Джанадилов Олжас Муратович,
Докторант PhD 2 года обучения
По специальности «Юриспруденция»
Академии правоохранительных органов при
Генеральной прокуратуре Республики Казахстан
Prevention
and admonition as a method of combating criminal infringements in
the field of informatization
(Cybercrime)
Annotation. Nowadays, almost all the production and defense
capability of states has been switched to digital management. The Internet hosts several million
sites and images of various kinds of information, including one that is able to
protect a person and the national security of any state.
Admonition of the investigated category of crimes, according to the majority of
scientists criminologists, is more effective than the investigation and
disclosure of computer crimes already committed, especially since the ways of
improving these crimes are updating with sufficient speed.
Keywords: offense,
informatization, admonition, preventive measures, prevention, protection, struggle.
The number of resources transferred through the global
Internet network is constantly, which indicates the emergence of a real
dependence of developed countries and each individual person from the
international information infrastructure. One of the main reasons for the emergence of the phenomenon of cybercrime
was the information and technological re-equipment of enterprises, institutions
and organizations, their saturation with computer equipment, software,
databases.
Considering
the spread of cyberspace, crimes in this area tend to grow.
Taking into account this special
urgency, issues of prevention and admonition of cybercrime are acquired, which are manifested primarily in preventive
work and aimed at creating conditions that impede the commission of the
investigated unlawful acts. The main task of preventing and admonition cybercrime is the development
of measures and creation of conditions for the use of information and
communication networks, computer technologies and computer information, in
which misconduct actions in the analyzed area are maximally limited.
Formation of a basis in which there is no place for criminal structures,
used to achieve science for the commission of computer crimes, plays a
significant role. However, modern reality indicates that this process is rather
complicated and long, requiring effort and international cooperation in this
field.
Despite these difficulties,
it is extremely necessary to start developing effective measures aimed at
preventing the growth of crimes in the field of computer technologies and
reducing their numbers.
To achieve these goals, it is advisable to ensure: information security of
individuals, society and the state; Protection of the constitutional rights of
citizens to privacy in all its aspects, reflected in computer information; Protection
of information constituting a state secret, and protection of other
confidential information, the secret of which is provided for by the
legislation of the Republic of Kazakhstan
The essence of the above tasks allows us to identify legislative, technical
and law enforcement measures aimed at preventing crimes in the field of
computer technology.
As М.М. Malykovtsev notes, that law enforcement officers aimed at prevention and
the admonition of offenses in the field of information [1, p.165].
Indeed, the introduction of training courses for law enforcement bodies and
special disciplines in the higher education institutions, whose aim will be to
deepen the special knowledge in the field of computerization, informatics and
information protection, on the basis of a specially established faculty in the
academies of the Ministry of Internal Affairs, the National Security Bureau and
the Financial Police.
Such a measure, in our opinion, should become a preventive criminological
measure based on training cadets and listeners in ways to create programs to
protect information from undue influence, as well as to prevent crimes
committed through global information and communication networks.
The effectiveness of this preventive approach is confirmed by studies
conducted by both domestic and foreign experts who rightly believe that it is
always much easier to prevent crimes in the field of computer technology than
to uncover and investigate it.
At the same time, in
the seminar was adopted a recommendation stating that "governments and
non-governmental organizations should together fight against computer-related
crime, including by raising the level of education and awareness of the
population in the field of information technologies and measures taken bodies
of internal affairs to reduce the level of offenses in this area.
An important role,
according to the seminar participants, is to improve the skills of law
enforcement officers and officials involved in the development of government
programs aimed at preventing offenses [2].
In the special
literature, legal scholars proposed to distinguish three main groups of crime
prevention measures in the field of computer technologies, which together
constitute an integral system of combating the analyzed social and dangerous
phenomenon: legal, organizational and technical, criminalistic [3, p.106].
Analyzing the
current Criminal Code of the Republic of Kazakhstan, namely Article 227 of the
Criminal Code of the Republic of Kazakhstan, we came to the conclusion that
this rule applies to already committed acts without a preventive nature.
The complexity of
preventing and combating computer crimes is also due to the lack of a unified
approach to terminology.
As A.M. Vinaver
notes, "By giving such a loophole into the hands of a criminal it is
difficult to talk about preventing a crime, because looking for an eye of an
interested consumer of the law in a slightly obscure edition of the legal norm
easily outlines a support and a weapon for defense or, as the circumstances
require, for an attack" [4].
A significant gap
in criminal legislation is the ignoring of the close interconnection of
computer equipment and global information and communication networks, which in
turn creates a favorable ground for the growth of the number of crimes in the
field of computer technology.
Another area of
work to ensure counteraction to crimes in the field of computer technology is
the adoption of organizational and technical measures.
Such measures,
according to M.M.Malykovtsev are: Use of special and certified equipment, software,
the use of cryptographic tools to protect information, Monitoring of work with information that is
state secrets and the general state of information security, the development of
models of alleged threats to information security, the creation of a database of priority
facilities and the development of measures to protect them, maintenance of
national legislation that meets modern realities, the development of an absolutely separate
segment of the information and telecommunications network, which allows
exchanging information, containing state secrets to a limited number of persons,
as well as the development of means of protecting information and its turnover
systems when employees work with it, With appropriate access, in order to avoid
espionage and information leakage [1, p.165].
In addition,
according to VN. Cherkasov, "without fail it is
necessary to implement such organizational measures as:
…1) for all
persons entitled to have access to the SCT should be defined category of
admission;
2) defined
administrative responsibility for individuals for the safety and authorization
of access to available information resources. At the same time, for
each of their types of responsibility should be borne by one particular person;
3) established periodic
systemic control of the quality of information protection through regular
maintenance both by the person responsible for safety and by the involvement of
competent specialists (experts) from other organizations;
4) classification
of information in accordance with its importance, differentiation based on this
protection measures; defined order of its protection and destruction;
5) organized physical
protection SKT (physical guards) ..." [5, p. 42].
In addition to
organizational and management measures, great importance in the prevention of
crimes in the field of computer technology, have technical measures.
Such measures
include, for example, protection against unauthorized access, from natural
disasters and accidents, sabotage, sabotage (explosions); The correct
organization of information and communication networks, and etc. These measures
can be divided into three main groups, depending on the nature and specificity
of the protected object, namely: hardware, software and complex.
Hardware methods,
as V.V. Simakov and S.V. Balakirev point out, "…are designed to protect
hardware and communication equipment of computer equipment against unwanted
physical influences of third-party forces on them, as well as to close possible
undesirable channels of leakage of confidential information and data, as due to
spurious electromagnetic emissions and pickups, vibroacoustic signals, and
others, which we examined in detail in the second and third chapters. Practical
implementation of these methods is usually carried out using a variety of
technical devices for special purposes" [6, p. 76-78].
It should be noted
that among these functions, distinguished a "call-in-front" and an
"electronic journal", which are sometimes combined to fix telephone
numbers of those subscribers who attempted unauthorized access to a computer
system or information and communication network with simultaneous notification of
computer services security of attempting such penetration.
Software
protection methods are designed to protect computer information in three
aspects: а) protection of computer and communication equipment; b) software
Protection; c)protection of integrity, accessibility and confidentiality of
data in communication channels.
To protect
information during its transmission, can be used a various methods of data
encryption before they are directly inserted into the channel of the
information and communication network or on a physical medium, followed by
interpretation. This method reduces the risk of access to private
information.
Also, there are
ways to protect computer information, such as the use of crypto algorithms, the
use of software tools that allow you to encrypt information, taking into
account various conditions for analyzing ciphertext when trying to open it. Such
tools include the program "Diskreet" from the software package
"Norton Utilities", which allows you to make both encryption of
magnetic media, and perform the function of blocking the keyboard and computer
screen (blanking out video images of valuable information). Moreover, this program provides for the protection of information objects
at the file level or virtual hard disk drives.
According to
Russian experts in the field of security of computer systems, in particular
Cherkasov V.N., "with paperless technology, conditions should be created
that exclude both accidental (unintentional) errors and deliberate distortions
of the information…. These objectives should serve as a series of preventive
measures" [5, p. 43].
Thus, summing up
this article, we can state the fact that in the development of general
preventive measures aimed at counteracting infringements in the field of
informatization, and priority is: independent protection of the physical and
legal information, by timely updating of software and virus programs, legislative
prohibition of the contact of networks (or single computers) of objects of
national importance (nuclear power plants, defense enterprises) with the global
information and communication network, that is, the development of departmental
networks separated from civil networks; a legislative ban on the use of
commercial software provided without source code, in the field of processing
classified information; legislative consolidation of the advantage of domestic
software producers when purchasing programs by state organizations.
Equally important in the process of cybercrime prevention has prophylactic work aimed at creating conditions that impede commit wrongful acts investigated.
Admonition of the investigated category of crimes, according to the majority of
scientists criminologists, is more effective than the investigation and
disclosure of computer crimes already committed, especially since the ways of
improving these crimes are updating with sufficient speed.
In this regard, it
is important to note that the prevention of any, including computer, crime
should be of a complex nature and should be exclusively within the competence
of state bodies. In this case, it is necessary to create and operate a computer
security system implemented by state forces and means, including both
legislative and organizational and technical measures, which are a set of
measures aimed at preventing cybercrime.
Bibliography:
1. Малыковцев М.М. Уголовная ответственность за
создание, использование и распространение вредоносных программ для ЭВМ [Malyikovtsev
M.M. Ugolovnaya otvetstvennost za sozdanie, ispolzovanie i rasprostranenie
vredonosnyih programm dlya EVM]:
дис. … канд. юрид. наук: 12.00.08. – М., 2006. – 186 с.
2. Report of the Eleventh United Nations Congress on Crime
Prevention and Criminal Justice // United Nations. - Access mode: http://www.un.org/
russian/ events/lthcongress/a_conf203_l 8.pdf
3. Вехов В.Б. Компьютерные преступления: способы совершения, методы расследования [Vehov V.B. Kompyuternyie prestupleniya: sposobyi
soversheniya, metodyi rassledovaniya]. – М., 1996. – 296 с.
4. Винавер A.M. Законодательная техника [Vinaver A.M. Zakonodatelnaya tehnika] // Право и жизнь. - 1926. - № 2-3.
5. Черкасов В.Н. Теория и практика решения организационно-методических проблем борьбы с экономической преступностью в условиях применения компьютерных технологий [Cherkasov V.N. Teoriya i praktika resheniya
organizatsionno-metodicheskih problem borbyi s ekonomicheskoy prestupnostyu v
usloviyah primeneniya kompyuternyih tehnologiy]: дис. ... докт. экон. наук: 05.13.10.- М., 1994. - 363 c.
6. Симаков В.В., Балакирев С.В. Многоканальный
цифровой комплекс регистрации и обработки аудиоинформации [Simakov
V.V., Balakirev S.V. Mnogokanalnyiy tsifrovoy kompleks registratsii i obrabotki
audioinformatsii] // Информатизация правоохранительных
систем. - М.: Академия МВД России, 1996. - С. 76-78.