week 9 - social media Flashcards
cyber banging
Exhibiting criminal power, recruiting members, or even acting directly against their enemies on social networks
· This term is also used to highlight criminal activities and those who engage in them
· Cyber-banging often led to real fights and even death
hyperreality
The concept of Hyperreality was first coined by French sociologist Jean Baudrillard in Simulacra and Simulation
· Hyperreality is the blurring of boundaries between reality and simulation, where the
simulation or representation becomes more significant than the actual reality it represents.
· Hyperreality is where the Physical and Virtual Worlds converge
· The image is better than the reality
the aesthetic of power in Mexico v Europe
Europe vs Latin America
o Mexico – common strategy, Jalisco cartel of new generation strategize and plan everything even making a simple video
o Europe – no common strategy, acting on individual way can say whatever they want
· The aesthetic of power is often expressed by criminal organizations on social media through the use of symbols, images, and videos that show their strength and control over certain territories or illegal activities
burning chrome
“Burning Chrome” is a story about two freelance hackers, Bobby Quine and Automatic Jack, who make a living by hacking computer systems
§ Bobby specialises in software while Jack’s expertise is hardware
§ The third main character in the story is Rikki, a woman whom Bobby falls in love with and hopes to impress by hitting it big
§ Jack acquires a highly sophisticated Russian hacking software that is difficult to trace
§ Bobby decides to hack into the system of a notorious and vicious criminal named Chrome, who handles money transfers for organised crime
§ Jack reluctantly agrees to help
§ Eventually, the break-in is successful, but Rikki decides to leave the group and move to Hollywood, which causes grief for Quine and Jack, as they have both grown to love her
· The word “cyberspace,” which was coined by Gibson, was first used in this story that
portrays the “mass consensual hallucination” of computer networks
three types of organised criminal activity related to the new technologies
discussed above:
1. Cyber-dependent organised crimes
(facilitated and committed online)
- Cyber-enabled organised crimes
(enabled, tech not essential here) - Cyber-assisted organised crimes
(traditional crimes assisted by tech, ex. drug deal)
5 types of opportunities brought by the internet for OC
1 .It facilitates communication among criminals and between them and (potential) customers through the use of e-mail, Skype, and other forms of instant messaging (communicative opportunities)
- It improves the efficiency of criminal markets by enabling easy and rapid adjustment of trade to changes in demand (managerial opportunities)
- Provides anonymity and increased operational security for criminals engaged in
illegal activities (security opportunities) - Allows for the creation of new criminal activities that would not be possible without the Internet, such as online fraud and identity theft (emergent opportunities)
- Enhances the speed and scale of criminal activities, such as money laundering, by allowing for instantaneous global transfers of funds (logistical opportunities)
Belgium 2012
In 2012, there was a case involving a shipping company in Antwerp, Belgium, where drug traffickers recruited hackers to breach the IT systems that controlled the movement and location of shipping containers
· This allowed them to smuggle drugs across international borders without being detected
· This demonstrates how criminals are using technology to facilitate their illegal activities
and the need for strong cybersecurity measures to prevent such crimes
tenerife
In 2021, the Spanish National Police arrested 106 people in southern Tenerife for computer scams linked to various Italian mafia clans
· The group consisted of five highly skilled cybercriminals who specialised in preparing
online fraud operations
· Their main activity involved money laundering in Spain, which was fueled by attacks targeted at Italy and Germany
· The Spanish authorities have found that the local group worked in collaboration with various mafia clans based in Rome, Naples, and the Apulia region, including Casamonica, Nuvoletta Clan of Camorra, and Sacra Corona Unita
private key
never to be shared
hacker vs cracker
Hacking: The term hacker most likely emerged from the Massachusetts Institute for
Technology (MIT) electrical engineering labs
· Today individuals who claim to be hackers contend that true hackers are concerned with
enhancing computer security.
· Later the term cracker was suggested to replace the term hacker in the media
o This term usually refers to an individual who violates the copyright protection
deep web
The Deep Web is worldwide Web content that is not included as a part of the Surface Web
o It is hidden from the outside world, so standard search engines do not index it
o It is the largest expanding category of new information on the Internet
o The total quantity of the deep web is 1000-2000X greater than that of the Surface
Web. Dictionary.com defines it as “the portion of the internet which is hidden and not shown from conventional search engines, as by encryption; the aggregate of unindexed websites.”
· Deep web – we can’t see, only a portion of the deep web is the dark web – no search engine, anonymous
dark web
· Dark web – part of deep web – no search engine, anonymous like deep web but carry illegal activities and marketplaces can purchase anything using cryptocurrency
The Dark Web is part or division of the Deep web, intentionally hidden from standard search engines
o All its data is encrypted
o To access it, you need special software, configurations, or authorization
o It uses masked IP addresses accessible only with a specific web browser—
for example, Tor, I2P, Freenet, etc.
silk road
Silk Road was an online “darknet” black market. In operation from approximately 2011 until 2013, Silk Road was used by numerous drug dealers and other unlawful vendors to distribute massive quantities of illegal drugs and other illicit goods and services to many buyers and to launder all funds passing through it.Nov 7, 2022
alpha bay market
Two of the largest dark web marketplaces have been shut down following a “landmark” international law enforcement investigation. The AlphaBay and Hansa sites had been associated with the trade in illicit items such as drugs, weapons, malware and stolen data.Jul 20, 2017
Corruption
supply vs. demand
“Supply-side corruption” is used to describe the act of offering an illicit payment or undue advantage
“demand-side corruption” relates to the acceptance or solicitation of such a payment or advantage.