Научная статья на тему 'CYBERTERRORISMAS A THREAT OF THE 21ST CENTURY'

CYBERTERRORISMAS A THREAT OF THE 21ST CENTURY Текст научной статьи по специальности «Право»

CC BY
96
22
i Надоели баннеры? Вы всегда можете отключить рекламу.
Журнал
Символ науки
Область наук
Ключевые слова
TERRORISM / CYBERTERRORISM / COMPUTER-RELATED OFFENCES / CYBER ATTACKS

Аннотация научной статьи по праву, автор научной работы — Penzenik A.Yu.

Nowadays cyberterrorism undoubtedly has become one of the most topical social security issues. In this article reasons for dissemination of cyberterrorism, main methods and means of computer crime including cyberattacks and also possible ways to deal with the problem of cyberterrorism have been analyzed.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «CYBERTERRORISMAS A THREAT OF THE 21ST CENTURY»

проведение азартных игр предусмотрено более суровое наказание, что обусловлено его распространенностью и потенциалом причинения более "впечатляющих" негативных последствий для объектов правоохранительных органов в результате такой незаконной деятельности.

Объективная сторона преступления, предусмотренного статьей 171.2 Уголовного кодекса Российской Федерации, выражается в трех альтернативных формах: 1) организация и (или) проведение азартных игр с использованием игрового оборудования за пределами игорной зоны; 2) организация и (или) проведение азартных игр с использованием информационно-телекоммуникационных сетей, включая Интернет, а также средств связи, в том числе мобильной связи; 3) организация и (или) проведение азартных игр без надлежащим образом полученного разрешения на осуществление такой деятельности в игорной зоне [2, с.127-128]. Условием привлечения к уголовной ответственности за незаконную организацию и проведение азартных игр, аналогично незаконному предпринимательству, является извлечение дохода в крупном размере.

Необходимо, чтобы деятельность по незаконной организации и проведению азартных игр имела все признаки незаконной предпринимательской деятельности. Поэтому однократного установления факта организации и проведения азартных игр, в том числе совершенных с извлечением дохода в особо крупном размере, недостаточно для привлечения виновных лиц к уголовной ответственности по статье 171.2 Уголовного кодекса Российской Федерации. Список использованной литературы:

1. Уголовный кодекс Российской Федерации от 13.06.1996 N 63-Ф3 (ред. от 01.07.2021) (с изм. и доп., вступ. в силу с 22.08.2021)

2. Гладких, В.И. Преступления в сфере экономики: курс лекций с практическими материалами / В.И. Гладких, Т.Н. Ермакова, А.Б. Коновалова; под общ. ред. докт. юрид. наук, проф. В.И. Гладких. - М., 2016.

3. Качурин, Д.В. О конкуренции уголовно-правовых норм / Д.В. Качурин // Российский судья. - 2002. - № 11.

4. Кузнецова, Н.Ф. Проблемы квалификации преступлений: лекции по спецкурсу «Основы квалификации преступлений» / Н.Ф. Кузнецова; под ред. В.Н. Кудрявцева. - СПС КонсультантПлюс, 2006.

5. Лопашенко, Н.А. Преступления в сфере экономической деятельности: понятие, система, проблемы квалификации и наказания: дис. ... докт. юрид. наук / Н.А. Лопашенко. - Саратов, 1997.

6. Лубешко, В.Н. Незаконное предпринимательство как вид преступного посягательства против установленного порядка экономической деятельности: уголовно-правовой и криминологический аспекты: дис. ... канд. юрид. наук / В.Н. Лубешко. - Ростов, 2004.

© Еремян А.А., 2021

УДК 343.34

Пензеник А.Ю.,

студент 1 курса,

Санкт-Петербургская академия Следственного комитета Российской Федерации,

Санкт-Петербург, РФ Научный руководитель: Федунова М.Н.

Старший преподаватель кафедры гуманитарных и социально-экономических дисциплин,

русского и иностранных языков Санкт-Петербургской академии Следственного комитета Российской Федерации

КИБЕРТЕРРОРИЗМ - УГРОЗА XXI ВЕКА

Аннотация

В настоящее время кибертерроризм, безусловно, является одной из наиболее волнующих проблем

для безопасности общества. В данной статье рассматриваются причины распространения этого явления, основные средства и методы осуществления кибер-атак, а также возможные пути решения проблемы кибертерроризма.

Ключевые слова

Терроризм, кибертерроризм, преступления в сфере компьютерной безопасности, кибер-атаки.

Penzenik A.Yu.,

1st year student,

St. Petersburg Academy of the Investigative Committee of the Russian Federation

Scientific Advisor: Fedunova M.N., Senior lecturer of the Department of the Humanities, Socio-economic Subjects, Russian and Foreign Languages, St. Petersburg Academy of the Investigative Committee of the Russian Federation

CYBERTERRORISMAS A THREAT OF THE 21ST CENTURY

Annotation

Nowadays cyberterrorism undoubtedly has become one of the most topical social security issues. In this article reasons for dissemination of cyberterrorism, main methods and means of computer crime including cyber-attacks and also possible ways to deal with the problem of cyberterrorism have been analyzed.

Keywords

Terrorism, cyberterrorism, computer-related offences, cyber attacks.

The current post-industrial society has faced active development and dissemination of global issues due to the strong globalization processes. Terrorism as one of such crucial problems is a violent ideology and practice aimed at influencing the process of making decisions by the public authorities or international organizations. In this article we would like to analyze cyberterrorism as one of the kinds of terrorism, that is illegal actions which threaten national safety, a person, or a society. Such acts involve the use of special worm programs and/or other modern computer technologies. A cyber-attack can be qualified as an international offence if the object of assault is global peace and safety, or if the illegal acts are the way to commit the international terrorist act. Moreover, if the public authorities participate in committing these illegal measures, such an act will be considered to be a form of a cyberwar. According to the U.S. Commission on Critical Infrastructure Protection, possible cyberterrorist targets include the banking industry, military installations, power plants, air traffic control centres, and water systems.

Reasons for dissemination of cyberterrorism

Undoubtedly, constant development and improvement of computer and digital technologies, increased use in all spheres of social life, a growing number of gadgets are among the reasons for spreading such illegal measures. First of all, the attractiveness of using digital areas by modern terrorists is related to low financial cost -only the Internet and worm programs are necessary. Secondly, cyberterrorism reduces the need for geographical proximity to the object. The distant position from the victim-goal allows terrorists to escape capture and avoid risks of death. There is also no need for physical or psychological preparation for potential criminals.

History of cyberterrorism emergence

The phenomenon of cyberterrorism originated in the 1980-s. At the same time, the notion of Cyberterrorism became a definition. In 1983 the first group of hackers known as "Band 414" was arrested in the USA. In 1996 the members of the terroristic organization "the Liberation Tigers of Tamil Eelam" have carried out a cyber-attack against the diplomatic representation of Sri Lanka. Due to acts of the unknown hacker in September 1997 medical

data transmission between the NASA station and the spaceship named "Atlantis" was interrupted. In January 1999 on the Internet, the first computer virus known as "Happy-99" appeared.

Speaking about modern examples, in January 2019, it was revealed that former U.S. intelligence personnel were working with hacker groups from the United Arab Emirates to help the country access the phones of activists, diplomats, and foreign government officials. In February 2019, state-sponsored extremists from China stole personal identification information from the employees of Airbus, a European aerospace company. In September 2020, prosecutors in Cologne, Germany, opened a negligent homicide investigation into an incident where an ailing woman was turned away from a hospital that was in the grips of a ransomware attack. She died on the way to another hospital. In 2019 and 2020, the S. Department of Justice (DOJ) charged China's Huawei Technologies Co. Ltd. with cybercrimes ranging from wire and bank fraud to obstruction of justice and conspiracy to steal trade secrets. [2]

Main manifestations of computer crime

Cyberterrorism is close to other types of computer offences. Nowadays neither Russian scientists, nor foreign experts have reached a consensus about a single definition of cyberterrorism that can help to depict a computer crime. To understand the difference and identify the acts of cyberterrorism, we need to know about another computer-related crime. In my opinion, it's necessary to mention the classification of offences in digital areas. According to Convention on Cybercrime, computer offences can be divided into several groups according to the corpus delicti of the crime.[5]

The main methods of cyberterrorism

The main goal of cyberterrorism is taking political, social, and economic advantages. Cybercriminals use special computer software for hacking the computer systems of organizations to achieve the objective. The main methods of cyberterrorist activity include the following:

- Advanced persistent threat (APT) attacks use sophisticated and concentrated penetration methods to gain network access and stay there undetected for some time to steal data. Typical targets for APT attacks are organizations with high-value information, such as national defence, manufacturing, and the financial industry.

- Computer viruses, worms, and malware target information technology (IT) control systems and can affect utilities, transportation systems, power grids, critical infrastructure, and military systems, creating instability.

- DoS attacks are intended to prevent legitimate users from accessing targeted computer systems, devices, or other computer network resources and can be aimed at critical infrastructure and governments.

- Hacking, or gaining unauthorized access, seeks to steal critical data from institutions, governments, and businesses.

- Ransomware, a type of malware, holds data or information systems hostage until the victim pays the ransom.

- Phishing attacks attempt to collect information through a target's email, using that information to access systems or steal the victim's identity. [2]

The urgency of the problem of cyberterrorism is confirmed by the following tendency: the higher the level of globalization and automations, the more cyberattacks take place. For example, one of the most known and largest acts of terrorism in world history, which was committed on the 11th of September 2001, was supported by cyberattacks on the navigation systems of New York's airport.

Due to the spread of IT technologies, active worldwide legislative development has started to prevent the growth of computer criminality rates. That's why several new articles devoted to computer crime (Chapter 28) were included in the Criminal Code of the Russian Federation. In 2012 the new rule providing criminal responsibility for committing fraud in digital areas (article 159.6 of the Criminal Code) was included in the Criminal Code. Thus, attempts have been made to prevent even ordinary computer-related offences. Nevertheless, according to the statistics of the Ministry of Internal Affairs, the number of computer-related particularly serious and serious offences has increased by 80 % during 2020. [3]

Combatting cyberterrorism

The key to countering the threat of cyberterrorism is to implement extensive cybersecurity measures and vigilance.

On the corporate level, businesses shall ensure that all internet-connected devices shall properly be secured and shall be inaccessible via public networks. To protect against ransomware and similar types of attacks, organizations must regularly back up their systems; utilize firewalls, antivirus software and antimalware; and implement continuous monitoring techniques.

Companies shall also develop IT security policies to protect business data. This includes limiting access to sensitive data and enforcing strict password and authentication procedures, like two-factor authentication or multifactor authentication. Another way to increase the level of cybersecurity is the integration of different law systems. Speaking about international authorities and organizations dealing with cyberterrorism, we can name the United Nations, the European Council, and the Interpol. The UN is the leading one of them.

In 2001 the European Council adopted the Convention on Cybercrime, where jurisdiction, basic principles, rights and responsibilities of authorities in the area of counter-cyberterrorism were determined. The Convention is signed by 58 countries including 43 member countries of the European Council, however Russian Federation hasn't ratified it. A small number of participating countries in cyberterrorism fighting is the most important problem in this area. [1] However, the agreement on cooperation in ensuring international information security between the governments of the Russian Federation and China was signed in May 2015.

International joint databases and rooted international associations have been created to prevent cyberattacks and fight against cybercrime. For example, the system including joint terrorist databases was established in June 2004 between UK, Canada, the USA, Australia and New Zealand. This system consists of 5 government centres: Joint terminal attack controller (UK), National Counterterrorism Center (the USA), Integrated Terrorism Assessment Centre (Canada), National Terrorism Threat Advisory System (Australia), Combined Threat Assessment Group (New Zealand). Moreover, in 2000 CIS (Commonwealth of Independent States) Counter-Terrorism Center was established. [1]

Right now, the world needs to worry about criminals using cyberattacks for financial gain (for example, ransomware) or fame among colleagues. Cyber attacks can also be used to cause physical harm. The world community must stop this in the future.

To sum it up, we have to say that cyberterrorism have become one of the most crucial issues of our age, that requires international consolidation and development corporation security of companies. The issue of cyberterrorism is dangerous because of constant progress in digital and computer areas. Therefore, this problem needs urgent attention.

Список использованной литературы:

1. Бельский А.И., Якимова В.И. Кибертерроризм как один из наиболее опасных видов международного терроризма // Российский следователь. 2020. №5. С. 66-70.

2. Кэти Террелл Ханна Что такое кибертерроризм? [Электронный ресурс] URL: https://searchsecurity.techtarget.com/definition/cyberterrorism (дата обращения: 02.10.2021).

3. Краткая характеристика состояния преступности в Российской Федерации за январь - декабрь 2020 года // Министерство внутренних дел Рос. Федерации: офиц. сайт. URL: https://xn--b1aew.xn--p1ai/reports/item/ 22678184/ (дата обращения: 05.12.2021).

4. Кибертерроризм [Электронный ресурс] URL: https://vuzlit.ru/881039/kiberterrorizm (дата обращения: 02.10.2021).

5. Конвенция о преступности в сфере компьютерной информации (заключена 23 ноября 2001 г.). Доступ из инф.-прав. портала "ГАРАНТ".

© Пензеник А.Ю., 2021

i Надоели баннеры? Вы всегда можете отключить рекламу.