The Dean of the College of Physical Education and Sports Sciences for Girls, University of Baghdad, Professor Dr. Fatima Abdel Maleh, hosted a delegation from the Intelligence Agency of the Ministry of Interior to hold a scientific symposium for undergraduate students entitled (Crimes of Electronic Extortion).

The axes of the symposium were delivered by Colonel Wissam Hussein, Major Eng. Saif Al-Din Abdel-Amir and Major Hani Abdullah, explaining the difference between the concepts of cybercrime and electronic extortion, as crimes are considered illegal work or activity that takes place through electronic networks by a group of people called ( Pirates) their crimes aim to steal data and information and spy on people or state institutions, and its elements are represented by the perpetrator, the criminal act and the victim, while extortion is a process of threatening and intimidating the victim by publishing pictures or film materials or leaking personal information related to the victim in exchange for paying sums of money or using them to carry out illegal acts for the benefit of the blackmailer, and among the pillars of his crime is the blackmailer, the means, the victim.

The lecturers also pointed to the characteristics of the crime of extortion, represented by the ease of falling into a trap, the damage caused by it that cannot be treated, due to leaving physical damage to the victim, the ease of concealing traces of the crime that indicate the perpetrator due to the distinction and encryption that occurs on the storage media.

They explained the most important motives of material, personal, entertainment, political and sexual.

The intelligence delegation noted the negative effects of extortion crimes, the most important of which is defamation, loss of money, family disintegration, betrayal and exploitation, psychological effects, the victim’s inability to seek help, spreading fear, chaos, anxiety and terror in society in general.

The symposium concluded with a set of recommendations, the most important of which is the use of strong and complex passwords, maintaining the confidentiality of your information, avoiding storing family photos on social networking sites, informing the security authorities immediately after exposure to such a crime, using safe software, not receiving and accepting links or strange files, Never leave the device open.

03/09/2023

a

Comments are disabled.