Countering the use of leading sectors of digital economy by organized crime: European experience
Highlightes of the European experience of preventing and countering organized crime in the digital economy. The tools, methods and experience to combat the criminal misuse of encryption and anonymity methods. Use of the cyber tools to investigate.
Рубрика | Государство и право |
Вид | статья |
Язык | английский |
Дата добавления | 19.05.2021 |
Размер файла | 55,8 K |
Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже
Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.
One of the main tasks of the EU law enforcement agencies is to fight against providers of criminal services and specialized tools that are the basis of software, hardware and personnel structures of European cybercrime. These types of specialized tools include: malicious software, including password extortionists, spyware, and banking trojans, as well as, respectively, their developers, suppliers and customers, providers, organizers and performers of DDoS attacks as services; manufacturers of botnets, especially their modifications, used to distribute other malicious programs; carrying out DDoS attacks, as well as criminal manipulations by distorting and “noisy” information space.
Novelty ually stealing money. Also in this category of crimes can be attributed to the theft of authentication data (digital signature), which allows you to get unhindered access to the accounts of electronic payment system agents, transfer financial resources from them to personal accounts of subscriber phone numbers, and then transfer them to cash.
Analysis and study of the scientific and analytical work of European criminological researchers makes it possible to state the dominance of the position according to which in modern conditions the sign of unity of organized groups is lost during crimes in the digital economy, and the traditional form of criminal interaction is replacing the traditional macro criminal networks, which are attended by visitors to forums, chat rooms, closed online communities. After all, to enter this segment you need to earn trust, have a certain status and reputation. It is no coincidence that the electronic environment greatly complicates the identification of the offender and contributes to the emergence of a new characteristic feature of crime in the digital economy - many episodes of criminal activity.
It should be noted that, in contrast to payments using traditional bank payment cards and Internet banking systems, payments by electronic means are often not personalized, which is an important criminological factor. The fundamental question is under what conditions these economic relations can be transformed into criminal law. Firstly, the risk of becoming a victim of fraudsters who use anonymous proxy servers and twin sites to deceive and become inaccessible for identification is large enough. Secondly, given the transnational nature of electronic information exchange and a significant number of intermediaries between the source and addressee of information, the procedure for establishing the legal status and virtues of all participants in this process is complicated, and therefore the problem of criminal liability of Internet providers becomes relevant.
Considering the above, China introduced the radical methods in this format. Since February 2019, the government of the PRC cyberspace has obliged all owners of blockchain services to collect user identification data and freely transfer them to law enforcement agencies. The policy of the PRC in this direction provides for total control by the state. In 2018, China banned Initial coin offering (ICO), crypto exchanges, and a blockchain conference on related topics. Against this background, it is the state that actively invests in large blockchain projects. A support fund of blockchain projects has recently been established in the amount of 72 billion US dollars, which will operate in major cities of China.
In Switzerland, Canton Zug became a platform with a developed infrastructure for the adaptation and implementation of blockchain projects. This region even got the name «Crypto Valley», where banking institutions operating both with Fiat and cryptocurrencies are represented, there is a university for preparing blockchain specialists of HSLU-I, the headquarters of leading blockchain startups such as: «Ethereum», «Monetas», «Lykke». From 2014, pilot projects began to appear in the canton of Zug, which used the blockchain platform. Campaigns were launched to conduct referendums, electronic identification of citizens, accepting transfers of citizens for housing and utilities services, and transport.
The world community is closely monitoring the situation and trying to influence it. Thus, during 2016-2019, quite a few world forums took place, during which experts identified the 10 most acute international problems and risks for the world economy that are spread by organized crime, in particular, these are: financial crimes, including illegal taxation, financial security and the exchange of financial resources, investments and assets; production, storage, transportation and sale of counterfeit products; theft and unlawful use of intellectual property; illicit trafficking in weapons and means of destruction; illegal removal, storage, transportation and use of human organs for transplantation; online organized pedophilia and child pornography; illegal gambling and lottery businesses, including the creation of virtual casinos, illegal computer games that provide for unlicensed monetization etc.
The phenomenon of «corruption by organised crime» is the subject of increased attention from policymakers in the United Kingdom of Great Britain and Northern Ireland. This focus is notable, given the limited political and academic consideration of the scope and meaning of this intersecting term. Both «organised crime» and «corruption» are difficult notions to pin down, definitionally and empirically, and such complexity is compounded by their conjunction (Campbell, 2016).
For example, since in most countries of the European Union, as well as in the United States, cryptocurrency is not considered as a means of payment, but as a commodity, it is de facto legalized. The vast majority of participants in these and similar platforms are good citizens and has nothing to do with crime. However, the lack of detailed regulations and law enforcement practices makes such a business a «gray» zone, where the crime goes. Europol experts note that organized criminal groups that operate in the eurozone differ in their organizational structure, functionality and composition. In the EU, the phenomenon of activation of small high-tech criminal groups that operate in criminal online commodity markets is recorded. As a rule, in such groups professional criminals are a small number of individuals, and the main contingent consists of employees of IT companies, banking institutions, financial companies etc.
During the conference on the global use of cryptocurrency, held in January 2017 in Qatar, for the first time the question was raised about small high-tech groups, which in the United States are called «organizations-werewolves», and French law enforcement officers called them - «Mobius crimi- nals». Some people mistakenly believe that such groups relate exclusively to cybercrime, because the spectrum of their criminal activities is quite wide. If earlier criminals used military or civilian technologies, adapting them for their needs, then in reality criminal groups themselves develop technologies, use them as a separate side business and realize through their interests in civil and military spheres. Modern criminals quickly adapt to technical innovations and create and implement technologies themselves. Adaptation options can be quite diverse.
Europol's greatest concern is the emergence of so-called «Mobius» criminal groups in the EU. Typical features of these groups are: small number, legal nature of activity, high level of their competence and professionalism. Such groups are created by the order of large business structures outside the EU. The development of information and other high technologies affects the constant increase in the destructive potential of such small criminal groups. Over the past five years, small criminal groups have been able to harm not at the level of an individual business or a local community, but at the scale of megacities and large corporations.
At the end of 2018, realizing the scale of the spread of crime in cyberspace and having concern about the threatening trends of its spread, the UN General Assembly approved the resolution «On counteracting the use of information and communication technologies for criminal purposes». The European Union, in turn, has strengthened responsibility for crimes related to the blockchain and cryptocurrency. The reason for this decision was the massive proliferation of malicious programs that lure money from ordinary EU citizens.
Technological innovations are important factors affecting the activities, structure and methods of organized «digital» crime in Europe. European organized crime groups demonstrate a high degree of fitness and creativity in the use of new technologies. The Internet and its growing connectivity to all components of the physical environment are increasingly affecting the forms of serious organized crime. The «Internet things» sphere is also constantly expanding. The ability to connect all types of devices is becoming a reality for households and enterprises in the EU countries. Unlike traditional computers and tablets, smart phones and things connected to the Internet remain extremely vulnerable. In million cities in the EU, up to 90 % of the public Wi-Fi nodes are not protected by encryption. Accordingly, cybercriminals can connect to any of the millions of subscribers who use these nodes daily. According to Europol experts, the greatest threat in the field of organized crime in the coming years will be not artificial intelligence or big data, but transformations of extremely vulnerable to external malicious intrusion of smartphones, e-wallets and access points to numerous services and programs that require identification of personal data (Skuratovska, 2016). The analysis of the presented materials allows to determine the ways of countering organized crime in the digital economy, which are: victimological prophylaxis; technical anti-virus law enforcement support, which includes regular updates of licensed software, forensic technology; attracting new IT specialists to the departments of relevant law enforcement agencies; international digital integration, rationing on the legal basis of information exchange, coordination of the conceptual apparatus on the digital economy and its components; generalization and practical support of the dissemination of the best practices of European experience in countries with developed digital economies in the field of combating crime in this field; risk management of digital security in the economic sphere at the level of world integration, the state, individual industries, the private sector, enterprises of strategic importance to the state.
The digital economy in the EU states is developing progressively, primarily in such areas as: cloud technologies, Internet banking, and electronic services for the purchase of goods using a smartphone, block chain, online consultations and etc. Unfortunately, the existing regulatory framework at the EU level cannot provide an adequate level of resistance to technological and digital crimes. The European community is aware of all the risks and threats that cybercriminals can spread, but effective universal mechanisms of systemic struggle have not yet been developed. The general trend, which is stored in the EU in the format of intensifying criminal activity, is one step ahead of the law and practice of law enforcement in the «digital» space. Against this background, the number of crimes committed in the field of IT-technologies is constantly and dynamically growing. Annually criminals launder billions of euros using high-tech and, in particular, cryptocurrency, because government bodies have no influence on these processes, and the police are not able to monitor and block such transactions. Even if it is proved that the transaction is criminal in nature, law enforcement agencies are not able to freeze it or cancel it, unlike the traditional banking system, which requires the development of appropriate measures of mechanisms and their practical implementation.
Thus, law enforcement agencies and representatives of the digital economy industry should ensure parity principles of interaction and cooperation at both the operational and strategic levels. We can also confidently state that organized crime in the digital economy has a cross-border nature, and therefore measures to counter such crime include setting up, above all, effective international cooperation in this field.
Thus, currently, in the EU, there remains an expressive barrier between cybercrime and traditional organized crime groups, which is associated with different educational, cultural and professional levels of participants in these criminal organizations, as well as differences in ethnic and territorial composition, and the digital economy and its leading industries all remain vulnerable segments of the criminal encroachment.
References
1. Campbell, L. (2016). "Corruption by Organized Crime" - A Matter of Definition? Current Legal Problems, 69(1), 115-141. doi: https://doi.org/10.1093/clp/cuw004.
2. European Cybercrime Centre - EC3. Combating crime in a digital age. Retrieved from https://www.europol.europa.eu/about-europol/european-cybercrime-centre-ec3.
3. Kiberbezpeka v Ukraini: pravovi ta orhanizatsiini pytannia, Cyber security in Ukraine: legal and organizational issues: Proceedings of the All-Ukrainian Scientific and Practical Conference. (2016). (p. 233). Odesa: ODUVS [in Ukrainian].
4. Liashenko, V.I., & Vyshnevskyi, O.S. (2018). Tsyfrova modernizatsiia ekonomiky Ukrainy yak mozhlyvist proryvnoho rozvytku [Digital modernization of the Ukrainian economy as an opportunity for breakthrough development]. Kyiv: NAN Ukrainy [in Ukrainian].
5. Skuratovska, D.V. (2016). Ways to improve management costs. International scientific magazine "Internauca", 6. doi: https://doi.org/10.21267/IN.2016.6.2294.
6. Stoica, O., & Ihnatov, I. (2016). Exchange rate regimes and external financial stability. Economic Annals, 209(61), 27-43. doi: https://doi.org/10.2298/ EKA1609027S.
7. YeS pratsiuie nad posylenniam borotby z vidmyvanniam hroshei-FT [The EU is working to strengthen the fight against money-laundering-FT]. Ukrainski natsionalni novyny: informatsiine ahentstvo, Ukrainian National News: Information Agency. Retrieved from https://www.unn.com.ua/uk/news/1751338-yes- pratsyuye-nad-posilennyam- borotbi-z-vidmivannyam-groshey-ft [in Ukrainian].
Размещено на Allbest.ru
...Подобные документы
Concept, importance of the Constitution as the fundamental law of the state, the history of development. Features of the constitutions of the leading powers of the European continent. Factors that influence the content of the Constitution of Bulgaria.
реферат [21,4 K], добавлен 14.02.2015The steady legal connection of the person with the state, expressing in aggregate of legal rights and duties. The Maastricht Treaty of 1992. Establishment of the European Economic Community. Increase of the number of rights given to the citizens.
реферат [22,5 K], добавлен 13.02.2015The concept of special tools and equipment. Implementation of technical means in the work of the Interior. Organizational-methodical and tactical basics of using technology in law enforcement agencies. Methods of the active defense, personal protection.
реферат [35,6 K], добавлен 08.10.2012The concept of legitimate force, the main condition and the possibility of entry of legal acts in force. Reflection of the procedure in the legislation of the European Union and the Russian Federation: comparative characteristics and differences.
реферат [20,5 K], добавлен 13.02.2015Аналіз інституційної системи European Civil Procedure, наднаціонального законодавства Європейського Союзу у сфері цивільного процесу. Аналіз положень, що регулюють питання передачі судових і позасудових документів, подання доказів, забезпечення вимог.
статья [21,4 K], добавлен 17.08.2017The purpose of state punishment. Procedure of criminal case. The aim of punishment. Theories of Punishment. The Difficult Child. Last hired, first fired. The Health Professions. Traditional Collector's Editions. Hospital and Specialist Services.
шпаргалка [41,7 K], добавлен 23.03.2014Защита авторских прав как достаточно сложное правовое явление, что порождает неоднозначные подходы к его изучению, особенности и средства реализации данного процесса во Всемирной паутине. DRM – digital rights management как управление цифровыми правами.
реферат [23,8 K], добавлен 18.04.2013Idea of human rights in constitutional legislation of Russia. The judicial review process. Establishing a certain period of appeal with supervisory complaint and limiting grounds for initiation of proceedings. The functions of the cabinet of Ministers.
реферат [16,6 K], добавлен 14.02.2015The notion of substance, the principles and characteristics of their treatment, as well as a reflection of these processes in the legislation of the state. Methods of dealing with illegal distribution of substances, the their effects on the human psyche.
презентация [3,0 M], добавлен 07.11.2014The launch of e-declaration on 15 August 2016 is an essential is the final commitment of Ukraine to obtain the free visa regime. In general, for effective implementation of anti-corruption policy in Ukraine should be introduced a systematic approach.
статья [19,8 K], добавлен 19.09.2017Protection of band names as a product of development of a civilization and commodity economy. Concept of band names, the courts and judges in USA. Band Protection in China. Conditions of advancement of the international cooperation in the field of band.
реферат [24,2 K], добавлен 19.07.2010Three models of juvenile system. The modern system of juvenile justice in Britain and Russia. Juvenile court. Age of criminal responsibility. Prosecution, reprimands and final warnings. Arrest, bail and detention in custody. Trial in the Crown Court.
курсовая работа [28,2 K], добавлен 06.03.2015Interaction of the courts of general jurisdiction and the Constitutional court of Ukraine. Impact of the institute of complaints on human rights. Analis of an independent function of the Constitutional court and courts of the criminal jurisdiction.
статья [19,6 K], добавлен 19.09.2017The influence of corruption on Ukrainian economy. Negative effects of corruption. The common trends and consequences of increasing corruption. Crimes of organized groups and criminal organizations. Statistical data of crime in some regions of Ukraine.
статья [26,7 K], добавлен 04.01.2014Сrime of ciber is an activity done using computers and internet. History of cyber crime. Categories and types of cyber crime. Advantages of cyber security. The characteristic of safety tips to cyber crime. Application of cyber security in personal compute
презентация [203,5 K], добавлен 08.12.2014Сучасний стан туристичного ринку в Україні. Експерти–консультанти як лідери самоорганізованих туристів. Створення якісного еmotional-experience туру з використанням індивідуальних переваг. Проект розробки еmotional-experience туру на базі існуючого туру.
курсовая работа [942,0 K], добавлен 18.02.2015The role of experience from the first reading the book for further reading hobby. Familiarization with the work of Terry Prachetta, J. Tolkien, R. Howard, and William Shakespeare. "Crime and Punishment" - an outstanding novel in Russian literature.
эссе [12,2 K], добавлен 16.01.2011Concept and program of transitive economy, foreign experience of transition. Strategic reference points of long-term economic development. Direction of the transition to an innovative community-oriented type of development. Features of transitive economy.
курсовая работа [29,4 K], добавлен 09.06.2012Commercial banks as the main segment market economy. Principles and functions of commercial banks. Legal framework of commercial operation banks. The term "banking risks". Analysis of risks and methods of their regulation. Methods of risk management.
дипломная работа [95,2 K], добавлен 19.01.2014Characteristic of the intellectual movement that gained strength in reaction to the Industrial Revolution. Studying the difference between "Songs of Innocence" and "Songs of Experience". Description of the main authors belonged to London Romanticism.
контрольная работа [27,4 K], добавлен 30.04.2011