|
Cybercrime
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Connexions LibraryDid the US Accidentally Give the World's Most Powerful Cyberweapon to Terrorists?: Sony Hack: Made in America? Lee, Peter Article 2015 Documents Reveal Canada's Secret Hacking Tactics Gallagher, Ryan Article 2015 Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified do... Netizen Report: Why Did YouTube Censor Your Videos? You May Never Know.: Global Voices Advocacy's Netizen Report offers an international snapshot of challenges, victories, and emerging trends in Internet rights ar Netizen Report Team Article 2017 Amid an apparent shift in YouTube’s approach to monitoring for rules violations and staying in the good graces of advertisers, a wave of YouTube users have found their work either blocked or relegated... Preparing for a Digital 9/11 Greenberg, Karen Article 2012 In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First... Researchers Find 'Astonishing' Malware Linked to NSA Spying Gallagher, Peter Article 2015 Security researchers have uncovered highly sophisticated malware that is linked to a secret National Security Agency hacking operation. Stuxnet on the Loose: Security for the One Percent Blunden, Bill Article 2012 Suspicions that the Stuxnet computer worm was indeed developed by the United States and Israel has once again exposed American exceptionalism. Espionage and sabotage are presented as intolerable crimi... Stuxnet-Like Digital Attack on Iran Nuclear Talks May Have Come from Israel, Security Researchers Say Alimardani, Mahsa Article 2015 Moscow-based technical security company Kaspersky Lab last week revealed evidence of a new cyber attack on both its own network and those of several European hotels that hosted nuclear negotiations be... US: Offensive Cyber-Warfare is Illegal... Unless We Do It Glaser, John Unclassified 2013 The US government declares that cyberwarfare directed against the US would be an act of war -- and, oh, by the way, that it is agressively engaged in cyberwarfare against foreign countries. Where the Anti-Russian Moral Panic is Leading Us Raimondo, Justin Article 2017 This is how the smear campaign scores points: you don't have to be on the Russian payroll -- you can be a "useful idiot" just because of your political views, which condemn you as an "unwitting" agent... Sources Experts & SpokespersonsSources LibraryCompanies that cooperate with dictatorships must be sanctioned Sources News Release 2011 Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes. Dark Market Cybethieves, Cybercops and You Glenny, Misha 2011 Investigative research into a hackers' cybermarket where cyberthieves exchange tricks and tips. The author finds the individuals who founded the site and also tackles the problem of policing these cri... Polishing Putin: hacked emails suggest dirty tricks by Russian youth group Elder, Miriam 2012 Nashi runs web of online trolls and bloggers paid to praise Vladimir Putin and denigrate enemies. Richard O'Dwyer: living with the threat of extradition Student who set up website posting links to TV and film content fears being used as a guinea pig by Hollywood giants Ball, James 2012 Richard O'Dwyer's web-linking site would place him at the heart of the titanic running battle between the Hollywood giants – struggling to keep their beleaguered business model intact in the online er... Stuxnet and the Bomb Benedict, Kennette 2012 Over the past decade, US experts have strenuously warned about the ominous possibility of other nations, rogue states, or even terrorist groups attacking US infrastructure through the Internet. As it ... The 10 Tools of Online Oppressors O'Brien, Danny 2011 The world’s worst online oppressors are using an array of tactics, some reflecting astonishing levels of sophistication, others reminiscent of old-school techniques. From China’s high-level malware at... US was 'key player in cyber-attacks on Iran's nuclear programme' Obama reported to have approved bid to target Tehran's nuclear efforts Beaumont, Peter; Hopkins, Peter 2012 Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies. Windows and online banking - Just say no 2009 There has been a rash of online heists that have stolen millions of dollars from businesses and non-profit organizations. While circumstances are different in each case, they all point to a single poi... |