Electronic extortion crimes One of the pictures Exploitation of technologies Technology and the information network
10/08/2024
Security Media – Private
We shed light in the fold of these lines on the crime of electronic extortion and its dimensions, methods and means of protection and prevention from falling prey and easy victim to the extortion network and its sisters from cross-border crimes and its criminal elements. Hosting the security expert Colonel Najib Al-Salhi to inform us, reveal to us a lot of ambiguity and question marks, and put points on the letters by virtue of his experience, specialization and professional field in this context.
Q/ What are the basic features of cybercrime in general and the crime of extortion in particular.
The cases of electronic extortion and cybercrime are today on their way to the circle of seriousness within the framework of the criminal phenomenon significantly, what has been revealed confirms this and what is hidden is greater. According to investigations into a number of crimes of this type, the nature of the multilateral crime, the vast geographical area of the crime scene, its transgression of the national scope, the duplication of criminal acts, the network of perpetrators, the multiplicity of victims and the damage resulting from it. As well as the difficulty of evidence procedures, the collection of evidence, the proof of guilt with evidence, and the tracking of the leads of the crime , which requires a lot of efforts to collect evidence and seizure procedures. This will only come in coordination and cooperation between the security services within the scope of the presence of parties and elements of the crime spatially.
The journey of exploring the depths of detecting the crimes of electronic extortion is highly sensitive, highly complex, surrounded by a lot of ambiguity, question marks, elements of confusion, confusion, and caveats, and privacy is wrapped in the folds of its vestibules.
It is very difficult to trace its threads and reveal its dimensions and elements in its dark maze, and the most difficult thing is to decipher it and translate its multiple and sophisticated codes.
Q/How you have handled many cases of transnational organized criminal nature?
There are many crimes of a transnational organized nature that have been dealt with and addressed. Sometimes the threads of interdependence continue and sometimes they are unclear and linked. The threads are interrupted in tracking the network and its elements beyond the borders due to obstacles, challenges and difficulties, and caveats related to privacy and the caveats of violating rights and freedoms. The nature of security, intelligence and diplomatic cooperation and coordination has a role in achieving goals and detecting and seizing these crimes and their elements.
There are many crimes of a transnational organized nature that have been dealt with and addressed. Sometimes the threads of interdependence continue and sometimes they are unclear and linked. The threads are interrupted in tracking the network and its elements beyond the borders due to obstacles, challenges and difficulties , and caveats related to privacy and the caveats of violating rights and freedoms. The nature of security, intelligence and diplomatic cooperation and coordination has a role in achieving goals and detecting and seizing these crimes and their elements.
Q/What types and types of cases of a criminal nature organized across borders have you dealt with?
- The most prominent operations of a criminal, organizational or organized nature across borders are cases of extortion, fraud, human trafficking, breach of trust , hacking, piracy, destruction of databases and information, penetrations of phones and computers , smuggling of goods, weapons, drugs and other contraband, attracting and spreading extremist ideas and acts of sabotage, smuggling, trafficking in human beings and sex, through the use of links of temptations, offers of financial and moral grants, therapeutic trips, sorcery, electronic commerce and highly profitable marketing. In addition to competition programs, therapeutic assistance, grants and job opportunities by companies, fake and counterfeit platforms in investments, real estate and other projects, exploitation of the national and regional situation, means of disappearance and the size of networks, in addition to the crimes of social media platforms, the formation of immoral communication relations, the exchange of images and blackmailing victims with them, requesting sums of money and threatening to publish in the event of non-payment, the use of financial systems, accounts and deposits with the use of deposit bonds in withdrawals from other places. Many cases of extortion, fraud, money laundering, electronic commerce, and other extraneous and transnational crimes are generated here.
Q/What are the most frequent cases monitored in the section of transnational organized crime?
-Electronic extortion, fraud , breach of trust , counterfeiting, forgery, money laundering cases and related crimes of drugs, smuggling, arms trafficking, toxins and fertilizers, human trafficking, terrorism and sabotage crimes, ethical issues, in addition to smuggling of antiquities, medicines and oil derivatives, piracy.
Q/What are the most prominent characteristics and recipes of those issues?
- Cases and transnational organized crimes are characterized by their use of means and means of communication networks and social media platforms and are related to unethical issues that involve extortion, and dealing with systems of supply, financing and camouflage of multilateral network deposit systems. These issues are very complex to use unethical means to ensure the expansion of the network of its elements and victims and hide behind them because of the difficulty and impossibility of reporting by victims, with the accuracy of using victim selection lists through the personal information of victims through their pages, and the use of means of intimidation and trolling with links and temptations that correspond to the tendencies of victims to drop them in their nets. Not to mention the concealment and hiding behind the principles of protecting privacy and the pretexts of protecting rights, freedoms and privacy from violation in the case of investigation and collecting evidence, as well as taking advantage of the differences and conflicts in the region and hiding behind the nature of relations between countries , with the confrontation between criminal groups in organized crimes, terrorist and subversive organizations and groups and encouraging countries, and the use of commercial and marketing cover and formulas. They resort to countries and states that support the spread of destruction and the disruption of Arab systems, security and stability, with the difficulty of detecting these crimes and collecting evidence in light of the spread of crime elements and parties in more than one place beyond borders. Finally, these organizations exploit the legal disparity and mechanisms of dealing with various These crimes, especially cybercrimes, and the legislative system in this context.
It is not hidden to everyone the comprehensiveness and diversity of the effects and harms of these crimes and the rise and multiplicity of their victims with the similarity and different characteristics and characteristics from one crime to another, and the use of artificial intelligence in deep falsification and addressing many means of extortion and dropping victims in its solution.
Q/What, are the procedures followed in dealing with these cases?
- The procedures followed in dealing with this type of crime, most of which are recent, are the procedures followed with other crimes. In addition to the procedures for dealing with each crime of coordination and cooperation with a number of public and private national bodies and agencies, not to mention the importance and necessity of the level of coordination, security and intelligence cooperation and exchange of information at the regional and international levels at the macro and bilateral levels between countries, all in order to track leads, collect evidence, investigate, prove and attribute the crime to the perpetrators and seize them.
Q/⇥What is distinctive about the procedures and dealing with such cases?
- As we said earlier, procedures in dealing with this type of crime are characterized by the fact that they require the use of information technologies and technologies, in addition to accuracy and caution in dealing with the sensitivity of conflict, exposure and prejudice in the procedures for dealing with these crimes to rights, freedoms and privacy, as well as the requirement of speed, confidentiality and accuracy to protect evidence from damage and erasure, protect victims from perpetrators, and protect their reputation and rights.
Q/What were the difficulties that faced your work in this field and those issues?
- The complexity and ambiguity of the circumstances of these crimes , the level of cooperation and disclosure by many victims of these crimes because they are highly socially sensitive and private, so many prefer to bear the burdens and pressures and pay reluctantly on the one hand, and ignorance of ways to get out of the middle of the solution of electronic blackmail, and on the other hand ignorance in dealing with social media and platforms,
data and information protection, privacy, and victims fall into the traps of those crimes. Fear of the consequences and staining of reputation has a role and the novelty of these crimes is yet , not to mention the possibilities of manipulation, hiding evidence and covering up behind many false acts.
Q/What advice do you give to the community in order to prevent and protect against such crimes?
- Dealing with the means and means of technology, information technologies, communication platforms, social networks and informatics with caution , protecting privacy and not downloading and circulating information and data of importance and sensitivity through the media ,using trusted others to protect the content of communication means when inexperienced , and dealing cautiously with links, especially those with exaggerated material temptations in terms of profitability, and programs of competitions, financial, therapeutic and study grants, and not dealing with strange and suspicious sites and links.
Cooperating with specialists in combating cybercrime and through networks, providing them with the necessary information, reporting those crimes to which they are directly exposed, and providing any information that protects society and facilitates the work of the security services in this section.
Last word.
The importance of the rational use of modern technologies, information technology, communication networks and artificial intelligence and their positive development in the service of society. They are a double-edged sword according to knowledge and ways of use. Harmonizing knowledge of these means, their risks, dangers and optimal use is positively beneficial to society at the same time. We protect society from their evils. Knowledge of the positive and negative field guides the use of the wall and systems of protection and control of children and those with weak levels of knowledge by these means, educating them, guiding them and guiding them towards means of protection, determining what is permissible and prohibited, and their participation in identifying appropriate content and addressing problems of information confidentiality and privacy protection, and ways of dealing with topics, strange and disturbing people and methods of their presence, and the importance of reporting without hesitation or fear to the family or the concerned authorities. Thus, we cut the way to the deviant and criminal exploitation of technology and artificial intelligence, especially cyber blackmail crimes, while granting everyone the right to use and benefit from the wide positive field in various areas of life, including the field of fighting crime in general and organized crime in particular
>