Dated 14/10/21
Today I would like to talk and write about how great Interpol is by giving you an informative and
enlightening process on how organise and structured they are plus there data base is when it
comes to fighting one of there main classification which is Cyber-crime and Cyber-threats on a
globe scale.
But, firstly let me give you a run down on Interpol itself.
Interpol was founded on 07/09/1923 by Johannes Schober just a few years after WW1 finished
to combat war crimes and war criminals.
Apart from those 2 mention above here are a few other mandates that it covers, crimes against humanity, child
pornography, drug trafficking and production, political corruption, and white-collar crimes, also sexual harassment
and assault, rape, extortion and bribery plus many, many more.
They use a system that has a Red Notice and a Yellow Notice.
Red Notices are issued for fugitives wanted either for prosecution or to serve a sentence, also
a Red Notice is a request to all law enforcement agencies worldwide to locate and provisionally
arrest a person pending extradition, surrender, or similar legal action.
A Yellow Notice is a global police alert for a missing person. It is published for victims of parental abductions,
criminal abductions (kidnappings) or unexplained disappearances.
The Yellow Notice can also be used to "help identify" "a person" who is unable to identify himself
or herself or someone that has false and fake IDs that where acquired from many other countries
apart from there own or it could even be there own country that has supply them with these IDs
for so, so many reasons.
RED NOTICE: VIEW And SEARCH All The MOST Wanted
Persons On The Globe By Clicking On The Link Below
And If You See Someone That You Suspect Call Interpol
https://bit.ly/3p1zERx
Yellow Notice: VIEW And Search All Public Missing
Persons On The Globe By Clicking On The Link Below
And If You See Someone Call Interpol ASAP Please
https://bit.ly/3BJ0eSH
Now that you have and get the gist of things and somewhat of a run down and understanding
about Interpol let's get to the great stuff being Cyber-crime and Cyber-threats on a globe scale.
Firstly what makes up Cyber-crime.
#1 Hacking websites, emails, spamming, making fake websites for the purpose of credit card
fraud or information on banking details and phishing just to name a few.
#2 Cyber-crimes use technology to hack use's personal computers, smartphone date, social
media personal details, national secrets, business secrets, people's identity and or adding
spy ware or malicious software to computer servers to gather protect and sensitive information.
#3 Cyber terrorism could also been known as information wars, it can be defined as an act of
Internet terrorism that includes deliberate and large-scale attacks and disruptions of computer networks or servers
by using computer viruses.
It could also be in a form of physical attacks using malware to attack governments, individuals
or big organizations. The main goals of Cyber terrorism is to create a feeling of terror in the
minds of the victims.
This is in part a elucidation on how it works and can cause many people minds to become
unstable or rickety, it then becomes much easier to mathematically use multiple cyber-attacks
for financial or altruistic gains with there main goals are to damage and or cause destruction
activities within there network or computer servers.
#4 Malicious Software are Internet-based programs or software that are used to disrupt
networks. These software programs are used to gain access to a system to steal sensitive information or data plus
to cause as much damage within the software hardware and or
also not beyond the computer operating systems or networks.
#5 If you must no, Malicious Software could be in many forms, e.g trojans, viruses, adware,
rootkits, software bugs and worms just to name a few, it is purely designed for one thing only
and, that is to destroy or damage as much as possible the computer system or it's network.
The Image below could represent so many things like, Cyber-crimes, Cyber terrorism and
computer hackers or a small piece of Interpol infrastructure or it could be believe it or not
myself the author of this article.
|

|
Now that you have an extremely good understanding about a few things let's get back to Interpol
and what type of systems they might be using to counter Cyber-crimes and Cyber terrorism.
To start of with remember what I wrote about at the begin how and when Interpol started and was
founded.
One must also think and take into consideration that Interpol has been around so, so many years before the Internet
even got started or was even form from a concept, roughly about 60 years
before hand.
So with that in mind just before I start writing about Interpol, keep this information very close to
your chest, if you are at the very begin of a new technology that has emerge don't you think that
they would have there fingers and feet everywhere on it if it helps them stop or counter Cyber-
crimes and Cyber terrorism on a globally scale.
With that said let's get into it.
I will be quite up front about this next quote, don't think for one moment no matter where on
the globe you might be, Interpol already knows what you are doing and what you are about to
do, furthermore it's armed and ready at a push of a button to collapse any computer system
or networks no matter how good they think there networks or frames of structure security is.
To start of with this is very simple computer language called HTLM and it is used to build almost
all websites, I myself call it code.
|

|
Then we have very advance computer language that is used to do many things? it is use by a
certain type of person or groups?
|

|
Then we have super advance computer language that has gateways and is use by what they
call artificial intelligence.
|

|
By the way if you must no there are so many more computer languages out there that are even
more advance than the one's above, in is saying that can you imagine what Interpol is using.
So why is it important to stay in contact and help Interpol with Cyber-crimes and Cyber terrorism,
firstly one must understand what it is like to have your emails or personal computer hack or your
CC misused by someone else other that you.
Now in saying that, just image having very sensitive information stolen by someone or a group
of people and them making out that they are you.
Don't you think that they should be jail for life.
Lastly one must also know that there are so, so many offences and breach's of many laws that
go along with Cyber-crimes and Cyber terrorism, it won't be just the couple I wrote about but,
everything else that is associated with it.
Written By G.S.G.
|