Traditionally, one of the key components of any methodology is the forensic character of the type of crime, often considered as a typical information model. The basis of this definition is, in our ...opinion, the need to model this type of crime by generalizing based on the study of large arrays of criminal cases, information about the criminally significant signs of the type of crime, and their natural connections. In the era of digitalization, new opportunities are opening up for the study and generalization of large arrays of forensically significant information using BigData technology. The use of information computer technologies in criminal activities makes it possible to commit different crimes (crimes against the person in economics, economic activities, public security and others) using the same methods. Therefore, the traditional unification of information models by types of crimes does not give necessary results. The article deals with the problems of formation and application of the foundations of a new doctrine of information-computer forensic models of computer crimes as part of the theory of information and computer support of the forensic activity. The subject of this teaching is the general laws for building information-computer models of computer crimes based on correlation ties. These are the ties of combinations of IT technologies and computer systems for implementing various methods of computer crimes, regardless of their type, with a traced picture as digital traces and with competencies in information computer technologies of the criminal and the injured party. The object of the study is forensically significant computer information about the used combinations of IT technologies and computer tools and systems. This is information about various methods of computer crimes, digital traces, including traces of the impact of ransomware, counterfeit information and computer products, characteristics of criminals and victims from the point of view of the degree of their proficiency in IT technologies. Information-computer models of computer crimes in the generalization of large arrays of information can serve as one of the key elements of private forensic methods of investigation. This approach is considered on the example of the investigation of extortion using the Internet - “cyber blackmail”. Options of “cyber blackmail” of individuals and organizations are considered and information and computer models are built for them. The authors determine the features of correlation of methods of crimes, the used computer tools and systems, objects of encroachment with the competencies of criminals (organized criminal groups) and victims in IT technologies.
The development of digitalization constantly generates new forms of crime, changes in the mechanisms of how they are committed, and concealment. The problem of combating such crimes is transnational ...in nature. This article considers the difficulties of creating the criminalistics study of computer tools and systems doctrine as part of the theory of information and computer support of criminalistics activities. The authors’ negative stance on the issue is indicated as well as the addition of definitions to the name of criminalistics that are related to the emergence of new objects of expertise: “electronic criminalistics”, “linguistic criminalistics”, “digital criminalistics”, and others. The unity of criminalistics as a science having its own subject, system, tasks, and objects is declared. The article substantiates the subject of the theory of criminalistics research of computer tools and systems as a system for gathering significant computer information on the basis of the knowledge of which technical and criminalistics methods, tools, techniques, and methods for identifying, fixing, and seizing evidence and orienting criminalistics information about computer tools are developed. In addition, the theory is based on systems in legal proceedings in criminal, civil, and administrative cases. The objects of this theory are computer tools and systems as well as the search and criminalistics evidence of information contained in them. Based on the doctrine of the criminalistics investigation of computer tools and systems, the foundations of a new area of criminalistics techniques and technology, as a system of scientific principles, are provided. This area centers around recommendations, tools, techniques, and methods designed to collect and study information about computer tools and systems. Digital footprints and the processes of their occurrence, transmission, and transformation in order to obtain evidence in legal proceedings, disclosure, and prevention of crimes, are included.
Excessive postoperative scarring halts the effectiveness of glaucoma surgery and still remains a challenging problem. The purpose of this study was to develop a PLA-PEG-based drug delivery system ...with cyclosporine A or everolimus for wound healing modulation. Methods: PLA-PEG implants saturation with cyclosporine A or everolimus as well as their further in vitro release were analyzed. Anti-proliferative activity and cytotoxicity of the immunosuppressants were studied in vitro using human Tenon’s fibroblasts. Thirty-six rabbits underwent glaucoma filtration surgery with the application of sham implants or samples saturated with cyclosporine A or everolimus. The follow-up period was six months. A morphological study of the surgery area was also performed at seven days, one, and six months post-op. Results: PLA-PEG implants revealed a satisfactory ability to cumulate either cyclosporine A or everolimus. The most continuous period of cyclosporine A and everolimus desorption was 7 and 13 days, respectively. Immunosuppressants demonstrated marked anti-proliferative effect regarding human Tenon’s fibroblasts without signs of cytotoxicity at concentrations provided by the implants. Application of PLA-PEG implants saturated with immunosuppressants improved in vivo glaucoma surgery outcomes. Conclusions: Prolonged delivery of either cyclosporine A or everolimus by means of PLA-PEG implants represents a promising strategy of wound healing modulation in glaucoma filtration surgery.