LAW
Aratuly Kuanysh the
doctoral candidate of 3-course Ph.D. chairs of criminal law, criminal trial and
criminalistics of law faculty of KazNU named al-Farabi
***
Dzhanbakieva Ilnara the student of 4-course of a
speciality of international law of faculty of the international relations of KazNU named
al-Farabi
Annotation
Undoubtedly
crimes in the field of computer information comparatively are one of young
objects of study and attention of scientists-lawyers, philosophers, IT specialists
and politicians. In Kazakhstan exposure, investigation and opening of crimes of
similar family considerably below as compared to foreign countries.
The
public danger of crimes in the field of computer information finds enormous
meaningfulness, and then how the legislation of foreign countries tries
one-time with development of NT and
contiguous with them the new types of crimes to stop the various hearths of
ignition of illegal acts in the field of information.
Exposure,
qualification, investigation and analysis of crimes such and clear
interpretation of signs existing crimes will play an important role in practice
and in science on a fight against a cybercrime.
Keywords: computers, computer
crimes,
computer network, Internet, information technology, Criminal code, computer
viruses, spam, fraud, obscene or offensive content, harassment, drug
trafficking, cyber terrorism, cyber warfare, Convention, DDoS attacks, cybercriminality.
MODERN VIEWS ON SOME ASPECTS OF CYBERCRIMES
Technical progress is
uncontrollable. The modern personal computer surpasses the large-sized
predecessors in set of parameters. And if for placing (together with the
peripheral equipment) become nowadays property of history of computers the huge
areas to their modern updatings there will be a place practically in each
apartment, up to small rooms were required.
Scope of application of
computers has changed also. Its borders have considerably extended. Every day
the number of users of the world computer network the Internet all over the
world increases. At the same time the displays generated by scientific and
technical any progress, lead to offenses. So new information technology
stimulated occurrence of unknown persons before ways of an encroachment on
public relations protected by the law and has led to specific new problems. One
of more widespread is, for example, necessity of maintenance of reliable
protection against unapproved access to the information. It is quite natural
that users of computer facilities accept certain security measures. Legal protection
in scope of application of computers became necessary, and performance of this
role has been assigned to criminal law. The appeared term «the computer
criminality», extended nowadays in mass media, in most cases penal recognizes
such actions as unapproved access to the information, its copying and
destruction, introduction in system of a computer virus, and also updating of
computer programs.
The general object of the
given category of crimes public relations in sphere of maintenance of
information security, and concern direct objects of a criminal encroachment
bases and databanks of concrete computer systems or networks, their separate
files, and also computer technologies and software of their maintenance,
including protection frames of the computer information.
The criminal liability for
wrongful access to the computer information comes, if this act has caused at
least one of following negative consequences: destruction, blocking, updating
or information copying; infringement of work of the computer, system of the
computer or their network [1].
It is necessary to allocate
especially cases when the computer is an encroachment subject, them is
inadmissible to carry to a category of computer crimes. The convention consists
that it is considered in this case not simply as a material world subject, and
as set of information and hardware structures. A crime subject the thing admits
criminal law, the material benefit of an objective material world in which
occasion is committed a crime. So at fulfillment of theft of another's property
by direct object personal property relations on which the criminal encroaches
can be, and a role of a subject of a crime the vehicle, the computer, personal
things of which the criminal takes hold can a role. Also it is impossible to
steal the information in legal sense, the criminal code doesn't consider it as
plunder because the information doesn't possess a materiality sign. But if the
information has certain properties for an illegal taking it responsibility
nevertheless is provided, only not by articles about plunder, and other
articles of the criminal code, that is articles of section of economic [2].
The crime subject should be
distinguished from tools and means of commission of crime. These concepts use,
when it is required to specify, by means of what the crime is committed. The
same subject of a material world in one crime can play a role of a subject of a
crime, and in other to be the crime tool. The computer as a mean of commission
of crime is considered among with such means, as the weapon, a vehicle, any
technical adaptation. In this sense its use has applied value, for example, for
plunder or concealment of taxes etc.
Taking into account the
possibilities given by computer networks, it is impossible to exclude that criminal
consequences will come or in any concrete and unique point of globe, or in
territory of the several states, or in territory of all states having access to
a network. Owing to these circumstances special value gets the correct decision
of a question on limits of action of the criminal law in space.
Computer
crime or cybercrime refers to any crime that involves a computer and a network.
The may have been used in the commission of a crime, or it may be the target.
Net crime refers, more precisely, to criminal exploitation of the Internet.
Issues surrounding this type of crime have become high-profile, particularly
those surrounding hacking, copyright infringement, child pornography, and child
grooming. There are also problems of privacy when confidential information is
lost or intercepted, lawfully or otherwise.
On the
global level, both governments and non-state actors continue to grow in
importance, with the ability to engage in such activities as espionage,
financial theft, and other cross-border crimes sometimes referred to as cyber
warfare. The international legal system is attempting to hold actors
accountable for their actions, with the International Criminal Court among the
few addressing this threat.
Computer
crime encompasses a broad range of potentially illegal activities. Generally,
however, it may be divided into one of two types of categories: (1) crimes that
target computer networks or devices directly; (2) crimes facilitated by
computer networks or devices, the primary target of which is independent of the
computer network or device.
Examples
of crimes that primarily target computer networks or devices would include:
-
computer viruses;
-
denial of service attacks;
-
malware (malicious code).
Examples
of crimes that merely use computer networks or devices would include:
-
cyber stalking;
-
fraud and identity theft;
-
information warfare;
-
phishing scams.
A
computer can be a source of evidence. Even though the computer is not directly
used for criminal purposes, it is an excellent device for record keeping,
particularly given the power to encrypt the data. If this evidence can be
obtained and decrypted, it can be of great value to criminal investigators.
Spam. Spam, or the unsolicited of
bulk email for commercial purposes, is unlawful to varying degrees. As applied
to email, specific anti-spam laws are relatively new, but however, limits on
unsolicited electronic communications have existed in few forms for some
time.
Fraud. Computer fraud is any
dishonest misrepresentation of fact intended to let another to do or refrain
from doing something which causes loss. In this context, the fraud will result
in obtaining a benefit by: Altering computer input in an unauthorized way. This
requires little technical expertise and is not an uncommon form of theft by
employees altering the data before entry or entering false data, or by entering
unauthorized instructions or using unauthorized processes; Altering,
destroying, suppressing, or stealing output, usually to conceal unauthorized
transactions: this is difficult to detect; Altering or deleting stored data;
Altering or misusing existing system tools or software packages, or altering or
writing code for fraudulent purposes. Other forms of fraud may be facilitated
using computer systems, including bank fraud, identity theft, extortion, and
theft of classified information. A variety of Internet scams target consumers
direct.
Obscene or offensive content. The content of
websites and other electronic communications may be distasteful, obscene or
offensive for a variety of reasons. In some instances these communications may
illegal.
Over 25
jurisdictions place limits on certain speech and ban racist, blasphemous,
politically subversive, libellous or slanderous, seditious, or inflammatory
material that tends to incite hate crimes.
The extent to which these communications are
unlawful varies greatly between countries, and even within nations. It is a
sensitive area in which the courts can become involved in arbitrating between
groups with strong beliefs. One area of Internet pornography that has been the
target of the strongest efforts at curtailment is child pornography.
Harassment. Whereas content may be
offensive in a non-specific way, harassment directs obscenities and derogatory
comments at specific individuals focusing for example on gender, race,
religion, nationality, sexual orientation. This often occurs in chat rooms,
through newsgroups, and by sending hate e-mail to interested parties ( see
cyber bullying, cyber stalking, harassment by computer, hate crime, online
predator, and stalking). Any comment that may be found derogatory or offensive
is considered harassment.
Drug trafficking. Drug traffickers are
increasingly taking advantage of the Internet to sell their illegal substances
through encrypted e-mail and other Internet Technology. Some drug traffickers
arrange deals at internet cafes, uses courier websites to track illegal
packages of pills, and swap recipes for amphetamines in restricted-access chat
rooms.
The
rise in Internet drug trades could also be attributed to the lack of
face-to-face communication. These virtual exchanges allow more intimidated
individuals to more comfortably purchase illegal drugs. The sketchy effects
that are often associated with drug trades are severely minimized and the
filtering process that comes with physical interaction fades away.
Cyber terrorism. Government officials and
information Technology security specialists have documented a significant
increase in Internet problems and server scans since early 2001. but there is a
growing concern among federal officials that such intrusions are part of an
organized effort by cyber terrorists, foreign intelligence services, or other
groups to map potential security holes in critical systems. A cyber terrorist
is someone who intimidates or coerces a government or organization to advance
his or her political or social objectives by launching computer-based attack
against computers, network, and the information stored on them. Cyber terrorism
in general, can be defined as an act of terrorism committed trough the use of
cyberspace or computer resources. As such, a simple propaganda in the Internet,
that there will be bomb attacks during the holidays can be considered cyber
terrorism. As well there are also hacking activities directed towards
individuals, families, organized by groups within networks, tending to cause
fear among people, demonstrate power, collecting information relevant for
ruining peoples’ lives, robberies, blackmailing etc.
Cyber
extortion is a form of cyber terrorism in which a website, e-mail server, or
computer system is subjected to repeated denial of service or other attacks by
malicious hackers, who demand money in return for promising to stop the
attacks. According to the Federal Bureau of Investigation of USA, cyber
extortionists are increasingly attacking corporate websites and networks,
crippling their ability to operate and demanding payments to restore their
service. More than 20 cases are reported each month to the FBI and many go
unreported in order to keep the victim’s name out of the domain. Perpetrators
typically use a distributed denial-of-service attack.
Cyber warfare. The U.S. Department of
Defense notes that cyberspace has emerged as a national-level concern through
several recent events of geo-strategic significance. Among those are included
the attack on Estonia’s infrastructure in 2007, allegedly by Russian hackers.
“In August 2008, Russia again allegedly conducted cyber attacks, this time in a
coordinated and synchronized kinetic and non-kinetic campaign against the
country of Georgia. Fearing that such attacks may become the norm in future
warfare among nation-states, the concept of cyberspace operations impacts and
will be adapted by warfighting military commanders in the future [3].
On our arena (Republic of Kazakhstan)
the good complex of ways and kinds of fulfillment of crimes is resulted by the
President of Republic of Kazakhstan in the concept of information security,
that at present the practical continuation to the full hasn't found. In the
Decree of the President of Republic of Kazakhstan «About the concept of
information security of Republic of Kazakhstan» from October, 10th, 2006
concepts, ways of fulfillment of crimes and criminal activity earlier not
specified to the full neither in the Republic of Kazakhstan Criminal code, nor
in one scientific work of domestic figures are resulted.
From
the big list of ways, methods, kinds of fulfillment of crimes in sphere of
computer information can allocate some cores:
1)
untimely information correspondence or an address error, illegal collecting and
information use;
2)
wrongful access to the information and information resources, destruction,
updating and copying of the computer information against the law;
3)
illegal manipulation with the information or influence on the information
(misinformation, change or information concealment);
4)
illegal copying of texts in information systems;
5)
using of mass-media against interests of the person, a society and the state;
6)
plunder of the information from libraries, archives and a database;
7)
infringement of technology of processing of the information;
8)
creation and distribution of programs of viruses;
9) an
establishment of program and information remote terminal units;
10)
destruction and infringement of processing devices of communication and the
information;
11)
destruction, infringement and plunder of machine and other information
carriers;
12)
plunder of cryptographic protection frames of the information, theft of program
or information keys, passwords;
13)
sending, decoding and a false information redirection in communication networks
and communication lines;
14) the
deliberate or negligent offer to users of the false, incomplete or wrong
information;
15) and
other illegal actions in sphere of the computer information [4].
In the
foreign and international criminal legislation at the description of similar
structures of crimes the term «unapproved access or illegal access» is used.
According to many scientific lawyers the given term is more exact for the
characteristic of the action forbidden by the criminal law as legitimacy of
access to the information actually means that it resolve the (legal) owner of the information.
Some
ways of wrongful access to the computer information are allocated: ways of
direct access; ways of the mediated (remote) access; the mixed ways of access.
All over the world the share of the criminal activity made by remote access to
the computer, system or a computer network, continues to grow in total number
of computer crimes steadily and makes by estimations of experts approximately
39,2 % [5].
As examples from judiciary practice, show that illegal
connection to a network the Internet investigatory and judicial bodies is often
qualified as a crime under article 227 of the Criminal code of Republic of
Kazakhstan, but only with use of remote access. At connection to a network the
Internet occurs use of another's user name and the password, therefore it is
considered that this access is wrongful. At the same time, many authors
investigating this problem, don't agree with the similar approach in low
practice. In similar cases illegal connection to a network the Internet leads
to change of the statistical information in billing system. Billing system
(i.e. the automated system of calculations) represents the hardware-software
complex intended for the account of consumption of a telecommunication service,
managements of calculations for such services, managements of services
simultaneously with storage of the information on subscribers to which the
communications service provider renders these services [6].
The in itself automated system can't define, it is
lawful or not this or that subject has entered the data of the subscriber.
Thus, the official statistics of criminality in sphere of the computer
information joins cases not quite correct application law enforcement bodies of
the criminal law, testifying to broad interpretation of elements of structure
of the crime provided by the criminal law of Republic Kazakhstan, and also
insufficient misunderstanding of specifications of functioning of
telecommunication services. For today the most widespread kinds of harmful
programs are: computer viruses, Trojan programs, net worms.
Also in this system there are so-called
zombies-computers who represent the infected computers giving unlimited access
for not authorized and remote users (hackers), allowing them to dispatch from
the infected computers spam or to carry out the coordinated Dos-attacks to various
Internet sites or information systems. By estimations of experts, now more
than 50 % of all spam are dispatched by means of zombies-networks. In 2007 the
quantity of zombies-computers has grown on 29%, in comparison with 2006, having
made about 6 million, and number of servers supervising them has decreased [7].
In criminal laws of some the CIS (ÑÍÃ) countries and Baltic, also as
Kazakhstan, together with many other European states, such crime as
infringement of service regulations of the computer (for example, Great
Britain, USA, Japan, Estonia and others) isn't provided absolutely not. From
the objective party the considered crime consists in infringement of service
regulations of the computer, their system or a network, i.e. in default or in
inadequate execution of rules by which the person having access to the computer
should be guided. Infringement of rules can be made as in the form of action,
and inactivity, for example, to be expressed in non-observance of the rules
established for maintenance of normal functioning of the computer. There are
two kinds of such rules: 1) rules which are developed by manufacturers of the
computer and are delivered together with the computer; 2) rules which are
established by the owner of the information or the operator of information
systems.
Growth of computer criminality, including crimes in sphere of the
computer information, and necessity of the coordinated approach of the states
to development of the criminally-legal and criminally-remedial procedures
directed on struggle against it, have led to creation in 1997 experts of
Committee of Ministers of the Europe Council Committee of on criminality in a
cyberspace. By results of this work in 2000 the project of the Convention of
the Council of Europe on cybercriminality has been developed. The convention
has been opened to signing till November, 23rd, 2001 in Budapest, and has come
into force on March, 18th, 2004. As of April, 7th, 2007 the Convention was
ratified by 19 states. The European Convention on cybercriminality is the
complex document containing norms of various branches of the right: criminal,
criminally-remedial, author's, civil, information.
In the Convention «computer crimes» or «a crime connected with use of
computer technologies» which were used in accepted before the international
documents aren't given concept definitions. In the document the concept
"the cybercrime" which maintenance reveals by means of the list
including is used: 1) the acts directed against the computer information (as subject
of a criminal encroachment), 2) the acts encroaching for other blessings
protected by the law, thus the information, computers etc. are one of elements
their lens - ache the parties, representing itself as, for example, the tool of
their fulfillment or a component of a way of their fulfillment or concealment.
The given Convention was ratified January, 2006 by France, then in
September, 2006 of the USA, Kazakhstan as well as Russia has postponed
Convention ratification for more later time [8].
For today at development of the coordinated measures of counteraction to
computer crimes the special attention at the international level is given to
following questions: detection and identification of the infringer who has
committed a computer crime; access reception to the maintenance of transferred
messages; the international cooperation in the field of gathering of proofs and
the help in case from one country is required to the law enforcement officer
access to the computer in other country for reception of proofs (i.e.«transboundary
operatively-search actions»); cooperation adjustment between state structures
and corresponding interested representatives community business (for example,
Internet providers). The group of Eight in 2000 had been accepted the Plan of
action from 10 basic points on counteraction of computer criminality which,
among other measures, provided consideration of the questions connected with
computer criminality, by preparation of agreements on legal aid, and also
consideration of methods of preservation of electronic proofs and their
representation within the limits of foreign criminal legal proceedings.
Action of the criminal law in space is defined by the interconnected
principles of territoriality,
citizenship and the Kazakhstan sovereignty. All persons who have committed a
crime in territory of Republic of Kazakhstan, is subject to a criminal
liability under the Kazakhstan Criminal code. The crimes made within maritime
belt or air space of Republic of Kazakhstan, admit made on Republic territory.
Action of the Criminal code of republic extends also on the crimes made on a
continental shelf, and also in cases provided by the ratified international
contracts. The Republic of Kazakhstan Criminal code regulates action of the
criminal law concerning the persons who have committed a crime out of limits of
Republic of Kazakhstan. On the basis of
citizenship it is possible to allocate following groups of persons: citizens of
Republic Kazakhstan, foreign citizens and persons without citizenship.
According to the Constitution of Republic of Kazakhstan and the Criminal code
of the Republic of Kazakhstan, establishing that nobody can be made twice
answerable for the same crime, the criminal law defines that neither citizens
of Republic of Kazakhstan, nor the person without citizenship, foreigners can't
be involved in a criminal liability if they have been condemned for the crime
committed by them in the foreign state [9].
Citizens of Republic of Kazakhstan
and persons constantly living in republic without the citizenship, committed a
crime out of Republic of Kazakhstan limits, are subject to a criminal liability
under the Republic of Kazakhstan Criminal code if the act made by them is
recognized by a crime in the state in which territory it has been made and if these
persons haven't been condemned in the foreign state. At condemnation of the
specified persons punishment can't exceed the top limit of the sanction
provided by the law of the foreign state in which territory the crime has been
committed.
Foreign citizens and persons
without the citizenship, not living constantly in the Kazakhstan which have
committed a crime out of limits of Kazakhstan, are subject to a criminal
liability under the Republic of Kazakhstan Criminal code in cases if the crime
is directed against interests of Kazakhstan, and in the cases provided by the
international contract if they haven't been condemned in the foreign state, are
involved in a criminal liability in Kazakhstan territory.
The subject of computer crimes
the person, reached certain age specified in the criminal legislation, having
all general signs of the subject of the criminal law, excluding limits of a
sign of diminished responsibility admits. But in particular cybercriminals have
the distinctive specific features, for example, presence of computer literacy
in certain degree [10].
The documented
cases and registered opportunities from practice on fulfillment of computer
crimes. The Newscorp satellite pay to view encrypted SKY-TV service was
hacked several times between 1995 and 1998 during an on-going technological
arms race between a pan-European hacking group and Newscorp. The original
motivation of the hackers was to watch Star Trek reruns in Germany; which was
something which Newscorp did not have the copyright to allow.
The Yahoo! website was attacked at
10:30 PST on Monday, 7 February 2000. The attack, started by Mafia Boy, lasted
for three hours. Yahoo was pinged at the rate of one gigabyte/second.
On 3 August 2000, Canadian
federal prosecutors charged Mafia Boy with 54 counts of illegal access to
computers, plus a total of ten counts of mischief to data for his attacks on
Amazon.com, eBay, Dell Computer, Outlaw.net, Yahoo!. Mafia Boy had also
attacked other websites, but prosecutors decided that a total of 66 counts were
enough. Mafia Boy pleaded not guilty.
Russian Business Network (RBN)
was registered as an internet site in 2006. Initially, much of its activity was
legitimate. But apparently the founders soon discovered that it was more
profitable to host illegitimate activities and started hiring its services to
criminals. The RBN has been described by VeriSign as “the bad of the bad”. It
offers web hosting services and internet access to all kinds of criminal and in
some cases monopolized personal identity theft for resale. It is the originator
of MPack and an alleged operator of the Storm botnet.
On 2 March 2010, Spanish
investigators busted 3 in infection of over 13 million computers around the
world. The botnet of infected computers included PCs inside more than half of
the fortune 1000 companies and more than 40 major banks, according to
investigators [11].
About fifty computers at
Stanford University, and also computers at the
University of California at Santa Barbara (USA)
were amongst the zombie computers sending pings in DDoS attacks.
DDoS (DoS) attacks are the
illegal actions directed on creation of problems in work of a site on purpose
to put system out of action, that is creation of such conditions at which
lawful users of system can't get access to given resources, or this access is
complicated. DDoS it is more difficult than DoS attack, DDoS attack
(Distributed Denial of Service – the distributed attack «refusal in service»):
in this case hackers use many computers which send plural inquiries about a
site and overload it so that usual users can't come on a site, the same
situation and has arisen on “Live Journal” and “Twitter”. Usually hackers
aren't interested in personal Web pages, and here the organizations need to
know about DDoS attacks and to be ready on a case of occurrence of similar
problems. Many organizations can lose a serious part of profit even at site
deducing out of operation at 1 hour, moreover, they can become a victim of
blackmail and extortion.
If you ever heard that «on a
site there were too many visitors» and «servers have failed» it is a question
of a problem connected with DDoS, instead of with physical breakage of the
server. Other types DDoS attacks, but at them one common feature are possible
also: botnet.
Botnet is the computer network
consisting of a number of hosts with started boats – the independent software.
Separate computers carry out function "zombie" as them supervise distance,
without having advised owners. Such computers often dispatch spam. It is
considered to be that the basic quantity of spam is dispatched with the help
«zombie» computers to which illegal access has been got.
One of recent examples of
botnet – group of computers on which virus Conficker (has been started for the
first time is found out in 2008). Different figures of the computers infected
with a virus are called, up to 15 million. Such quantity of computers can be quite
used for preparation DDoS attacks. Some hackers even hand over such botnets in
time using to other hackers for the certain sum.
Origin DDoS attacks is
extremely foggy: without knowing, who stands up for it, it is very difficult to
judge motives. At the same time some attacks obviously were are motivated by
political ends, for example, attack to the Georgian and Russian websites during
August events of 2008. Recent attack on Twitter and Facebook in August 2009 has
been aimed at the Georgian blogger owning pages on Twitter, LiveJournal and
Facebook. There was an attempt to put out of action its pages in summary all
three networks have failed.
At the same time, there are
attacks in which motivations aren't looked through. In February 2000 ã the
Canadian schoolboy has made attacks to sites CNN, eBay and Amazon without any
visible reason. According to experts, DDoS attacks become more and more
motivated from the financial point of view: more and more cases with the
repayment requirement when from owners of a site extort the money in an
exchange for renewal of work of a site [12].
In
Kazakhstan the notorious affair of the large Internet provider
"Nursat", which database have cracked the schoolboys of Karaganda
city, has forced many to look at an information security question on another.
The management of the given company has made decision to punish malefactors
publicly, that is through court, thereby having created precedent in Kazakhstan
[13].
In a
typical attack, the hacker will delete some pages or graphics, then upload new
pages with the same name as the old file, so that the hacker controls the
message conveyed by the site.
This is
not the worst kind of computer crime. The proper owner of the site can always
close the website temporarily, restore all of the files from backup media,
improve the security at the site, and then re-open the site. Nonetheless, the
perpetrator has committed a computer crime by making an unauthorized use of
someone else’s computer or computer account.
The
internet is a medium for freely sharing information and opinions. However the
criminals who trash other people’s websites are acting as self-appointed
censors who deny freedom of speech to those with whom they disagree. These
criminals often make the self-serving excuse for their actions that they only
attack sites sponsored by bad corporations or bad people. However, this excuse
makes these criminals into vigilantes who serve as legislature, judge, jury and
executioner: arrogantly determining what is in the best interests of society.
One
example of the crime of defacing a website is the case of Dennis M. Moran. In
February 2000, he made unauthorized intrusions into computers at four different
U.S. Army and Air Force installations [14].
Of course crimes in the sphere of
computer information are a relatively young objects of study and attention of
legal scholars, philosophers, IT-specialists and policymakers. In Kazakhstan,
detection, investigation and detection of crimes of this kind is much lower
compared with other countries. The reason why is the low computer literacy is
not only representatives of official authorities and population, a young fast growing scientific environment
is explained by the fact that Kazakhstan is considered and is one of the young
countries in the international scientific and economic arena.
Social danger
of crime in field of computer information acquires great significance. And then
as the legislation of foreign countries trying to lump the development of new
technologies and allied with them new types of crime to suppress all possible
ignition source of illegal acts in the field of information against the
interests of citizens and the state.
Identification,
qualification, inquiry and analysis crimes of this kind and clear interpretation of the signs
of the existence of criminal acts play an important role in the practice and science on struggle against cybercriminality.
LITERATURE
1.
Criminal code of Republic of Kazakhstan accepted on July, 16th, 1997 ¹167-1.
2. Jani P.S. «The Criminal encroachment on property».
3.
en.wikipedia.org/wiki/Computer crimes.
4. The decree of the
President of Republic of Kazakhstan «About the Concept of information security
of Republic of Kazakhstan» from October, 10th, 2006, ¹ 199.
5. Zinina U.V. Crime in sphere of the computer information in the Russian
and foreign criminal law. //The Dissertation on scientific degree competition of
candidate of jurisprudence – Moscow, 2007.
6. Golubev V.A.,
Golovin A.J. Problems of investigation of crimes in sphere of use of computer
technologies. // www.crime-research.org /articles.
7. www.computerra.ru/news/31134025.
8. www.conventions.coe.int/Treaty/en/Treaties/Html/185.htm 30.
9. Criminal
code of Republic of Kazakhstan accepted on July, 16th, 1997 ¹167-1.
10. Paragraph-by-paragraph comments to the Criminal code
of Republic of Kazakhstan of 1997
(¹167-1).
11. www.seminarprojects.com/attachment.php?aid=6286.
12. Amy
Webb - That such DDoS attacks?/ ijnet.org/ru/stories/54598.
13. Karpinsky O.
Information protection, virtual private network. /Technology VipNet/ materials
of company INFOTECS.
14. www.publicservice.co.uk/news
story.asp?id...