Cyber Crime, Danger Should be Addressed - Rawan For Media Artistic and Production
It is known that the Cyber Crime is carried out by using a computer or
mobile phone through connecting to the Internet, and its goal is to
penetrate networks or sabotage or misrepresentation or fraud, theft,
embezzlement or piracy and theft of intellectual property rights in the
networks, and deviant behavior form a perfect crime.
Types of cyber crime:
There
are several types of cyber crimes, including physical one, which causes
financial damage to victim or target of the monument process and take
one of three forms: electronic theft such as taking over the ATM and
bank machines, and this spread prominently in many African countries,
especially southern and western Africa, and through it electronic data
of the ATM card is copied and then used to take funds from the victim's
account, or through establishment of Internet page similar to the site
of a major bank or large financial institutions to requests from client
to enter his (her) data or update his information in order to obtain his
bank’s data and then steal him.
There
are mail messages received by the mobile phone from unknown sources
regarding request of contributing laundering of funds from abroad with
promise of a percentage of the amount, or that telling owner of the
e-mail of his winning of one of the prizes or lottery and asking him to
submit his bank account number to the said body.
Cultural
Crime, where offender seizes on intellectual property rights without
the consent of the victim, it is possible to be through software piracy:
It is the process of copying or imitation of the programs of an
international company on CDs and sell them to people at a lower price,
or infringement on encoded satellite channels and make them available
via the Internet using technology of (soft copy), besides crime of
copying the scientific novels through electronic means.
There
is also the political and economic crime, a serious crime by using
information technology by terrorist groups to facilitate the typical
forms of criminal acts. They do not hesitate to use the advanced means
such as: communication and coordination, broadcast of false news, employ
of some young people, and transfer of some money in order to achieve
their goals.
In
some countries, terrorists are using the Internet to exploit supporters
of their ideas and collect money to finance their terrorist programs,
as well as taking of sensitive sites to steal information and have the
ability to spread viruses, and this is due to the growing number of
powerful and easy use computer programs that can be downloaded for free.
It also helps in spreading of misconceptions among young people such as
terrorism, addiction and sexual offenses, such as penetrating one of
girls’ device or taking it with a set of images and the spread of photos
and videos indecent on Web sites, in the framework of intellectual
invasion programs for corrupting youth and weakens their faith.
So
this important conference comes as cyber crimes constitute interest
among security and intelligence services of the African countries,
with the aim of joint coordination to raise awareness of the dangers of
these crimes, and reduce their spread, besides enactment of deterrent
laws to perpetrators, as those offenses cannot be immune from
punishment, and that we should have bodies and mechanisms to combat such
as crimes and fight them without infringing on the freedom of people,
and they must be aware of everything that happens in the said field,
whether criminal crimes, or crimes affecting state security as general,
which affects the ideas among young people or spreading of
misconceptions or even shake the confidence between individual and his
government.
The
most important methods of prevention of piracy and cybercrime is to
take caution and not to believe everything of messages and to ensure of
its credibility, and avoid opening any unknown email messages, but
hasten to cancel, and developing of a password, in accordance to good
specifications, and to secure the personal information and the personal
computer and use protection programs.
We
cannot overlook the role of the Sudanese government through its
competent organs, notably the NISS and justice organs, in its adoption
of a number of draft resolutions adopted by the Conference of the States
Parties to combat corruption, including the African decision on the
strengthening of international cooperation and return of stolen funds to
their native countries, in order to strengthen financial and accounting
systems to reduce the gaps of abuses and corruption.
We
recall the decision of the International Financial Action Task Force,
during its meetings in Paris last week, on removing the name of Sudan
from the list of countries that have deficiencies in anti-money
laundering and terrorism financing system, as this decision came as a
result of great efforts made by the Central Bank of Sudan (CBOS) with
the support of the competent authorities, especially the NISS, and
judicial organs.
Sudan
has remained committed to the harmonization of the national laws with
international conventions, despite the prejudice of the United States
and its allies to continue in the fight against Sudan and place it in
the lists of terrorism and economic sanctions, where Sudan renewed its
rejection of the justifications invoked by the United States to renew
the unilateral sanctions on Sudan.
Sudan
also rejects the continued imposition of harsh financial sanctions on
European banks under the pretext of violation of US sanctions laws
imposed on several countries, including Sudan, but no doubt that such
sanctions will have direct repercussions and impacts on the banking
system of Sudan, while Sudan has continued its constructive efforts to
achieve stability and establish security in the region and regional
surroundings, through its role in the fight against organized crime,
including cyber crime, cross-border crimes, phenomenon of human
trafficking and cooperation in the fight against terrorism, as well as
harboring large numbers of refugees from neighboring countries.
By Lieutenant General Hanafi Abdullah, 13 hours 23 minutes ago
Khartoum
is witnessing, these days, an important conference to discuss the issue
of Cyber Crime, as part of the active efforts of the National
Intelligence and Security Service (NISS) to organize the programs of the
Committee of Intelligence and Security Services of Africa (CISSA).
is witnessing, these days, an important conference to discuss the issue
of Cyber Crime, as part of the active efforts of the National
Intelligence and Security Service (NISS) to organize the programs of the
Committee of Intelligence and Security Services of Africa (CISSA).
It is known that the Cyber Crime is carried out by using a computer or
mobile phone through connecting to the Internet, and its goal is to
penetrate networks or sabotage or misrepresentation or fraud, theft,
embezzlement or piracy and theft of intellectual property rights in the
networks, and deviant behavior form a perfect crime.
Types of cyber crime:
There
are several types of cyber crimes, including physical one, which causes
financial damage to victim or target of the monument process and take
one of three forms: electronic theft such as taking over the ATM and
bank machines, and this spread prominently in many African countries,
especially southern and western Africa, and through it electronic data
of the ATM card is copied and then used to take funds from the victim's
account, or through establishment of Internet page similar to the site
of a major bank or large financial institutions to requests from client
to enter his (her) data or update his information in order to obtain his
bank’s data and then steal him.
There
are mail messages received by the mobile phone from unknown sources
regarding request of contributing laundering of funds from abroad with
promise of a percentage of the amount, or that telling owner of the
e-mail of his winning of one of the prizes or lottery and asking him to
submit his bank account number to the said body.
Cultural
Crime, where offender seizes on intellectual property rights without
the consent of the victim, it is possible to be through software piracy:
It is the process of copying or imitation of the programs of an
international company on CDs and sell them to people at a lower price,
or infringement on encoded satellite channels and make them available
via the Internet using technology of (soft copy), besides crime of
copying the scientific novels through electronic means.
There
is also the political and economic crime, a serious crime by using
information technology by terrorist groups to facilitate the typical
forms of criminal acts. They do not hesitate to use the advanced means
such as: communication and coordination, broadcast of false news, employ
of some young people, and transfer of some money in order to achieve
their goals.
In
some countries, terrorists are using the Internet to exploit supporters
of their ideas and collect money to finance their terrorist programs,
as well as taking of sensitive sites to steal information and have the
ability to spread viruses, and this is due to the growing number of
powerful and easy use computer programs that can be downloaded for free.
It also helps in spreading of misconceptions among young people such as
terrorism, addiction and sexual offenses, such as penetrating one of
girls’ device or taking it with a set of images and the spread of photos
and videos indecent on Web sites, in the framework of intellectual
invasion programs for corrupting youth and weakens their faith.
So
this important conference comes as cyber crimes constitute interest
among security and intelligence services of the African countries,
with the aim of joint coordination to raise awareness of the dangers of
these crimes, and reduce their spread, besides enactment of deterrent
laws to perpetrators, as those offenses cannot be immune from
punishment, and that we should have bodies and mechanisms to combat such
as crimes and fight them without infringing on the freedom of people,
and they must be aware of everything that happens in the said field,
whether criminal crimes, or crimes affecting state security as general,
which affects the ideas among young people or spreading of
misconceptions or even shake the confidence between individual and his
government.
The
most important methods of prevention of piracy and cybercrime is to
take caution and not to believe everything of messages and to ensure of
its credibility, and avoid opening any unknown email messages, but
hasten to cancel, and developing of a password, in accordance to good
specifications, and to secure the personal information and the personal
computer and use protection programs.
We
cannot overlook the role of the Sudanese government through its
competent organs, notably the NISS and justice organs, in its adoption
of a number of draft resolutions adopted by the Conference of the States
Parties to combat corruption, including the African decision on the
strengthening of international cooperation and return of stolen funds to
their native countries, in order to strengthen financial and accounting
systems to reduce the gaps of abuses and corruption.
We
recall the decision of the International Financial Action Task Force,
during its meetings in Paris last week, on removing the name of Sudan
from the list of countries that have deficiencies in anti-money
laundering and terrorism financing system, as this decision came as a
result of great efforts made by the Central Bank of Sudan (CBOS) with
the support of the competent authorities, especially the NISS, and
judicial organs.
Sudan
has remained committed to the harmonization of the national laws with
international conventions, despite the prejudice of the United States
and its allies to continue in the fight against Sudan and place it in
the lists of terrorism and economic sanctions, where Sudan renewed its
rejection of the justifications invoked by the United States to renew
the unilateral sanctions on Sudan.
Sudan
also rejects the continued imposition of harsh financial sanctions on
European banks under the pretext of violation of US sanctions laws
imposed on several countries, including Sudan, but no doubt that such
sanctions will have direct repercussions and impacts on the banking
system of Sudan, while Sudan has continued its constructive efforts to
achieve stability and establish security in the region and regional
surroundings, through its role in the fight against organized crime,
including cyber crime, cross-border crimes, phenomenon of human
trafficking and cooperation in the fight against terrorism, as well as
harboring large numbers of refugees from neighboring countries.
By Lieutenant General Hanafi Abdullah, 13 hours 23 minutes ago
ليست هناك تعليقات:
إرسال تعليق