Cyber Crime and Cyber Terrorism


LISTEN ( Staniforth, 2014 ) to members of the public: L



Download 5,67 Mb.
Pdf ko'rish
bet43/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   39   40   41   42   43   44   45   46   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

LISTEN
(
Staniforth, 2014
) to members of the public:
L
isten to citizens and take their concerns seriously
I
nspire confidence and provide reassurance
S
upport with information, advice and guidance
T
ake ownership and record citizen concerns
E
xplain what you shall do and why
N
otify supervision and report concerns
During all cyber investigations, the public must be put first. The victims of cyber 
crimes must be managed professionally and specialist care and support provided as 
required. Complainants of cyber crimes must be regularly updated as to the progress 
of the investigation. By listening to members of the public and providing a police 
service of the highest professional standards will increase confidence of the public in 
the law enforcements commitment and determination to tackle cyber crimes.
INVESTIGATING CRIME AND TERROR
When Metropolitan Police officers raided a flat in West London during October 
2005, they arrested a young man, Younes Tsouli. The significance of this arrest was 
not immediately clear but investigations soon revealed that the Moroccan born Tsouli 
was the world’s most wanted “cyber-terrorist” (
Staniforth and PNLD, 2009
). In his 
activities Tsouli adopted the user name “Irhabi 007” (Irhabi meaning “terrorist” in 
Arabic), and his activities grew from posting advice on the internet on how to hack 
into mainframe computer systems to assisting those in planning terrorist attacks 
(
Staniforth, 2012
). Tsouli trawled the internet searching for home movies made by 
US soldiers in the theatres of conflict in Iraq and Afghanistan that would reveal the 
inside layout of US military bases. Over time these small pieces of information were 
collated and passed to those planning attacks against armed forces bases. This virtual 
hostile reconnaissance provided insider data illustrating how it was no longer neces-
sary for terrorists to conduct physical reconnaissance if relevant information could 
be captured and meticulously pieced together from the internet.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   39   40   41   42   43   44   45   46   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish