osi_info_program + cybercrime   29

The Economic Impact of Cybercrime and Cyber Espionage
Is cybercrime, cyber espionage, and other malicious cyber activities what some call “the greatest transfer of wealth in human history,” or is it what others say is a “rounding error in a fourteen trillion dollar economy?” In this interim report, sponsored by McAfee, CSIS Technology and Public Policy Program Director James Lewis and coauthor Stewart Baker estimate the costs of cybercrime and cyber espionage at nearer $400 million than the $1 trillion recently claimed by the Obama administration.
cybercrime  espionage 
july 2013 by osi_info_program
Corporate Cyberattacks, Possibly State-Backed, Now Seek to Destroy Data - NYTimes.com
Mr. Lewis, the computer security expert, agreed. “The Iranian attacks have tilted private sector opinion,” he said. “Hence the muted reaction to the executive order versus squeals of outrage. Companies are much more concerned about this and much more willing to see a government role.”
cybercrime 
march 2013 by osi_info_program
Outcry Over Computer-Crime Indictment of Matthew Keys - NYTimes.com
"Hackers are the new Communists for the US Department of Justice."
...
“There are three categories of hackers: Russian criminals trying to rob us blind; the Chinese who are trying to steal our secrets; and then there’s Anonymous, and a lot of them are like merry pranksters. We’re treating them all the same.”
anonymous  AaronSw  hackers  cybercrime 
march 2013 by osi_info_program
Attacks on the Press in 2011: Regulating the Internet - Committee to Protect Journalists
Allegations that reporters from the now-defunct News of the World in the United Kingdom illegally accessed private voicemails demonstrate that journalists must be bound by legitimate anti-hacking laws. But some country's cybercrime laws are constructed so broadly that normal journalistic activity online can be deemed illegal.
cybercrime  freeexpression  oped  bh 
february 2012 by osi_info_program
Bloggings by boz: On Conficker
"This week the Conficker Working Group published a lessons learned report I wrote in late 2009 and early 2010 related to their fight against one of the largest and potentially most dangerous botnets in the internet's history. I had the opportunity and privilege to interview some of the top private sector cybersecurity experts in the US and write about what they did in the hopes that others may learn from their experience."
cybersecurity  cybercrime  botnets 
february 2011 by osi_info_program
Technology Review: Policy: Global Gridlock on Cyber Crime
"The first international treaty on fighting cyber crime went into effect six years ago. Called the European Convention on Cybercrime, it aims to make different country's laws compatible and promote investigative coöperation. But progress has stalled.

Just 30 nations, including the United States, have ratified the treaty. China and Brazil haven't even signed it. Most troubling is that Russia--which the Internet infrastructure company Akamai identifies as the leading source of computer attacks as of late 2009--has also refused to sign. Russia objects to a provision that would let foreign investigators bypass governments and work directly with network operators."
cybersecurity  security  cybercrime 
june 2010 by osi_info_program
Infosecurity (UK) - UN rejects international cybercrime treaty
"The United Nations has rejected a Russia-backed proposal for a treaty on cybercrime, despite widespread agreement that closer international co-operation is vital in a world more closely connected by global computer networks."
cybercrime  un  russia  news 
april 2010 by osi_info_program
Cyberactivists obtain Latvian State Revenue Service data
A purported group of cyberactivists who call themselves the Fourth Awakening People's Army has obtained around 7.4 million records from a database linked to the web-based service for filing income tax returns and other information with Latvia's State Revenue Service. According to the group, it hopes to expose government waste, unjust wage differentials and possible corruption by analyzing data filed by state agencies and public sector.
cybersecurity  cybercrime  latvia  hacktivism  dataprotection  transparency 
february 2010 by osi_info_program
U.S. enables Chinese hacking of Google
Bruce Schneier explains how backdoors mandated by the US govt enabled Chinese to hack into Gmail.
news  google  china  cybercrime  security 
february 2010 by osi_info_program
Google to enlist NSA to help it ward off cyberattacks
"the alliance is being designed to allow the two organizations to share critical information without violating Google's policies or laws that protect the privacy of Americans' online communications. " according to anonymous sources in Washington Post
cybercrime  cybersecurity  NSA  Google  US  privacy 
february 2010 by osi_info_program
Nart Villeneuve — Google’s New Approach
Nart gets to the heart of the matter - "The nexus of censorship, surveillance and malware attacks allows China is the key to China’s information control policies" - some good discussion in the comments, too
china  google  malware  cybercrime  censorship 
january 2010 by osi_info_program
Google, censorship, China | Tom Watson MP
Tom Watson plans to table an early day motion in the UK Parliament supporting Google's move out of China and urging other technology companies to do the same.
china  google  uk  censorship  cybercrime  freeexpression 
january 2010 by osi_info_program
Official Google Blog: A new approach to China
Announcement from Google that it is re-evaluating its approach to China, and details of cyber-attacks that have led to this decision
china  google  cybercrime  censorship 
january 2010 by osi_info_program
"The snooping dragon"
2009 paper on the rise of social malware, by Ross Anderson and Shishir Nagaraja.
china  censorship  google  malware  cybercrime 
january 2010 by osi_info_program

Copy this bookmark:



description:


tags: