Implementation of modern information technologies lead
to new types of crime, which use calculation systems, novel means of
telecommunication and communication, means of íåãëàñíîãî obtaining of
information, etc. The quantity of so called cybercrimes using modern
information technologies, stealing the cash and non-cash funds is increasing.
The term “cyber crime” is young and is created by combination of the two words: cyberspace and crime. The term cyberspace space
(terms “virtual space”, “virtual world” are used more often in domestic
literature) and (according to the definition in “New hacker vocabulary” by Eric
S. Raimond) defines the information space modeled through computer, in which
defined types of objects or symbol images of information exist – the place
where computer programs work and data is transferred [1].
The report on computer security and cyber crime
problem has been produced according to the data of the American Computer
Security Insitute on the basis of the research, conducted at the assignment of
International Computer Crime Squads FBI USA [2], indicating the most common
methods of attacks and offences:
·
brute-force - 13,9%. Selection of passwords, keys to fit and other
identification or authentication information;
·
IP-spoofing - 12,4%. Method of attack when criminal changes
IP-addresses of packages, transferred through Internet so, that they look like
“internal” for the network where every unit trusts the address information of
the other;
·
denial of service - 16,3%. Influence on network or its separate parts
with the purpose of breach of usual functioning order;
·
sniffer - 11,2%. Looking through and decoding the
transferred data with the purpose of collection of passwords, keys and other
identification or authentication information;
·
scanner - 15,9%. Method of attack using the software,
which consequentially check possible points of entering the system (for
instance, TCP-port numbers or telephone numbers) with the purpose of
identifying ways and possibilities to intrude;
·
data diddling - 15,6%.
The victims of criminals become banks, institutions,
enterprises and organizations, which use automated systems for processing
documents, making payments and other operations. Classic example for such crime
could be one of the criminal cases, which investigation has been conducted by
Russian law enforcement and FBI USA [3].
Criminal case was opened for V. Levin and other citizens of the Russian
Federation, which enter in collusion with each other with the purpose to thief
great amounts of funds from "City Bank of America" (USA). They have
created criminal group, used Internet and overcame several levels of protection
from unauthorized access, through personal computer of standard configuration
from the office, located in St-Petersburg (Russia), they entered untrue
information into the cash flow management system the above bank. The criminals have accomplished not less
than 40 transfers of funds of the total amount of 10 millions 700 thousands US
Dollars.
Levin was at last arrested in Great Britain in
September 1997 and extradited to USA. He admitted himself guilty and in
February 1998 has been sentenced to 36 months in jail.
According to statistic data, obtained by FBI USA as a
result of analysis of attempts to penetrate in 220 computer systems of American
network "MILNET" [4], 20% of the password used appeared vulnerable.
In 98% of the cases administrators of
attacked systems in order to clarify the circumstances of the suspicious
activity did not even try to contact the organization, which network, after
offender has illegally entered it, was used for attacks on other networks. 8% of the systems has disclosed to offender
the information on its current status and users in response to simplest request
of sysstat, who, etc. 1% of
systems has given limited access to data bases and e-mail systems. In 2% of the cases a criminal managed to enter the
system under the name of authorized user. 2% of systems has given the offender
the automated system administrator authorization.
On October 23, 1998 through unauthorized access to
automated banking system from the accounts of Reserve Fund of Vinnitsa
Department of the National Bank of Ukraine 80,4 millions of Hryvnias
(equivalent of approx. 20 millions of US Dollars) were stolen.
As it is
obvious, there are many ways of unauthorized access to the data and
interference in the information processing and exchange processes in automated
systems. The term automated system
(ÀS) means organization-technical system, which realizes information
technology and combines operation system, physical environment, personnel and
information processed [5]. Reliable information protection system
is critical for AS safety, and in the event of offense allows law enforcement
to conduct investigation.
As it is known, the subjects for applying means and
measures in criminal judiciary are its participants, since they take part in
the process of proving and collect, research, assess and use criminality
information. However, due to different levels of their procedural status, forms
and extent of use of the special means and knowledge are also different. Such
means are instruments for work and law enforcement for investigators and
detectives and they are authorized to use them directly (Art. 114 of the
Criminal Code of Ukraine) or indirectly, involving special knowledge of expert
(Art. 75 of the Criminal Code of
Ukraine) [6]. Similar legal norms exist in many countries of the world.
Therefore, legitimacy in application of accountability technology upon
investigation of cyber crimes is characterized by legal side of acceptance and
shows that application of these technologies for collection of criminality
information is appropriate.
In order to solve these problems, one of the Ukrainian
enterprises (http://www.anna.zp.ua),
developed "Network Remote Monitor" security system, which is under
the certification of the Department of Special Telecommunication Systems and
Information Protection of the Security Service of Ukraine. In addition, the
Department of operative-search activity of Zaporizhia Law Institute under
US-Ukraine Research Partnership Program conducts research purported to develop
recommendations on disclosing and investigation of the transnational computer
crime (cyber crime) using the Internet.
"Network Remote
Monitor" security system (hereinafter SS "NRM") is network
hardware - software security system purported for automated accountability of
computer (calculation) user automated systems,
who work under Windows 95/98/NT, Microsoft (USA) in automated systems
based on TCP/IPnetworks.
In SS “NRM” such security function as accountability
is involved, it is computer (calculation)
system feature, which allows to track the activity of users and processes,
use of passive objects as well as identify indicators of users and processes,
engaged in certain acts with the purpose of prevention of the information security policy violations
and/or enforcement liability for certain acts. Security system makes audit,
which allows to collect and analyse the information on using objects and
functions under control of security means by users and processes and maintains audit
trail as systemized set of registration records, each of which is made
by complex of security means when the controlled event occurs.
Using
the accountability technology in SS “NRM” is important for investigation of
cyber crime, related to “human factor”,
which gives the possibility for law enforcement to resolve the following
issues:
Investigation starts with analysis
of audit trail of SS “NRM”, where investigation agency can find answers on the following questions:
Therefore, implementing
the accountability technology for computer systems using SS “NRM” gives
effective means for combating and investigating "cyber crime".
1.
Collin Barry C. The Future of Cyber Terrorism //
Proceedings of 11th Annual International Symposium on Criminal Justice Issues.
The University of Illinois at Chicago, 1996.
2.
International Computer Crime Squads The report
of the President's Commission on Critical Infrastructure Protection, 1997.
http://www.pccip.gov/report_index.html
3.
Golubev V.O. Computer
crimes in banking sphere. — Zaporozhya, 1997. Ñ.16-18.
4.
Mark M. Pollitt. CYBERTERRORISM - Fact or Fancy.
FBI Laboratory.
5.
ND TZI 1.1-003-99. Terminology in the sphere of
computer systems information protection from unauthorized access. // Department
of Special Telecommunication systems and Information protection of Security
Services of Ukraine. – Kyiv, 1999.
6.
Criminal-procedural Code of Ukraine:
scientific-practical comments. — Kyiv, 1995. —639 p.