Computer Crime Research Center

terror/ct.jpg

Internet has become the most vulnerable ever

Date: September 22, 2004
Source: Computer Crime Research Center
By: Dmitri Kramarenko

A threat of terrorism on the Internet appeared to be more serious than it was expected to be; displays of terrorism unbelievably extended because of the global distribution of the Internet. Dale Watson says, the threat lies not only in breaks into closed information systems of state authorities to access data bases or secret information due to special services that quite successfully counteract to similar attempts. The greatest danger is in breaks into open sites and computer networks. Attacking these targets, they achieve access to secret information, e.g. most sites of state authorities have data that may interest terrorist groups (schemes of underground communications, information on radiofrequencies used by police and special services, etc.) Besides, criminals obtain access to personal data of Internet users - starting from their addresses and telephone numbers ending with detailed information on persons, including their hobbies and their life order. According to statistics, if a western firm loses only 20% of confidential information, it would lead to its bankruptcy during one month.

The possibility of cyberterrorism represents a number of important challenges. Firstly, owing to their latency, computer attacks cannot be forecasted or tracked down in real time. Therefore an attack may be started at any time, in any country, and may be conducted by teenagers seeking adventures or hostile countries, criminals, secret agents and terrorists; significant resources are needed to define with high degree of reliability a person who is responsible for these attacks. Technology, as it appears, won't be able to solve this problem in the near future. Secondly, due to complexity of laws in force all over the world it is problematic to collect evidence when the Internet and other electronic means can be used, and also prosecution, search, capture and delivery are problematic too. Modification of contradicting laws which is happening now in many countries may require additional efforts and long initiatives.

Peter S. Probst fairly says the more states develop the more they depend on high technologies. Complex national systems are potentially dangerous as they comprise critical centers, attacks on which may lead to destructive sequels. A similar attack may be committed via computer or using explosives or by putting cables out of operation with the purpose to cause series of wrecks with the final collapse of e.g. pipeline or airport control systems.

Efficient struggle against transnational computer criminality and terrorism is a key element of assuring security not only in view of fighting against e-terrorism but also a real counteraction to new kinds of terrorism and organized crime. Despite uneasy situation in the sphere of security, there are some opportunities to solve it:

1. Organization of efficient collaboration with foreign countries, their law enforcement agencies, special services and also international organizations to fight cyberterrorism and transnational computer crime.
2. Forming a national unit to fight cyber crimes and an international communication center to provide aid at responding to transnational computer incidents.
3. Extending transnational cooperation in the sphere of legal support to fight computer crimes and cyberterrorism.
4. Accepting overwhelming laws on e-security according to the existing international standards and EU Cyber Crime Convention.
September 11, 2001 tragedy became, in a way, a catalyst to speed up response of the world community to the activity of terrorist organizations. The result of the work is the definition of conditions to complete antiterrorist politics. It is necessary to:
- prevent and avert financing of terrorist acts;
- introduce criminal liability for deliberate provision or collecting funds to commit terrorist acts;
- block funds and other financial assets or money of persons that commit or attempt to commit terrorist acts;
- find opportunity to speed up the exchange of operational information with the purpose to prevent acts of terrorism;
- refuse asylum to those supporting, financing and planning terrorist acts;
- render assistance in view of criminal investigations related to financing or backing of terrorist acts;
- prevent displacement of terrorists by assistance of frontier control;
- render thorough cooperation in the framework of multilateral and bilateral mechanisms and treaties with the purpose to prevent terrorist acts;
- take part in the corresponding international conventions and protocols to fight international terrorism.


Add comment  Email to a Friend

Discussion is closed - view comments archieve
2005-09-07 12:17:29 - Stamp Collector Stamp Collector
2005-09-02 16:32:40 - Law Office Megans Law
Total 2 comments
Copyright © 2001-2013 Computer Crime Research Center
CCRC logo