Recently, with the development of the information network, through which corporations and government services forward important data to each other, there is a need to implement measures to protect personal information. Another even more significant problem was financial fraud in the network and other crimes in the field of computer information.
A couple of years ago it was believed that it was impossible to track scammers operating on the Internet. It is also impossible to protect a virtual wallet from hacking and an electronic signature from a fake.
But information technology does not stand still, and law enforcement agencies are not asleep.
It turned out that crimes in the field of computer information can be stopped by following simple security measures (which, unfortunately, no one follows). If we are talking about a virtual wallet, you should follow the recommendations of the program developers. If about e-mail, never open unknown links, inform the site administration about spam and do not enter your identification data (login and password) on a familiar site whose address does not correspond to reality (even if it differs from the real one by only one letter). Consumer rights exercised over the network also need protection. The fact is that the Internet is full of substandard goods and services. Beautiful slogans, spam messages and colorful banners somehow attract buyers. Although you can find unflattering reviews about the product on the same store sites, such forethought will save you from buying nonexistent things (and if existing ones, for example, glasses with a video camera or a pen with a built-in voice recorder, are definitely inaccessible to the public). As for copyright, it’s more complicated here. Protecting them online is virtually impossible, but you can try. For example, store handwritten sketches. Send your “manuscript” with a text to a friend by e-mail from which it would be clear that this manuscript belongs to you. Even better, before you post something on the Internet, register your intellectual property in the manner prescribed by the copyright law.
Sometimes simple security measures are not enough to protect yourself from an information technology crime. They are becoming more sophisticated and no longer resemble a harmless joke in the form of a “death screen” or a “trojan”. These include actions that cause significant harm to users: cracking passwords from a bank card, disseminating defamatory information, distorting important information or deleting it. Good ground for scammers is created by online opportunities for playing in the stock market and auctions. Not to mention the dissemination of information containing pornographic materials and encouraging racial struggle, discrimination.
To protect the citizens of Russia from such criminal acts, the government had to make next amendments to the law. And today, among other well-known and qualified crimes, the Criminal Code contains the concept of “ computer information crime ”. Those found guilty are punished according to the degree of damage - from a fine to imprisonment (up to 7 years). I wonder if someone was arrested for violating this article of the Criminal Code of the Russian Federation (chapter 28, articles: 272-274)?
Recently (in 1998), a special department was created in the Ministry of Internal Affairs of Russia - Office "K". It employs IT specialists who not only record illegal actions, investigate crimes in the field of computer information, but also identify the persons who committed them. How they succeed, it is better to keep this information a secret, so that law enforcement agencies have the opportunity to be one step ahead of the attackers.
It is much more important to know the following. Each citizen can contact the Office "K" of the Ministry of Internal Affairs directly or through the official website. There you can download a very useful memo about basic safety rules regarding not only the Internet, but also the use of a telephone and a bank card.
Solving a crime in the field of computer information is not an easy task: according to a 2010 study, hackers managed to appropriate $ 7 billion (worldwide). The study was conducted by experts from the largest companies specializing in network security violations - Eset, Leta, Group-IB. Experts of the Office “K” call to report on discovered violations in the field of IT, otherwise the attackers will go unpunished.