Weeks 9 and 10 - Crime, venality, and stewardship

What is crime?

Guy Fawkes mask{width=1in}

Criminal categories

Criminal categories: doing

Criminal categories: not doing

Criminal categories: deception

Computer technology as an integral part of crime

The current successful cybercrime categories

According to RSA; largely credit card fraud, followed by account takeover / identity theft.

Internet vigilantism

Hacktivism and more

As you can see from the Wikipedia page, it's hard to use a single word to characterize the group "Anonymous"; maybe "group" isn't even an accurate word.

Whatever Anonymous might be, it certainly receives credit for various acts of "hacktivism".

Scambaiting

Canute cannot hold back the waves{width=1in}

Leaking

Wikileaks{width=1in}

From Wikileaks "About" page: "WikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying and corruption. It has so far published more than 10 million documents and associated analyses."

Doxing

Not the exclusive province of the Internet; public release of data about individuals in order to harass or otherwise embarrass has long been done. The Internet however makes for a substantially more powerful platform for these type of attacks.

Greyballing

In today's news, how Uber protects itself from regulators

Information for sale

Information brokers have the ethically interesting business of selling other people's information without their permission.

The Senate's Commerce Committee recently issued a comprehensive report on this industry. Particularly concerning are the sections on how "financially vulnerable" segments of the populace are targeted.

More information for sale?

Cross-device tracking

Air is a medium, not a "gap": Cross-device tracking via audio

Pervasive sensors and actuators

Pervasive sensors and actuators

Pervasive sensors and actuators

Making a market in cybernetic arms

Making a market in cybernetic arms

Making a market in cybernetic arms

Hoarding vulnerabilities

Ethical questions about cyberwar

Stewardship

Proactivity: Vigilantism, or Stewardship?