Page 152 - Cyber Defense eMagazine December 2022 Edition
P. 152

can document in a mathematical fashion any event in a completely quantitative manner as they cope with
            the cold logics which can indeed; impact any case or the other actions in a truly rational way. Apparently,
            it’s great dealing with some descriptions, tables, equations and diagrams, but there must be a method to
            interpret those outcomes as the entire system could cope with those research findings in order to obtain
            a deep understanding of some policing tasks, so far.

            In addition, a similar approach could be applied in following certain events in the cyberspace where the
            users talk to each other or do some cyber activities such as e-payment, online banking, simple web
            search or social networking usages. In such a sense, it’s obvious many of them even in a legal business
            would keen to get familiar with the user habits, behavior and interests as once the marketplace tendencies
            are well-analyzed there can be run certain consumer’s campaigns which role is to improve those offerings
            and attract as many clients as it is possible in order to take a good portion of the marketplace, as well as
            count on a bigger profit.

            At the moment, the user behavior can be observed as a fully lawful concern, but as it is well-known some
            legal business consumers are everyone being capable to pay for some product or service and as a
            customer is always right no one will reject the money even coming from a criminal environment as in a
            business world it’s important to make an income, not take that care if the finances are made legally or
            illegally, so far. From such a point of view, it’s clear that something must be done in case of the money
            laundering through buying some goods, services, retails, estates and much more. At this stage, no lawful
            business will ask their customer about a background of such money and that’s how many will legalize
            their capital being earned through some crime.

            Therefore, the majority of the criminal organizations must pawn some areas over the world and they will
            deeply go into the legal system trying to in such a case literally pay for their legal status within some
            communities. Even the modern banking relies on the cyber technologies and any such transactions can
            be monitored and proved as there are some ways in the ongoing law enforcement to confirm someone’s
            identity just if that person is using some counterfeited details about a certain belonging. In other words,
            in order to create a bank account or subscribe to some communication plan there will be the entire
            application form which must be completed and some ID documents must be shown in order to get a
            permission to use the services of such critical infrastructures. The operator with some telecommunication
            provider or bank officer with some banking surroundings are supposed to enter data accurately into their
            online  system  simply  registering a  new user  to  get  subscribed  to  their  services which  means  some
            footage is left and only through a skillful analysis it’s feasible to check out such an account or in another
            way recommend to such critical assets to put a request on a pending status in order to give some time
            to the Police to confirm a possible security concern with such an application.

            It seems such an approach could serve as a good idea for some crime prevention program which should
            be well-studied, prepared and implemented among the communities. The counterfeited documents are
            not necessarily included into the Police register and they might be created with the forgery underworld
            as those clever offenders can produce something that the modern policing recognizes as a blank ID
            document.  The  entire  program  should  be  developed  very  carefully  as  there  can  always  be  some
            drawbacks with the system which can be overwhelmingly exploited.

            In order to avoid such a scenario the law enforcement agencies must assure a comprehensive risk
            management within a society as in the future those criminal schemes would be completely reduced or at




            Cyber Defense eMagazine – December 2022 Edition                                                                                                                                                                                                         152
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   147   148   149   150   151   152   153   154   155   156   157