Abstract

In the article, the identification and documentation of crimes in the field of illegal coal mining as two interrelated processes are considered. Based on the consideration of the nature of crimes detection, directions and objects of documentation, the following proposals are formulated: on the formation of sources of operational search information; on the list of search features; on the list of operational investigative measures that are appropriate to carry out for solving the problem of bringing perpetrators to criminal responsibility. The list of open sources from which the primary information about the facts of being prepared, committed or having been committed crimes in the field of illegal coal mining is considered. A list of persons who may be involved in confidential assistance in order to obtain covert operational search information is also proposed. In order to ensure effective activity in detecting the facts of preparation and commission of crimes in the field of illegal coal mining, a list of search characteristics is proposed that can indicate facts of illegal activity. Suggestions regarding operational search measures have also been formulated, which allow the effective and timely detection, suppression and solving the crimes in the field of illegal coal mining.

Highlights

  • Among the measures implemented by the operational units of economic security and anticorruption of the internal affairs bodies to combat illegal coal mining, a special role is given to such forms of operational-search activities as identification and documentation

  • Documentation of crimes in the field of illegal coal mining, in turn, is the following set of actions made by employees of operational units of economic security and anti-corruption carried out as part of the operational case: - putting forward versions of the circumstances of the crime; - identification of evidence on the circumstances of the crime, having evidentiary value in the consideration and resolution of a criminal case; - providing the ability to use evidence for these purposes by fixing in operational documents and other storage media

  • Operational verification of primary information allows the following: - to establish the presence or absence of objective signs confirming the commission of crimes in the field of illegal coal mining [3]; - to verify the sufficiency of data for sending materials on jurisdiction [4]; - to assess whether there is a reason to believe that without a complex operational search measures it is impossible or extremely difficult to expose a person of committing crimes in the field of illegal coal mining

Read more

Summary

Introduction

Among the measures implemented by the operational units of economic security and anticorruption of the internal affairs bodies to combat illegal coal mining, a special role is given to such forms of operational-search activities as identification and documentation.The identification and documentation of crimes in the field of illegal coal mining are two interrelated processes. These, in our opinion, should include the following: the availability of reliable sources of operational investigative information, including secretive sources; knowledge by persons providing confidential assistance of signs indicating possible facts of criminal activity; a list of operational investigative measures, the implementation of which allows solving effectively the problem of combating illegal coal mining. These circumstances make it necessary to consider the organizational and tactical foundations for identifying and documenting crimes in the field of illegal coal mining

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.