Skip to main content

Home/ ARIN6902 Internet Cultures and Governance/ Group items tagged crime

Rss Feed Group items tagged

Search and More

Network security( Penetration testing) : cyber-crime is costing the UK's small businesses - 0 views

  •  
    It's a well-known fact that small businesses are more susceptible to cyber-crime than many of their larger counterparts. A lack of funding and resources means that few small to medium-sized businesses can afford to pay for vulnerability assessments or penetration testing of their network security.
Stephen Murphy

Israeli security: passport cloners in uniform | Beyond The Beyond - 0 views

  •  
    Cybersecurity - just as soon as there is new technology to help prevent crime and terrorism that technology is then subverted and becomes a tools for the criminal.
yunju wang

Surfing the net with global cops | The Australian - 1 views

  • The convention, which provides a standard framework for investigating and prosecuting crimes such as fraud, hacking, child pornography and copyright infringement across national borders, has been adopted by more than 45 countries including the US, Canada and Japan.
  • new laws will be needed in relation to facilitating international co-operation
  •  
    Australian government is planning to accedeto the concil of Europe's Convention on Cybercrim, to further govern online content. several opinons appeared, one is saying that "age-appropriate" filtering is more effective than compelling ISPs to provide access to stored electronic communications for foreign law enforcement pruposes.
César Albarrán Torres

Red virtual, banco de datos para plagiarios | Ediciones Impresas Milenio - 0 views

  • Estas páginas no sólo están exhibiendo a una persona, sino que dan información de quién compone la familia, dónde y cómo vive y dónde estudia. Esto crea la posibilidad de un secuestro”, aseguró Eduardo Muriel, investigador privado con más de 40 años de experiencia en el negocio de la seguridad.
  • ¿Fotografías de viaje esquiando en Valle de Bravo, Tequesquitengo o de fiesta en París o Disneylandia?
  • En Venezuela, otro país que atraviesa una crisis de secuestros, la consultora Informática Forense admite que estas redes son un claro riesgo para sus usuarios.
  •  
    In Mexico and other Latin American countries there have been some questions raised on how kidnappers can get precise information of potential victims and their spending power: friends, lifestyle, travels. If social networks like Facebook are a potential tool for criminals, should they be regulated by the government? Is it the media or the government's fault if such a use is being made? I am looking for references in English regarding this problem. 
Gina Spithakis

A Key Weapon to Thwart Cybercrime - 0 views

  •  
    The FBI cracks down on online crime as part of Operation Cyber Sweep in 2003. Although some would argue, that protecting users in the first place would be far more useful
anonymous

Australia on internet watchlist with Iran, North Korea - 0 views

  • Paris-based media rights group Reporters Without Borders on Thursday put Australia and South Korea on its list of countries "under surveillance" in its "Internet Enemies"
  • Australia was listed for the government's plan to block access to websites featuring material such as rape, drug use, bestiality and child sex abuse.
  • "This regrettably puts Australia on notice that, despite the Rudd government’s best intentions, any mandatory filtering policy is likely to be perceived internationally in ways that will not benefit our reputation as a free and open society," he said.
  • ...1 more annotation...
  • He cited Australia's plans as an example, saying that there "the wide scope of content prohibited could include socially and politically controversial material".
  •  
    A media rights watchdog has listed Australia in a report on countries that pose a threat of internet censorship.
  • ...1 more comment...
  •  
    A top media rights watchdog has listed Australia along with Iran and North Korea in a report on countries that pose a threat of internet censorship.
  •  
    Why does everyone get so worked up with the word "censorship"? In some cases, like with child porn, if a medium is used to violate a human right or indeed foments a crime, then there should be some sort of control. Why look at it from a b&w perspective when there are so many grey areas?
  •  
    Is this really where Australia's future in censorships is heading?
Bec Crew

Court: Cyber Bullying Treats Are Not Protected Speech - 0 views

  •  
    A California appeals court allows students to be trialled for hate crimes for posting threatening comments on a fellow student's blog after it was ruled these comments were not protected free speech. Interesting development that narrowss the gap between traditonal schoolyard bullying and cyber bullying.
Gina Spithakis

Cyber crime made easy; A burgeoning service industry is springing up around the creatio... - 0 views

  •  
    With technology making it easier to for computer novices to steal user ids and data, now anyone can become a cybercriminal. This article showcases how easy it is to buy Zeus online, malware software which is used to steal information including online banking user ids and passwords and even security plans of US airports. Does accessibility turn you into a criminal? I still think if you're going to be a criminal you will find a way. Technology is certainly making it easier but you will only search for ways to hack into user info if you intend to steal in the first place.
Elizabeth Gan

Cyber bully whose victim suicided avoids jail - 0 views

  •  
    This article discusses the repercussions and impacts of threatening text messages that resulted in a teen suicide. Although the bully expressed remorse, the tragedy clearly marks how words are simply devastating, even if they seem trivial to others. Prosecution and Cyber bullying laws should examine the severity of the crime, and provide adequate justice.
Qi Li

K-Rudd's Website Targeted By Anti-Censorship Hackers Anonymous - 0 views

  •  
    This article is criticizing the attack lunched by Anonymous. It said, the any protest against the Mandatory ISP filtering plan is encouraged, however, the bring down government website is an illegal way to make political statement, and will render the protest null and avoid. Instead, even the anti-censorship community advocate legal way to protest the Mandatory censorship. In my opinion, this attack is interesting, although it is illegal, it doesn't cause big cost, just threw little troubles to government website, it can be considered as a prank, not a crime. Anyway, no one can be convicted, as it is an anonymous attack by hacker, lol.:)
Stephen Murphy

Cyber Espionage 2.0 - 0 views

  •  
    Highly detailed white paper on the underworld of cyber-espionage. Multinational corporation and state sponsored - all explore this backbone of the internet to get an advantage. Note: This gets quite technical at times. Very eye opening considering the recent events with the Australian/China cyber attacks on government and corporate targets.
César Albarrán Torres

EDITORIAL: TSA to download your iTunes? - Washington Times - 0 views

  • Federal security workers are now free to snoop through more than just your undergarments and luggage at the airport. Thanks to a recent series of federal court decisions, the digital belongings of international fliers are now open for inspection. This includes reading the saved e-mails on your laptop, scanning the address book on your iPhone or BlackBerry and closely scrutinizing your digital vacation snapshots.
  • In other words, simply because a U.S. citizen is returning from a foreign country by airplane, the government thinks it is a "routine" matter to download sensitive business documents, personal correspondence and any other information that might be saved on a laptop or cell phone, regardless of whether there is any reason to suspect the traveler of a crime.
  •  
    Creepy: airport checks might now include checking the files in your laptop. 
anonymous

China-Based Hackers may Have used Twitter, Google to Attack Dalai Lama - 0 views

  •  
    This article (posted yesterday) is about the announcement of a huge China-based cyber espionage which stole thousands of documents - including classified information, visa applications, and personal identities - from "politically sensitive targets" around the world using platforms such as Twitter, Google Groups, Blogspot, Baidu Blogs, blog.com and Yahoo Mail to maintain persistent control of infected computers. Among the targets: the offices of the Dalai Lama, the United Nations as well as Indian and Pakistani government officials. Also available in this article, a report document of 58 pages about "Investigating Cyber Espionnage" (scribd application)
Louise McClean

Four Corners: Chinese Whispers - 0 views

  •  
    An insightful episode- which speaks about the cyber-crime/espionage and privacy issues which have been linked back to China.
Elizabeth Gan

In precedent-setting case, aiding suicide charges laid in Brampton teen's death - 0 views

  •  
    It is the first time in North America that assisted suicide laws have been applied to the Internet. William Melchert-Dinkel has been charged with assisting in 2 suicides, where he posed under several aliases and made suggestions of suicides from medication to advice on how to tie nooses. Though the argument was that suicide is the behaviour done unto oneself, and suggestion is freedom of speech, this is no different than cyberbullies who also suggest the same thing, however this heinous individual offered information to those that were indanger of commiting suicide. Based on the wording in the state of Minnesota, assisted suicides do not require the actual physical presence of the person, hence the prosecution stands.
Stephen Murphy

TELECOMMUNICATIONS (INTERCEPTION AND ACCESS) ACT 1979 - 0 views

  •  
    One of the Acts under which the exact laws are outlined in regards to telecommunications providers and their responsibility towards the consumer and state. Dry and very 'Legal' but useful.
1 - 16 of 16
Showing 20 items per page