According to some foreign experts, the situation in the field of protection of national interests in the information sphere became much more complicated after the terrorist attacks in USA on 11 September 2001 and to date continues to deteriorate. A number of experts stressed that, despite the massive resources at the disposal of the governments of the several States, the Executive and the legislature do not create the image of a coherent information policy that casts doubt on what they actually spend.
Everything that happens looks more like a change of balance of forces, a redistribution inside a fundamentally new sphere of vital interests of modern society – in the information sphere. In this redistribution, the role of the United States.
The first step in the formation of the necessary priorities in the information sector was undertaken with the release of the Act on rights in the digital Millennium (DMCA), and then with the adoption of a new law to combat terrorism, according to which equated to terrorist acts and crimes against computer systems.
Further, at the end of November 2001 there was signed an international Agreement on cybercrime: thirty countries (European States, USA, Canada, Japan and South Africa) signed a document whose purpose is "...to protect society against cybercrime through the formation of unified international law and encourage active cooperation...".
Many analysts noted that the agreement was drawn up in haste and at the request of the USA, who managed to achieve rapid unification of changes in their legislation with international agreements.
Effective delivery is achieved, including, and the General tightening procedure for dealing with offences connected with terrorist activities. So, in mid-November 2001 the US enacted a system of military tribunals. The tribunals are designed to deal with cases of terrorism suspects foreigners and of cooperating with them. After the verdict suspect his case is not an appeal in civil courts neither the United States nor in international courts. The decision to cancel or the President, or the Minister of defence with the consent of the President. Thus, the President imposed a rigid system of severe punishment of terrorists. The severity is reinforced by the fact that one of the reasons for American reluctance to participate in the creation of the international criminal Tribunal under the auspices of the United Nations is the refusal of this organization to impose the death penalty. This will allow US to complete the destruction of the international system of law and bring to justice the criminals who attempted the invasion in information systems USA, without regard to their nationality.
Activities to ensure national security in the information sphere from developed countries has led to the fact that in November 2001 only in Somalia Internet company and the largest telecommunications operator were forced to close, as they appeared in the list of companies suspected of supporting terrorists without clear evidence of guilt. In addition to disabling access to the Internet, severe restrictions imposed on international telephone services, and money transfer. This fact is the first example of international action against crime in the information sphere.
However, the results of studies on the analysis of possibilities of international terrorist organizations to influence the critical segments of the information infrastructure in the past few months a number of foreign analytical centers, show a number of significant shifts in the estimates of possible threats from terrorist organizations.
For example, the following changes occurred in the estimates of the leading American experts in the field of information security: if a few years ago, the threat of terrorist attacks on information infrastructure of the U.S. was seen as very relevant, today experts stress that the immediate threat of terrorism against the information infrastructure of the United States is not.
Experts note that today's terrorists come from the fact that the act has to be spectacular. You need comprehensive coverage in the media, and to achieve this by conducting information attacks is very difficult. In addition, it is noted that today the terrorist groups don't have the necessary number of highly skilled professionals able to plan and carry out a terrorist attack in the information space, there is no experience of use of means of information influence, not evaluated any possible damage and entertainment, as well as the costs for preparing such attacks. In this regard, experts note that today the terrorists to undertake such operations, including the development of effective interventions, conducting experiments and recruiting with appropriate training, is required 2 to 4 years. Can I also coordinated large-scale information attack on information infrastructure of the U.S. that could seriously disrupt its operations and result in significant consequences, terrorist organizations will be able not earlier than in 6 to 10 years. However, experts predict in the near future the growing number of relatively simple information attacks with minor economic consequences.
However, experts note that recently the information space is actively used by terrorists to coordinate their activities, communications and fundraising. Realizing the potential of new information technologies, the number of international terrorist organizations in recent times trying to establish links with a global network community of hackers. Terrorists are working on a possible involvement in the future for planning and carrying out terrorist acts.
The possibility of such linkages is particularly troubled American experts. The establishment of working contacts between terrorists and hackers will be a sudden leap in the technological development of terrorists that can lead to the fact that the above provisional assessment of the willingness of terrorists to conduct large-scale information attacks will be significantly reduced. In this regard, the American governmental bodies decided to tighten control communications hacking communities in the global information network.
- 29-05-2012Drugs in the service of the Third Reich
- 12-09-2010Many experts believe the best tank Merkava main battle tank in the world
- 12-09-2010The Minister of defence of Germany introduced draft large-scale reform of the armed forces
- 21-04-2001To the question about the war of the fourth sphere