scholarly journals Policing Cyber Terrorism

2018 ◽  
Vol 3 (1) ◽  
pp. 13-18 ◽  
Author(s):  
Phillip R. Neely, Jr. ◽  
Michelle T. Allen

In order to police a crime there must be an act that is considered a crime and punishable under the law. There also must exist the capability to investigate for potential suspects and obtain physical or circumstantial evidence of the crime to be used in criminal proceedings. The act of gaining unauthorized access to a network system is a criminal act under federal law. Several key factors are presented during the course of this discussion and then built upon. Two methods of attack planning are presented. The attack planning cycle for traditional terrorist and then cyber terrorists planning used to penetrate a network system. Supervisory Control and Data Acquisition System (SCADA) are defined and presented as an important critical target within the nation’s infrastructure. Examples of successful attacks are presented. A brief overview is used to present malicious software and the effects of its use against SCADA systems. The path for which data takes through a network is explained. The importance of the data path is vital in understanding the five methods of attribution which serve as methods of investigating cyber terrorism.  

2013 ◽  
Vol 33 (2) ◽  
pp. 567-570
Author(s):  
Zeping YANG ◽  
Deqiang LIU ◽  
Qian WANG ◽  
Qiangming XIANG

1994 ◽  
Author(s):  
N.G. Pope ◽  
S.B. Schreiber ◽  
S.L. Yarbro ◽  
B.G. Gomez ◽  
H.L. Nekimken ◽  
...  

2015 ◽  
Vol 5 (3) ◽  
pp. 19-27
Author(s):  
Rahul Rastogi ◽  
Rossouw von Solms

SCADA (Supervisory Control and Data Acquisition System) is a cyber-physical system, wherein IT (Information Technology) components work in conjunction with field devices to control a physical process. The security of these IT components becomes crucial in view of the damaging effects that any security breach of these IT components can have on the underlying physical process. In response to this critical issue, various governments across the world have recognized the issue of SCADA security and have initiated the creation of a regulatory framework for mandating SCADA security in their respective countries. This paper provides a brief overview of the cyber-security issues of SCADA and the implications of Stuxnet for SCADA security. The paper reviews the steps taken by the governments of India and South Africa; and it provides guidance to the owners of SCADA regarding SCADA security, as mandated by the Government of India.


2010 ◽  
Vol 156-157 ◽  
pp. 992-995
Author(s):  
Ying Hu ◽  
Qing Xue Huang ◽  
Xiao Hong Hao ◽  
Shao Zhen Jin

To improve the quality of the steel plate, The No.2 Roll Mill of Wuyang Iron and Steel Company has adopted the hydraulic reversible 11 rolls leveler developed by Taiyuan University of Science and Technology and the Taiyuan Heavy Industry Co., Ltd. The machine uses a number of advanced technologies and new equipments. For example, this plate leveler uses the Supervisory Control and Data Acquisition system, including the main operator station, the monitoring station, engineer station, etc.It also adopts Oracle 10G database system and HP 380 Server clusters to realize the management function of technical data acquisition and analysis. It is able to complete the real-time data acquisition, data analysis, model calculation and self –learning function.


Lex Russica ◽  
2019 ◽  
pp. 129-138 ◽  
Author(s):  
E. V. Larkina

Based on the study of court decisions, the article analyzes the first judicial-investigative practice of applying innovations in the system of procedural coercive measures — preventive measures in the form of a ban on certain actions, as well as bail and house arrest in combination with the prohibitions provided for in part 6 of article 105.1 of the Criminal Procedural Code of the Russian Federation. The subject of the study were 40 court decisions made by district and higher courts of 17 constituent entities of the Russian Federation. The author analyzes these decisions on preventive measures, the initiators of their election, the crimes charged with the accused, the stages of criminal proceedings at which they were taken. Decisions on the election of a ban on certain actions are analyzed according to the criteria: the number of simultaneous prohibitions; the time allowed to leave the premises; the places that the accused is forbidden to visit; the persons with whom they are forbidden to communicate. The analysis of the resolutions on the election of bail and house arrest with simultaneous establishment of certain prohibitions showed that the courts do not always properly motivate their decisions, subjected to defendants not covered by section 6 of article 105.1 of the Criminal Procedural Code of the Russian Federation prohibitions, permitted the defendants to take actions that do not provide their isolation from society. The data given in the article are accompanied by the author’s comments and references to the decisions set in the State automated system of the Russian Federation “Justice”. At the end of the study, the author provides conclusions and proposes to adjust in the near future the judicial practice of application of preventive measures following appropriate explanations of the Plenum of the Supreme Court of the Russian Federation, taking into account the changes made to the Criminal Procedural Code of the Russian Federation by the Federal law of 18.04.2018 No. 72-FZ.


Sign in / Sign up

Export Citation Format

Share Document