Some problems of cyber crime and cyber terrorism fighting The international community has come to new epoch – information society epoch. At present the human activity depends on telecommunication technologies used in almost all fields of people activity (communications, transport, space, power industry, water supplying, finances, trading, science, education, defense, public maintenance of law and order, medicine and so). In 1998 there were connected to Internet only 143 millions of people, but in 2001 the users quantity has reached to 700 millions. Russian Internet segment yet has 6 millions users or so.Rapid developing of telecommunications and global computer networks has created the reasons, which allow to commit of cyber crimes in the high technologies field more easier. The telecommunication technologies opportunities use by criminal organizations very widely. The typical examples of such kind of crimes are: -transmitting of crimes collected capitals, -untaxed financial operations, -cracks and weapon sales through Internet, -crimes connections commitment by use of E-mail, -compromising” spreading, -theft of passwords and accessing networks codes, unlawful information coping, including commercial and confidential one, -hacker attacks, -producing and use of cloned personal radio-electronic measures (“similar”).
By the way many of these crimes by idea, committing and results may be named as terrorist actions. Terrorist actions in the cyberspace could be done not only isolated persons or terrorist groups, but one state against another. By that cyber terrorism not differ from other kind of terrorism by nothing.
Extremist groups, separatist forces, advocates of ideas, which defy to the universal values ntensive use of modern technologies for their idea propaganda and information wars conduction. So, creating of finding and neutrality of influence on the information technologies is the main task of the society and it law-defense authorities. This understood so in the Russian Federation well. By the Maine office of special technical measures (M O S T M) of the Russian Department of Interior dates during 2001 year the quantities of committed in the cyber information field crimes on the territory of the Russia increased in 1. times or so compared with 2000 year. The international community realized fully the possibility consequences rate from the cyber criminal thread and there was signed the International Convention of cyber criminal by the representatives of EC countries and also US, Canada and Japan in the November 2001. In the convention the crimes, which committed in the information field or against information resources or with the help of information measures factually ruled as cyber crimes and ruled the approximate list of this crimes: Unlawful access to information environment. -No legal interception of information resources.
-Intervention into containing on the magnetic transmitters information. -Intervention into the computer system. -Unlawful use of telecommunication equipment. -Forgery with use of computer measures. -Deviousness with use of computer measures.
-Crimes, which connected with considered in the Convention contents actions. -Crimes, which connected with “child” porno. -Crimes, which connected with author and related rights breaking.We think that cyber crime (and cyber terrorism as one of it kind) is the intervention into the telecommunication networks work, functioning in their environment computer programs or no sanctioning modification of the computer dates, leading to disorganization of the very important elements of the state infrastructure and creating of people death danger, causing the significant property loss or coming of other social danger consequences which makes to destroy the social protection, population frightening or influencing to the authorities decisions which profitably for criminals or their unlawful property and(or) other interests satisfaction.I’ll mark that to our mind cyber crime do not limited by crime boards which were committed in the Internet, it spread on all kind of committed in the information-telecommunication field crimes, where information, information resources, information technical could be subject (term) of crime infringes, field where offences has been doing and crime measure or tool. Information weapon could act selectively, it could be use through trans-board links, that could be cause of source finding impossibility.
So information weapon can become an ideal measure for terrorists and information terrorism could become the threat of many states existence, what make the information protection matter the important aspect of national and international protection and this aspect role will be increased. In the foreign countries legislation the cyber terrorist very often named as hacker. The arsenal of both are: different attacks kinds which allow to penetrate into the attacked network or intercept of network control -cyber viruses, including network viruses (worms), which modify and delete of information or block of calculation systems work -logical bombs- the commands kits , which penetrated into the program and operated at certain conditions for example after certain time period -“gresian horses “,which allow to do certain actions without poisoned system master (user) knowledge ( at present time widespread the kind of “gresians”, which send to its “master” through Internet different information from the spoiled computer, including registered users passwords) -measures of information exchange suppressing in the networks. It is no sense to doubt that the new measures will appear soon, as the cyber crimes weapon modified constantly depending from the protection measures which used by computer networks users: when the protection systems become improved, the attack measures become more sophisticated. The main features of cyber crimes are: -cyber crimes secretiveness -trans-broadness information, information resources, information technique could be the subject ( aim) of crime infringement, the environment when offenses committed and the crime measure or tool -computer information (crime traces) deleting and changing easiness -cyber crimes commitment traces kept in the technique facilities memory, in the electro-magnetic field, on the machine transmitters of computer information and occupy an intermediate position between material and ideal traces -“virtual” traces could not be removed, it is only possible to copy them -short time of cyber crimes traces keeping on the servers of the telecommunication networks companies-operators -unique peculiarity – actions immediateness, which directed to the computer information recognizing and persons identification which deal with unlawful activity in the computer networks.
Taking into attention cyber crimes peculiarities there appear the whole technical and juridical problems complex, which connected with absence of: 1. Legislation acts, regulating of criminal-processional actions 2. Specially training staffs (operate and investigate staff, specializing on the discovering and exposing of the crimes in the information-telecommunication field) 3. Necessary technical measures.