Page 89 - Cyber Defense eMagazine February 2024
P. 89
device is emitting its signal the trace will be uncovered easily and that bad actor will be located searching
hard for all such contacts within that network. Also, if some data search within the law enforcement is run
those who have paid to get into the Police database will just be uncovered and their whereabout will be
known to the authorities giving an option to start a case in order to prove and arrest those threats, so far,
leading the investigation to a quite effective and less cost-consuming direction.
The biometrics documents have been invoked a couple of decades ago, but their reliability is yet under
a question mark as there is chronically a big deal of the corruption within a system as those sitting in
decision-making spots cannot reject a bribe. There are, indeed, some techniques to combat corruption
within a community, but there are still heaps of challenges that should be overcome. The new time brings
some hope that once everyone gets a situational awareness about the possible risks some of those
threats could be mitigated leaving an opportunity for many to recognize and contribute in fighting bad
guys, so far. At a very beginning of the preparation and introducing the biometrics documents many have
believed that could be a silver bullet which can shoot all the ongoing problems as from this perspective,
it seems that some ideas from the past are yet good, but it is needed to make a plenty of adjustments for
the times that come in order to manage some tomorrow’s security challenges. In other words, it’s not
enough to develop some defense program which will support in fighting a current threat, it’s needed to
do a lot of patching and updating in order to keep a step with a tendency as those who have built this
world are the smart guys and they can resolve so many of that, but they cannot always accurately predict
what the future will bring. That’s something that will be left to science and mostly technology as those
two branches of the humankind activities must deal with a high accuracy offering something that will be
operable for real.
Apparently, in order to get an access to any critical infrastructure it is needed to leave some personal
information from some either true or fake ID as such a way of the identification is necessary to create
that sort of the user’s account, so far. Therefore, in a case of the banking system which also belongs to
the ICT facility it is possible to show either true or fake document in order to manage some finances. All
those banking accounts being open applying a counterfeited ID are the members of the dark finances
which should be imagined as a root of the iceberg going deeply below a surface of the frozen water. In
addition, it is not a wrong idea at all to attempt to confirm someone’s web accounts as those sorts of the
assets also cope with some information such as contact details like e-mail address or cell phone number,
so some kind of the trace could be found looking within that sort of the online systems, so far. In other
words, if anyone using a visible web has dealt with a protected e-mail address that high-tech item will be
created leaving a plenty of the information which could be correlated with someone’s mobile object
number and once the authorities get that identification code they will know how to confirm who is behind
such an analytical piece of the information as even being opened on the fake ID the whereabout of the
lawbreaker will be assessed and everything will be pushed through an identification procedure. Getting
anything via fake IDs is a fraud and that sort of the criminal justice offense is recognized by the Criminal
Code anywhere across the globe. Also, it’s truly feasible locating someone waiting for a login event as in
such a case, the Police can check out the entire surrounding of that threat scanning all activated devices
within such a place and if not being activated at that moment it is always possible searching a history of
those GPS coordinates, so far.
Cyber Defense eMagazine – February 2024 Edition 89
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.