Lecture 5 - Crime, venality, and stewardship

What is crime?

Guy Fawkes mask

Guy Fawkes mask

Criminal categories

Criminal categories: doing

Criminal categories: not doing

Criminal categories: deception

Computer technology as an integral part of crime

The current successful cybercrime categories

According to RSA; credit card fraud, account takeover, identity theft particularly prevalent.

Internet vigilantism

Hacktivism and more

As you can see from the Wikipedia page, it's hard to use a single word to characterize the group "Anonymous"; maybe "group" isn't even an accurate word.

Whatever Anonymous might be, it certainly receives credit for various acts of "hacktivism".

Scambaiting

Canute cannot hold back the waves

Canute cannot hold back the waves

Leaking

Wikileaks

Wikileaks

From Wikileaks "About" page: "WikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying and corruption. It has so far published more than 10 million documents and associated analyses."

Doxing (or "doxxing")

Not the exclusive province of the Internet; public release of data about individuals in order to harass or otherwise embarrass has long been done. The Internet however makes for a substantially more powerful platform for these type of attacks.

Greyballing

How Uber protected itself from regulators

Information for sale

Information brokers have the ethically interesting business of selling other people's information without their permission.

The Senate's Commerce Committee issued in 2013 a comprehensive report on this industry. Particularly concerning are the sections on how "financially vulnerable" segments of the populace are targeted.

More information for sale?

Cross-device tracking

Air is a medium, not a "gap": Cross-device tracking via audio

Pervasive sensors and actuators

Pervasive sensors and actuators

Pervasive sensors and actuators

Making a market in cybernetic arms

Making a market in cybernetic arms

Making a market in cybernetic arms

Hoarding vulnerabilities

Ethical questions about cyberwar

Stewardship

Proactivity: Vigilantism, or Stewardship?