
“Confronting Cyber Crimes at the International Level / Masoumeh Sharifi”
Regarding cyberspace, a complete and definitive definition has not yet been presented, but based on multiple definitions, it can be said that “cyber” is a prefix that refers to activities related to computers and electronics. According to one of these definitions, “cyberspace is an operational domain that utilizes information through interconnected systems and their integrated infrastructure, using the science of electronics”; in the US Cyber Policy Document of 2009, this space is defined as a global and interconnected infrastructure of digital communications and information that forms the foundation of almost all aspects of modern societies. Generally, cyberspace is referred to as an environment for the transfer of data and information and does not only include the internet, but also all networks and communication-information systems.
The cyber space hides the identity and location of its players and provides an easy way to use fake names and proxies, making it difficult to penetrate and expose them. The cyber space is vast and boundless, legally ambiguous and verbally brief, and in general, complex and unattainable.
Cybersecurity consists of three elements:
Privacy:
This means that if the data being transferred in cyberspace is read by attackers and its confidentiality is violated…
Unity.
If during the transfer of data, the information is tampered with and changed by attackers…
Availability.
This type of attacks aims to extract information from the service; in a way that the source is no longer able to provide the service to others and cannot have accurate information exchange with its users.
Establishing security in cyberspace is a very difficult task due to the nature of this space. Cyber technology can undoubtedly be used, like conventional weapons, to attack government institutions, financial institutions, energy and transportation infrastructure, and public morale. Insecurity in cyberspace includes all infrastructures that are somehow connected to information technology. In the mid-1990s, with the expansion of international networks and satellite communications, the third generation of computer crimes, known as cyber (virtual) crimes or crimes in the cyberspace environment, emerged. After the first computer crimes occurred in the world, many conventions and organizations were formed, in addition to governments, to secure this space. Among them are the following:
The “Cybercrime Convention”, also known as the Budapest Convention, is considered the first international treaty that specifically addresses cybercrimes such as copyright infringement, computer fraud, child pornography, and network security breaches. It aims to improve investigative methods and increase cooperation between nations by harmonizing national laws. The convention was adopted by the Council of Europe in Strasbourg, France and was enforced on July 1, 2004 with active participation from monitoring countries such as Canada, Japan, and China. It was signed by 43 countries, including Canada, Japan, the United States, and the Republic of South Africa.
The first “European Cybercrime Prevention and Detection Center” also aims to integrate information, knowledge and skills necessary to assist the police of European Union member countries in national and cross-border investigations. The activities of experts in this center, located in The Hague, are mainly focused on three topics: fraud, identity theft, and sexual exploitation of children online, and are aimed at finding ways to improve the security of social networks such as Facebook and Twitter. The cost of the European Cybercrime Center (EC3) is provided by Europol, the European Union’s police force. This center will provide technical, analytical and evidence-gathering support for joint investigations of EU member countries, as well as necessary consultations and will specifically monitor attacks targeting electronic banking and critical infrastructure. As mentioned, combating the sexual exploitation of children is also one of the priorities of the EC3 center.
The International Union for the Protection of Cyber Security was announced in London in 2011 to combat global cyber crimes. The members of this international union include governments, internet and technology companies, and legal institutions responsible for fighting cyber crimes, such as the International Police (Interpol). Companies active in the field of computer and cyber security, such as McAfee and Trend Micro, which are active in producing anti-virus software, have also joined the International Union for the Protection of Cyber Security. The budget for this international organization is provided by the European Union and other countries that intend to join this institution, and new international laws have been defined to combat cyber crimes and criminals in order to support companies active in the technology sector.
“Bitdefender” company is another example that was founded by SoftWin in Romania in 2001 and is currently one of the largest producers of fast and effective security software. It has developed new standards for preventing threats and producing tools to detect and remove viruses. It is also a provider of the best technologies for identifying cyber security threats. The anti-malware technology of this company is being used by other companies such as F-secure, G-Data, Qihoo, Bullguard, and IBM. Since 2010, Bitdefender SafeGo! has also been protecting Facebook accounts.
American cybersecurity company “Silence” is the first company to use artificial intelligence, algorithmic science, and machine learning in relation to national security. It enhances the process of actively solving the world’s most difficult security problems for companies, governments, and users. Silence uses an advanced mathematical process to accurately and quickly distinguish threats from other cases. Its job is not only to identify what is on the blacklist and what is not, but also to combine advanced mathematics and machine learning with a unique understanding of the hacker mindset to provide technologies and services that can truly identify and prevent advanced threats from occurring.
And finally, the company “Fire Eye” which is active in the field of security, and the “Electronic Frontier Foundation” whose goal is to protect consumer rights on the internet, and many other companies that are included in this list…
In addition to the mentioned cases, well-known hacking groups such as Anonymous (anonymous hackers) are also active, as well as individuals like Colin Anderson and many others who remain unknown and anonymous.
“And as for a few important security points for users in the cyber space, from the words of Edward Snowden, the whistleblower of the biggest conspiracy and espionage of world information, we remind you:”
Never say, “I have no information to hide.”
Undoubtedly, every person has important information about themselves, their family, bank account, and …
Other.
It can be attractive to hackers. Hackers are interested in even the smallest pieces of information about you, so don’t repeat this sentence anymore. Facebook and Google are among the most dangerous services that easily and without the knowledge of users steal their information. Be careful with your security information on these two services. Online spaces are heavily monitored, so avoid sending messages on applications like social networks that are connected to the internet. What is known as privacy policies or Privacy Policy is a set of policies of companies or private networks regarding what privacy is and what information it includes. The fundamental point here is that what may be part of privacy today may not be in this field tomorrow. Before publishing and sharing something on social networks, examine how these social networks work. Be careful about the content you share online, especially behaviors such as online purchases or installing an app that can leak sensitive information about you. Always make sure who you are sharing with, what you are sharing, and how you are sharing it when communicating with
Tags
Magazine number 45 Masoumeh Sharifi