Use of digital resources to support criminal acts and/or terrorism
Cyber Crime (26)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 7 min
- Wall Street Journal
- 2019
Large firms in the United States are becoming far more resilient to cyber attacks, primarily through larger spending and higher prioritization of security. This is especially important as digital hacking escalates conflicts between global nations.
- Wall Street Journal
- 2019
-
- 7 min
- Wall Street Journal
- 2019
U.S. Companies Learn to Defend Themselves in Cyberspace
Large firms in the United States are becoming far more resilient to cyber attacks, primarily through larger spending and higher prioritization of security. This is especially important as digital hacking escalates conflicts between global nations.
How might small businesses fit into this picture? How could cyber security development be more oriented toward the public good? How can tech corporations help the government in a age which seems to be tending toward digital mutually assured destruction?
-
- 3 min
- CNET
- 2019
US Government agencies rely on outdated verification methods, increasing the risk of identify theft.
- CNET
- 2019
-
- 3 min
- CNET
- 2019
Thanks to Equifax breach, 4 US agencies don’t properly verify your data, GAO finds
US Government agencies rely on outdated verification methods, increasing the risk of identify theft.
If the government does not ensure our cyber security, then who does? Can any digital method for identity verification be completely safe, especially given how much of our personal data lives in the digital world?
-
- 5 min
- Wired
- 2019
Non-profit companies such as Thorn and the Canadian Centre for Child Protection are using existing software, particularly facial recognition algorithms, to discover ways to become more proactive in fighting child pornography and human trafficking on the dark web.
- Wired
- 2019
-
- 5 min
- Wired
- 2019
How Facial Recognition is fighting child sex trafficking
Non-profit companies such as Thorn and the Canadian Centre for Child Protection are using existing software, particularly facial recognition algorithms, to discover ways to become more proactive in fighting child pornography and human trafficking on the dark web.
How has technology facilitated underground illegal activities, such as child trafficking? How has technology also facilitated fighting back against them? What is your opinion on the debate on whether or not law enforcement should have extensive access to facial recognition technology or machine learning algorithms?
-
- 7 min
- MIT Technology Review
- 2019
Autonomous vehicles could be subject to hacks by adversarial machine-learning, possibly perpetrated by out-of-work truck/Uber drivers and “adversarial machine learning”. The fact that vehicle algorithms can already be fairly easily tricked also raises concerns.
- MIT Technology Review
- 2019
-
- 7 min
- MIT Technology Review
- 2019
Hackers Are the Real Obstacle for Self-Driving Vehicles
Autonomous vehicles could be subject to hacks by adversarial machine-learning, possibly perpetrated by out-of-work truck/Uber drivers and “adversarial machine learning”. The fact that vehicle algorithms can already be fairly easily tricked also raises concerns.
Had you considered this big obstacle in self-driving? How would this risk impact the business of self-driving vehicles? What are the consequences of companies not fully understanding the machine algorithms that they use? Should we use self-driving vehicles when this threat stands?
-
- 5 min
- MIT Technology Review
- 2019
Discusses the issues that come with allowing private companies to fight back against cyber attacks by chasing hackers across the internet, including greater conflict with other countries and potential lawsuits.
- MIT Technology Review
- 2019
-
- 5 min
- MIT Technology Review
- 2019
Five reasons “hacking back” is a recipe for cybersecurity chaos
Discusses the issues that come with allowing private companies to fight back against cyber attacks by chasing hackers across the internet, including greater conflict with other countries and potential lawsuits.
Do we need international norms to help defuse tensions in the cyberspace? What are the “alternatives” to hacking back? Would data be safer if it was not digital?
-
- 5 min
- The New York Times
- 2019
As the case study of Baltimore demonstrates, cyber crime against governments for ransom of digital cash is not an uncommon practice.
- The New York Times
- 2019
-
- 5 min
- The New York Times
- 2019
Hackers Holding Baltimore Hostage
As the case study of Baltimore demonstrates, cyber crime against governments for ransom of digital cash is not an uncommon practice.
How can hacking affect whole cities? Should entire cities trust digital systems to contain all of their important information?