Legal principles of the use of open intelligence in criminal proceedings in Ukraine and the EU

Autores/as

  • Anatolii Puhach Interregional Academy of Personnel Management
  • Oleksandr Shevchuk National Academy of Internal Affair
  • Oleh Zrazhevskyy National University of Water and Environmental Engineering
  • Alexander Rusnak National Academy of the Security Service of Ukraine
  • Viktor Trepak Security Service of Ukraine National Academy

Palabras clave:

Rule of Law, Criminal Justice, Governance, Corruption, Organized Crime, Human Rights, Legal System

Resumen

The growing practical use of OSINT in criminal proceedings, together with fragmented regulation and uneven evidentiary treatment in Ukraine and the EU, called for a clearer legal analysis. This study examined under which conditions OSINT-derived material may be used in criminal proceedings and which legal requirements govern its collection, authenticity, documentation, and judicial assessment. The method combined doctrinal analysis of legislation and case law from Ukraine and EU legal materials, with the United Kingdom and the United States used as comparative reference points because their courts and legal instruments more expressly addressed digital evidence and publicly available online material. The analysis showed that European approaches relied on clearer rules on legality, proportionality, authenticity, and documentation, whereas Ukrainian law treated OSINT mainly through general rules on electronic evidence. On that basis, the article formulated a legal test centered on lawful collection, source identification, preservation of integrity, procedural recording, and judicial review. The novelty of the study lies in restating OSINT issues in conventional evidentiary terms and clarifying where Ukrainian law converges with, and differs from, European approaches. Further research should test these criteria in actual criminal cases.

Descargas

Los datos de descarga aún no están disponibles.

Referencias

Agalliu, P.; Agalliu, T. “Proposing a human-rights-based approach in open-source intelligence”, In Lecture notes in networks and systems. Cham: Springer Nature Switzerland, 2025, pp. 48–54. https://doi.org/10.1007/978-3-031-95200-5_6

Aji, M. P.; Assidiq, M. H.; Sugiyanto, S.; Wijaya, E. S.; Wicaksono, A. P. “Design a profiling tool using OSINT (open source intelligence)”, In The 1st brawijaya international conference on chemical engineering (bromine) 2024. AIP Publishing, 2025, art. no. 050013. https://doi.org/10.1063/5.0258515

Artemov, V.; Ishchenko, Y.; Rusnak, A.; Trepak, V.; Denysenko, M. “The role of American intelligence in shaping foreign policy strategies”, Edelweiss Applied Science and Technology, v. 8, n. 5, 2024, pp. 1385–1399. https://doi.org/10.55214/25768484.v8i5.1842

Ayobami, U. “Automated metadata extraction and correlation techniques for digital evidence analysis in cybercrime investigations”, International Journal of Research Publication and Reviews, v. 6, n. 6, 2025, pp. 101–124. https://doi.org/10.55248/gengpi.6.0625.2177

Bennani, H.; El Maysour, M. A. “L’ “Open source intelligence”a l’ere numerique: Un spectreethico-politique entre pouvoir, preuves et limites judiciaires”, Revue droit societe, v. 6, n. 17, 2025, pp. 5–18. Available at: https://journals.sms-institute.com/wp-content/uploads/2025/07/BENNANI-Hniya.pdf (accessed on 18 October 2025).

Bollikonda, V. B.; Kiran, K. V. D. “Unveiling the hidden: Exploring challenges in dark web investigation using measurement sensors”, Journal of Cybersecurity and Information Management, v. 15, n. 1, 2025. https://doi.org/10.54216/jcim.150113

Breuer, N. “Investigating the internal structure of mafias using open-source intelligence” (Doctoral dissertation, University of Oxford, 2025a). Available at: https://ora.ox.ac.uk/objects/uuid:77533443-112f-42d6-baba-599b77c17142 (accessed on 18 October 2025).

Breuer, N. “Testing the reliability of OSINT network data for investigating organised crime infiltration of legal-market businesses”, Global Crime, 2025b, pp. 1–25. https://doi.org/10.1080/17440572.2025.2567277

CANTELLI-Forti, A.; Longo, G.; Lupia, F.; Russo, E. “WEFT: A consistent and tamper-proof methodology for acquisition of automatically verifiable forensic web evidence”, International Journal of Information Security, v. 24, n. 2, 2025. https://doi.org/10.1007/s10207-025-00991-8

Chermak, S. M.; Freilich, J. D.; GREENE-Colozzi, E.; Klein, B. R. “Open-Source research in criminology and criminal justice”, Annual Review of Criminology, 2025, pp. 141-170. https://doi.org/10.1146/annurev-criminol-022422-013842

Cohen, D.; Elalouf, A.; Citrinowicz, D. “Uncovering Salafi jihadist terror activity through advanced technological tools”, Journal of Policing, Intelligence and Counter Terrorism, 2025, pp. 1–17. https://doi.org/10.1080/18335330.2025.2478553

Colley, T.; Dylan, H. “The war on open-source intelligence”, The Washington Quarterly, v. 48, n. 3, 2025, pp. 147–162. https://doi.org/10.1080/0163660x.2025.2554477

CRAWFORD-Holland, S.; Smith, P. B.; Williams, A. “Law’s capture of human rights focused open-source investigation”, London Review of International Law, v. 33, n. 1, 2025, pp. 93–113. https://doi.org/10.1093/lril/lraf007

Djamadi, N.; W. Badu, L.; Towadi, M. “The use of digital evidence in law enforcement efforts in human trafficking cases”, Estudiante Law Journal, v. 7, n. 3, 2025. https://doi.org/10.33756/eslaj.v7i3.33365

Dragomir, A. N.; Morari, B. A. “The global fight against crime on the dark web. Legal responses and technological innovations”, Legea şi Viaţa, v. S, 2025, pp. 83-93. Available at: https://ibn.idsi.md/vizualizare_articol/230518 (accessed on 18 October 2025).

Garg, P.; Shrivas, N.; Kalia, A.; Roy, R.; Sharma, S.; Agarwal, G. “OSINT: A Double-Edged Sword”, In 2025 First Global Conference on AI Research and Emerging Developments (G-CARED 2025), 2025, pp. 150–157. https://doi.org/10.63169/GCARED2025.p22

Hadiq, D.; Mahdi, I. “The role of occrp’s soft power in framing president joko widodo leadership on corruption”, INJECT (Interdisciplinary Journal of Communication), v. 10, n. 1, 2025, pp. 385–406. https://doi.org/10.18326/inject.v10i1.4395

Hawa, M. R.; Owda, M.; Owda, A. Y. “Enhancing digital investigation: The role of generative AI (ChatGPT) in evidence identification and analysis in digital forensics”, In 2025 12th International Conference on Information Technology (ICIT). 2025, pp. 19-26. https://doi.org/10.1109/ICIT64950.2025.11049120

Hubanova, T.; Shchokin, R.; Hubanov, O.; Antonov, V.; Slobodianiuk, P.; Podolyaka, S. “Information technologies in improving crime prevention mechanisms in the border regions of southern Ukraine”, Journal of Information Technology Management, v. 13, 2021, pp. 75-90. Available at: https://scispace.com/pdf/information-technologies-in-improving-crime-prevention-5eh5g6z2hh.pdf (accessed on 18 October 2025).

Kopotun, I.; Nikitin, A.; Dombrovan, N.; Tulinov, V.; Kyslenko, D. “Expanding the potential of the preventive and law enforcement function of the security police in combating cybercrime in ukraine and the EU”, TEM Journal, v. 9, n. 2, 2020, pp. 460–468. https://doi.org/10.18421/tem92-06

Kortukova, T.; Kolosovskyi, Y.; Korolchuk, O. L.; Shchokin, R.; Volkov, A. S. “Peculiarities of the legal regulation of temporary protection in the european union in the context of the aggressive war of the russian federation against ukraine”, International Journal for the Semiotics of Law, v. 36, n. 2, 2023, pp. 667-678. https://doi.org/10.1007/s11196-022-09945-y

Lazarov, W.; Moravec, V.; Loutocký, P.; Vostoupal, J.; Martinasek, Z. “Comparative analysis of OSINT tools, techniques, and legal aspects”, 2025. https://doi.org/10.2139/ssrn.5579220

Melnyk, D. S.; Parfylo, O. A.; Butenko, O. V.; Tykhonova, O. V.; Zarosylo, V. O. “Practice of the member states of the european union in the field of anti-corruption regulation”, Journal of Financial Crime, v. 29, n. 3, 2022, pp. 853-863. https://doi.org/10.1108/JFC-03-2021-0050

Meng, W. “AI-enhanced OSINT evidence governance: Academic integrity, platform disposition, and national security risk assessment in the case of Shanghai Maritime University's "First-Class Undergraduate Major" Controversy”, 2025. https://doi.org/10.2139/ssrn.5560703

Mulya, A.; Purwanto, S. A.; Damayanti, A.; Polimpung, H. Y.; Pramadi, Y. R.; Putro, P. A. W. “The security intelligence gathering debate between human intelligence (humint) versus technological intelligence (techint)”, Greenation International Journal of Law and Social Sciences, v. 3, n. 2, 2025, pp. 572–588. https://doi.org/10.38035/gijlss.v3i2.497

Novikarany, R. “Geoint as a driver of national security”, International Journal of Scientific Multidisciplinary Research, v. 3, n. 2, 2025, pp. 237–250. https://doi.org/10.55927/ijsmr.v3i2.66

Palmieri, E. A.; Ghanem, M. C.; SOWINSKI-Mydlarz, V.; Dunsin, D. “A framework for embedding generative and agentic AI in Open Source Intelligence”, Authorea Preprints, 2025. https://doi.org/10.36227/techrxiv.175623135.54287545/v2

Pitman, L.; Walsh, L. “Policy considerations of open-source intelligence: A study of bellingcat's online investigation patterns (2014-2024)”, International Journal of Cybersecurity Intelligence Cybercrime, v. 8, n. 2, 2025. https://doi.org/10.52306/2578-3289.1202

Rahman, M. D. “The art of open source intelligence (OSINT): Addressing cybercrime, opportunities, and challenges”, 2025. https://doi.org/10.2139/ssrn.5281845

Rangappa, P.; Muscat, A.; SANCHEZ Lara, A.; Motlicek, P.; Antonopoulou, M.; Fourfouris, I.; ... Kostka, K. “Detecting criminal networks via non-content communication data analysis techniques from the TRACY project”, In Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering. Cham: Springer Nature Switzerland, 2025, pp. 340–353. https://doi.org/10.1007/978-3-031-89363-6_20

Rathod, D. M.; Padhya, M.; Natu, A. M.; Chaudhari, N.; Vibhute, A. “DarkCatalog: A vision-first, parser-independent framework for forensic harvesting of TOR hidden services”, 2025. https://doi.org/10.2139/ssrn.5641694

Santos, P.; Abreu, R.; Reis, M. J. C. S., Serôdio, C.; Branco, F. “A systematic review of cyber threat intelligence: The effectiveness of technologies, strategies, and collaborations in combating modern threats”, Sensors, v. 25, n. 14, 2025, p. 4272. https://doi.org/10.3390/s25144272

Shchokin, R.; Oliinyk, V.; Bondarenko, O.; Kyslenko, D.; Kolos, O.; Tymoshenko, Y. “Sport management in the context of criminal liability for corruption”, Retos, v. 48, 2023, pp. 708–719. https://doi.org/10.47197/retos.v48.96768

Soler, R.; Dawson, M.; Colina, M. “Automated target profiling: Leveraging artificial intelligence for open-source intelligence collection”, International Conference KNOWLEDGE-BASED ORGANIZATION, v. 31, n. 1, 2025, pp. 184–190. https://doi.org/10.2478/kbo-2025-0023

Soni, N.; Poonia, R. “AI-Driven open-source intelligence in digital forensics for cybercrime investigation”, Journal of Collective Sciences and Sustainability, v. 1, n. 1, 2025, pp. 1–8. https://doi.org/10.64189/css.25405

Stegen, J. I. “Leveraging social media intelligence (SOCMINT) in the African intelligence context”, Journal of Policing, Intelligence and Counter Terrorism, v. 20, n. 2, 2025, pp. 243–257. https://doi.org/10.1080/18335330.2025.2465529

Suh, B. W.; Kim, W.-W. “Leveraging open source intelligence (OSINT) for cryptocurrency crime investigation using tools and techniques”, In 2025 9th international conference on cryptography, security and privacy (CSP). 2025, pp. 12–16. https://doi.org/10.1109/CSP66295.2025.00010

Tınas, M.; Tuncal, D. “OSINT in the techno-political era: From intelligence collection to exerting influence”, Security, Law, and Influence in the Age of Techno-Politics, 2025, pp. 69–86. https://doi.org/10.4018/979-8-3373-7406-2.ch003

VAN PUYVELDE, D.; TABÁREZ Rienzi, F. “The rise of open-source intelligence”, European Journal of International Security, 2025, pp. 1–15. https://doi.org/10.1017/eis.2024.61

Yazici, T. “Standardizing space technologies as admissible evidence: Legal and ethical frameworks for U.S. courts and the international criminal court”, University of Miami International and Comparative Law Review, v. 32, n. 2, 2025, p. 180. Available at: https://repository.law.miami.edu/umiclr/vol32/iss2/4/ (accessed on 18 October 2025).

Zhou, B.; Fang, B.; Wang, Y. “The application of the MDATA cognitive model in open source intelligence analysis”, In Lecture notes in computer science. Singapore: Springer Nature Singapore, 2025, pp. 148–180. https://doi.org/10.1007/978-981-96-3528-3_6

Zunino, G. “Digital forensics in corporate simulations: A study of tool efficacy and analysis techniques”. (Doctoral dissertation, Politecnico di Torino, 2025). Available at: https://webthesis.biblio.polito.it/35242/ (accessed on 18 October 2025).

Descargas

Publicado

30-03-2026

Cómo citar

“Legal principles of the use of open intelligence in criminal proceedings in Ukraine and the EU” (2026) Cadernos de Dereito Actual, (31), pp. 457–474. Available at: https://cadernosdedereitoactual.es/index.php/cadernos/article/view/1442 (Accessed: 30 March 2026).