Extradition to the United States for violations in the field of information technology

20.04.18 в 11:48 Interesting 10917

Thousands of cybercrimes are committed daily in the world, large amounts of money are being stolen from electronic bank accounts, secret data, some of which are then publicly published. Every year the damage from such violations becomes more serious. According to analysts' forecasts, by 2019 in the world economy the damage from cybercrime can reach 2 trillion dollars.

At the forum of insurance technologies InnoIns-2018 (source: http://www.banki.ru/news/lenta/?id=10404738) Vladimir Novikov, Deputy Director General of Insurance Company Sberbank Insurance, said that 16 enterprises are subjected to cyber attacks each day . To protect information systems, business spends about 122.5 billion dollars a year. However, according to the expert, neither law enforcement agencies nor the legislation is yet able to get ahead of cyber-fraudsters developing all new criminal schemes.

One of the first to discuss bills aimed at protecting against cybercrime, the United States. The first bill, providing for criminal liability for crimes committed using computer technology, was developed back in 1977. In 1984, it was based on the adoption of the Computer Fraud and Abuse Act (source: https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act), which shared several types of cybercrime, which will be followed by criminal punishment. Among them:

  • espionage;
  • fraud;
  • unauthorized access to personal data;
  • damage to protected computers (deliberate and by negligence);
  • threats, extortion.

In addition to the prison term, punishment for cybercrime can be a monetary fine. The choice of a preventive measure will depend on the extent of the damage done, as well as the criminal past of the offender.

For example, there are several known cases that illustrate the scale of damage from cybercrime (source: http://wiki.ru/sites/informatsionnye_tekhnologii/id-news-18926.html). So, in 2002, the source code of the innovative computer program OS / COMET was openly available on the Internet, it was created for NAVSTAR GPS. This system was used by the US Air Force Space Division to determine the coordinates of satellites, spacecraft and rockets. The attacker under the nickname Leaf published this data on the free mail server Freebox.com. Fortunately, nothing terrible happened, but if terrorists with the appropriate equipment used secret data, they could take control of the airspace over America. Cybercriminals have not yet been found.

Earlier, in 1989, no less than a loud cyber crime was committed by other intruders, still not found. They were able to "launch" the WANK worm into NASA's computer network, which caused a serious malfunction in its operation and, as a result, the transfer of the launch of several satellites.

A less harmless, but no less daring, cyber crime was committed by Matthew Weigman. Even at the age of 14, a blind man from birth knew that he could use his unique ears for blackmail. He learned to invade the telephone network of girls who rejected his proposals, and imitated their voices to call the FBI or police. For about 5 years, he managed to deceive employees of various services, but at the age of 19, Matthew Weigman was still in jail, he confessed to crimes and expressed regret about what he had done.

The lion's share of such crimes is committed precisely against American companies, since they have significant amounts of financial resources. Cyber attacks also go to various US stock markets and exchanges, most of which are located in the United States. All such atrocities do not remain unanswered by law enforcement agencies of this state. In the US, there is the largest and most powerful organization to combat cybercrime, which is in contact with many special services of other countries.

Even more complicating the life of intruders is the fact that America has an agreement on the extradition of criminals with 111 countries of the world (source: https://www.1vpns.com/articles/view/id/4). Among them, all the countries of the European Union, Hong Kong, China, Australia, Haiti, Egypt, Zimbabwe, Canada, Israel, Thailand, Japan, etc.

This means that if the hacker is in one of them, the local authorities will send him, according to the contract, to the United States, where he will respond with all the rigor of US law. And since real prison terms here can be calculated not just by tens, but also by hundreds of years (in fact this is life imprisonment), then few would like to be in the place of those "lucky ones" who are extradited to this country.

An example would be the extradition of the Russian hacker Vladimir Zhelezenin, who was hiding in Switzerland (source: https://www.gazeta.ru/business/2012/01/18/3966797.shtml?updated). The FBI conducted an investigation and found out that he was in cahoots with his son Kirill to establish control over brokerage accounts of US citizens and to steal from their bank accounts. Charges of 9 counts were filed against criminals in 2007, the US Attorney for the Southern District of New York, Prith Bharara, said. If charges of fraud are proven, Russian hackers face 142 years in prison.

Another hacker - Peter Levashov - is under arrest in Spain, he is also accused of committing a number of cybercrimes and the US is seeking his extradition for conviction and punishment (source: http://news24today.info/time-lideru-rossiyskoy-kiberprestupnosti-grozit- ekstraditsiya-V-ssha.html). Journalists Time Rafael Sutter and Howard Amos claim that Peter Levashov has become a pioneer in the field of cyber crime. He developed a fraudulent scheme even when users and experts did not know in principle about this kind of theft. In 2002, he created a website through which spam was spread. He actively cooperated with Alan Ralsky, who recognized "the king of spam" and is already serving his sentence for cybercrimes. Levashov was able to avoid arrest, since he agreed to cooperate with the government and help in the crackdown of anti-Jewish sites.

Thai authorities also decided to extradite, at the request of the FBI, cybercriminals, Sergei Medvedev (source: https://www.infox.ru/news/251/world/incidents/1941... ). He charges in the creation of fraudulent schemes, hacker attacks and the sale of banned goods via the Internet.

Of course, there are places in the world where American law enforcement agencies can not run their long arms. These are such states as Iran, North Korea, Cuba. It is unlikely that those who are really concerned about their personal safety will want to be here for a long time from justice.

Our service does not recommend violating the law in the field of information technology. Every year they only develop and methods of computing cybercriminals are becoming more and more perfect. Real criminals are threatened with extradition to the country that represents the injured party (the USA has more from all countries of the world than other similar agreements with other states).


Sign in to comment

Together with wide opportunities the Internet carries a number of dangers. First of all, when it comes to anonymity and security.

Initially, the World Wide Web was conceived as a space without borders, where you can get absolutely any information on an anonymous basis.

In today's world, it becomes more difficult to keep personal and corporate data in secret, so the issue of information security is becoming more acute every day.

In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).

Good afternoon! Now we are talking about such an important topic in our time, as an opportunity to bypass the blocking of sites. The problem is very relevant in our country


Proxy traffic can also be encrypted, just like a VPN. The TLS over Proxy technology is used for this purpose! You can read about how this works and why such proxies can be more convenient and efficient than VPN services in this article

Mobile proxy is a software and hardware complex that acts as an intermediary between the user and the Internet. The proxy function is to receive a signal from the device, assign a new IP address, and transmit it to the global network. As a result, the user uses one IP, and the Internet connection comes from a completely different one

In this article we'll talk about TOR and its place in ensuring anonymity on the Internet, and how to use Tor Browsers on Windows 10 and Android.

Not every place on the Internet is easily accessible nowadays. Many websites get blocked or they set restrictions on their visitors themselves. So how to retain access to the content you need? We'll explain it in this article.

This article explains why some American websites are unavailable to foreign users and how to circumvent these restrictions using American proxy servers.

Contact Us
Have you got any question?

Click here and we’ll answer