Правовые справочные документы 7 страница



[534] See Mitchison/Urry, "Crime and Abuse in e-Business, IPTS Report", available at: http://www.jrc.es/home/report/english/articles/vol57/ICT2E576.htm

[535] See Smith, "Investigating Cybercrime: Barriers and Solutions", 2003, page 2, available at: http://www.aic.gov.au/conferences/other/smith_russell/2003-09-cybercrime.pdf

[536] In fact, newspapers as well as TV stations limit their coverage of successful Internet investigations to spectacular cases such as the identification of a paedophile by descrambling manipulated pictures of the suspect. For more information about the case and the coverage, see: "Interpol in Appeal to find Paedophile Suspect", The New York Times, 09.10.2007, available at: http://www.nytimes.com/2007/10/09/world/europe/09briefs- pedophile.html?_r=1&oref=slogin; as well as the information provided on the Interpol website, available at: http://www.interpol.int/Public/THB/vico/Default.asp.

[537] See SOCA, "International crackdown on mass marketing fraud revealed, 2007", available at: http://www.soca.gov.uk/downloads/massMarketingFraud.pdf.

[538] In the 2006 NW3C Internet Crime report, only 1.7 per cent of the reported total USD losses were related to the Nigerian Letter Fraud, but those cases that were reported had an average loss of 5,100 USD each. The number of reported offences is very low, while the average loss of those offences is the high.

[539] See: Giordano/Maciag, Cyber Forensics: A Military Operations Perspective, International Journal of Digital Evidence, Vol. 1, Issue 2, available at: https://www.utica.edu/academic/institutes/ecii/publications/articles/A04843F3-99E5-632B-FF420389C0633B1B.pdf; Reith, An Examination of Digital Forensic Models, International Journal of Digital Evidence, Vol. 1, Issue 3, available at:

https://www.utica.edu/academic/institutes/ecii/publications/articles/A04A40DC-A6F6-F2C1-98F94F16AF57232D.pdf; Kerr, Searches and Seizures in a digital world, Harvard Law Review, 2005, Vol. 119, page 531 et seq.

[540] Regarding hash-value based searches for illegal content see: Kerr, Searches and Seizures in a digital world, Harvard Law Review, 2005, Vol. 119, page 546 et seq.; Howard, Don't Cache Out Your Case: Prosecuting Child Pornography Possession Laws Based on Images Located in Temporary Internet Files, Berkeley Technology Law Journal, Vol. 19, page 1233.

[541] For more information about the case, see: Interpol in Appeal to find Paedophile Suspect, The New York Times, 09.10.2007, available at: http://www.nytimes.com/2007/10/09/world/europe/09briefs-pedophile.html?_r=1&oref=slogin; as well as the information provided on the Interpol website, available at: http://www.interpol.int/Public/THB/vico/Default.asp

[542] It was reported that the United States Department of Defence had to shut down their e-mail system after a hacking attack. See: http://www.defenselink.mil/transcripts/transcript.aspx?transcriptid=3996.

[543] Examples include the control of air-conditioning, access and surveillance systems, as well as the control of elevators and doors.

[544] See Goodman, "The Civil Aviation Analogy - International Cooperation to Protect Civil Aviation Against Cyber Crime and Terrorism" in Sofaer/Goodman, "The Transnational Dimension of Cyber Crime and Terrorism", 2001, page 69, available at: http://media.hoover.org/documents/0817999825_69.pdf.

[545] Bohn/Coroama/Langheinrich/Mattern/Rohs, "Living in a World of Smart Everyday Objects - Social, Economic & Ethical Implications", Journal of Human and Ecological Risk Assessment, Vol. 10, page 763 et seqq., available at: http://www.vs.inf.ethz.ch/res/papers/hera.pdf.

[546] Re the impact of attacks, see: Sofaer/Goodman, "Cybercrime and Security - The Transnational Dimension", in Sofaer/Goodman, "The Transnational Dimension of Cyber Crime and Terrorism", 2001, page 3, available at: http://media.hoover.org/documents/0817999825_1.pdf.

[547] A demonstration of the impact of even short interruptions to Internet and computer services was the harm caused by the computer worm, 'sasser". In 2004, the computer worm affected computers running versions of Microsoft's operation System Windows. As a result of the worm, a number of services were interrupted. Among them were the U.S. airline "Delta Airlines" that had to cancel several trans-Atlantic flights because its computer systems had been swamped by the worm, whilst the electronic mapping services of the British Coastguard were disabled for a few hours. See Heise News, 04.01.2005, available at: http://www.heise.de/newsticker/meldung/54746; BBC News, "Sasser net worm affects millions", 04.05.2004, available at: http://news.bbc.co.uM/hi/technology/3682537.stm.

[548] Shimeall/Williams/Dunlevy" Countering cyber war", NATO review, Winter 2001/2002, page 16, available at: http://www.cert.org/archive/pdf/counter_cyberwar.pdf.

[549] One analysis by "Red Sheriff' in 2002 stated that more than 90% of the users worldwide use Microsoft's operating systems (source: http://www.tecchannel.de - 20.09.2002).

[550] Re the discussion about the effect of the monoculture of operating systems on cybersecurity, see Picker, "Cyber Security: Of Heterogeneity and Autarky", available at: http://picker.uchicago.edu/Papers/PickerCyber.200.pdf; "Warning: Microsoft 'Monoculture'", Associated Press, 15.02.2004, available at http://www.wired.com/news/privacy/0,1848,62307,00.html; Geer and others, "CyberInsecurity: The Cost of Monopoly", available at: http://cryptome.org/cyberinsecurity.htm.

[551] With regards to the effect of spam on developing countries, see: "Spam issues in developing countries, 2005", available at:

[552] http://www.oecd.org/dataoecd/5/47/34935342.pdf.

565 Regarding the integration of developing countries in the protection of network infrastructure, see: "Chairman's Report on ITU

Workshop On creating trust in Critical Network Infrastructures", available at: http://www.itu.int/osg/spu/ni/security/docs/cni.10.pdf; "World Information Society Report 2007", page 95, available at:

http://www.itu.int/osg/spu/publications/worldinformationsociety/2007/WISR07_full-free.pdf.

[553] WiMAX (Worldwide Interoperability for Microwave Access) is a technology that provides wireless data services over long distances. For more information, see: The WiMAX Forum, available at http://www.wimaxforum.org; Andrews, Ghosh, Rias, "Fundamentals of WiMAX: Understanding Broadband Wireless Networking"; Nuaymi, "WiMAX Technology for Broadband Wireless Access".

[554] Regarding the attack, see: Toth, Estonia under cyberattack, available at: http://www.cert.hu/dmdocuments/Estonia_attack2.pdf

[555] See: Waterman: Analysis: Who cyber smacked Estonia, United Press International 2007, available at: http://www.upi.com/Security_Terrorism/Analysis/2007/06/11/analysis_who_cyber_smacked_estonia/2683/.

[556] Regarding cybersecurity in developing countries see: World Information Society Report 2007, page 95, available at: http://www.itu.int/osg/spu/publications/worldinformationsociety/2007/WISR07_full-free.pdf.

57° See below: Chapter 4.

[558] According to the ITU, there were 1.14 billion Internet users by the start of 2007, available at: http://www.itu.int/ITU-D/icteye.default.asp.

[559] See Wallsten, "Regulation and Internet Use in Developing Countries", 2002, page 2.

[560] See "Development Gateway's Special Report, Information Society - Next Steps?", 2005, available at: http://topics.developmentgateway.org/special/informationsociety.

[561] An example for new technology in this area is WiMAX (Worldwide Interoperability for Microwave Access), a standards-based wireless technology that provides broadband connections over long distances. Each WiMAX node could enable high-speed Internet connectivity in a radius of up to 50 km. For more information, see: The WiMAX Forum at http://www.wimaxforum.org; Andrews, Ghosh, Rias, "Fundamentals of WiMAX: Understanding Broadband Wireless Networking"; Nuaymi, WiMAX, Technology for Broadband Wireless Access.

[562] Regarding the necessary steps to improve cybersecurity, see: "World Information Society Report 2007", page 95, available at: http://www.itu.int/osg/spu/publications/worldinformationsociety/2007/WISR07_full-free.pdf.

[563] The fact that the offenders are not only based in western countries is proven by current analysis that suggests for example that an increasing number of phishing websites are hosted in developing countries. For more details, see: "Phishing Activity Trends", Report for the Month of April 2007, available at: http://www.antiphishing.org/reports/apwg_report_april_2007.pdf. Regarding phishing, see above: Chapter 2.8.d.

[564] Regarding hash-value based searches see: Kerr, Searches and Seizures in a digital world, Harvard Law Review, 2005, Vol. 119, page 531 et seq.; Howard, Don't Cache Out Your Case: Prosecuting Child Pornography Possession Laws Based on Images Located in Temporary Internet Files, Berkeley Technology Law Journal, Vol. 19, page 1233.

[565] Gordon Moore observed that the power of computers per unit cost doubles every 24 months (Moore's Law). For more information. see Moore, "Cramming more components onto integrated circuits", Electronics, Volume 38, Number 8, 1965, available at:

ftp://download.intel.com/museum/Moores_Law/Articles-Press_Releases/Gordon_Moore_1965_Article.pdf; Stokes, "Understanding Moore's Law", available at: http://arstechnica.com/articles/paedia/cpu/moore.ars/.

[566] Chapter six, "World Information Society Report 2007", ITU, Geneva, available at: http://www.itu.int/wisr/

[567] "Websense Security Trends Report 2004", page 11, available at: http://www.websense.com/securitylabs/resource/WebsenseSecurityLabs20042H_Report.pdf; "Information Security - Computer Controls over Key Treasury Internet Payment System", GAO 2003, page 3, available at: http://www.globalsecurity.org/security/library/report/gao/d03837.pdf. Sieber, Council of Europe Organised Crime Report 2004, page 143.

[568] Ealy, "A New Evolution in Hack Attacks: A General Overview of Types, Methods, Tools, and Prevention", page 9 et seqq., available at: http://www.212cafe.com/download/e-book/A.pdf.

[569] In order to limit the availability of such tools, some countries criminalise the production and offer of such tools. An example of such a provision can be found in Art. 6 of the European Convention on Cybercrime. See below: Chapter 6.1.13.

[570] Regarding the costs, see: The World Information Society Report, 2007, available at: http://www.itu.int/wisr/

[571] See "Development Gateway's Special Report, Information Society - Next Steps?", 2005, available at: http://topics.developmentgateway.org/special/informationsociety.

[572] For more information see: Ryan, War, Peace, or Stalemate: Wargames, Wardialing, Wardriving, and the Emerging Market for Hacker Ethics, Virginia Journal of Law and Technology, Vol. 9, 2004, available at: http://www.vjolt.net/vol9/issue3/v9i3_a07-Ryan.pdf

[573] With regard to the advantages of wireless networks for the development of ICT infrastructure in developing countries, see: "The Wireless Internet Opportunity for Developing Countries, 2003", available at: http://www.firstmilesolutions.com/documents/The_WiFi_Opportunity.pdf.

[574] One example of an approach to restrict the use of public terminals for criminal offences is Art. 7 of the Italian Decree-Law No. 144. Decree-Law 27 July 2005, no. 144 - "Urgent measures for combating international terrorism". For more information about the Decree-Law, see for example the article "Privacy and data retention policies in selected countries", available at http://www.ictregulationtoolkit.org/en/PracticeNote.aspx?id=2026.

5>s See below: Chapter 6.2.11.

[576] Regarding the impact of censorship and control, see: Burnheim, "The right to communicate, The Internet in Africa", 1999, available at: http://www.article19.org/pdfs/publications/africa-internet.pdf

[577] Regarding the question whether access to the Internet is a human right, see: Hick/Halpin/Hoskins, "Human Rights and the Internet", 2000; Regarding the declaration of Internet Access as a human right in Estonia, see: "Information and Communications Technology", in UNDP Annual Report 2001, Page 12, available at: http://www.undp.org/dpa/annualreport2001/arinfocom.pdf; "Background Paper on Freedom of Expression and Internet Regulation", 2001, available at: http://www.article19.org/pdfs/publications/freedom-of-expression-and-internet-regulation.pdf.

[578] Autronic v. Switzerland, Application No. 12726/87, Judgement of 22 May 1990, para. 47. Summary available at: http://sim.law.uu.n]/sim/caselaw/Hof.nsf2422ec00f1ace923c1246681002b47f1/cd1bcbf61104580ec1246640004c1d0b?OpenDocument.

[579] The Internet Systems Consortium identified 490 million Domains (not webpages). See the Internet Domain Survey, July 2007, available at: http://www.isc.orgindex.pn/ops/ds/reports/2007-07/; The Internet monitoring company Netcraft reported in August 2007 a total of nearly 130 million websites at: http://news.netcraft.com/archives/2007/08/06/august_2007_web_server_survey.html.

[580] http://www.wikipedia.org

[581] In the future development of the Internet, information provided by users will become even more important. "User generated content" is a key trend among the latest developments shaping the Internet. For more information, see: O 'Reilly, "What Is Web 2.0 - Design Patterns and Business Models for the Next Generation of Software", 2005, available at: http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html.

[582] For more information, see: Long/Skoudis/van Eijkelenborg, "Google Hacking for Penetration Testers, 2005"; Dornfest/Bausch/Calishain, "Google Hacks: Tips & Tools for Finding and Using the World's Information", 2006.

[583] See Nogguchi, 'search engines lift cover of privacy", The Washington Post, 09.02.2004, available at: http://www.msnbc.msn.eom/id/4217665/print/1/displaymode/1098/.

[584] One example is the "Terrorist Handbook" - a pdf-document that contains detailed information how to build explosives, rockets and other weapons.

[585] See Thomas, "Al Qaeda and the Internet: The Danger of 'Cyberplanning'", Parameters 2003, page 112 et seqq., available at: http://www.iwar.org.uk/cyberterror/resourees/cyberplanning/thomas.pdf; Brown/Carlyle/Salmeron/Wood, "Defending Critical Infrastructure", Interfaces, Vol. 36, No. 6, page 530, available at: http://www.nps.navy.mil/orfacpag/resumePages/Wood-pubs/defending_critical_infrastructure.pdf.

[586] "Using public sources openly and without resorting to illegal means, it is possible to gather at least 80% of all information required about the enemy". The reports about the sources of the quotation varies: The British High Commissioner Paul Boateng mentioned in a speech in 2007 that the quote was "contained in the Al Qaeda training manual that was recovered from a safe house in Manchester" (see: Boateng, "The role of the media in multicultural and multifaith societies", 2007, available at:

http://www.britishhighcommission.gov.uk/servlet/Front?pagename=0penMarket/Xcelerate/ShowPage&c=Page&cid=112556043761 0&a=KArticle&aid=1171452755624. The United States Department of Defence reported that the quote was taken from an Al Qaeda Training Manual recovered in Afghanistan (see:

http://www.defenselink.mil/webmasters/policy/rumsfeld_memo_to_DOD_webmasters.html). Regarding the availability of sensitive information on websites, see: Knezo, "Sensitive but Unclassified" Information and Other Controls: Policy & Options for Scientific and Technical Information, 2006, page 24, available at: http://digital.library.unt.edu/govdocs/crs/permalink/meta-crs-8704:1.

[587] See Telegraph.co.uk, news from January the 13th 2007.

[588] See for example, Sadowsky/Zambrano/Dandjinou, "Internet Governance: A Discussion Document", 2004, available at: http://www.intemetpoHcy.net/governance/20040315paper.pdf;

[589] For a brief history of the Internet, including its military origins, see: Leiner, Cef, Clark, Kahn, Kleinrock; lynch, Postel, Roberts, Wolff, "A Brief History of the Internet", available at: http://www.isoc.org/internet/history/brief.shtml.

[590] Lipson, "Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues".

[591] Regarding filter obligations/approaches see: Zittrain/Edelman, Documentation of Internet Filtering Worldwide, available at: http://cyber.law.harvard.edu/filtering/; Reidenberg, States and Internet Enforcement, University of Ottawa Law & Technology Journal, Vol. 1, No. 213, 2004, page 213 et Seq., available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=487965; Regarding the discussion about filtering in different countries see: Taylor, Internet Service Providers (ISPs) and their responsibility for content under the new French legal regime, Computer Law & Security Report, Vol. 20, Issue 4, 2004, page 268 et seq.; Belgium ISP Ordered By The Court To Filter Illicit Content, EDRI News, No 5.14, 18.06.2007, available at: http://www.edri.orgedrigram/number5.14/belgium-isp; Enser, Illegal Downloads: Belgian court orders ISP to filter, OLSWANG E-Commerce Update, 11.07, page 7, available at: http://www.olswang.com/updates/ecom_nov07/ecom_nov07.pdf; Standford, France to Require Internet Service Providers to Filter Infringing Music, 27.11.2007, Intellectual Property Watch, available at: http://www.ip- watch.org/weblog/index.php?p=842; Zwenne, Dutch Telecoms wants to force Internet safety requirements, Wold Data Protection Report, issue 09/07, page 17, available at:

http://weblog.leidenuniv.nl/users/zwennegj/Dutch%20telecom%20operator%20to%20enforce%20Internet%20safety%20requirements.pdf; The 2007 paper of IFPI regarding the technical options for addressing online copyright infringement, available at:

http://www.eff.org/files/filenode/effeurope/ifpi_filtering_memo.pdf; Regarding self-regulatory approaches see: ISPA Code Review, Self-Regulation of Internet Service Providers, 2002, available at: http://pcmlp.socleg.ox.ac.uk/selfregulation/iapcoda/0211xx-ispa-study.pdf.

[592] For more information regarding anonymous communications, see below: Chapter 3.2.l2.

[593] Regarding the extent of transnational attacks in the most damaging cyberattacks, see: Sofaer/Goodman, "Cyber Crime and Security - The Transnational Dimension" in Sofaer/Goodman, "The Transnational Dimension of Cyber Crime and Terrorism", 2001, page 7, available at: http://media.hoover.org/documents/0817999825_1.pdf.

[594] The first and still most important communication protocols are: Transmission Control Protocol (TCP) and Internet Protocol (IP). For further information, see: Tanebaum, Computer Networks; Comer, "Internetworking with TCP/IP - Principles, Protocols and Architecture".

[595] See Kahn/Lukasik, "Fighting Cyber Crime and Terrorism: The Role of Technology," presentation at the Stanford Conference, December 1999, page 6 et seqq.; Sofaer/Goodman," Cyber Crime and Security - The Transnational Dimension", in Sofaer/Goodman, "The Transnational Dimension of Cyber Crime and Terrorism", 2001, page 6, available at: http://media.hoover.org/documents/0817999825_1.pdf.

[596] One example of the international cooperation of companies and the delegation within international companies is the Compuserve case. The head of the German daughter company (Compuserve Germany) was prosecuted for making child pornography available that was accessible through the computer system mother company in the United States connected to the German company. See Amtsgericht Muenchen, Multimedia und Recht 1998, Page 429 et seq. (with notes Sieber).

[597] See Huebner/Bem/Bem, "Computer Forensics - Past, Present And Future", No.6, available at: http://www.scm.uws.edu.au/compsci/computerforensics/Publications/Computer_Forensics_Past_Present_Future.pdf; Regarding the possibilities of network storage services, see: Clark, Storage Virtualisation Technologies for Simplyfing Data Storage and Management.

[598] Regarding the need for international cooperation in the fight against Cybercrime, see: Putnam/Elliott, "International Responses to Cyber Crime", in Sofaer/Goodman, " Transnational Dimension of Cyber Crime and Terrorism", 2001, page 35 et seqq., available at: http://media.hoover.org/documents/0817999825_35.pdf; Sofaer/Goodman, "Cyber Crime and Security - The Transnational Dimension" in Sofaer/Goodman, "The Transnational Dimension of Cyber Crime and Terrorism", 2001, page 1 et seqq., available at: http://media.hoover.org/documents/0817999825_1.pdf

[599] National Sovereignty is a fundamental principle in International Law. See Roth, 'state Sovereignty, International Legality, and Moral Disagreement", 2005, page 1, available at: http://www.law.uga.edu/intl/roth.pdf.

[600] See Gercke, "The Slow Wake of A Global Approach Against Cybercrime", Computer Law Review International 2006, 142. For examples, see Sofaer/Goodman, "Cyber Crime and Security - The Transnational Dimension", in Sofaer/Goodman, "The Transnational Dimension of Cyber Crime and Terrorism", 2001, page 16, available at: http://media.hoover.org/documents/0817999825_1.pdf;

[601] See below: Chapter 3.2.10.

[602] See Gercke, "The Slow Wake of A Global Approach Against Cybercrime", Computer Law Review International 2006, 142.

[603] Dual criminality exists if the offence is a crime under both the requestor and requesting party's laws. The difficulties the dual criminality principle can cause within international investigations are a current issue in a number of international conventions and treaties. Examples include Art. 2 of the EU Framework Decision of 13 June 2002 on the European arrest warrant and the surrender procedures between Member States (2002/584/JHA).

[604] Regarding the dual criminality principle in international investigations, see: "United Nations Manual on the Prevention and Control of Computer- Related Crime", 269, available at http://www.uncjin.org/Documents/EighthCongress.html; Schjolberg/Hubbard, "Harmonizing National Legal Approaches on Cybercrime", 2005, page 5, available at: http://.itu.int/osg/spu/cybersecurity/ presentations/session12_schjolberg.pdf.

[605] See: Lewis, "Computer Espionage, Titan Rain and China", page 1, available at: http://www.csis.org/media/csis/pubs/051214_china_titan_rain.pdf.

[606] Regarding the extend of cross-border cases related to Computer Fraud see: Beales, Efforts to Fight Fraud on the Internet, Statement before the Senate Special Committee on aging, 2004, page 9, available at: http://www.ftc.gov/os/2004/03/bealsfraudtest.pdf.

[607] See below: Chapter 6.3.8.

[608] See below: Chapter 6.3.

[609] One example is phishing. Although most sites are still stored in the United States (32%), which has strong legislation in place, countries such as China (13%), Russia (7%) and the Republic of Korea (6%), which may have less effective instruments in the field of international cooperation in place, are playing a more important role. Apart from the United States, none of them has yet signed and ratified cybercrime specific international agreements that would enable and oblige them to effectively participate in international investigations.

[610] This issue was addressed by a number of international organisations. The UN General Assembly Resolution 55/63 points out: "States should ensure that their laws and practice eliminate safe havens for those who criminally misuse information technologies". The full text of the Resolution is available at: http://www.unodc.org/pdf/crime/a_res_55/res5563e.pdf. The G8 10 Point Action plan highlights: "There must be no safe havens for those who abuse information technologies". See below: Chapter 5.2.

[611] For more information, see http://en.wikipedia.org/wiki/ILOVEYOU; regarding the effect of the worm on Critical Information Infrastructure Protection, see: Brock, "ILOVEYOU" Computer Virus Highlights Need for Improved Alert and Coordination Capabilities, 2000, available at: http://www.gao.gov/archive/2000/ai00181t.pdf.

[612] BBC News, "Police close in on Love Bug culprit", 06.05.2000, available at: http://news.bbc.co.uM/hi/sci/tech/738537.stm. Regarding the technology used, see: http://radsoft.net/news/roundups/luv/20000504,00.html.

[613] See for example: CNN, "Love Bug virus raises spectre of cyberterrorism", 08.05.2000, http://edition.cnn.com/2000/LAW/05/08/love.bug/index.html; Chawki, "A Critical Look at the Regulation of Cybercrime", http://www.crime- research.org/articles/Critical/2; Sofaer/Goodman, "Cyber Crime and Security - The Transnational Dimension" in Sofaer/Goodman, "The Transnational Dimension of Cyber Crime and Terrorism", 2001, page 10, available at: http://media.hoover.org/documents/0817999825_1.pdf; Goodman/Brenner, The Emerging Consensus on Criminal Conduct in Cyberspace, UCLA Journal of Law and Technology, Vol. 6, Issue 1; United Nations Conference on Trade and Development, Information Economy Report 2005, UNCTAD/SDTE/ECB/2005/1, 2005, Chapter 6, page 233, available at: http://www.unctad.org/en/docs/sdteecb20051ch6_en.pdf.

[614] One example of low- cost services that are automated is e-mail. The automation of registration allows providers offer e-mail addresses free of charge. For more information on the difficulties of prosecuting Cybercrime involving e-mail addresses, see below: Chapter 3.21

[615] The term "Spam" describes the process of sending out unsolicited bulk messages. For a more precise definition, see: "ITU Survey on Anti-Spam Legislation Worldwide 2005", page 5, available at: http://www.itu.int/osg/spu/spam/legislation/Background_Paper_ITU_Bueti_Survey.pdf.

[616] For more details on the automation of spam mails and the challenges for law enforcement agencies, see: Berg, "The Changing Face of Cybercrime - New Internet Threats create Challenges to law enforcement agencies", Michigan Law Journal 2007, page 21, available at: http://www.michbar.org/journal/pdf/pdf4article1163.pdf.

[617] Ealy, "A New Evolution in Hack Attacks: A General Overview of Types, Methods, Tools, and Prevention", page 9 et seqq., available at: http://www.212cafe.com/download/e-book/A.pdf.

[618] The Online-Community HackerWatch publishes regular reports on hacking attacks. Based on their sources, more than 250 million incidents were reported in only one month (August 2007). Source: http://www.hackerwatch.org.


Дата добавления: 2015-12-19; просмотров: 10; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!