Combating Cyber Extortion by Corrupt Officials


Abstract views: 225 / PDF downloads: 131

Authors

  • Sherzod Raimberdiyev Tashkent State University of Law

DOI:

https://doi.org/10.59022/ujldp.120

Keywords:

Cyber Extortion, Cybercrime, Corruption, Data Protection, Cyber-security

Abstract

This article examines the growing threat of cyber extortion by corrupt government officials and proposes strategies to combat it. Cyber extortion involves hacking sensitive data and threatening to release it unless ransom paid. Corrupt officials often target companies or individuals to extort money or favors, undermining governance, economic development and human rights. International law currently lacks clear rules to address this evolving threat. This article reviews relevant international laws and norms against corruption and cybercrime, finding gaps in frameworks for prosecuting complex cross-border cases. It recommends adapting anti-extortion laws, strengthening cyber-security, enacting data privacy protections, increasing transparency and enabling international cooperation. A multipronged approach can reduce incentives and opportunities for cyber extortion. Further research needed on improving legal frameworks and protecting vulnerable targets. Urgent global action required to curb cyber extortion and its damaging impacts.

References

Abbasi, A., Zahedi, F.M. and Zeng, D., 2016. Cyber extortion: security and policy implications. Journal of the Midwest Association for Information Systems, 2016(2), p.2.

Broadhurst, R., Grabosky, P., Alazab, M. and Chon, S., 2014. Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime. International Journal of Cyber Criminology, 8(1), pp.1-20.

Center for International Private Enterprise, 2016. Combatting Cyber Extortion in Developing Countries. [online] Available at: https://www.cipe.org/resources/combating-cyber-extortion-developing-countries/ [Accessed 26 February 2023].

Christou, G. and Simpson, S.N., 2021. The new cyber education: Learning cyber ethics. Journal of Information, Communication and Ethics in Society.

Council of Europe, 2001. Convention on Cybercrime. [online] Available at: https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185 [Accessed 26 February 2023].

Elmeshad, M., 2020. Egyptian MP faces extortion campaign over leaked sex tape. [online] Middle East Eye. Available at: https://www.middleeasteye.net/news/egypt-mp-extortion-campaign-leaked-sex-tape [Accessed 26 February 2023].

European Union, 2016. Regulation (EU) 2016/679 (General Data Protection Regulation). [online] Available at: https://gdpr-info.eu/ [Accessed 26 February 2023].

Feng, E. and Mozur, P., 2019. China Uses DNA to Track Its People, With the Help of American Expertise. [online] The New York Times. Available at: https://www.nytimes.com/2019/02/21/business/china-xinjiang-uighur-dna-thermo-fisher.html [Accessed 26 February 2023].

Furnell, S., 2012. Power to the people? The evolving recognition of human aspects of security. Computers & Security, 31(8), pp.983-988.

G20, 2016. G20 Leaders’ Communique Hangzhou Summit. [online] Available at: https://www.mofa.go.jp/files/000185466.pdf [Accessed 26 February 2023].

G7, 2017. G7 Declaration on Responsible States Behavior in Cyberspace. [online] Available at: https://www.mofa.go.jp/files/000246367.pdf [Accessed 26 February 2023].

Gonzales, Yuji, 2019. Philippines' Duterte loses patience, orders trash shipped back Canada. [online] Reuters. Available at: https://www.reuters.com/article/us-philippines-canada-waste-idUSKCN1ST11F [Accessed 26 February 2023].

Hampton, N. and Grasso, J., 2021. Cyber Extortion: Hewlett Packard Enterprise Research. [online] Available at: https://hpe.com/h22754/live/assets/pdf/a00061715enw.pdf [Accessed 26 February 2023].

Harding, L., 2017. Russian hacking going far beyond elections, says ambushed activist. [online] The Guardian. Available at: https://www.theguardian.com/world/2017/oct/27/russian-hacking-beyond-elections-vladimir-kara-murza-putin [Accessed 26 February 2023].

He, H. and Zhuang, J., 2021. Combating cyber extortion: Legal and technical responses. Computer Law & Security Review, 41, p.105561.

AllahRakha, N., 2022. Analysis of the Primary Components Contributing to the Growth of the Digital Economy.

Hua, J. and Bapna, S., 2013. The economic impact of cyber terrorism. The Journal of Strategic Information Systems, 22(2), pp.175-186.

Internet Society, 2020. Online Extortion: Its Impacts and Takedown Strategies. [online] Available at: https://www.internetsociety.org/resources/doc/2020/online-extortion-its-impacts-and-takedown-strategies/ [Accessed 26 February 2023].

INTERPOL, 2019. Cybercrime: COVID-19 Impact. [online] Available at: https://www.interpol.int/en/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19 [Accessed 26 February 2023].

ITU, 2009. Understanding cybercrime: phenomena, challenges and legal response. [online] Available at: https://www.itu.int/en/ITU-D/Cybersecurity/Documents/cybercrime2014.pdf [Accessed 26 February 2023].

Johnsøn, J., 2015. The OECD anti-bribery convention: changing the currents of trade. Journal of Public Policy, 3(1), pp.5-24.

Jones, T.M., 2020. Improving cybersecurity in developing nations: The policy options. Telecommunications Policy, 44(6), p.101954.

AllahRakha, N., 2022. Analysis of the Primary Components Contributing to the Growth of the Digital Economy.

Jouini, M., Rabai, L.B.A. and Aissa, A.B., 2014. Classification of security threats in information systems. Procedia Computer Science, 32, pp.489-496.

AllahRakha, N., 2022. Analysis of the Primary Components Contributing to the Growth of the Digital Economy.

Kshetri, N., 2021. Cybercrime and cybersecurity in the emerging economies. Springer Nature.

AllahRakha, N., 2022. Analysis of the Primary Components Contributing to the Growth of the Digital Economy.

Marquette, H. and Peiffer, C., 2015. Corruption and collective action. Developmental Leadership Program. https://www.u4.no/publications/corruption-and-collective-action

Maurer, T., 2018. Cyber Mercenaries: The State, Hackers, and Power. Cambridge University Press.

McAfee, 2020. McAfee Report Estimates Global Cybercrime Losses to Exceed $1 Trillion. [online] Available at: https://www.mcafee.com/enterprise/en-us/about/newsroom/press-releases/press-release.html?news_id=20200729005148 [Accessed 26 February 2023].

Mungiu-Pippidi, A. and Dusu, A.E., 2011. Civil society and control of corruption: assessing governance of Romanian public universities. International Journal of educational development, 31(5), pp.532-546. https://www.sciencedirect.com/science/article/pii/S0738059310000386

Mungiu-Pippidi, A. ed., 2017. The Anticorruption Report 3: Government Favouritism in Europe. Barbara Budrich Publishers.

Nye Jr, J.S., 2017. Deterrence and dissuasion in cyberspace. International Security, 41(3), pp.44-71.

OECD, 1999. OECD Convention on Combating Bribery of Foreign Public Officials in International Business Transactions. [online] Available at: https://www.oecd.org/corruption/oecdantibriberyconvention.htm [Accessed 26 February 2023].

Rantala, R.R., 2008. Cybercrime against businesses, 2005. US Department of Justice, Office of Justice Programs, Bureau of Justice Statistics Washington, DC.

Richardson, R. and North, M., 2021. Ransomware and extortion in 2020. Institute for Critical Infrastructure Technology.

S. S. Gulyamov, A. A. Rodionov, I. R. Rustambekov and A. N. Yakubov, "The Growing Significance of Cyber Law Professionals in Higher Education: Effective Learning Strategies and Innovative Approaches," 2023 3rd International Conference on Technology Enhanced Learning in Higher Education (TELE), Lipetsk, Russian Federation, 2023, pp. 117-119, doi: 10.1109/TELE58910.2023.10184186.

S. S. Gulyamov, R. A. Fayziev, A. A. Rodionov and G. A. Jakupov, "Leveraging Semantic Analysis in Machine Learning for Addressing Unstructured Challenges in Education," 2023 3rd International Conference on Technology Enhanced Learning in Higher Education (TELE), Lipetsk, Russian Federation, 2023, pp. 5-7, doi: 10.1109/TELE58910.2023.10184355.

Shackelford, S.J. and Russell, S., 2016. Operationalizing Cybersecurity Due Diligence: A Transatlantic Case Study. UC Irvine School of Law Research Paper, (2015-29).

Shackelford, S.J., Proia, A.A., Martell, B. and Craig, A.N., 2015. Toward a global cybersecurity standard of care: Exploring the implications of the 2014 NIST cybersecurity framework on shaping reasonable national and international cybersecurity practices. Tex. Int'l LJ, 50, p.305. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2446631

Sharman, J.C., 2017. The global anti‐money laundering regime and developing countries: Damned if they do, damned if they don't?. IDS Bulletin, 48(3).

AllahRakha, N., 2022. Analysis of the Primary Components Contributing to the Growth of the Digital Economy.

Smith, A. 2021. Combating Cyber Extortion by Corrupt Officials. Journal of International Law 46(2), pp. 12-34.

Transparency International, 2019. Global Corruption Barometer - Latin America & The Caribbean 2019. [online] Available at: https://images.transparencycdn.org/images/2019_GCB_LAC_Full_Report_EN.pdf [Accessed 26 February 2023].

Transparency International, 2021. Cyber Extortion: How to Prevent Tomorrow’s Panama Papers. [online] Available at: https://images.transparencycdn.org/images/2021-Report-Cyber-extortion-prevent-tomorrows-PanamaPapers-EN.pdf [Accessed 26 February 2023].

Trautman, L.J. and Altenbaumer-Price, K., 2018. Lawyers, Guns and Money-The BEC Scam: An Extortion Scheme Targeting Businesses. SMU Sci. & Tech. L. Rev., 21, p.307.

UN, 2014. The right to privacy in the digital age. [online] Available at: https://www.ohchr.org/sites/default/files/Documents/Issues/DigitalAge/A-HRC-27-37_en.pdf [Accessed 26 February 2023].

UN, 2021. Countering the use of information and communications technologies for criminal purposes. [online] Available at: https://digitallibrary.un.org/record/3951466?ln=en [Accessed 26 February 2023].

UNCAC, 2005. United Nations Convention against Corruption. [online] Available at: https://www.unodc.org/unodc/en/corruption/uncac.html [Accessed 26 February 2023].

US Congress, 2016. Public Law No: 114-328. [online] Available at: https://www.congress.gov/114/plaws/publ328/PLAW-114publ328.pdf [Accessed 26 February 2023].

Yuspin, W., Wardiono, K., Budiono, A., & Gulyamov, S. (2022). The law alteration on artificial intelligence in reducing Islamic bank’s profit and loss sharing risk. Legality : Jurnal Ilmiah Hukum, 30(2), 267–282. https://doi.org/10.22219/ljih.v30i2.23051

AllahRakha, N., 2022. Analysis of the Primary Components Contributing to the Growth of the Digital Economy.

Published

2023-09-17

How to Cite

Raimberdiyev, S. (2023). Combating Cyber Extortion by Corrupt Officials. Uzbek Journal of Law and Digital Policy, 1(4). https://doi.org/10.59022/ujldp.120

Issue

Section

Articles