Instituto de Estudios Políticos y Derecho Público "Dr. Humberto J. La Roche"
de la Facultad de Ciencias Jurídicas y Políticas de la Universidad del Zulia
Maracaibo, Venezuela
Publicación cientíca en formato digital
ISSN-Versión Impresa 0798-1406 / ISSN-Versión on line 2542-3185
Depósito legal pp 197402ZU34
ppi 201502ZU4645
Vol.40 N° 75
2022
Recibido el 15/02/2022 Aceptado el 25/07/2022
ISSN 0798- 1406 ~ De pó si to le gal pp 198502ZU132
Cues tio nes Po lí ti cas
La re vis ta Cues tio nes Po lí ti cas, es una pu bli ca cn aus pi cia da por el Ins ti tu to
de Es tu dios Po lí ti cos y De re cho Pú bli co Dr. Hum ber to J. La Ro che” (IEPDP) de la Fa-
cul tad de Cien cias Ju rí di cas y Po ti cas de la Uni ver si dad del Zu lia.
En tre sus ob je ti vos fi gu ran: con tri buir con el pro gre so cien tí fi co de las Cien cias
Hu ma nas y So cia les, a tra vés de la di vul ga ción de los re sul ta dos lo gra dos por sus in ves-
ti ga do res; es ti mu lar la in ves ti ga ción en es tas áreas del sa ber; y pro pi ciar la pre sen ta-
ción, dis cu sión y con fron ta ción de las ideas y avan ces cien tí fi cos con com pro mi so so cial.
Cues tio nes Po lí ti cas apa re ce dos ve ces al o y pu bli ca tra ba jos ori gi na les con
avan ces o re sul ta dos de in ves ti ga ción en las áreas de Cien cia Po lí ti ca y De re cho Pú bli-
co, los cua les son so me ti dos a la con si de ra ción de ár bi tros ca li fi ca dos.
ESTA PU BLI CA CIÓN APA RE CE RE SE ÑA DA, EN TRE OTROS ÍN DI CES, EN
:
Re vicyhLUZ, In ter na tio nal Po li ti cal Scien ce Abs tracts, Re vis ta In ter ame ri ca na de
Bi blio gra fía, en el Cen tro La ti no ame ri ca no para el De sa rrol lo (CLAD), en Bi blio-
gra fía So cio Eco nó mi ca de Ve ne zue la de RE DIN SE, In ter na tio nal Bi blio graphy of
Po li ti cal Scien ce, Re vencyt, His pa nic Ame ri can Pe rio di cals In dex/HAPI), Ul ri chs
Pe rio di cals Di rec tory, EBS CO. Se en cuen tra acre di ta da al Re gis tro de Pu bli ca cio-
nes Cien tí fi cas y Tec no ló gi cas Ve ne zo la nas del FO NA CIT, La tin dex.
Di rec to ra
L
OIRALITH
M. C
HIRINOS
P
ORTILLO
Co mi Edi tor
Eduviges Morales Villalobos
Fabiola Tavares Duarte
Ma ría Eu ge nia Soto Hernández
Nila Leal González
Carmen Pérez Baralt
Co mi Ase sor
Pedro Bracho Grand
J. M. Del ga do Ocan do
Jo Ce rra da
Ri car do Com bel las
An gel Lom bar di
Die ter Nohlen
Al fre do Ra mos Ji mé nez
Go ran Ther born
Frie drich Welsch
Asis ten tes Ad mi nis tra ti vos
Joan López Urdaneta y Nil da Ma n
Re vis ta Cues tio nes Po lí ti cas. Av. Gua ji ra. Uni ver si dad del Zu lia. Nú cleo Hu ma nís ti co. Fa-
cul tad de Cien cias Ju rí di cas y Po lí ti cas. Ins ti tu to de Es tu dios Po lí ti cos y De re cho Pú bli co
Dr. Hum ber to J. La Ro che. Ma ra cai bo, Ve ne zue la. E- mail: cues tio nes po li ti cas@gmail.
com ~ loi chi ri nos por til lo@gmail.com. Te le fax: 58- 0261- 4127018.
Vol. 40, Nº 75 (2022), 334-351
IEPDP-Facultad de Ciencias Jurídicas y Políticas - LUZ
Application of the method of computer
forensic simulation of crimes in the course
of an armed conict
DOI: https://doi.org/10.46398/cuestpol.4075.22
Andriy Tymchyshyn *
Oleh Zvonarov **
Olena Mokhonko ***
Vitalii Postryhan ****
Olena Popovych *****
Abstract
The objective of the study was to determine the characteristics
and perspectives of the use of computer simulation as a method
for investigating crimes committed in the course of an armed
conict. In addition, the study involved a system approach,
descriptive analysis, systematic sampling, doctrinal approach
and prognostic methods. The author chooses the technological direction of
application of the simulation (prospective or retrospective) and simulates
the characteristics of the event, the identity of the oender, the victim of
the crime and the sequence of the investigation process. In the course of
hostilities, computer simulation can be performed by representatives of
national and international law enforcement agencies, depending on the
type of crime. Computer simulation in the course of armed conict requires
standardization of procedures and improvement of the substantive and
instrumental components of the application of this method. It is concluded
that this model has dierent perspectives for its development, which
include: standardization of procedures with due regard to the specics
of the crime committed and the oender; details of information sources;
* PhD in Law, Head of the Law Department, Separate Structural Subdivicion of Higher Education
Institution "Open International University of Human Development 'Ukraine'" Ivano-Frankivska
Branch, 76010, Ivano-Frankivsk, Ukraine. ORCID ID: https://orcid.org/0000-0002-9591-8273.
** PhD in Law, Associate Professor, Special Chair, Educational and Scientic Institute of the State
Security, Nacional Academy of the Security Service of Ukraine, 03066, Kyiv, Ukraine. ORCID ID:
https://orcid.org/0000-0002-7142-4842.
*** PhD in Law, Senior Lecturer, Chair Criminal Process and Criminology, Educational and Scientic
Humanitarian Institute, National Academy of the Security Service of Ukraine, 03066, Kyiv, Ukraine.
ORCID ID: https://orcid.org/0000-0002-2583-4445.
**** Doctor of Law, Associate Professor, Department of Public and Private Law, Faculty of Law and
Humanitarian Studies, East European University named after Rauf Ablyazov, 18936, Cherkasy,
Ukraine. ORCID ID: https://orcid.org/0000-0003-3480-6443.
***** PhD in Law, Associate Professor, Department of International and Criminal Justice, Chernivtsi
Educational and Scientic Institute of Law of the National University "Odesa Law Academy", 58002,
Chrnivtsi, Ukraine. ORCID ID: https://orcid.org/0000-0002-6778-4714.
335
CUESTIONES POLÍTICAS
Vol. 40 Nº 75 (2022): 334-351
technological direction of simulation; possible types of models; and, the
need/appropriateness of involving international coordination assistance.
Keywords: law enforcement; armed conict; crime investigation;
criminal justice; forensic methods.
Aplicación del método de simulación informática
forense de delitos en el curso de un conicto armado
Resumen
El objetivo del estudio fue determinar las características y perspectivas
del uso de la simulación por computadora como método para investigar los
delitos cometidos en el curso de un conicto armado. Además, el estudio
involucró un enfoque de sistema, análisis descriptivo, muestreo sistemático,
enfoque doctrinal y métodos de pronóstico. El autorizado elige la dirección
tecnológica de aplicación de la simulación (prospectiva o retrospectiva)
y simula las características del hecho, la identidad del delincuente, la
víctima del delito y la secuencia del proceso de investigación. En el curso
de las hostilidades, la simulación por computadora puede ser realizada por
representantes de las fuerzas del orden nacionales e internacionales, según
el tipo de delito. La simulación por computadora en el curso de un conicto
armado requiere de la estandarización de los procedimientos y la mejora
de los componentes sustantivos e instrumentales de la aplicación de este
método. Se concluye que este modelo tiene diferentes perspectivas para su
desarrollo, que incluyen: la estandarización de los procedimientos teniendo
debidamente en cuenta las especicidades del delito cometido y del
delincuente; detalles de las fuentes de información; dirección tecnológica
de simulación; posibles tipos de modelos; y, la necesidad/adecuación de
involucrar la asistencia de coordinación internacional.
Palabras clave: aplicación de la ley; conicto armado; investigación de
delitos; justicia penal; métodos forenses.
Introduction
The ght against crime is extremely necessary for the stability and
development of society. Law enforcement agencies try to exert eective
inuence on criminals and their groups with due regard to the specics of
criminal activity (Tyagi and Sharma, 2018). This is why innovative methods
of detection and investigation of crimes reect the use of currently available
336
Andriy Tymchyshyn, Oleh Zvonarov, Olena Mokhonko, Vitalii Postryhan y Olena Popovych
Application of the method of computer forensic simulation of crimes in the course of an armed conict
technologies in criminal actions.
The use of the latest technologies (Caldwell et al., 2020) by criminals
led to the reorientation of law enforcement ocers to the collection of
mostly digital evidence (Freeman, 2018). In general, cybernetic methods
(Pryakhin, 2022), in particular data mining, their processing with the help
of articial intelligence (Shah et al., 2021), have become an important part
of crime detection (McClendon and Meghanathan, 2015).
Forensic innovations have provided a better understanding of the
dynamics of criminal activity, identication of criminal behaviour patterns
(Tyagi and Sharma, 2018). This, in turn, provided an opportunity to simulate
and predict the development of criminal situations (Blahuta and Movchan,
2020), to visualize various aspects of the committed crime through models.
Virtual reality becomes a component of forensic methods that increase the
quality of proceedings and trials (Ahir et al., 2020). Therefore, it became
possible to obtain evidence that is accepted in courts through general
methods of investigation of all types of crimes by means of digital forensics
(Rani, 2018).
However, armed conicts are an obvious challenge to law enforcement
and judicial systems. Armed aggression always results in massive violations
of human rights. The governments of states, the territory of which is covered
by hostilities, are objectively unable to eectively full their obligations to
protect citizens from criminal encroachments, including the payment of
compensation to victims.
The crime rate is increasing rapidly in the course of hostilities,
accompanied by an increased number of the most serious crimes in
its structure, the number of law enforcement ocers involved in the
investigation process is being signicantly reduced, so it is impossible to
ensure the proper safety of participants in criminal proceedings. The eorts
of international justice also do not guarantee a quick and eective trial of
cases on conict-related crimes and bringing the perpetrators to justice
(Farrell Rosenberg and Nassar, 2022).
The specics of hostilities necessitate the use of the newest methods of
digital forensics by law enforcement agencies, which enable generating a
set of evidence acceptable to the court quickly, qualitatively, safely with
the involvement of a small number of people. Computer simulation takes
a prominent place among such methods. At the same time, the analysis of
the signicance and eectiveness of computer simulation of crimes in the
course of hostilities faces a number of conceptual legal, organizational and
procedural problems.
As for the legal aspect, genocide, crimes against humanity and war
crimes are considered the most serious acts as the object of application of
the latest forensic methods. The international community considers that
337
CUESTIONES POLÍTICAS
Vol. 40 Nº 75 (2022): 334-351
the prevention, investigation and prosecution of such crimes play a central
role in the ght against impunity (Interpol, 2015). War crimes committed
with the use of the latest weapons leave digital traces.
This becomes the basis for new sources and types of data, and
fundamentally changes the investigation of such crimes (Freeman, 2021).
However, little attention is paid to the fact that other violent and acquisitive
crimes are committed in the course of military operations, which also
require eective investigation.
Besides, the specics of the justice system are important because the
generated set of evidence must be accepted by the court. It can be both
a national and an international court for crimes committed during the
hostilities. However, international criminal justice is dierent from national
one, as the international justice does not appeal to harsh sanctions. This is
a humanitarian form of justice, where the victim occupies a central place
(Lohne, 2020).
The state plays the main role in the investigation and prosecution of
international crimes remains with the state. It has the duty and right to
exercise criminal jurisdiction when crimes are committed on its territory
or by its citizens (Mayans-Hermida and Hola, 2020). The International
Criminal Court only supplements national eorts (International Criminal
Court & The Oce of the Prosecutor, 2014).
This is why the national law enforcement and judicial systems carry
the main burden of detection, investigation and trial of criminal cases
about crimes during the hostilities. However, quite often the International
Criminal Court does not accept the evidence collected by “external”
(national) investigators (Braga da Silva, 2020).
This results in the organizational problems of using computer
simulation of crimes in the course of hostilities. Not all states that face such
acts have specially trained law enforcement ocers. This raises the issue of
conducting training of investigators. Ideally, every investigator in the eld
will be able to conduct expert research by connecting a laptop to databases
(Du et al., 2017). However, this is possible only with proper strategic
cooperation and ensuring the exchange of experience with international
specialists (Interpol, 2015).
The practical skills of processing information and forming databases
are an important procedural component of computer simulation of crimes.
During the hostilities, a signicant information array can be obtained with
the help of social networks. These platforms are obviously valuable for
collecting and storing the testimonies of victims and witnesses of crimes,
although they are limited in showing certain events and their evaluations
(Goldschmidt-Gjerløw and Remkes, 2019).
338
Andriy Tymchyshyn, Oleh Zvonarov, Olena Mokhonko, Vitalii Postryhan y Olena Popovych
Application of the method of computer forensic simulation of crimes in the course of an armed conict
Even in a normal situation, social networks are actively analysed to
detect and investigate criminal activity (Nizamani et al., 2019). This becomes
especially important in the military conict zones (Freeman, 2018). Among
other things, this will enable working out algorithms for cooperation
with civil society in order to integrate the results of the application of the
latest forensic methods into procedural activities (Zweig et al., 2018). For
example, the Oce of the Prosecutor of the International Criminal Court
recognizes the important role that civil society plays in the ght against
sexual crimes and crimes against children.
The Oce supports and strengthens cooperation with those civil
institutions that have experience in documenting such crimes and working
with victims (International Criminal Court & The Oce of the Prosecutor,
2014).
Although the area of intersection of technology, human rights and
criminal prosecution is relatively new, it will cover a wide range of
criminal cases in the near future (Freeman, 2018). Therefore, the use of
digital forensics methods in general and computer simulation of crimes in
particular will be increasingly expanding, especially in the course of armed
conicts.
1. Aim
In view of the foregoing, the aim of this study is to consider the specics
of the use of computer simulation of crimes in the course of hostilities with
the determination of problematic aspects to achieve the goals of justice.
The aim involved the following research objectives: clarify the legal,
organizational and procedural aspects of applying the method of computer
simulation of crimes in the course of hostilities; determine prospects for
the introduction of standards governing the use of this method in crime
investigation.
2. Methodology and methods
The sources which textually and contextually cover the issue of computer
simulation of crimes as a method of digital forensics were selected in order
to achieve the goals and tasks set in the article. Their analysis resulted in
formulation of the main legal, organizational and procedural aspects of the
subject under research.
The article also involved a generalization of the practice of international
judicial bodies and law enforcement agencies regarding the standards for
determining the signs of international crimes committed during hostilities,
339
CUESTIONES POLÍTICAS
Vol. 40 Nº 75 (2022): 334-351
and regarding the results of the use of computer simulation of crimes in the
context of requirements for the presentation of evidence in national and
international courts.
This enabled determining the main prospects for improving the
eectiveness of the use of computer simulation of crimes in the course of
hostilities.
The aim of this study was achieved through the following methods:
the system approach was used to study computer simulation of crimes
as a logical sequence of actions of authorized persons for the generation
of evidence in criminal proceedings for cases on crimes in the course of
hostilities; descriptive analysis was used to identify and study the specics
of computer simulation as a method of digital forensics; systematic
sampling and doctrinal approach enabled identifying and describing the
features of crimes for which computer simulation is used in the course of
hostilities; forecasting was used to determine the prospects for improving
the eectiveness of computer simulation of crimes.
3. Results
The application of the computer simulation of crimes in the course
of hostilities is a problem with many components. These reasons are the
following: a) the heterogeneity of crimes that can be committed during
hostilities, and the characteristics of criminals; b) characteristics of persons
whose authority may include simulation; c) specics that determine the
organizational and procedural aspects of the application of this forensic
method.
With regard to crimes committed during hostilities, they represent a
heterogeneous set of dangerous acts. These actions are dierent in terms of
danger and subjects. However, they can be combined into one group based
on the situation — the crimes committed during the hostilities. Such crimes
can include: a) international crimes with their inherent features determined
by the International Criminal Court (genocide, crimes against humanity and
war crimes (International Criminal Court, 2013), sexual violence occupies
a special place in this list (UN; DPKO/DFS Specialised Training Materials,
2017); b) military crimes against the procedure of military service provided
for by national legislation (for example, disobeying an order, desertion); c)
crimes against national security (for example, treason); d) general crimes
that are not directly related to the conict, but the hostilities facilitate the
commission of these crimes and hiding of criminals from law enforcement
authorities (for example, murder, robbery, fraud) (see Figure 1).
340
Andriy Tymchyshyn, Oleh Zvonarov, Olena Mokhonko, Vitalii Postryhan y Olena Popovych
Application of the method of computer forensic simulation of crimes in the course of an armed conict
Figure 1: A set of crimes committed in the course of military operations.
The specics of the perpetrators are an important characteristic of
crimes in the course of military operations, which aects the specics of
the use of computer simulation. For example, perpetrators of international
crimes include both direct perpetrators and military commanders. A
military commander can be prosecuted for crimes committed by forces
under his eective control and command.
Even if the commander did not give the criminal order, he will be
responsible for the inability or the failure to exercise eective control (UN;
DPKO/DFS Specialised Training Materials, 2017). Besides, crimes can be
committed individually or in groups characterized by varying degrees of
cohesion (see Figures 2a, 2b).
Figure 2a: The specics of the status of persons who commit crimes during
hostilities
341
CUESTIONES POLÍTICAS
Vol. 40 Nº 75 (2022): 334-351
The crimes of soldiers entail the responsibility of ocers.
Figure 2b: Quantitative composition of perpetrators who commit crimes during
the hostilities.
The data for drawing conclusions about the specics of the crime
committed during military operations are obtained from various sources.
Features of the combat situation determine the main aspects that should
be taken into account: a) the most eective collection of information that
can be used for computer simulation in hard-to-reach areas; b) objectivity
of the data obtained; c) safety of persons participating in the proceedings;
d) availability of information for all persons concerned (Freeman, 2018).
Messages in mass media and social networks become very widespread
sources of information during the hostilities (Sarkin, 2021). In particular,
social networks are a huge archive of digitized images. Having an image of
a person of interest to the ocers of the criminal investigation department,
it is possible to establish his/her location, connections, or at least the
direction for further search (Blahuta and Movchan, 2020). The results
of processing of the information obtained determine the choice of the
technological direction of applying the computer simulation as a component
of the investigation of the act by the authorized person - prospective or
retrospective (see Figure 3).
342
Andriy Tymchyshyn, Oleh Zvonarov, Olena Mokhonko, Vitalii Postryhan y Olena Popovych
Application of the method of computer forensic simulation of crimes in the course of an armed conict
Figure 3: Technological direction of applying computer simulation (Pryakhin,
2022).
The peculiarities of the committed crime, the specics of the available
information and the choice of technological direction allow the authorized
person to determine most appropriate computer models. Studying practical
experience allows us to single out the four most widespread types of models
that can be components of the investigation of crimes during hostilities.
They help to reproduce: a) the event of the crime; b) the criminal’s identity;
c) the victim’s identity; d) certain regularities of the investigation (see
Figure 4).
Figure 4: Types of models as a result of computer simulation of crimes in the
course of hostilities (Benz et al., 2022; Blahuta and Movchan, 2020; Gupta et
al., 2015; Horsman and Sunde, 2022; Jha et al., 2019; Longhi, 2021).
343
CUESTIONES POLÍTICAS
Vol. 40 Nº 75 (2022): 334-351
The specics of the use of computer simulation of crimes in the course
of hostilities determines that only authorized persons - experts in the eld
of criminal justice - can apply this forensic method. At the same time, the
peculiarities of the crimes, in connection with which this simulation is used,
determine the principle of complementarity of eorts of international and
national law enforcement agencies and judicial bodies (Mayans-Hermida
and Hola, 2020).
However, the main way to achieve the goals of justice for crimes
committed in the course of hostilities is through national legal systems
(Farrell Rosenberg and Nassar, 2022). Their activities regarding serious
international crimes are coordinated and supported by Interpol (Interpol,
2015). This is why the subject competence of authorized persons can be
presented as follows (see Figure 5):
Figure 5: Subject competence of persons authorized to apply computer
simulation of crimes committed in the course of hostilities
The development of methods and tools of digital criminology enables
determining the main prospects for improving computer simulation of crimes in the
course of hostilities: a) meaningful innovations that are related to the formulation
of new tasks (Pavliuk, 2019; Wang et al., 2019); b) instrumental innovations in
terms of technical and technological support for computer simulation of crimes
(D’alessandra and Sutherland, 2021; Gunha et al., 2022; Shah et al., 2021) (see
Figure 6).
344
Andriy Tymchyshyn, Oleh Zvonarov, Olena Mokhonko, Vitalii Postryhan y Olena Popovych
Application of the method of computer forensic simulation of crimes in the course of an armed conict
Figure 6: Prospects for improving computer simulation of crimes in the course
of hostilities.
In view of the foregoing, it is considered appropriate to talk about the
reasonability of developing standard computer simulation procedures
that can be applied in most investigations of crimes committed in the
course of hostilities. These procedures should be based on the following
aspects: peculiarities of the committed crime and the criminal (criminals);
the specics of data obtained from available sources of information;
technological direction of simulation; the types of models to be applied;
the necessity/appropriateness of involving international coordination
assistance. This will enable standardizing the results of computer
simulations for the needs of national and international justice.
4. Discussion
Research on the application of computer simulation of crimes in the
course of hostilities is still lacking. In general, this problem is a component
of the theoretical applied discourse regarding the latest technologies in
detecting and investigating crimes. The digital forensics is currently not
only about the process of investigating computer crimes.
It provides methods of identication, storage, collection, verication,
analysis, documentation and provision of digital evidence in all categories
of criminal proceedings (Rani, 2018). As experts rightly note, this raises
the practical importance of technologies that: a) speed up data collection;
b) reduce storage volumes; c) provide timely review and analysis of
information; d) management of knowledge and archives (Du et al., 2017).
In general, it is emphasized that computer simulation of crimes is
quite widely used in countries with developed law enforcement systems.
345
CUESTIONES POLÍTICAS
Vol. 40 Nº 75 (2022): 334-351
Ukraine is no exception (Avdieieva and Bululukov, 2019; Bilous, 2021). The
following models are mainly paid attention: a) crime scene reproduction
with the help of 3D visualization among other techniques (Wang et al.,
2019); b) forensic medical examination of victims based on 3D models
(Benz et al., 2022); c) facial reconstruction (forensic facial approximation)
(Gupta et al., 2015); d) criminal proling (Jha et al., 2019).
One should support the position of the appropriateness of using
simulation with regard to crimes committed in the course of hostilities,
because the creation of models is used mainly in those cases when the
study of the object, phenomenon or process in the original is impossible
for one reason or another. The authors correctly point out that the specics
of modern warfare led to the growth of the intellectual component in
armament. In case of crimes related to armed conict, this allows the use
of new types of data that can be interpreted in criminal proceedings as
evidence (Freeman, 2021).
In order to eliminate impunity, it is extremely important that states
strive to eectively investigate and prosecute serious international crimes
(International Criminal Court & The Oce of the Prosecutor, 2014).
However, it seems controversial to reduce crimes committed in the course
of hostilities mainly to international acts (for example, genocide, war
crimes, sexual violence and torture (UN; DPKO/DFS Specialised Training
Materials, 2017), against children (International Criminal Court & The
Oce of the Prosecutor, 2014). “Ordinary” crimes that are not related to
the conict, but are committed in the course of hostilities (robbery, murder,
etc.) also pose a signicant danger to victims and society. Their investigation
also faces the challenges of a combat environment and requires the use of
the latest forensic technologies.
The availability of simulations based on such technologies as social
networks, cloud computing, mobile technologies, information resizing,
encryption, and varieties of virus programmes for law enforcement ocers
is ambiguously evaluated, because they make the investigation quite
complicated and burdensome (Thakar et al., 2021; Rudyk et al., 2022).
In this regard, one should agree that constant technological innovations
guide the eorts of investigators, prosecutors, lawyers and judges to adapt
procedures for operations with digital evidence (Freeman, 2018).
In particular, the experience of the Joint Investigative Group
investigating the MH-17 crash can be considered a positive example. In its
conclusions, the Joint Investigative Group refers to a signicant amount
and dierent types of digital evidence, including data from open sources.
This made it possible to create models of signicant aspects of the event
(Freeman, 2018).
346
Andriy Tymchyshyn, Oleh Zvonarov, Olena Mokhonko, Vitalii Postryhan y Olena Popovych
Application of the method of computer forensic simulation of crimes in the course of an armed conict
The procedural dimension of the use of computer simulation of crimes
committed in the course of hostilities is also considered problematic. The
relevance of the issue of compliance with the fair trial standards is rightly
emphasized. This primarily concerns international courts (Zarmsky,
2021). It is suggested that the prosecution should provide the defence with
maximum access to the evidence base at the early stages of the proceedings
in order to ensure the fairness of the trial (Freeman, 2018). However, this is
not always possible because of the specics of crimes related to the armed
conict.
The results of this study indicate that the statement on the need for
common standards of proof and algorithms for collecting and securing
digital evidence should be shared. Proposals for improving data analysis
algorithms through visualization of information content (Thakar et al.,
2021) (for example, using a computer model to visualize the testimony of
the interrogated) seem promising (Pavliuk, 2019; Rudyk et al., 2022).
However, the position that all lawyers should become experts in how
to collect, store and use digital evidence may be a bit of an exaggeration.
This primarily concerns the use of data from social networks and other
digital communications in conict zones (Freeman, 2018). As concerns
international crimes, a point of view should be shared regarding the
appropriateness of uniting the eorts of national law enforcement agencies
(Interpol, 2015) and creating a legal framework for optimizing the use of
national investigations at the International Criminal Court (Braga da Silva,
2020). In general, these considerations can form the basis of the legal,
organizational and procedural aspects of the use of computer simulation of
crimes committed in the course of hostilities.
Conclusions
The conducted research provides the ground for drawing a number of
conclusions regarding the legal signicance, organizational and procedural
features of computer simulation of crimes committed in the course of
hostilities as a forensic method.
It was established that the mentioned crimes represent a set of various
actions united by the situation — they were committed in the course of
hostilities. Computer simulation of these crimes is used depending on
the specics of the act, status and number of persons who commit it. It is
shown that the authorized person chooses the technological direction of
applying the computer simulation method — prospective or retrospective
— as a component of the investigation of the act based on the results of
information processing.
347
CUESTIONES POLÍTICAS
Vol. 40 Nº 75 (2022): 334-351
This makes it possible to determine the most appropriate type(s)
of models in a particular criminal proceeding. It was established that
representatives of national and international law enforcement agencies are
among the persons authorized to use computer simulation depending on
the specics of the crime. The further use of computer simulation of crimes
committed in the course of hostilities involves meaningful and instrumental
development of this activity.
It is proposed to develop standard simulation procedures to standardize
the results of computer simulation and their use as evidence in national
and international courts. They are determined by the following aspects:
specics of the committed crime and the criminal(s); the specics of data
obtained from available sources of information; technological direction of
simulation; the types of models to be applied; the necessity/appropriateness
of involving international coordination assistance.
This study opens up the prospects of working out the standards of
forensic support for the detection and investigation of crimes committed in
the course of hostilities with the further use of the evidence base in national
and international courts. A separate promising direction is the organization
of training practicing lawyers for the implementation and use of the latest
technologies in criminal proceedings and court proceedings.
Bibliographic References
AHIR, Kunjal; GOVANI, Kajal; GAJERA, Rutvik; SHAH, Manan. 2020.
“Application on Virtual Reality for Education Learning, Military Training
and Sports” In: Augmented Human Research. Vol. 5, No. 7, pp. 120-123.
AVDIEIEVA, Halyna; BULULUKOV, Oleh. 2019. “Innovative products
developed by the sta of Academician V.V. Stashis Scientic Research
Institute for the Study of Crime Problems together with scientists from
the Department of Forensic Science of the Yaroslav Mudryi National
Law University” In: Innovative methods and digital technologies in
criminology, forensic examination and legal practice: materials of the
international “round table” Pravo. Kharkiv, Ukraine.
BENZ, Lena; AMPANOZI, Garyfalia; FRACKENBERG, Sabine; MASSINI,
Federico; SIEBERTH, Till. 2022. “Forensic examination of living persons
in 3D models” In: Forensic Science International. Vol. 335, pp. 111286.
BILOUS, Ruslana. 2021. “Participation of criminal analysts in solving crimes.”
In: Using the achievements of modern science and technology in solving
crimes: materials of the scientic and practical round table. National
Academy of Internal Aairs. Kyiv, Ukraine.
348
Andriy Tymchyshyn, Oleh Zvonarov, Olena Mokhonko, Vitalii Postryhan y Olena Popovych
Application of the method of computer forensic simulation of crimes in the course of an armed conict
BLAHUTA, Roman; MOVCHAN, Anatolii. 2020. The latest technologies in the
investigation of crimes: the current state and problems of use. Lviv State
University of Internal Aairs. Lviv, Ukraine.
BRAGA DA SILVA, Rafael. 2020. “Sherlock at the ICC? Regulating Third-
Party Investigations of International Crimes in the Rome Statute Legal
Framework” In: Journal of International Criminal Justice. Vol. 18, No.
1, pp. 59-86.
CALDWELL, Martyn; ANDREWS, Jerone; TANAY, Thomas; GRIFFIN, Lewis.
2020. “AI-enabled future crime” In: Crime Science. Vol. 9, No. 14, pp.
1-13.
D’ALESSANDRA, Federica; SUTHERLAND, Kirsty. 2021. “The Promise and
Challenges of New Actors and New Technologies in International Justice”
In: Journal of International Criminal Justice. Vol. 19, No. 1, pp. 9-34.
DU, Xiaoyu; LE-KHAC, Nhien-An; SCANLON, Mark. 2017. “Evaluation of
Digital Forensic Process Models with Respect to Digital Forensics as a
Service” In: 16th European Conference on Cyber Warfare and Security
(ECCWS 2017). Dublin, Ireland.
FARRELL ROSENBERG, Erin; NASSAR, Amal. 2022. “Response to Conict-
related Sexual Violence in Ukraine: Accountability and Reparations” In:
Opinio Juris. Available online. In: http://opiniojuris.org/2022/06/21/
response-to-conict-related-sexual-violence-in-ukraine-accountability-
and-reparations/. Consultation date: 18/07/2022.
FREEMAN, Lindsay. 2018. “Digital Evidence and War Crimes Prosecutions: The
Impact of Digital Technologies on International Criminal Investigations
and Trials” In: Fordham International Law Journal. Vol. 41, No. 2, pp.
283-335.
FREEMAN, Lindsay. 2021. “Weapons of War, Tools of Justice: Using Articial
Intelligence to Investigate International Crimes” In: Journal of
International Criminal Justice. Vol. 19, No. 1, pp. 35-53.
GOLDSCHMIDT-GJERLØW, Beate; REMKES, Merel. 2019. “Frontstage
and Backstage in Argentina’s Transitional Justice Drama: The Nietas’
Reconstruction of Identity on Social Media” In: International Journal of
Transitional Justice. Vol. 13, No. 2, pp. 349-367.
GUNHA, Rafael Rodrigues; ARRABAL, Claude Thiago; DANTAS, Marcelo
Mourão; BASSANELLI, Hélio Rodrigues. 2022. “Laser scanner and
drone photogrammetry: A statistical comparison between 3-dimensional
models and its impacts on outdoor crime scene registration” In: Forensic
Science International. Vol. 330. 111100.
349
CUESTIONES POLÍTICAS
Vol. 40 Nº 75 (2022): 334-351
GUPTA, Sonia; GUPTA, Vineeta; VIJ, Hitesh; VIJ, Ruchieka; TYAGI, Nutan.
2015. “Forensic Facial Reconstruction: The Final Frontier” In: Journal of
Clinical and Diagnostic Research. Vol. 9, No. 9, pp. 26-28.
HORSMAN, Graeme; SUNDE, Nina. 2022. “Unboxing the digital forensic
investigation process” In: Science and Justice. Vol. 62, No. 2, pp. 171-180.
INTERNATIONAL CRIMINAL COURT. 2013. Elements of Crimes. Available
online. In: https://www.icc-cpi.int/sites/default/les/Publications/
Elements-of-Crimes.pdf. Consultation date: 18/07/2022.
INTERNATIONAL CRIMINAL COURT; THE OFFICE ОF THE PROSECUTOR.
2014. Policy Paper on Sexual and Gender-Based Crimes. Available
online. In: https://www.icc-cpi.int/sites/default/les/iccdocs/otp/
OTP-Policy-Paper-on-Sexual-and-Gender-Based-Crimes--June-2014.
pdf. Consultation date: 18/07/2022.
INTERPOL. 2015. Interpol’s support to the investigation and prosecution of
genocide, war crimes and crimes against humanity.
JHA, Pranay; JHA, Raman; SHARMA, Ashok. 2019. “Behavior Analysis and
Crime Prediction using Big Data and Machine Learning” In: International
Journal of Recent Technology and Engineering. Vol. 8, No. 1, pp. 461-
468.
LOHNE, Kjersti. 2020. “Penal welfarism ‘gone global’? Comparing international
criminal justice to The Culture of Control” In: Punishment and Society.
Vol. 23, No. 1, pp. 3-23.
LONGHI, Julien. 2021. “Using digital humanities and linguistics to help with
terrorism investigations” In: Forensic Science International. Vol. 318,
pp. 1110564.
MAYANS-HERMIDA, Beatriz; HOLA, Barbora. 2020. “Balancing ‘the
International’ and ‘the Domestic’: Sanctions under the ICC Principle of
Complementarity” In: Journal of International Criminal Justice. Vol. 18,
No. 5, pp. 1103–1130.
McCLENDON, Lawrence; MEGHANATHAN, Natarajan 2015. “Using Machine
Learning Algorithms to Analyze Crime Data” In: Machine Learning and
Applications: An International Journal. Vol. 2, No. 1, pp. 12.
NIZAMANI, Sarwat; NIZAMANI, Saad; NIZAMANI, Sehrish; ISMAILI, Imdad.
2019. “On the computational models for the analysis of illicit activities”
In: Computer Science: Computers and Society. Available online. In:
https://arxiv.org/abs/1902.05691. Consultation date: 18/07/2022.
350
Andriy Tymchyshyn, Oleh Zvonarov, Olena Mokhonko, Vitalii Postryhan y Olena Popovych
Application of the method of computer forensic simulation of crimes in the course of an armed conict
PAVLIUK, Nazar. 2019. Application of 3D modeling during interrogation and
investigative experiment. In: Innovative methods and digital technologies
in criminology, forensic examination and legal practice: materials of the
international “round table”. Pravo. Kharkiv, Ukraine.
PRYAKHIN, Yevhen. 2022. Forensic means and methods of investigating
criminal oenses. Lviv State University of Internal Aairs. Lviv, Ukraine.
RANI, Sudesh. 2018. “Digital Forensic Models: A Comparative Analysis” In:
International journal of Management, IT and Engineering. Vol. 8, No.
6, pp. 432-443.
RUDYK, Mykola; MASLIENIKOVA, Kateryna; NOSEVYCH, Nadiya;
VINTSUK, Viktoriia; FATKHUTDINOV, Vasyl. 2022. “The Role of
the Number of Detected Criminal Oenses in the Police Performance
Indicators System” In: Cuestiones Políticas. Vol. 40, No.73, pp. 90-107.
SARKIN, Jeremy Julian. 2021. “Promoting the Rights of Victims in Under-
Resourced Places by Using Science and Technology That Can be Used
by Ordinary People, to Deal with Human Rights Violations: Bolstering
the Right to the Truth” In: Liverpool Law Review, Vol. 42, No. 3, pp. 339-
360.
SHAH, Neil; BHAGAT, Nandish; SHAH, Manan. 2021. “Crime forecasting: a
machine learning and computer vision approach to crime prediction and
prevention” In: Visual Computing for Industry, Biomedicine and Art.
Vol. 4, No. 9, p. 14.
THAKAR, Akash; KUMAR, Kapil; PATEL, Baldev. 2021. “Next Generation
Digital Forensic Investigation Model (NGDFIM) – Enhanced, Time
Reducing and Comprehensive Framework” In: Journal of Physics:
Conference Series. Vol. 1767. 012054.
TYAGI, Deepika; SHARMA, Sanjiv. 2018. “An Approach to Crime Data
Analysis: a Systematic Review” In: International Journal of Engineering
Technologies and Management Research. Vol. 5, No. 2, pp. 67-74.
UN; DPKO/DFS SPECIALISED TRAINING MATERIALS. 2017. Prevention
and Response to Conict Related Sexual Violence. Available online.
In: http://repository.un.org/bitstream/handle/11176/400575/CRSV.
Strategic_Module.pdf?sequence=88&isAllowed=y. Consultation date:
18/07/2022.
WANG, Jinming; LI, Zhengdong; HU, Wenhu; SHAO, Yu; WANG, Liyang; WU,
Rongqi; MA, Kaijun; ZOU, Donghua; CHEN, Yijiu. 2019. “Virtual reality
and integrated crime scene scanning for immersive and heterogeneous
crime scene reconstruction” In: Forensic Science International. Vol. 303,
pp. 109943.
351
CUESTIONES POLÍTICAS
Vol. 40 Nº 75 (2022): 334-351
ZARMSKY, Sarah. 2021. “Why Seeing Should Not Always Be Believing:
Considerations Regarding the Use of Digital Reconstruction Technology
in International Law” In: Journal of International Criminal Justice. Vol.
19, No. 1, pp. 213-225.
ZWEIG, Katharina; WENZELBURGER, Georg; KRAFFT, Tobias. 2018. “On
Chances and Risks of Security Related Algorithmic Decision Making
System” In: European Journal for Security Research. Vol. 3, pp. 181-203.
www.luz.edu.ve
www.serbi.luz.edu.ve
www.produccioncienticaluz.org
Esta revista fue editada en formato digital y publicada
en diciembre de 2022, por el Fondo Editorial Serbiluz,
Universidad del Zulia. Maracaibo-Venezuela
Vol.40 Nº 75