Правовые справочные документы 6 страница



[420] For an overview about the tools used, see Ealy, "A New Evolution in Hack Attacks: A General Overview of Types, Methods, Tools, and Prevention", available at: http://www.212cafe.com/download/e-book/A.pdf. Regarding the price of keyloggers (200 - 500 US Dollar) see: Paget, Identity Theft, White Paper, McAfee, 2007, available at: http://www.mcafee.com/us/threat_center/white_paper.html.

[421] See above: Chapter 2.4.1.

[422] For more examples, see: "The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond", page 23 et seq., available at: http://www.antiphishing.org/reports/APWG_CrimewareReport.pdf; Berg, "The Changing Face of Cybercrime - New Internet Threats create Challenges to law enforcement agencies", Michigan Law Journal 2007, page 21, available at: http://www.michbar.org/journal/pdf/pdf4article1163.pdf.

[423] DoS is an acronym for Denial-of-Service attack. For more information, see above: Chapter 2.4.e.

[424] These generally contain two elements: Software that automates the process of sending out e-mails by avoiding techniques that enable e-mail providers to identify spam e-mails and a database with thousands or even millions of e-mail addresses. For more information, see: "The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond", page 25, available at: http://www.antiphishing.org/reports/APWG_CrimewareReport.pdf.

[425] For more details, see below: Chapter 6.1.13.

[426] Gercke, Cyberterrorism, How Terrorists Use the Internet, Computer und Recht, 2007, page 62 et. seq.

[427] Rollins/ Wilson, "Terrorist Capabilities for Cyberattack", 2007, page 10, available at: http://www.fas.org/sgp/crs/terror/RL33123.pdf.

[428] The CIA pointed out in 2002 that attacks against critical infrastructure in the United States will become an option for terrorists. Regarding the CIA position, see: Rollins/Wilson, "Terrorist Capabilities for Cyberattack, 2007", page 13, available at: http://www.fas.org/sgp/crs/terror/RL33123.pdf. However, the FBI has stated that there is presently a lack of capability to mount a significant cyber-terrorism campaign. Regarding the FBI position, see: Nordeste/Carment, "A Framework for Understanding Terrorist Use of the Internet, 2006", available at: http://www.csis-scrs.gc.ca/en/itac/itacdocs/2006-2.asp

[429] See: Report of the National Security Telecommunications Advisory Committee - Information Assurance Task Force - Electric Power Risk Assessment, available at: http://www.aci.net/kalliste/electric.htm.

[430] See: Lewis, "The Internet and Terrorism", available at: http://www.csis.org/media/csis/pubs/050401_internetandterrorism.pdf; Lewis, "Cyber­terrorism and Cybersecurity"; http://www.csis.org/media/csis/pubs/020106_cyberterror_cybersecurity.pdf; Gercke, Cyberterrorism, How Terrorists Use the Internet, Computer und Recht, 2007, page 62 et. seq.; Sieber/Brunst, Cyberterrorism - the use of the Internet for terrorist purposes, Council of Europe Publication, 2007; Denning, "Activism, hacktivism, and cyberterrorism: the Internet as a tool for influencing foreign policy", in Arquilla/Ronfeldt, Networks & Netwars: The Future of Terror, Crime, and Militancy, page 239 et seqq., available at: http://www.rand.org/pubs/monograph_reports/MR1382/MR1382.ch8.pdf; Embar-Seddon, "Cyberterrorism, Are We Under Siege?", American Behavioral Scientist, Vol. 45 page 1033 et seqq; United States Department of State, "Pattern of Global Terrorism, 2000", in: Prados, America Confronts Terrorism, 2002, 111 et seqq.; Lake, 6 Nightmares, 2000, page 33 et seqq; Gordon, "Cyberterrorism", available at: http://www.symantec.com/avcenter/reference/cyberterrorism.pdf; US-National Research Council, "Information Technology for Counterterrorism: Immediate Actions and Future Possibilities", 2003, page 11 et seqq. OSCE/ODIHR Comments on legislative treatment of "cybertenor' in domestic law of individual states, 2007, available at: http://www.legislationline.org/upload/ lawreviews/93/60/7b15d8093cbebb505ecc3b4ef976.pdf.

4zt3 See: Rötzer, Telepolis News, 4.11.2001, available at: http://www.heise.de/tp/r4/artikel/9/9717/1.html.

[432] The text of the final message was reported to be: "The semester begins in three more weeks. We've obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts, and the faculty of engineering." The name of the faculties was apparently the code for different targets. For more detail see Weimann, How Modern Terrorism Uses the Internet, The Journal of International Security Affairs, Spring 2005, No. 8; Thomas, Al Qaeda and the Internet: The danger of "cyberplanning", 2003, available at:

http://findarticles.com/p/articles/mi_m0IBR/is_1_33/ai_99233031/pg_6; Zeller, On the Open Internet, a Web of Dark Alleys, The New York Times, 20.12.2004, available at: http://www.nytimes.com/2004/12/20/technology/20covert.html?pagewanted=print&position=;

4zt5 CNN, News, 04.08.2004, available at: http://www.cnn.com/2004/US/08/03/tenor.threat/index.html.

[434] For an overview see: Sieber/Brunst, Cyberterrorism - the use of the Internet for terrorist purposes, Council of Europe Publication, 2007; Gercke, Cyberterrorism, How Terrorists Use the Internet, Computer und Recht, 2007, page 62 et. seq.;

[434] Sofaer/Goodman, "Cybercrime and Security - The Transnational Dimension", in Sofaer/Goodman, "The Transnational Dimension of Cyber Crime and Terrorism", 2001, available at: http://media.hoover.org/documents/0817999825_1.pdf.

[435] Regarding different international approaches as well as national solutions see: Sieber in Sieber/Brunst, Cyberterrorism - the use of the Internet for terrorist purposes, Council of Europe Publication, 2007;

[436] One example for such approach is the amendment of the European Union Framework Decision on combating terrorism, C0M(2007) 650.

[437] Regarding attacks via the Internet: Arquilla/Ronfeldt, in The Future of Terror, Crime and Militancy, 2001, page 12; Vatis in Cyber Attacks During the War on Terrorism, page 14ff.; Clark, Computer Security Officials Discount Chances of 'Digital Pearl Harbour', 2003; USIP Report, Cyberterrorism, How real is the threat, 2004, page 2; Lewis, Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats; Wilson in CRS Report, Computer Attack and Cyber Terrorism - Vulnerabilities and Policy Issues for Congress, 2003.

[438] See for example Record, Bounding the global war on terrorism, 2003, available at: http://strategicstudiesinstitute.army.mil/pdffiles/PUB207.pdf.

[439] Wilson in CRS Report, Computer Attack and Cyber Terrorism - Vulnerabilities and Policy Issues for Congress, 2003, page 4.

[440] ADL, Terrorism Update 1998, available at: http://www.adl.org/terror/focus/16_focus_a.asp.

[441] Weimann in USIP Report, How Terrorists use the Internet, 2004, page 3. Regarding the use of the Internet for propaganda purposes see as well: Crilley, Information warfare: New Battlefields - Terrorists, propaganda and the Internet, Aslib Proceedings, Vol. 53, No. 7 (2001), page 253.

[442] Regarding the use of YouTube by terrorist organisations, see Heise News, news from 11.10.2006, available at: http://www.heise.de/newsticker/meldung/79311;Staud in Sueddeutsche Zeitung, 05.10.2006.

[443] Zanini/Edwards, "The Networking of Terror in the Information Age", in Networks and Netwars: The Future of Terror, Crime, and Militancy, 2001, page 42.

[444] United States Homeland Security Advisory Council, Report of the Future of Terrorism, 2007, page 4.

[445] Regarding the justification see: Brandon, Virtual Caliphate: Islamic extremists and the internet, 2008, available at: http://www.socialcohesion.co.uk/pdf/VirtualCaliphateExecutiveSummary.pdf.

[446] Brachman, High-Tech Terror: Al-Qaeda's Use of New Technology, The Fletcher Forum of World Affairs, Vol. 30:2, 2006, page 149 et. seqq.

[447] See: Conway, "Terrorist Use of the Internet and Fighting Back", "Information and Security", 2006, page 16.

[448] Videos showing the execution of American citizens Berg and Pearl were made available on websites. See Weimann in the USIP Report, "How Terrorists use the Internet", 2004, page 5.

[449] Regarding the related challenges see Gercke, The Challenge of Fighting Cybercrime, Multimedia und Recht, 2008, page 292.

[450] Levine, Global Security, 27.06.2006, available at: http://www.globalsecurity.org/org/news/2006/060627-google-earth.htm.; Regarding the discovery of a secret submarine on a satellite picture provided by a free of charge Internet Service see: Der Standard Online, Goolge Earth: Neues chinesisches Kampf-Uboot entdeckt, 11.07.2007, available at: http://www.derstandard.at/?url/?id=2952935.

463 For further reference see: Gercke, The Challenge of Fighting Cybercrime, Multimedia und Recht, 2008, 292.

[452] For more information regarding the search for secret information with the help of search engines, see Long, Skoudis, van Eijkelenborg, "Google Hacking for Penetration Testers".

[453] "Using public sources openly and without resorting to illegal means, it is possible to gather at least eighty per cent of information about the enemy." For further information, see Conway, "Terrorist Use of the Internet and Fighting Back", Information & Security, 2006, Page 17.

467 See Broad, US Analysts Had flagged Atomic Data on Web Site, New York Times, 04.11.2006.

[455] Conway, Terrorist Use the Internet and Fighting Back, Information and Security, 2006, page 18,

[456] See Sueddeutsche Zeitung Online, BKA findet Anleitung zum Sprengsatzbau, 07.03.2007, available at: http://www.sueddeutsche.de/deutschland/artikel/766/104662/print.html.

470 See below.

[458] See US Commission on Security and Cooperation in Europe Briefing, 15.05.2008, available at: http://csce.gov/index.cfm?FuseAction=ContentRecords.ViewTranscript&ContentRecord_id=426&ContentType=H,B&ContentRecordType=B&C FID=18849146&CFTOKEN=53; O'Brian, Virtual Terrorists, The Australian, 31.07.2007, available at http://www.theaustralian.news.com.au/story/0,25197,22161037-28737,00.html; O'Hear, Second Life a terrorist camp?, ZDNet,

[459] Regarding other terrorist related activities in online games see: Chen/Thoms, Cyber Extremism in Web 2.0 - An Exploratory Study of International Jihadist Groups, Intelligence and Security Informatics, 2008, page 98 et seqq.

[460] Brunst in Sieber/Brunst, Cyberterrorism - the use of the Internet for terrorist purposes, Council of Europe Publication, 2007; United States Homeland Security Advisory Council, Report of the Future of Terrorism Task Force, January 2008, page 5; Stenersen, The Internet: A Virtual Training Camp? In Terrorism and Political Violence, 2008, page 215 et seq.

[461] Musharbash, Bin Ladens Intranet, Der Spiegel, Vol. 39, 2008, page 127.

[462] Weimann, How Modern Terrorism uses the Internet, 116 Special Report of the United States Institute of Peace, 2004, page 10.

[463] The 9/11 Commission Report, Final Report of the National Commission on Terrorist Attacks Upon the United States, 2007, page 249.

[464] The text of the final message was reported to be: "The semester begins in three more weeks. We've obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts, and the faculty of engineering." The name of the faculties was apparently the code for different targets. For more detail see Weimann, How Modern Terrorism Uses the Internet, The Journal of International Security Affairs, Spring 2005, No. 8; Thomas, Al Qaeda and the Internet: The danger of "cyberplanning", 2003, available at:

http://findarticles.com/p/articles/mi_m0IBR/is_1_33/ai_99233031/pg_6; Zeller, On the Open Internet, a Web of Dark Alleys, The New York Times, 20.12.2004, available at: http://www.nytimes.com/2004/12/20/technology/20covert.html?pagewanted=print&position=;

[465] The Commission analyzing the 9/11 attacks calculated that the costs for the attack could have been between 400.000 and 500.000 USD. See 9/11 Commission Report, Final Report of the National Commission on Terrorist Attacks Upon the United States, page 187. Taking into account the duration of the preparation and the number of people involved the cost per person have been relatively small. Regarding the related challenges see as well Weiss, CRS Report for Congress, Terrorist Financing: The 9/11 Commission Recommendation, page 4.

[466] See in this context: Crilley, Information warfare: New Battlefields - Terrorists, propaganda and the Internet, Aslib Proceedings, Vol. 53, No. 7 (2001), page 253.

[467] Weimann in USIP Report, How Terrorists use the Internet, 2004, page 7.

[468] See Conway, Terrorist Use the Internet and Fighting Back, Information and Security, 2006, page 4,

[469] Regarding virtual currencies see Woda, Money Laundering Techniques with Electronic Payment Systems in Information and Security 2006, page 39.

[470] Sofaer/Goodman, "Cybercrime and Security - The Transnational Dimension", in Sofaer/Goodman, "The Transnational Dimension of Cyber Crime and Terrorism", 2001, available at: http://media.hoover.org/documents/0817999825_1.pdf

[471] Lewis, Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats, Center for Strategic and International Studies, December 2002.

[472] Shimeall/Williams/Dunlevy" Countering cyber war", NATO review, Winter 2001/2002, available at: http://www.cert.org/archive/pdfcounter_cyberwar.pdf

[473] Gercke, The slow wake of a global approach against cybercrime, Computer und Recht International, 2006, page 140 et seq.

[474] Gercke, The Challenge of fighting Cybercrime, Multimedia und Recht, 2008, page 293.

[475] CERT Research 2006 Annual Report", page 7 et seqq., available at: http://www.cert.org/archive/pdfcert_rsch_annual_rpt_2006.pdf

[476] Law Enforcement Tools and Technologies for Investigating Cyber Attacks, DAP Analysis Report 2004, available at: http://www.ists.dartmouth.edu/projects/archives/ISTSGapAnalysis2004.pdf.

[477] Brunst in Sieber/Brunst, Cyberterrorism - the use of the Internet for terrorist purposes, Council of Europe Publication, 2007.

[478] United States Executive oTder 13010 - Critical Infrastructure Protection. Federal Register, July 17,1996. Vol. 61, No. 138.

[479] Critical Infrastructure Protection: Sector Plans and Sector Councils Continue to Evolve, GAO communication, July 2007, available at: http://www.gao.gov/new.items/d07706r.pdf.

[480] Kelemen, Latest Information Technology Development in the Airline Industry, 2002, Periodicapolytechnica Ser. Transp. Eng., Vol. 31, No. 1-2, page 45-52, available at: http://www.pp.bme.hu/tr/2003_1/pdf/tr2003_1_03.pdf; Merten/Teufel, Technological Innovations in the Passenger Process of the Airline Industry: A Hypotheses Generating Explorative Study in O'Conner/Hoepken/Gretzel, Information and Communication Technologies in

[481] Tourism 2008.

494 Sasser B Worm, Symantec Quick reference guide, 2004, available at: http://eval.symantec.com/mktginfo/enterprise/other_resources/sasser_quick_reference_guide_05-2004.en-us.pdf.

[482] Schperberg, Cybercrime: Incident Response and Digital Forensics, 2005; The Sasser Event: History and Implications, Trend Micro, June 2004, available at: http://us.trendmicro.com/imperia/md/content/us/pdf/threats/securitylibrary/wp02sasserevent040812us.pdf.

[483] Paxson, "An Analysis of Using Reflectors Dfor Distributed Denial-of-Service Attacks", available at: http://www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html; Schuba/Krsul/Kuhn/Spafford/Sundaram/Zamboni, "Analysis of a Denial of Service Attack on TCP", 1997; Houle/Weaver, "Trends in Denial of Service Attack Technology", 2001, available at: http://www.cert.org/archive/pdf/DoS_trends.pdf.

[484] Yurcik, "Information Warfare Survivability: Is the Best Defense a Good Offence?", available at: http://www.projects.ncassr.org/hackback/ethics00.pdf.

[485] Power, 2000 CSI/FBI Computer Crime and Security Survey, Computer Security Journal, Vol. 16, No. 2, 2000, page 33 et. seq.; Lemos, Web attacks: FBI launches probe, ZDNet News, 09.02.2000, available at: http://news.zdnet.com/2100-9595_22-501926.html.

[486] Gercke, The Decision of the District Court of Frankfurt in the Lufthansa Denial of Service Case, Multimedia und Recht, 2005, page 868-869.

[487] Improving our Ability to Fight Cybercrime: Oversight of the National Infrastructure Protection Center, Hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary United States Senate One Hundred Seventh Congress First Session, July 2001, Serial No. J-107-22, available at: http://cipp.gmu.edu/archive/215_S107FightCyberCrimeNICPhearings.pdf.

[488] Critical Infrastructure Protection, Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain, September 2007, GAO-07-1036, available at: http://www.gao.gov/new.items/d071036.pdf; Berinato, Cybersecurity - The Truth About Cyberterrorism, March 2002, available at: http://www.cio.com/article/print/30933.

51,2 See above: Chapter 2.8.1.

[490] Regarding the beginning discussion about Cyberwarfare, see: Molander/Riddile/Wilson, "Strategic Information Warfare, 1996", available at: http://www.rand.org/pubs/monograph_reports/MR661/MR661.pdf.

[491] Molander/Riddile/Wilson, Strategic Information Warfare, 1996, page 15, available at: http://www.rand.org/pubs/monograph_reports/MR661/MR661.pdf.

[492] Shimeall/Williams/Dunlevy, "Countering cyber war", NATO review, Winter 2001/2002, page 16, available at: http://www.cert.org/archive/pdl/counter_cyberwar.pdf; Yurcik/Sharma, "Internet Hack Back as an Active Defense Strategy", 2005, available at: http://www.projects.ncassr.org/hackback/ccsa05.pdf.

[493] Traynor, "Russia accused of unleashing cyberwar to disable Estonia", The Guardian, 17.05.2007, available at: http://www.guardian.co.uk/russia/article/0,,2081438,00.html.

[494] Thornburgh, "Inside the Chinese Hack Attack", Time, 25.08.2005, available at: http://www.time.com/time/nation/printout/0,8816,1098371,00.html.

[495] One example is the intentional destruction of communication infrastructure by NATO forces during the war in the former Republic of Yugoslavia. Regarding this issue, see: http://www.nato.int/kosovo/press/p990506c.htm.

[496] One of the most important obligations is the requirement to keep records and to report suspicious transactions.

[497] Offenders may tend to make use of the existing instruments e.g., the service of financial organisations to transfer cash, without the need to open an account or transfer money to a certain account.

[498] For case studies, see: "Financial Action Task Force on Money Laundering", "Report on Money Laundering Typologies 2000 - 2001", 2001, page 8.

[499] See: Woda, "Money Laundering Techniques With Electronic Payment Systems", Information & Security, Vol. 18, 2006, page 40.

[500] Regarding the related challenges see below: Chapter 3.2.l.

[501] The costs of setting up an online casino are not significantly larger than other e-commerce businesses.

[502] Regarding approaches to the criminalisation of illegal gambling, see below: Chapter 6.1.j.

[503] See: Financial Action Task Force on Money Laundering, "Report on Money Laundering Typologies 2000 - 2001", 2001, page 2.

[504] Regarding the threat of spyware, see Hackworth, "Spyware, Cybercrime and Security", IIA-4.

[505] Regarding the phenomenon of phishing, see. Dhamija/Tygar/Hearst, "Why Phishing Works", available at: http://people.seas.harvard.edu/~rachna/papers/why_phishing_works.pdf; "Report on Phishing", A Report to the Minister of Public Safety and Emergency Preparedness Canada and the Attorney General of the United States, 2006, available at: http://www.usdoj.gov/opa/report_on_phishing.pdf

[506] The term "phishing" originally described the use of e-mails to "phish" for passwords and financial data from a sea of Internet users. The use of "ph" linked to popular hacker naming conventions. See Gercke, Computer und Recht, 2005, page 606; Ollmann, "The Phishing Guide Understanding & Preventing Phishing Attacks", available at: http://www.nextgenss.com/papers/NISR-WP- Phishing.pdf.

[507] The following section describes email-based phishing attacks, compared to other phishing scams, which may, for example, be based on voice communications. See: Gonsalves, "Phishers Snare Victims with VoIP", 2006, available at: http://www.techweb.com/wire/security/186701001.

[508] "Phishing" shows a number of similarities to spam e-mails. It is thus likely that organised crime groups that are involved in spam are also involved in phishing scams, as they make use of the same spam databases. Regarding spam, see above: Chapter 2.5.7.

[509] Regarding related trademark violations, see above 2.6.2.

[510] For an overview about what phishing mails and the related spoofing websites look like, see: http://www.antiphishing.org/phishing_archive/phishing_archive.html.

[511] In some phishing attacks, as many as 5 per cent of victims provided sensitive information on fake websites. See Dhamija/Tygar/Hearst, "Why Phishing Works", available at:

http://people.seas.harvard.edu/~rachna/papers/why_phishing_works.pdf, page 1, that refers to Loftesness, "Responding to "Phishing" Attacks", Glenbrook Partners (2004).

[512] Anti-Phishing Working Group. For more details, see: http://www.antiphishing.org.

[513] "Phishing Activity Trends", Report for the Month of April 2007, available at: http://www.antiphishing. org/reports/apwg_report_april_2007.pdf.

527 See above: Chapter 2.7.3.

[515] See, for example: "Deloitte 2007 Global Security Survey" - September 2007; "2005 FBI Computer Crime Survey"; "CSI Computer Crime and Security Survey 2007" is available at: http://www.gocsi.com/; "Symantec Internet Security Threat Report", September 2007, available at: http://www.symantec.com/enterprise/theme.jsp?themeid=threatreport; "Sophos Security Threat Report", July 2007, available at: http://www.sophos.com/pressoffice/news/articles/2007/07/securityrep.html.

[516] See for example: Goodman/Brenner, The Emerging Consensus on Criminal Conduct in Cyberspace, 2002, page 27, available at: http://www.lawtechjournal.com/articles/2002/03_020625_goodmanbrenner.pdf; See also ITU Study on the Financial Aspects of Network Security: Malware and Spam, July 2008, available at http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-study-financial-aspects-of-malware-and-spam.pdf.

[517] The "CSI Computer Crime and Security Survey 2007", available at: http://www.gocsi.com/

[518] See "CSI Computer Crime and Security Survey 2007", page 1, available at: http://www.gocsi.com/.

532 "2005 FBI Computer Crime Survey".

[520] The 2005 FBI Computer Crime Survey is based on data of 2066 United States institutions (see 2005 FBI Computer Crime Survey, page 1) while the 2007 CSI Computer Crime and Security Survey is based on 494 respondents (See CSI Computer Crime and Security Survey 2007, page 1, available at: http://www.gocsi.com/).

534 See "2005 FBI Computer Crime Survey", page 10.

[522] See "2005 FBI Computer Crime Survey", page 6.

[523] See Evers, "Computer crimes cost $67 billion, FBI says", ZDNet News, 19.01.2006, available at: http://news.zdnet.com/2100-1009_22-

6028946.html.

[525] "2005 FBI Computer Crime Survey", page 10.

538 See "2005 FBI Computer Crime Survey", page 10 As well as Evers, "Computer crimes cost $67 billion, FBI says", ZDNet News, 19.01.2006, available at http://news.zdnet.com/2100-1009_22-6028946.html.

[526] The report makes available useful details of those institutions that responded. See "CSI Computer Crime and Security Survey 2007", page 3, available at: http://www.gocsi.com/

[527] "2007 Malware Report: The Economic Impact of Viruses, Spyware, Adware, Botnets, and Other malicious Code". A summary of the report is available at: http://www.computereconomics.com/artide.cfm?id=1225.

[528] The costs covered by the report include labour costs to analyze and repair an infected computer system, the loss of user productivity and the loss of revenue due to a loss of performance of infected computer systems. For more information, see the summary of the report available at: http://www.computereconomics.com/artide.cfm?id=1225.

[529] See: "Sasser Worm rips through the Internet", CNN News, 05.05.2004, available at: http://edition.cnn.com/2004/TECH/internet/05/05/sasser.worm/index.html

[530] See Heise News, 06.07.2005, available at: http://www.heise.de/newsticker/meldung/print/61451.

[531] Regarding the related difficulties see: United Nations Conference on Trade and Development, Information Economy Report 2005, UNCTAD/SDTE/ECB/2005/1, 2005, Chapter 6, page 229, available at: http://www.unctad.org/en/docs/sdteecb20051ch6_en.pdf.

[532] "The United States Federal Bureau of Investigation has requested companies not to keep quiet about phishing attacks and attacks on company IT systems, but to inform authorities, so that they can be better informed about criminal activities on the Internet. "It is a problem for us that some companies are clearly more worried about bad publicity than they are about the consequences of a successful hacker attack," explained Mark Mershon, acting head of the FBI's New York office". See Heise News, 27.10.2007, available at: http://www.heise-security.co.uk/news/80152.

[533] ITU Study on the Financial Aspects of Network Security: Malware and Spam, July 2008, available at http://www.itu.int/ITU- D/cyb/cybersecurity/docs/itu-study-financial-aspects-of-malware-and-spam.pdf.


Дата добавления: 2015-12-19; просмотров: 9; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!