FORENSIC TECHNIQUE FOR IDENTIFYING CORRUPTION CHALLENGES TO NATIONAL SECURITY THROUGH DIGITAL TECHNOLOGIES

##plugins.themes.bootstrap3.article.main##

##plugins.themes.bootstrap3.article.sidebar##

Published: Dec 17, 2024

  Oleksii Makarenkov

  Victoria Kosa

Abstract

The article's subject is the application of forensic techniques for the identification of corruption challenges to national security through the utilisation of digital technologies. The research methodology employed a range of methods, including general philosophical, statistical, axiomatic, comparative, systemic, formal-dogmatic, hermeneutic, axiological, and other approaches. The purpose of this article is to present a forensic technique for identifying corruption challenges to national security through the use of digital technologies. It has been demonstrated that the teleological focus of forensic investigation, namely the acquisition of proper evidence, is explicitly delineated within the methodology employed in anti-corruption investigations. This methodology encompasses the documentation of testimonies from whistleblowers and other witnesses, statements from suspects and the accused to expose their accomplices, the facts of bribery transactions, agreements on bribes, the absence of lawful sources of enrichment, facts and methods of laundering illicit funds, and the locations where such funds and other corrupt resources are stored. It is imperative that all evidence, wherever feasible, substantiates the criminal intent pertaining to corruption. This encompasses a range of investigative techniques, including accounting, auditing, covert pre-trial measures, crowdsourcing platforms, whistleblowing, news reporting and dissemination platforms, blockchain technology for monitoring financial transactions, cloud-based digital infrastructure, technical-scientific expertise and other forensic methods enhanced by sophisticated computer equipment, electronic networks and communication tools. These are employed with the objective of identifying corruption risks for national security. It was emphasised that the complexity of the digital path of corrupt funds lies in the multitude of individuals involved in financial operations with these funds and the digital products used for such operations, the duration of corruption, the large volume of corrupt funds, and/or the laundering of illicit funds through cryptocurrency, corporate assets, foreign jurisdictions, offshore tax havens, and similar means. Blockchain technology can be employed to develop a system for monitoring the compliance of income and expenses of public officials, controlling financial transactions in the field of digital assets, tracking money laundering actions, funding of other criminal activities with these funds, and other transparency procedures. The electronic anti-corruption blockchain mechanism comprises a system of programs for the creation of databases and the exchange of information pertaining to the aforementioned areas of corruption risk, with a view to safeguarding the public interest. The relevant terminology and digital indicators of the material assets of potential subjects of corruption constitute the input data for this blockchain. It was posited that the confiscation of assets linked to corruption and related criminal activities, along with other resources, should be conducted through a series of simultaneous searches at the premises of all individuals with whom the corrupt individual is associated, whether through personal, professional, or business relationships. The prompt implementation of the algorithms is essential for the return of funds. The possibilities of eradicating corruption, which is exacerbated by the use of cryptocurrencies and other virtual assets in cyberspace, are enhanced by the outlined legal measures against the backdrop of growing investments in artificial intelligence. The use of digital tools in forensic methods of combating fraud and money laundering should be based on the relevant experience of highly developed countries.

How to Cite

Makarenkov, O., & Kosa, V. (2024). FORENSIC TECHNIQUE FOR IDENTIFYING CORRUPTION CHALLENGES TO NATIONAL SECURITY THROUGH DIGITAL TECHNOLOGIES. Baltic Journal of Economic Studies, 10(4), 288-300. https://doi.org/10.30525/2256-0742/2024-10-4-288-300
Article views: 38 | PDF Downloads: 16

##plugins.themes.bootstrap3.article.details##

Keywords

accounting, artificial intelligence, audit, blockchain, crypto, cyberspace, forensic technique, virtual assets

References

Alcántara, M. (2022). Ciencia política y digitalización. Revista Ecuatoriana de Ciencia Política. Vol. 1. N. 1. P. 6–21. DOI: https://doi.org/10.59352/recp.v1i1.22

Alecu, G., Boloș, P. (2023). The methodology of the investigation and research of corruption crimes. Romanian Journal of Forensic Science. Vol. 24. Nr. 1(133). P. 67–72.

Anti-corruption strategy for 2021-2025, approved by the Law of Ukraine dated 20.06.2022. № 2322-IX. Available at: https://zakon.rada.gov.ua/laws/show/2322-20#Text

Artificial Intelligence Act: regulation 2024/1689 of the European Parliament and of the Council of 13 June 2024. Available at: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024R1689

Balynska, O. M., Tokarska, A. S., Yashchenko, V. A. (2017). Actual problems of the philosophy of law: manual. Lviv: LvDUVS, 612 p.

Buryachok, V. L., Kyrychok, R. V., Skladanniy, P. M. (2018). Basics of information and cybernetic security: manual. Kyiv: KU B. Hrinchenka, 320 p.

Commission Anti-Fraud Strategy Action Plan – 2023 revision: communication from the European Commission. 11.7.2023. Available at: https://anti-fraud.ec.europa.eu/policy/policies-prevent-and-deter-fraud/european-commission-anti-fraud-strategy_en

Convention on Cybercrime, adopted by the Council of Europe 23.XI.2001. ETS No. 185. Budapest. Available at: https://rm.coe.int/1680081561

The Criminal Procedural Code of Ukraine dated 04/13/2012. № 4651-VI. Available at: https://zakon.rada.gov.ua/laws/show/4651-17/conv#n2390

Dela Р. (2016). Cyberspace as the Environment Affected by Organized Crime Activity. Connections. Vol. 15. No. 3. P. 55–64. DOI: https://doi.org/10.11610/Connections.15.3.05

Deployment of special investigative means. EU and the Council of Europe’s project on criminal assets recovery in Serbia. Strasbourg: Economic Crime Co-operation Unit. 2013. 94 p.

Đukić, T., Pavlovic, M., Grdinić, V. (2023). Uncovering Financial Fraud: The Vital Role of Forensic Accounting and Auditing in Modern Business Practice. Economic Themes. Vol. 61. Iss. 3. P. 407–418. DOI: https://doi.org/10.2478/ethemes-2023-0021

Goddard S., Hassan H., Kos D., Kraft O., Kupusswami R. and others (2024). Practical Guide on the Investigation of Corruption Cases. Vienna: UNODC. 107 p.

Google’s AI Principles Progress Update 2023. Available at: https://ai.google/static/documents/ai-principles-2023-progress-update.pdf

GoldenJackal: New Threat Group Targeting Middle Eastern and South Asian Governments. 23.05.2023. Available at: https://thehackernews.com/2023/05/goldenjackal-new-threat-group-targeting.html

Guidelines for secure AI system development. 27.11.2023. Available at: https://www.ncsc.gov.uk/files/Guidelines-for-secure-AI-system-development.pdf

G7 Italy 2024 Foreign Ministers’ Statement on Addressing Global Challenges, Fostering Partnerships. Media Note. April 19, 2024. Available at: https://www.state.gov/g7-italy-2024-foreign-ministers-statement-on-addressing-global-challenges-fostering-partnerships

Ibbotson, P. About compliance and governance: Thoughts arising from banking royal commission. Governance Directions. September 2018. P. 485–488.

Johar, S. S., Johar, G. S. (2017). Vol A Simple and Cogent Forensic Technique to Trap and Nab a Bribe-Seeking Corrupt Public Servant ‘Blue-Handed’. Indian Journal of Forensic Medicine and Toxicology. Vol. 11. No 1. DOI: https://doi.org/10.5958/0973-9130.2017.00010.X

Kossow, N., Dykes, V. (2018) Embracing Digitalisation: How to use ICT to strengthen Anti-Corruption. Bonn: Deutsche GIZ GmbH. 38 p.

Krishnaveni S., Thomas M., Mithileysh Sathiyanarayanan C., Amutha B. (2024). CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems. Vol. 27. P. 7273–7306. DOI: https://doi.org/10.1007/s10586-024-04320-x

Larsen, J. A., Wirtz, J. J. (2023). The Meaning of ‘Strategic’ in US National-security Policy. Global Politics and Strategy. Vol. 65. Iss. 5. P. 95–116. DOI: https://doi.org/10.1080/00396338.2023.2261249

Limba, T., Driaunys, K., Stankevicius, A., Andrulevicius, A. (2020). Cryptocurrency and National Security: Peculiarities of Interaction. Transformations in Business & Economics. Vol. 19. Iss. 2 (50). P. 138–158.

Makarenkov, О. L. (2023). Legal determination of good virtues in the image of Ukrainians as a condition for their integration into the EU. Law and Society. № 3. P. 40–48. DOI: https://doi.org/10.32842/2078-3736/2023.3.6

Millions Forfeited by Office of National Drug and Money Laundering Control Policy of Antigua and Barbuda. September 15, 2016. Press Releases. Available at: https://ondcp.gov.ag/millions-forfeited-by-ondcp/

Okinawa Charter on Global Information Society adopted by the Okinawa G8 Summit at Okinawa: Building a global development partnership. 22.07.2000. Available at: https://www.mofa.go.jp/policy/economy/summit/2000/pdfs/charter.pdf

Oleksyuk L. (2020) Cyber security management best practices: review report. Kyiv: Parliamentary Committee on Digital Transformation. 130 p.

Directive (EU) 2018/1673 of the European Parliament and of the Council of 23 October 2018 on combating money laundering by criminal law. Available at: https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32018L1673&qid=

On preventing, discovering and sanctioning corruption offences: Romania Law. No. 78 of May 8th, 2000. Available at: https://www.pna.ro/legislatie.xhtml?sectiune=2&id=14&jftfdi=&jffi=legislatie

Putra Yusra M. N. B., Simon Runturambi A. J., Widiawan B. (2024). Trends and Prevention of Cryptocurrency-Based Money Laundering Crimes. Asian Journal of Engineering, Social and Health. Vol. 3. No. 8. P. 1751–1759. DOI: https://doi.org/10.46799/ajesh.v3i8.378

Regime do segredo de estado: Lei Orgânica n.º 2/2014. 06.08.2014. Assembleia da República Portuguesa. Available at: https://www.pgdlisboa.pt/leis/lei_mostra_articulado.php?nid=2201&tabela=leis&so_miolo=

SEC Charges Three So-Called Market Makers in Crackdown on Manipulation of Crypto Assets Offered and Sold as Securities. Washington. 09.10.2024. Available at: https://www.sec.gov/newsroom/press-releases/2024-166

Serrano R., Schulz H., Rikk R., Pedak M., Jung I. and others (2018-2024) The National Cyber Security Index. Tallinn: e-Governance Academy Foundation. 45 p. Available at: https://ncsi.ega.ee/ncsi-index/?order=rank&archive=1

Sobre secretos oficiales: Ley 9/1968, de 5 de abril, aprobada por las Cortes Españolas. Available at: https://www.boe.es/buscar/act.php?id=BOE-A-1968-444

The Bletchley Declaration by Countries Attending the AI Safety Summit. 01.11.2023. Available at: https://www.gov.uk/government/publications/ai-safety-summit-2023-the-bletchley-declaration

The Interim Measures for the Management of Generative AI Services: promulgated on July 10, 2023 by the Cyberspace Administration of China and others. Available at: https://www.cac.gov.cn/2023-07/13/c_1690898327029107.htm

Torre, C. (2022). Liderazgo populista. Revista Ecuatoriana de Ciencia Política. Vol. 1. N. 1. P. 64–80. DOI: https://doi.org/10.1163/9789004679016_010

UN Convention against Transnational Organized Crime and the Protocols thereto, adopted by the UN General Assembly 15 November 2000, by resolution 55/25. Available at: https://www.unodc.org/unodc/en/organized-crime/intro/UNTOC.html

US Strategy on Countering Corruption of December 06, 2021. Available at: https://www.state.gov/implementing-the-u-s-strategy-on-countering-corruption/

Waddell, С. (2022). Investigative and diagnostic tools for covering fraud: insights from the forensic accounting field. International Journal of Accounting, Economics, and Finance Perspectives. Vol. 2. № 1. Р. 85–97.

Wasim Malik, A., Bhatti, D. S., Park, T.-J., Ishtiaq, H.-U., Ryou, J.-C., Kim, K.-I. (2024). Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges. Sensors. Vol. 24. No. 2. P. 1–30. DOI: https://doi.org/10.3390/s24020433

Wingate G., Gray L. A., Greenberg T. S., Samuel L. M. (2009). Stolen asset recovery: a good practices guide. Washington: WB Group. 284 р.

Yaroshko, T., Kosa, V., Ignatenko, O., Makarenkov, O., Ermolayev, V. (2024). Engineering Scientific Knowledge Graphs from Publications: The Anti-Corruption Use Case. Available at: https://easychair.org/smart-program/ICTERI-2024/2024-09-26.html#talk:266254