LightBlog

Monday 18 March 2019

Internet Ethics and Issues | TheHackerEarth

Internet-Ethics-and-Issues


Internet Ethics and Issues


New technologies, creating a new paradigm, which also attacks every human activity These activities affect the dark side: criminal behavior of individuals and organized Groups

For this reason, we have reserved the last text of HHS to analyze some aspects related to Validity and ethics, analysis of many behaviors which may end in crimes and The consequences of these crimes.

Foreign Crimes Versus Local Rights


As mentioned above, the introduction of new technologies can result in the formation of the new darkness Attentions of activities: criminal behavior of individuals or organized groups. Two are the main Features through which Information Technology and Communication (TIC) are Related to crime:

  1. Technology may give the possibility of renewing the traditional methods of breaking the law. These are illegal activities which traditionally appear in the Penal Code, but are now Efforts are being made in new ways. Examples include money laundering and illegal type Pornography
  2. In addition, due to their own innovation, there are consequences in the presence of TIC New types of criminal activities, and because of their nature, these are new crimes The process of being added to the law of many countries examples include the Distribution of Spam and Virus Attacks.

Another feature of TIC that should be emphasized is their regional displacement, Which affects the general environment but also affects other countries without any doubt. 

First, in the areas of 'law', there was always a clear area in view of the judicial authority Will also be decided in relation to the law (absolute justice) and law (applicable laws). Both concepts are still quite geographical.

In short, we can say that TIC is global and essentially multi-bound, while law And the courts are limited to a specific state or region. Apart from this, it is also a stray More confusing than initially visible. 

Although we do not know about this, a bidirectional online Communication between a user in Barcelona and a web site organized in an ISP in California Can pass through more than 10 ISPs, can be hosted in various remote points around the world.

Facing this diversity of addresses and nationalities, it is necessary to ask which law Which country will be applicable in case of litigation? Which of the potential countries would be Suitable court to adjourn the case?

The relatively recent European Council agreement on cybercrime was signed in November By roughly 30 countries in Budapest, 2001, including 15 EU partners United States, Canada, Japan, and South Africa. 

Intends to restore this agreement Essential Principles for Defining a Competent Court This agreement is to be signed The culmination of four years of work, resulting in a document containing 48 articles Organized into four categories:

  1. Violation Against Privacy
  2. Falsification and Computer Science Fraud
  3. The relative deviation of content
  4. Violation of Intellectual Property

Once exclusively complex rules and restrictions on criminal activity on the Internet Has been described, should reach or reach the three main areas of consensus concerns Difficulties:

  1. Daily: Judicial Conference The most competent court choice to judge Multinational and multi-boundary crime This problem is definitely not solved by anyone Known judicial systems.
  2. Second Difficulty: Resisting the Law. Once the court is selected, the first hurdle The court will be facing to select the applicable law for this case. Again we are forced to conclude that the traditional legal criteria have not been designed for Virtual environment
  3. Duplex: Boycott of Sanatan Once the competent court has set one Sentence, the sentence should probably be done by a different country The country that fixed the sentence Therefore, it is necessary to be an international recognition and commitment to accept any sentence. It is problematic The issue is more complex to solve compared to the previous two.

Recently, in the case of a hacker in Russia, these complications were clearly demonstrated, Many American systems had been hacked, and for an interview, a Funny American company was invited.

During the interview, he demonstrated his skills by hacking into his own network in Russia. this

It was revealed that the interview was actually conducted by the FBI, and he was arrested. The FBI used sniffers kept on the interview computer to raid the hacker's computer in Russia and The download is proof that he was convicted.

But there are many unresolved issues:
  • Did the FBI investigate the contents of a computer in Russian without legal Get permission from the Russian government?
  • By inviting Hacker to America, the FBI did not have to arrange his extradition America. Was it legal?
  • Can a person blame a person for the crime that was technically committed to Russia soil?

Finally, he was convicted in the United States because he used a proxy server in the US to conduct
Some attack He served only 4 years in jail and now lives and works in America.

Crimes related to the TICs

Classification of criminal behavior is one of the essential principles in penalties System, For this reason, many countries should think about a change in their penal code, such as Spain, where the effective penal code was relatively recently announced. 

Famous On November 23, 1995, the Approval of the Barlow Penal Code (Penal Laws) Code 10/1995) and it recognizes the need to adapt current social to punitive norms Reality...

Among others, we can classify potential criminal offenses in the following six categories.

  1. Manipulate data and information contained in files and other computer equipment.
  2. Use of data or authorization of data until authorization.
  3. To incorporate programs/routines into other computers to delete or modify information, data, or applications.
  4. Use of other people's computers or applications without the explicit authorization, for the purpose of acquiring benefits for themselves and/or harming others.
  5. Computer use with fraudulent intentions.
  6. Use of authorized data, through the use and processing of personal data with a different purpose than authorized one.

Technical crime is the specialty of the difficulties involved in its quest, to prove it And he is under litigation. Victims prefer to undergo the consequences of crime and to try Instead of starting the judicial process, stop it in the future. This situation is very much It is difficult to calculate the number of crimes like this and preventive legal planning Solution.

It is complicated by constantly changing technologies. However, the laws are changing For fast judges, jurists and lawyers punish the crimes associated with legal instruments of great value TIC to

Next, we will analyze some specific crimes related to TIC.

  1. Misrepresentation: Internet anonymity allows users to show off to anyone That they want to be As a result, crimes can happen when users pretend to be an Anyone else to gain information or to gain the trust of other people
  2. Interception of communication: interception of secret or private communication, Such as email, or cell phone broadcasts, listening devices, recording, or Reproduction of sounds and or images.
  3. Discovering and Secrets of Mysteries: Discovering the Company's Mysteries Illegally Examining data, or electronic documents. In some cases, there are legal sentences If the secrets are told to a third party, then expand.
  4. Unauthorized access to computers: Invalid access with accounts and notifications Intent to give profits. Includes identity theft.
  5. Damaging computer files: deleting, changing, making any other way worthwhile, Disadvantages of electronic data, programs or documents on other computers, networks or System
  6. Illegal Imitation: Illegal Imitation of Copy-Written Content, Literature, Artistic, Scientific Works by means of intellectual owners without any authorization Property or its executive

Prevention of Crimes and Technologies of double use


The only reliable way to get ready for criminal aggression in the area of TIC is Properly applied to the security measures mentioned during the previous HHS lesson. Apart from this, it is extremely important for the application of these measures The way in which it is practically impossible to do any criminal or suspicious behavior.

It is important to note that many uses of technologies and the same technology can be used For security, together, as a result of criminal activity. It is called TECHNOLOGIES OF Double use, with the largest component Cryptography and technologies Blocking Electronic Communications This section discusses the reality of this incident And its dangerous consequences at all levels of human activity, including policy, social Economic, and research.

The global systems of monitoring: concept "COMINT"

The term COMINT was recently created as a result of the integration of the terms "COMmunications Intu Ence" and refers to the interception of communication As a result of the large scale implementation of development and TIC nowadays, COMINT represents an attractive economic activity providing both clients and private, 

With intelligent content on-demand, especially in the areas of diplomacy, economy and Research This has resulted in the displacement of an obsolete plan of military espionage With more or less open implementation of new techniques for exams and
collection of data.

The most representative examples of COMINT technologies are the system "ECHELON" "CARNIVORE" which has been discussed further.

"ECHELON" System

In an agreement between the UK and UK, this system was created in 1947 immediately after World War II.

The United States with clear military and security objectives. The details of this agreement are still not available Completely known. Later, countries such as Canada, Australia, and New Zealand joined Working as the compromise, information providers and subordinates

The system works indiscriminately, which disrupts large amounts of communication, not What is the difference between the tools used for transport and storage mainly on the following? Listening areas:

  • Broadband broadcasts (broadband and internet)
  • Facsimile and telephone communication by cable: blocking of cables, and Submarines through ships equipped for this
  • Cell phone communication
  • Voice Recognition System
  • Biometric system recognition such as the identity of the face through anonymous filming

Later, according to the instructions in the EcoLon system, valuable information is selected, To define and implement the key with the help of many methods of Artificial Intelligence (AI).

Each of the five-member countries provides "keyword authority" Introduced in communication blocking devices and served as an "automatic filter". Logically, "words" and "dictionaries" change over time according to particular The interest of member countries of the system, First of all, ECHELON had a clear military and The purpose of security Later, 

It officially became a dual system working for the prevention of international organized crime (terrorism, mob, smuggling of weapons and drugs, dictatorship, Etc.) but with the effect of reaching global economies and commercial policies in companies.

Recently, ECHELON is working with a five-point star structure around two main areas. There are structures of both the NSA (National Security Agency): one in the United States, coincidentally With their headquarters in Fort Meade (Maryland), and another in England in the North Yorkshire, known as Minnith Hill.

On the tracking stations of partner partners, the marks of the stars are recorded:

  • USA (2): Sugar Grove and Yakima.
  • New Zealand (1): Y Pai
  • Australia (1): Geraldton
  • UK (1): Morvensto (Cornwell).
  • There was another in Hong Kong before returning to China.

The "CARNIVORE" system

One is sponsored by the second great global system of interception and espionage US is known as FBI and CARNIVORE, in which there is a purpose of fighting organized crime and Strengthen America's Security Because of its powerful technique and its versatility to implement In areas of listening and attention, CARNIVORE caused a head-on collision in the meantime. The state-of-the-art system, political organization (US Congress), and mass media.

CARNIVORE was developed in 2000, and it is an automated system, intercepting Internet Communication by taking advantage of one of the fundamental principles of Net: Dissemination of information in groups of "packages" or similar data. 

CARNIVORE is able to detect and identify the "package of this information" It is believed that it is done in defense Strengthen the fight against national security and organized and technological crime.

American Civil Rights Organizations immediately oppose it as a new attack on privacy And secrecy of electronic information transactions. One group, electronic privacy Information Center (EPIC) has requested that a federal judge orders the FBI to grant access ISP's for monitoring system - to ensure that this system is not being used beyond Law limit

At the beginning of August 2000, the Court of Appeal of Columbia District rejected a law Preventing the FBI without the need of telecommunications (especially cell phones) Through a Federal Commission of Telecommunication, ask for the last judicial permission The project which tried to force mobile telephone companies to install tracking devices in all Receive the automatic location of the phone and this way calls. This increases the cost of 45% of manufacturing equipment.

With these two examples, we generate a household echelon in view of the FBI's intentions. The system is centered on the internet and cell phones, which are known as CARNIVORE. 

The project is The United States has been widely rejected by the various judicial courts and by Congress, because there is no It is suspected that this is an attack on American civil rights, at least in this early version.

The project is being reproduced at least formally including the previous judicial authority (Such as search warrants) are accepted as a requirement for any data Evidence in a test.

Ethical Hacking


In addition to talking about criminal behavior, crime, and related restrictions, we should It is very clear that being a hacker does not mean that it is a criminal.

Nowadays, companies are taking services from "ethical hackers" to detect vulnerabilities in Their computer science system and therefore, improve their defense measures.

Ethical Hackers, with their knowledge, help define the parameters of defense. They do In order to verify the defense of the system, the previously controlled "controlled" attack by the organization
They create groups between new attack techniques, exploits, and vulnerabilities. Others are included. They work as researchers for the security sector.

Sun Tzu said in his book "The Art of War", "The Secret of Attack Defense is Defense Defense Attack plan ".

The functioning of ethical hacking is divided into several stages:
  1. Plan of attack
  2. Internet access
  3. Testing and execution of an attack
  4. Gathering information
  5. Analysis
  6. Assessment and diagnosis
  7. Final Report

A useful tool for using ethical hackers is the OSSTMM method - open source security Test method manual This methodology is for testing any security system Guards and doors of mobile and satellite communications and satellites. It is currently Applied and used by important organizations such as:

  • Spanish financial institutions
  • US Treasury Department for testing financial institutions
  • U.S. Navy and Air Force

The 10 most common internet frauds


The most common crimes listed below are summaries of the U.S. Federal Trade Commission On the Internet till 2005
  1. Internet Auction: Shop in a "virtual marketplace" which offers a huge selection of Products in great deals. After sending your money, consumers receive an item Less valuable than promises, or worse, nothing, nothing.
  2. Internet access services: Free money, just a check to cache. Are consumers "Trapped" long term contracts for the use of the Internet or any other web service Significant penalties for cancellation or initial termination.
  3. Credit Card Fraud: Surf the Internet and see adult pictures online for free To prove that you are over 18, share your credit card number. Using fraudulent promoters To run a fee on the card, their credit card number
  4. International Modem Dialing: Get Free Access by Adult Content and Pornography Downloading a "Viewer" or "Dialer" Computer Program. Consumers complained Extremely long-distance charges on their phone bill Through the program, their modem is disconnected, then reconnected to the internet through an international Long distance number
  5. Web Cramming: Get a free custom-designed website for a 30-day trial period, or not Compulsion to continue Consumers are charged or received on their telephone bill Separate invoice, even if they never accepted the offer or agreed not to continue Service after the trial period.
  6. Multilevel Marketing Plans / Pyramid: Earn money through products and services You sell with the program being sold by recruiters. The consumers They say that they have bought in plans and programs, but their customers are other Distributors, not ordinary people.
  7. Travel and Vacation: Make a Great Tour of "Extra" in a Deal-basement value. Companies offer less quality housing and services than themselves Advertised or not traveling at all. Other hidden charges or additional requirements apply After payment to consumers
  8. Business Opportunities: Taken from promises about the potential income, many Consumers have invested in a "biz op" which has become a "big flop". was not Evidence for supporting income claims
  9. Investment: Make a preliminary investment in the one-day trading system or service and you will Quickly realize heavy returns. But big profits always mean big risks. The consumers are lost Money for those programs which claim to be able to predict the market with 100 percent Accuracy.
  10. Health Care Products / Services: Claims for "Miracle" products and treatments Consumers can be cured of their health problems. But people with serious illnesses Those who put their hopes in these proposals may have a delay in getting the health care requirement.
Related:

No comments:

Post a Comment