LAW

 

Aratuly Kuanysh the doctoral candidate of 3-course Ph.D. chairs of criminal law, criminal trial and criminalistics of law faculty of KazNU named al-Farabi

 

***

 

Dzhanbakieva Ilnara the student of 4-course of a speciality of international law of faculty of the international relations of KazNU named al-Farabi

 

Annotation

Undoubtedly crimes in the field of computer information comparatively are one of young objects of study and attention of scientists-lawyers, philosophers, IT specialists and politicians. In Kazakhstan exposure, investigation and opening of crimes of similar family considerably below as compared to foreign countries.

The public danger of crimes in the field of computer information finds enormous meaningfulness, and then how the legislation of foreign countries tries one-time with development of  NT and contiguous with them the new types of crimes to stop the various hearths of ignition of illegal acts in the field of information.

Exposure, qualification, investigation and analysis of crimes such and clear interpretation of signs existing crimes will play an important role in practice and in science on a fight against a cybercrime.

 

Keywords: computers, computer crimes, computer network, Internet, information technology, Criminal code, computer viruses, spam, fraud, obscene or offensive content, harassment, drug trafficking, cyber terrorism, cyber warfare, Convention, DDoS attacks, cybercriminality.

 

MODERN VIEWS ON SOME ASPECTS OF CYBERCRIMES

Technical progress is uncontrollable. The modern personal computer surpasses the large-sized predecessors in set of parameters. And if for placing (together with the peripheral equipment) become nowadays property of history of computers the huge areas to their modern updatings there will be a place practically in each apartment, up to small rooms were required.

Scope of application of computers has changed also. Its borders have considerably extended. Every day the number of users of the world computer network the Internet all over the world increases. At the same time the displays generated by scientific and technical any progress, lead to offenses. So new information technology stimulated occurrence of unknown persons before ways of an encroachment on public relations protected by the law and has led to specific new problems. One of more widespread is, for example, necessity of maintenance of reliable protection against unapproved access to the information. It is quite natural that users of computer facilities accept certain security measures. Legal protection in scope of application of computers became necessary, and performance of this role has been assigned to criminal law. The appeared term «the computer criminality», extended nowadays in mass media, in most cases penal recognizes such actions as unapproved access to the information, its copying and destruction, introduction in system of a computer virus, and also updating of computer programs.

The general object of the given category of crimes public relations in sphere of maintenance of information security, and concern direct objects of a criminal encroachment bases and databanks of concrete computer systems or networks, their separate files, and also computer technologies and software of their maintenance, including protection frames of the computer information.

The criminal liability for wrongful access to the computer information comes, if this act has caused at least one of following negative consequences: destruction, blocking, updating or information copying; infringement of work of the computer, system of the computer or their network [1].

It is necessary to allocate especially cases when the computer is an encroachment subject, them is inadmissible to carry to a category of computer crimes. The convention consists that it is considered in this case not simply as a material world subject, and as set of information and hardware structures. A crime subject the thing admits criminal law, the material benefit of an objective material world in which occasion is committed a crime. So at fulfillment of theft of another's property by direct object personal property relations on which the criminal encroaches can be, and a role of a subject of a crime the vehicle, the computer, personal things of which the criminal takes hold can a role. Also it is impossible to steal the information in legal sense, the criminal code doesn't consider it as plunder because the information doesn't possess a materiality sign. But if the information has certain properties for an illegal taking it responsibility nevertheless is provided, only not by articles about plunder, and other articles of the criminal code, that is articles of section of economic [2].

The crime subject should be distinguished from tools and means of commission of crime. These concepts use, when it is required to specify, by means of what the crime is committed. The same subject of a material world in one crime can play a role of a subject of a crime, and in other to be the crime tool. The computer as a mean of commission of crime is considered among with such means, as the weapon, a vehicle, any technical adaptation. In this sense its use has applied value, for example, for plunder or concealment of taxes etc.

Taking into account the possibilities given by computer networks, it is impossible to exclude that criminal consequences will come or in any concrete and unique point of globe, or in territory of the several states, or in territory of all states having access to a network. Owing to these circumstances special value gets the correct decision of a question on limits of action of the criminal law in space.

Computer crime or cybercrime refers to any crime that involves a computer and a network. The may have been used in the commission of a crime, or it may be the target. Net crime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions, with the International Criminal Court among the few addressing this threat.   

Computer crime encompasses a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.

Examples of crimes that primarily target computer networks or devices would include:

-         computer viruses;

-         denial of service attacks;

-         malware (malicious code).

Examples of crimes that merely use computer networks or devices would include:

-         cyber stalking;

-         fraud and identity theft;

-         information warfare;

-         phishing scams.

A computer can be a source of evidence. Even though the computer is not directly used for criminal purposes, it is an excellent device for record keeping, particularly given the power to encrypt the data. If this evidence can be obtained and decrypted, it can be of great value to criminal investigators.

Spam. Spam, or the unsolicited of bulk email for commercial purposes, is unlawful to varying degrees. As applied to email, specific anti-spam laws are relatively new, but however, limits on unsolicited electronic communications have existed in few forms for some time.  

Fraud. Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by: Altering computer input in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes; Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect; Altering or deleting stored data; Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes. Other forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, extortion, and theft of classified information. A variety of Internet scams target consumers direct.

Obscene or offensive content. The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may illegal.

Over 25 jurisdictions place limits on certain speech and ban racist, blasphemous, politically subversive, libellous or slanderous, seditious, or inflammatory material that tends to incite hate crimes.

 The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs. One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography.

Harassment. Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties ( see cyber bullying, cyber stalking, harassment by computer, hate crime, online predator, and stalking). Any comment that may be found derogatory or offensive is considered harassment.

Drug trafficking. Drug traffickers are increasingly taking advantage of the Internet to sell their illegal substances through encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals at internet cafes, uses courier websites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms.

The rise in Internet drug trades could also be attributed to the lack of face-to-face communication. These virtual exchanges allow more intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are often associated with drug trades are severely minimized and the filtering process that comes with physical interaction fades away.

Cyber terrorism. Government officials and information Technology security specialists have documented a significant increase in Internet problems and server scans since early 2001. but there is a growing concern among federal officials that such intrusions are part of an organized effort by cyber terrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. A cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attack against computers, network, and the information stored on them. Cyber terrorism in general, can be defined as an act of terrorism committed trough the use of cyberspace or computer resources. As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyber terrorism. As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples’ lives, robberies, blackmailing etc.

Cyber extortion is a form of cyber terrorism in which a website, e-mail server, or computer system is subjected to repeated denial of service or other attacks by malicious hackers, who demand money in return for promising to stop the attacks. According to the Federal Bureau of Investigation of USA, cyber extortionists are increasingly attacking corporate websites and networks, crippling their ability to operate and demanding payments to restore their service. More than 20 cases are reported each month to the FBI and many go unreported in order to keep the victim’s name out of the domain. Perpetrators typically use a distributed denial-of-service attack.  

Cyber warfare. The U.S. Department of Defense notes that cyberspace has emerged as a national-level concern through several recent events of geo-strategic significance. Among those are included the attack on Estonia’s infrastructure in 2007, allegedly by Russian hackers. “In August 2008, Russia again allegedly conducted cyber attacks, this time in a coordinated and synchronized kinetic and non-kinetic campaign against the country of Georgia. Fearing that such attacks may become the norm in future warfare among nation-states, the concept of cyberspace operations impacts and will be adapted by warfighting military commanders in the future [3]. 

On our arena (Republic of Kazakhstan) the good complex of ways and kinds of fulfillment of crimes is resulted by the President of Republic of Kazakhstan in the concept of information security, that at present the practical continuation to the full hasn't found. In the Decree of the President of Republic of Kazakhstan «About the concept of information security of Republic of Kazakhstan» from October, 10th, 2006 concepts, ways of fulfillment of crimes and criminal activity earlier not specified to the full neither in the Republic of Kazakhstan Criminal code, nor in one scientific work of domestic figures are resulted.

From the big list of ways, methods, kinds of fulfillment of crimes in sphere of computer information can allocate some cores:

1) untimely information correspondence or an address error, illegal collecting and information use;

2) wrongful access to the information and information resources, destruction, updating and copying of the computer information against the law;

3) illegal manipulation with the information or influence on the information (misinformation, change or information concealment);

4) illegal copying of texts in information systems;

5) using of mass-media against interests of the person, a society and the state;

6) plunder of the information from libraries, archives and a database;

7) infringement of technology of processing of the information;

8) creation and distribution of programs of viruses;

9) an establishment of program and information remote terminal units;

10) destruction and infringement of processing devices of communication and the information;

11) destruction, infringement and plunder of machine and other information carriers;

12) plunder of cryptographic protection frames of the information, theft of program or information keys, passwords;

13) sending, decoding and a false information redirection in communication networks and communication lines; 

14) the deliberate or negligent offer to users of the false, incomplete or wrong information;

15) and other illegal actions in sphere of the computer information [4].                        

In the foreign and international criminal legislation at the description of similar structures of crimes the term «unapproved access or illegal access» is used. According to many scientific lawyers the given term is more exact for the characteristic of the action forbidden by the criminal law as legitimacy of access to the information actually means that it resolve  the (legal) owner of the information.

Some ways of wrongful access to the computer information are allocated: ways of direct access; ways of the mediated (remote) access; the mixed ways of access. All over the world the share of the criminal activity made by remote access to the computer, system or a computer network, continues to grow in total number of computer crimes steadily and makes by estimations of experts approximately 39,2 % [5].

As examples from judiciary practice, show that illegal connection to a network the Internet investigatory and judicial bodies is often qualified as a crime under article 227 of the Criminal code of Republic of Kazakhstan, but only with use of remote access. At connection to a network the Internet occurs use of another's user name and the password, therefore it is considered that this access is wrongful. At the same time, many authors investigating this problem, don't agree with the similar approach in low practice. In similar cases illegal connection to a network the Internet leads to change of the statistical information in billing system. Billing system (i.e. the automated system of calculations) represents the hardware-software complex intended for the account of consumption of a telecommunication service, managements of calculations for such services, managements of services simultaneously with storage of the information on subscribers to which the communications service provider renders these services [6].

The in itself automated system can't define, it is lawful or not this or that subject has entered the data of the subscriber. Thus, the official statistics of criminality in sphere of the computer information joins cases not quite correct application law enforcement bodies of the criminal law, testifying to broad interpretation of elements of structure of the crime provided by the criminal law of Republic Kazakhstan, and also insufficient misunderstanding of specifications of functioning of telecommunication services. For today the most widespread kinds of harmful programs are: computer viruses, Trojan programs, net worms.

Also in this system there are so-called zombies-computers who represent the infected computers giving unlimited access for not authorized and remote users (hackers), allowing them to dispatch from the infected computers spam or to carry out the coordinated Dos-attacks to various Internet sites or information systems. By estimations of experts, now more than 50 % of all spam are dispatched by means of zombies-networks. In 2007 the quantity of zombies-computers has grown on 29%, in comparison with 2006, having made about 6 million, and number of servers supervising them has decreased [7].

In criminal laws of some the CIS (ÑÍÃ) countries and Baltic, also as Kazakhstan, together with many other European states, such crime as infringement of service regulations of the computer (for example, Great Britain, USA, Japan, Estonia and others) isn't provided absolutely not. From the objective party the considered crime consists in infringement of service regulations of the computer, their system or a network, i.e. in default or in inadequate execution of rules by which the person having access to the computer should be guided. Infringement of rules can be made as in the form of action, and inactivity, for example, to be expressed in non-observance of the rules established for maintenance of normal functioning of the computer. There are two kinds of such rules: 1) rules which are developed by manufacturers of the computer and are delivered together with the computer; 2) rules which are established by the owner of the information or the operator of information systems.

Growth of computer criminality, including crimes in sphere of the computer information, and necessity of the coordinated approach of the states to development of the criminally-legal and criminally-remedial procedures directed on struggle against it, have led to creation in 1997 experts of Committee of Ministers of the Europe Council Committee of on criminality in a cyberspace. By results of this work in 2000 the project of the Convention of the Council of Europe on cybercriminality has been developed. The convention has been opened to signing till November, 23rd, 2001 in Budapest, and has come into force on March, 18th, 2004. As of April, 7th, 2007 the Convention was ratified by 19 states. The European Convention on cybercriminality is the complex document containing norms of various branches of the right: criminal, criminally-remedial, author's, civil, information.

In the Convention «computer crimes» or «a crime connected with use of computer technologies» which were used in accepted before the international documents aren't given concept definitions. In the document the concept "the cybercrime" which maintenance reveals by means of the list including is used: 1) the acts directed against the computer information (as subject of a criminal encroachment), 2) the acts encroaching for other blessings protected by the law, thus the information, computers etc. are one of elements their lens - ache the parties, representing itself as, for example, the tool of their fulfillment or a component of a way of their fulfillment or concealment.

The given Convention was ratified January, 2006 by France, then in September, 2006 of the USA, Kazakhstan as well as Russia has postponed Convention ratification for more later time [8].

For today at development of the coordinated measures of counteraction to computer crimes the special attention at the international level is given to following questions: detection and identification of the infringer who has committed a computer crime; access reception to the maintenance of transferred messages; the international cooperation in the field of gathering of proofs and the help in case from one country is required to the law enforcement officer access to the computer in other country for reception of proofs (i.e.«transboundary operatively-search actions»); cooperation adjustment between state structures and corresponding interested representatives community business (for example, Internet providers). The group of Eight in 2000 had been accepted the Plan of action from 10 basic points on counteraction of computer criminality which, among other measures, provided consideration of the questions connected with computer criminality, by preparation of agreements on legal aid, and also consideration of methods of preservation of electronic proofs and their representation within the limits of foreign criminal legal proceedings.

Action of the criminal law in space is defined by the interconnected principles of territoriality, citizenship and the Kazakhstan sovereignty. All persons who have committed a crime in territory of Republic of Kazakhstan, is subject to a criminal liability under the Kazakhstan Criminal code. The crimes made within maritime belt or air space of Republic of Kazakhstan, admit made on Republic territory. Action of the Criminal code of republic extends also on the crimes made on a continental shelf, and also in cases provided by the ratified international contracts. The Republic of Kazakhstan Criminal code regulates action of the criminal law concerning the persons who have committed a crime out of limits of Republic of  Kazakhstan. On the basis of citizenship it is possible to allocate following groups of persons: citizens of Republic Kazakhstan, foreign citizens and persons without citizenship. According to the Constitution of Republic of Kazakhstan and the Criminal code of the Republic of Kazakhstan, establishing that nobody can be made twice answerable for the same crime, the criminal law defines that neither citizens of Republic of Kazakhstan, nor the person without citizenship, foreigners can't be involved in a criminal liability if they have been condemned for the crime committed by them in the foreign state [9].  

Citizens of Republic of Kazakhstan and persons constantly living in republic without the citizenship, committed a crime out of Republic of Kazakhstan limits, are subject to a criminal liability under the Republic of Kazakhstan Criminal code if the act made by them is recognized by a crime in the state in which territory it has been made and if these persons haven't been condemned in the foreign state. At condemnation of the specified persons punishment can't exceed the top limit of the sanction provided by the law of the foreign state in which territory the crime has been committed.

Foreign citizens and persons without the citizenship, not living constantly in the Kazakhstan which have committed a crime out of limits of Kazakhstan, are subject to a criminal liability under the Republic of Kazakhstan Criminal code in cases if the crime is directed against interests of Kazakhstan, and in the cases provided by the international contract if they haven't been condemned in the foreign state, are involved in a criminal liability in Kazakhstan territory.

The subject of computer crimes the person, reached certain age specified in the criminal legislation, having all general signs of the subject of the criminal law, excluding limits of a sign of diminished responsibility admits. But in particular cybercriminals have the distinctive specific features, for example, presence of computer literacy in certain degree [10].

The documented cases and registered opportunities from practice on fulfillment of computer crimes. The Newscorp satellite pay to view encrypted SKY-TV service was hacked several times between 1995 and 1998 during an on-going technological arms race between a pan-European hacking group and Newscorp. The original motivation of the hackers was to watch Star Trek reruns in Germany; which was something which Newscorp did not have the copyright to allow.

The Yahoo! website was attacked at 10:30 PST on Monday, 7 February 2000. The attack, started by Mafia Boy, lasted for three hours. Yahoo was pinged at the rate of one gigabyte/second.

On 3 August 2000, Canadian federal prosecutors charged Mafia Boy with 54 counts of illegal access to computers, plus a total of ten counts of mischief to data for his attacks on Amazon.com, eBay, Dell Computer, Outlaw.net, Yahoo!. Mafia Boy had also attacked other websites, but prosecutors decided that a total of 66 counts were enough. Mafia Boy pleaded not guilty.

Russian Business Network (RBN) was registered as an internet site in 2006. Initially, much of its activity was legitimate. But apparently the founders soon discovered that it was more profitable to host illegitimate activities and started hiring its services to criminals. The RBN has been described by VeriSign as “the bad of the bad”. It offers web hosting services and internet access to all kinds of criminal and in some cases monopolized personal identity theft for resale. It is the originator of MPack and an alleged operator of the Storm botnet.

On 2 March 2010, Spanish investigators busted 3 in infection of over 13 million computers around the world. The botnet of infected computers included PCs inside more than half of the fortune 1000 companies and more than 40 major banks, according to investigators [11].

About fifty computers at Stanford University, and also computers at the   University of California at Santa Barbara (USA) were amongst the zombie computers sending pings in DDoS attacks.

DDoS (DoS) attacks are the illegal actions directed on creation of problems in work of a site on purpose to put system out of action, that is creation of such conditions at which lawful users of system can't get access to given resources, or this access is complicated. DDoS it is more difficult than DoS attack, DDoS attack (Distributed Denial of Service – the distributed attack «refusal in service»): in this case hackers use many computers which send plural inquiries about a site and overload it so that usual users can't come on a site, the same situation and has arisen on “Live Journal” and “Twitter”. Usually hackers aren't interested in personal Web pages, and here the organizations need to know about DDoS attacks and to be ready on a case of occurrence of similar problems. Many organizations can lose a serious part of profit even at site deducing out of operation at 1 hour, moreover, they can become a victim of blackmail and extortion.

If you ever heard that «on a site there were too many visitors» and «servers have failed» it is a question of a problem connected with DDoS, instead of with physical breakage of the server. Other types DDoS attacks, but at them one common feature are possible also: botnet.

Botnet is the computer network consisting of a number of hosts with started boats – the independent software. Separate computers carry out function "zombie" as them supervise distance, without having advised owners. Such computers often dispatch spam. It is considered to be that the basic quantity of spam is dispatched with the help «zombie» computers to which illegal access has been got.

One of recent examples of botnet – group of computers on which virus Conficker (has been started for the first time is found out in 2008). Different figures of the computers infected with a virus are called, up to 15 million. Such quantity of computers can be quite used for preparation DDoS attacks. Some hackers even hand over such botnets in time using to other hackers for the certain sum.

Origin DDoS attacks is extremely foggy: without knowing, who stands up for it, it is very difficult to judge motives. At the same time some attacks obviously were are motivated by political ends, for example, attack to the Georgian and Russian websites during August events of 2008. Recent attack on Twitter and Facebook in August 2009 has been aimed at the Georgian blogger owning pages on Twitter, LiveJournal and Facebook. There was an attempt to put out of action its pages in summary all three networks have failed.

At the same time, there are attacks in which motivations aren't looked through. In February 2000 ã the Canadian schoolboy has made attacks to sites CNN, eBay and Amazon without any visible reason. According to experts, DDoS attacks become more and more motivated from the financial point of view: more and more cases with the repayment requirement when from owners of a site extort the money in an exchange for renewal of work of a site [12].

In Kazakhstan the notorious affair of the large Internet provider "Nursat", which database have cracked the schoolboys of Karaganda city, has forced many to look at an information security question on another. The management of the given company has made decision to punish malefactors publicly, that is through court, thereby having created precedent in Kazakhstan [13].

In a typical attack, the hacker will delete some pages or graphics, then upload new pages with the same name as the old file, so that the hacker controls the message conveyed by the site.

This is not the worst kind of computer crime. The proper owner of the site can always close the website temporarily, restore all of the files from backup media, improve the security at the site, and then re-open the site. Nonetheless, the perpetrator has committed a computer crime by making an unauthorized use of someone else’s computer or computer account.

The internet is a medium for freely sharing information and opinions. However the criminals who trash other people’s websites are acting as self-appointed censors who deny freedom of speech to those with whom they disagree. These criminals often make the self-serving excuse for their actions that they only attack sites sponsored by bad corporations or bad people. However, this excuse makes these criminals into vigilantes who serve as legislature, judge, jury and executioner: arrogantly determining what is in the best interests of society.

One example of the crime of defacing a website is the case of Dennis M. Moran. In February 2000, he made unauthorized intrusions into computers at four different U.S. Army and Air Force installations [14].

Of course crimes in the sphere of computer information are a relatively young objects of study and attention of legal scholars, philosophers, IT-specialists and policymakers. In Kazakhstan, detection, investigation and detection of crimes of this kind is much lower compared with other countries. The reason why is the low computer literacy is not only representatives of official authorities and population,  a young fast growing scientific environment is explained by the fact that Kazakhstan is considered and is one of the young countries in the international scientific and economic arena.

Social danger of crime in field of computer information acquires great significance. And then as the legislation of foreign countries trying to lump the development of new technologies and allied with them new types of crime to suppress all possible ignition source of illegal acts in the field of information against the interests of citizens and the state.

Identification, qualification, inquiry and analysis crimes of this kind and clear interpretation of the signs of the existence of criminal acts play an important role in the practice and science on struggle against cybercriminality.

 

  

LITERATURE

1. Criminal code of Republic of Kazakhstan accepted on July, 16th, 1997 ¹167-1.

2. Jani P.S. «The Criminal encroachment on property».

3. en.wikipedia.org/wiki/Computer crimes. 

4. The decree of the President of Republic of Kazakhstan «About the Concept of information security of Republic of Kazakhstan» from October, 10th, 2006, ¹ 199.

5. Zinina U.V. Crime in sphere of the computer information in the Russian and foreign criminal law. //The Dissertation on scientific degree competition of candidate of jurisprudence – Moscow, 2007.

6. Golubev V.A., Golovin A.J. Problems of investigation of crimes in sphere of use of computer technologies. // www.crime-research.org /articles.

7. www.computerra.ru/news/31134025.

8. www.conventions.coe.int/Treaty/en/Treaties/Html/185.htm 30.

9. Criminal code of Republic of Kazakhstan accepted on July, 16th, 1997 ¹167-1.

10. Paragraph-by-paragraph comments to the Criminal code of Republic of  Kazakhstan of 1997 (¹167-1).

11. www.seminarprojects.com/attachment.php?aid=6286.

12. Amy Webb - That such DDoS attacks?/ ijnet.org/ru/stories/54598.

13. Karpinsky O. Information protection, virtual private network. /Technology VipNet/ materials of company INFOTECS.

14. www.publicservice.co.uk/news story.asp?id...