Organized crime gangs in Southeast Asia use psychological profiling, elaborate scripts and algorithms to produce sophisticated scams. Using dating apps, they target vulnerable people looking for love.
An estimated one in ten Australian tertiary students have paid a so-called contract cheating service to do their work for them. What most don’t think about is the risk of being blackmailed later.
The AN0M app was programmed by law enforcement to allow ‘back-door’ access. This led to the retrieval of information that culminated in hundreds of search warrants.
We unpacked a large cybercrime business network and found a group relying on business 101 tactics: VIP memberships, cheap trial offers and a customer base reluctant to spend.
Vulnerable websites are popping up as organizations move online during the coronavirus pandemic – and hackers have more time at home alone. The result is more websites falling victim to defacement.
Real-time cyberattacks on a display at the 175th Cyberspace Operations Group of the Maryland Air National Guard.
U.S. Air Force photo by J.M. Eddins Jr.
Benjamin Jensen, American University School of International Service and Chris Inglis, United States Naval Academy
In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it’s time to change that.
Language analysis may help police catch offenders.
Facebook’s initiative places the company in a complicated situation, as increased user privacy, while positive, could come with potential impunity for offenders.
SHUTTERSTOCK
Facebook is planning to put end-to-end encryption on all its messaging services soon. But governments aren’t happy about it, as it could make it harder to catch criminals.
The new laws could mean internet service providers could end up being forced to surveil the activities of users.
from www.shutterstock.com
The Commonwealth Criminal Code now has two substantive new criminal offences aimed at limiting live streaming of crime. Both target technology companies, not terrorists.
It might sound scary, but the ‘dark web’ is not much different from the rest of the internet.
Willequet Manuel/Shutterstock.com
Begun as part of efforts to preserve online anonymity and privacy, Freenet, Tor and the Invisible Internet Project are, like the rest of the web, home to both crime and free expression.
Around the world, people are both increasingly dependent on, and distrustful of, digital technology. New research suggests ways this conflict could unfold.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017.
(Yun Dong-jin/Yonhap via AP)
Professor of Strategic Studies, Marine Corps University; Scholar-in-Residence, American University, American University School of International Service