Page 174 - Cyber Defense eMagazine March 2024
P. 174

a military conflict takes lives of the millions of people, as well as damage health of many of so who have
            survived that biological strike. On the other hand, what is well-known within a modern world is anyone
            among defense and that is also a case with the criminal and terrorist organizations must deal with the
            identity and trust management systems as they are a way to assure an access to some environment,
            literally, to all of so who are in a register of that group that has some biometrics parameters, as well as
            the entire records for all such members, so far.

            It’s quite difficult getting trusted with any organization even being governed by any criminal or terror group
            as those units have their members internationally and usually transfer their messages over the globe,
            and it is pretty trickery to anyone either in legal or unlawful community to be familiar with any networking
            member in a transnational context. In other words, for such a reason many transnational organized crime
            and terrorist rings must rely on a fingerprint checking system which serves to confirm an identity, as well
            as manage trust to those trying to get provided an access to such an organization, so far. As it is well-
            known, many defense services with a capacity to combat organized crime and terrorism will monitor on
            the criminality group members mainly their couriers who would need to get confirmed once they come
            with the secret information. In order to make so they will be checked by online checking assets which
            could use a fingerprint reader to scan someone’s finger and do some recalling from that cloud application
            making a connecting with some server or datacenter which accommodates records of those persons.

            This is possible through the visible web infrastructure, but there could be some challenges if that querying
            would go via some decentralized communication system as in such a case, the entire records would be
            very hidden and a bit dangerous than those going through the surface internet. Apparently, there is a
            word  about  the  online  applications  which  could  be  available  via  some  Darknet  platform  and  if  the
            authorities catch such an information exchange, they could cope with some straggling attempting to take
            out data from such a dynamic server. Hence, in a sense of the Tor privacy browser, it’s clear those secret
            spots could belong so some onion domains and if an endpoint uses some reliable web link such as, say,
            a satellite network the track could be camouflaged as the deep web communication goes via relays and
            very sophisticated cryptosystems making it hard to trace such a data transfer, so far. Also, sometimes
            the Darknet communication might collapse, but that risk is equally frequent as losing connection with any
            visible web online grid as such an incident always can be predicted and, in that manner, no one will be
            distracted with so.


            The majority of criminality actors work for a profit and in a case of the terrorism, it’s necessary to assure
            some finances that some terror spreaders could spend on their training, staying, travelling and so on
            getting in mind by that some transnational organized crime groups could sponsor their activities at the
            global level trying to cause conflicts, unrest and troubles to communities they want to make to capitulate
            in front of their dominance assuring for themselves a pawn over some territory or region, so far. The point
            with so is the good guys can make some high-tech tracking giving them an opportunity to figure out when
            someone of the lawbreakers is uncovered, but it yet looks like that there are truly a plenty of the methods
            to avoid the rules and count on someone’s situational unawareness and sometimes a lack of the helpful
            skills in fighting against the crime. In total, some studies suggest that those being in a criminal business
            will not that easily give up from their illegal activities, but more likely try to trick the law proposing new
            criminal schemes which will deal with an awareness about what the investigations really look for and
            getting such a finding could be feasible if some of the officers or at most their commanders are corrupted
            and willing to sell some professional secrets for a couple of millions of dollars putting in such a sense,





            Cyber Defense eMagazine – March 2024 Edition                                                                                                                                                                                                          174
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   169   170   171   172   173   174   175   176   177   178   179