scholarly journals BLOCKCHAIN TECHNOLOGY IN COUNTERING CYBER TERRORISM

Author(s):  
E. A. Antonyan ◽  
I. I. Aminov

In the paper, modern blockchain technologies are called a revolutionary phenomenon, equal in importance to the ingenious invention of the 20th century — the Internet. Originally developed for Bitcoin digital currency and launching the network of the same name, the blockchain technology created a platform for the new type of the Internet, influenced the decentralization of the Network according to the distributed registry principle, and began to be used in various types and combinations for various purposes, including cybersecurity. The paper argues that the use of blockchain technology to ensure cybersecurity is infinite due to such unique properties as reliability, accessibility, high adaptability, economic efficiency, profitability. The use of blockchain technologies to combat cybercrime, including cyberterrorism, may extend to control over financial services, transportation or any other industry. However, the growth of criminal activity using the blockchain technology will also be enhanced if the law enforcement agencies are not technologically competent, can detect these developing centers, determine their actions and destroy plans at a faster pace.

Author(s):  
Olena Samoilenko ◽  
Kateryna Titunina

The article proves that the separation of technologies for committing fraud on the Internet allows you to determine the causal complexes. As a result, it is possible to effectively influence the prevention and counteraction of the corresponding type of crime. The author concludes that it is necessary to introduce into the practice of law enforcement and other government agencies effective tools for preventing and combating Internet fraud. He sees such a tool as outreach activities and modes of action that will block the determinants of criminal behavior in cyberspace. In order to concretize the specified means of prevention, it also deepens the theoretical basis regarding the system for preventing Internet fraud. So, the author comes to the conclusion that counteraction is a system of measures and methods of activity not only of law enforcement agencies, but also of other state and non-state bodies, while among these measures there are measures to prevent certain types of crimes. The article indicates that in the process of implementing a certain type of cybercrimes by criminals, they talk about the technologies of criminal activity as complexes of interrelated crimes, united by a single criminal purpose. For the commission of Internet fraud in the technology of criminal activity, there are typically ways of committing crimes in the use of computers, systems and computer networks and telecommunication networks (provided for in Section XVI of the Criminal Code of Ukraine) and Art. 200 of the Criminal Code of Ukraine. As a result of the analysis of the materials of the forensic practice of investigating fraud on the Internet, two main technologies have been identified: 1) the seizure of funds using phishing sites (the methods of reporting false information from the victim and its content have been updated) 2) the seizure of funds using a bank payment card and / or ATM (the variability of the method of manipulating information has been updated)


2021 ◽  
Vol 6 ◽  
Author(s):  
David Gilbert ◽  
Georgina Heydon

Nation states increasingly apply electronic surveillance techniques to combat serious and organised crime after broadening and deepening their national security agendas. Covertly obtained recordings from telephone interception and listening devices of conversations related to suspected criminal activity in Languages Other Than English (LOTE) frequently contain jargon and/or code words. Community translators and interpreters are routinely called upon to transcribe intercepted conversations into English for evidentiary purposes. This paper examines the language capabilities of community translators and interpreters undertaking this work for law enforcement agencies in the Australian state of Victoria. Using data collected during the observation of public court trials, this paper presents a detailed analysis of Vietnamese-to-English translated transcripts submitted as evidence by the Prosecution in drug-related criminal cases. The data analysis reveals that translated transcripts presented for use as evidence in drug-related trials contain frequent and significant errors. However, these discrepancies are difficult to detect in the complex environment of a court trial without the expert skills of an independent discourse analyst fluent in both languages involved. As a result, trials tend to proceed without the reliability of the translated transcript being adequately tested.


2019 ◽  
Vol 16 (1) ◽  
pp. 81-96 ◽  
Author(s):  
Daniel LaChance ◽  
Paul Kaplan

Popular documentary representations of crime and punishment have traditionally tended to fall into two camps: programs that are critical of law enforcement agencies and those that are sympathetic to them. In this article, we show how programs that present themselves as critical of legal authorities can nonetheless reinforce the “law and order punitivism” that underlay the ratcheting up of harsh punishment in the late 20th century. In a case study of the popular documentary miniseries Making a Murderer, we show how this can happen when texts fetishize the question of a criminal defendant’s innocence, adopt a “good versus evil” approach to players in the criminal justice system, and perpetuate a procedural rather than substantive vision of justice. Arguments are supported by a close reading of Making a Murderer and illustrated by a line of discussion it inspired in an internet forum.


Electronics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 484 ◽  
Author(s):  
Prince Khan ◽  
Yung-Cheol Byun ◽  
Namje Park

The video created by a surveillance cameras plays a crucial role in crime prevention and examinations in smart cities. The closed-circuit television camera (CCTV) is essential for a range of public uses in a smart city; combined with Internet of Things (IoT) technologies they can turn into smart sensors that help to ensure safety and security. However, the authenticity of the camera itself raises issues of building up integrity and suitability of data. In this paper, we present a blockchain-based system to guarantee the trustworthiness of the stored recordings, allowing authorities to validate whether or not a video has been altered. It helps to discriminate fake videos from original ones and to make sure that surveillance cameras are authentic. Since the distributed ledger of the blockchain records the metadata of the CCTV video as well, it is obstructing the chance of forgery of the data. This immutable ledger diminishes the risk of copyright encroachment for law enforcement agencies and clients users by securing possession and identity.


2018 ◽  
Vol 5 (2) ◽  
pp. 217
Author(s):  
Andri Winjaya Laksana

Cybercrime has been become a major portion for law enforcement agencies and intelligence services to both national and international matter, development of information and technology’s crime resulted in every country have a different policy of criminalization. The emphasis on cross-country has made a crime on the internet is not just a national issue, but has become an International problem. therefore it is important to have uniformity in the prevention of cybercrime that this crime can be solved. Based on the comparison of cybercrime that included the rules from various countries including the United States, Singapore, the Netherlands, the Philippines, Myanmar as a reference in the application of criminal law enforcement regulations regarding cybercrime seal the document.


2021 ◽  
Vol 7 (Extra-D) ◽  
pp. 560-565
Author(s):  
Yuri A. Kovtun ◽  
Eduard A. Vinokurov ◽  
Irina Y. Kapustina ◽  
Andrey V. Lagutochkin ◽  
Dmitry V. Stepanov

The authors substantiate the feasibility of introducing digital technologies into modern law enforcement. The position on the need for normative consolidation of the procedure for the creation and use of international databases of law enforcement agencies based on blockchain technology, and the introduction of artificial intelligence technologies is substantiated. The need for a phased, but offensive implementation of digital technologies in law enforcement is determined. The main task for successful international integration is the complete digitalization of law enforcement within each country and on the basis of uniform standards that will allow all individual law enforcement agencies to be combined into a single international law enforcement agency.


Legal Concept ◽  
2021 ◽  
pp. 26-32
Author(s):  
Ekaterina Azarova ◽  
Vyacheslav Vnukov

Introduction: in modern Russian society, the fight against crime requires the legislative regulation. Crime is a multifaceted phenomenon that is becoming more complex in parallel with the development of society. Its growth makes it necessary to research the fundamentals of the theory and practice of coordinating the activities of the law enforcement agencies in the fight against crime. The important factors from the point of view of the state of coordination activities are their proper organizational support, the development of the right strategies and tactics when performing the necessary actions, as well as their effective use by the law enforcement agencies to curb criminal activity. The authors of the paper set the goal of the study, which is to analyze the coordination activities of the law enforcement agencies in the fight against crime. Methods: the methodological framework for the research is the dialectical-materialistic method of cognition, which includes the elements of system analysis, and the specific scientific methods, such as the logical and legal one. Results: based on the legal analysis, the content of coordination activities as the effective coordinated actions in the fight against crime is revealed. Conclusions: it is revealed that there is a need to adopt a special law aimed at improving the status of prosecutors in the framework of these coordination activities.


Author(s):  
Dan Jerker B. Svantesson

This chapter seeks to set the scene and make some proposals for how we may make progress in the field of internet jurisdiction. For this purpose, the chapter will focus on three examples where the matter of internet jurisdiction is a major concern for internet intermediaries. The first relates to the validity of the terms of service that internet intermediaries typically impose on their users, and which typically contain important provisions regarding jurisdiction and applicable law. The second example relates to situations in which law enforcement agencies seek access to user data held by internet intermediaries. Such situations give rise to important matters of jurisdiction, not only where the requesting law enforcement agency and the internet intermediary are based in different countries, but may also—as was illustrated in the well-known Microsoft Warrant case—give rise to such issues where the requested data is stored outside the country in which both the law enforcement agency and the internet intermediary are based. The third example relates to the matter of geographical scope where an internet intermediary is required to remove, block, take down, delist, de-index, or de-reference content.


2019 ◽  
pp. 27-42
Author(s):  
Loo Seng Neo ◽  
Leevia Dillon ◽  
Priscilla Shi ◽  
Jethro Tan ◽  
Yingmin Wang ◽  
...  

Exploiting the benefits afforded by the Internet, violent extremists have created and utilised a myriad of online platforms (e.g., websites, forums, blogs, social media) that have abetted and enhanced their recruitment campaigns across the world. While the idea of countering violent extremists' online presence is a matter of considerable security interest, the paucity of research analysing the persuasiveness of their online platforms to certain target audiences impedes law enforcement agencies' capability to deal with them. There is a need to understand why their online platforms are so persuasive to certain target audiences. Focusing on these online platforms, this chapter will examine the features of these platforms that enhance the appeal of violent extremist messages.


Author(s):  
Mykola Pavlyk

The article considers the issues of international cooperation in the investigation of crimes in the field of employment of Ukrainian citizens abroad. An analysis of the main international legal acts ratified by Ukraine on the regulation of the activities of authorized entities in the field of external labor migration. It is emphasized that external labor migration is directly related to aspects of interstate cooperation, as the vast majority of permits for employment of citizens abroad are issued through the relevant foreign diplomatic missions. The legal aspects of the interaction of authorized bodies in the course of international cooperation are studied, attention is paid to certain features of the formation of such requests and the formulation of questions in them. And crimes committed in the employment of Ukrainian citizens abroad often have group characteristics of criminal activity, even transnational in nature and are mostly related to human trafficking and their successful investigation is impossible without proper cooperation and international cooperation of relevant law enforcement agencies. The author has concluded that today in Ukraine there are no theoretical and scientifically substantiated and practically tested methodological developments on the methodology of investigation of crimes committed on employment abroad. It is possible to improve the effectiveness of the investigation of crimes committed in the field of employment abroad, to more successfully counter these phenomena and to protect the citizens of Ukraine from criminal encroachments on external labor migration in the field of employment abroad, provided participants in the provision of such international assistance and authorized entities for the effective implementation of international cooperation, taking into account the specifics of these crimes.


Sign in / Sign up

Export Citation Format

Share Document