Cybercrime

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

Documents Reveal Canada's Secret Hacking Tactics
Gallagher, Ryan
Article
2015
Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified do...
Netizen Report: Why Did YouTube Censor Your Videos? You May Never Know.: Global Voices Advocacy's Netizen Report offers an international snapshot of challenges, victories, and emerging trends in Internet rights ar
Netizen Report Team
Article
2017
Amid an apparent shift in YouTube’s approach to monitoring for rules violations and staying in the good graces of advertisers, a wave of YouTube users have found their work either blocked or relegated...
Preparing for a Digital 9/11
Greenberg, Karen
Article
2012
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
Researchers Find 'Astonishing' Malware Linked to NSA Spying
Gallagher, Peter
Article
2015
Security researchers have uncovered highly sophisticated malware that is linked to a secret National Security Agency hacking operation.
Stuxnet on the Loose: Security for the One Percent
Blunden, Bill
Article
2012
Suspicions that the Stuxnet computer worm was indeed developed by the United States and Israel has once again exposed American exceptionalism. Espionage and sabotage are presented as intolerable crimi...
Stuxnet-Like Digital Attack on Iran Nuclear Talks May Have Come from Israel, Security Researchers Say
Alimardani, Mahsa
Article
2015
Moscow-based technical security company Kaspersky Lab last week revealed evidence of a new cyber attack on both its own network and those of several European hotels that hosted nuclear negotiations be...
US: Offensive Cyber-Warfare is Illegal... Unless We Do It
Glaser, John
Unclassified
2013
The US government declares that cyberwarfare directed against the US would be an act of war -- and, oh, by the way, that it is agressively engaged in cyberwarfare against foreign countries.
Where the Anti-Russian Moral Panic is Leading Us
Raimondo, Justin
Article
2017
This is how the smear campaign scores points: you don't have to be on the Russian payroll -- you can be a "useful idiot" just because of your political views, which condemn you as an "unwitting" agent...

Sources Experts & Spokespersons

Sources Library

Companies that cooperate with dictatorships must be sanctioned
Sources News Release
2011
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
Dark Market
Cybethieves, Cybercops and You
Glenny, Misha
2011
Investigative research into a hackers' cybermarket where cyberthieves exchange tricks and tips. The author finds the individuals who founded the site and also tackles the problem of policing these cri...
Polishing Putin: hacked emails suggest dirty tricks by Russian youth group
Elder, Miriam
2012
Nashi runs web of online trolls and bloggers paid to praise Vladimir Putin and denigrate enemies.
Richard O'Dwyer: living with the threat of extradition
Student who set up website posting links to TV and film content fears being used as a guinea pig by Hollywood giants
Ball, James
2012
Richard O'Dwyer's web-linking site would place him at the heart of the titanic running battle between the Hollywood giants – struggling to keep their beleaguered business model intact in the online er...
Stuxnet and the Bomb
Benedict, Kennette
2012
Over the past decade, US experts have strenuously warned about the ominous possibility of other nations, rogue states, or even terrorist groups attacking US infrastructure through the Internet. As it ...
The 10 Tools of Online Oppressors
O'Brien, Danny
2011
The world’s worst online oppressors are using an array of tactics, some reflecting astonishing levels of sophistication, others reminiscent of old-school techniques. From China’s high-level malware at...
US was 'key player in cyber-attacks on Iran's nuclear programme'
Obama reported to have approved bid to target Tehran's nuclear efforts
Beaumont, Peter; Hopkins, Peter
2012
Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.
Windows and online banking - Just say no
2009
There has been a rash of online heists that have stolen millions of dollars from businesses and non-profit organizations. While circumstances are different in each case, they all point to a single poi...