Criminology and E...
Follow
Find tag "English"
8.2K views | +0 today
Criminology and Economic Theory
In search of viable criminological theory
Curated by Rob Duke
Your new post is loading...
Your new post is loading...
Rescooped by Rob Duke from ICT Security-Sécurité PC et Internet
Scoop.it!

How Did The FBI Break Tor?

How Did The FBI Break Tor? | Criminology and Economic Theory | Scoop.it
If you control enough of the Tor network, it’s possible to get a kind of bird’s eye view of the traffic being routed through it. It was clear that Tor thought the Carnegie Mellon researchers were responsible. The researchers refused to talk to the press, but a conference spokesperson told Reuters the talk was canceled because the researchers hadn’t cleared the release of their work through their department, the Software Engineering Institute, which is funded by the Defense Department.

 

At the time, many assumed that the university pulled the plug on the talk because of the gray legal zone it was in, with the researchers casually intercepting Web traffic. But maybe it got pulled because the researchers were revealing a law enforcement technique that the government did not want publicized. If nothing else, it’s highly likely the information the researchers collected about “drug dealers and child pornographers” made its way into law enforcement hands. McCord said he was “unable to comment on the matter.” Carnegie Mellon’s SEI declined comment about the canceled talk and about whether it had provided information from the research to law enforcement.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR

 


Via Gust MEES
more...
Gust MEES's curator insight, November 7, 3:50 PM
If you control enough of the Tor network, it’s possible to get a kind of bird’s eye view of the traffic being routed through it. It was clear that Tor thought the Carnegie Mellon researchers were responsible. The researchers refused to talk to the press, but a conference spokesperson told Reuters the talk was canceled because the researchers hadn’t cleared the release of their work through their department, the Software Engineering Institute, which is funded by the Defense Department.


At the time, many assumed that the university pulled the plug on the talk because of the gray legal zone it was in, with the researchers casually intercepting Web traffic. But maybe it got pulled because the researchers were revealing a law enforcement technique that the government did not want publicized. If nothing else, it’s highly likely the information the researchers collected about “drug dealers and child pornographers” made its way into law enforcement hands. McCord said he was “unable to comment on the matter.” Carnegie Mellon’s SEI declined comment about the canceled talk and about whether it had provided information from the research to law enforcement.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Rescooped by Rob Duke from ICT Security-Sécurité PC et Internet
Scoop.it!

How to Use Your Cat to Hack Your Neighbor’s Wi-Fi

How to Use Your Cat to Hack Your Neighbor’s Wi-Fi | Criminology and Economic Theory | Scoop.it

Late last month, a Siamese cat named Coco went wandering in his suburban Washington, DC neighborhood. He spent three hours exploring nearby backyards. He killed a mouse, whose carcass he thoughtfully brought home to his octogenarian owner, Nancy. And while he was out, Coco mapped dozens of his neighbors’ Wi-Fi networks, identifying four routers that used an old, easily-broken form of encryption and another four that were left entirely unprotected.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cats+as+wardriver




Via Gust MEES
more...
Gust MEES's curator insight, August 8, 1:46 PM

Late last month, a Siamese cat named Coco went wandering in his suburban Washington, DC neighborhood. He spent three hours exploring nearby backyards. He killed a mouse, whose carcass he thoughtfully brought home to his octogenarian owner, Nancy. And while he was out, Coco mapped dozens of his neighbors’ Wi-Fi networks, identifying four routers that used an old, easily-broken form of encryption and another four that were left entirely unprotected.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cats+as+wardriver



Rescooped by Rob Duke from ICT Security-Sécurité PC et Internet
Scoop.it!

LulzSec hacker faces 30 years to life

LulzSec hacker faces 30 years to life | Criminology and Economic Theory | Scoop.it
Jeremy Hammond is denied bail, placed on terrorist watch list...

 

Either way, a potential sentence of 30 years to life for alleged hacking crimes is probably enough to get the attention of most 27-year-olds. And that is what U.S. District Judge Loretta Preska told Hammond last week that he could face if he is convicted on all counts.

 

Hammond, much better known in the world of hactivism by various online aliases including "Anarchaos," "sup_g," "burn," "yohoho," "POW," "tylerknowsthis," and "crediblethreat," has been held without bail since his arrest in March on charges connected with last year's hacking of Strategic Forecasting, or Stratfor, an Austin, Texas-based international intelligence broker, by AntiSec, an offshoot of LulzSec, which is in turn an offshoot of the hacktivist collective Anonymous.

 

Read more:

http://www.csoonline.com/article/722380/lulzsec-hacker-faces-30-years-to-life

 


Via Gust MEES
more...
No comment yet.
Rescooped by Rob Duke from ICT Security-Sécurité PC et Internet
Scoop.it!

Feds Shutter Illegal Drug Marketplace Silk Road 2.0, Arrest 26-Year-Old San Francisco Programmer

Feds Shutter Illegal Drug Marketplace Silk Road 2.0, Arrest 26-Year-Old San Francisco Programmer | Criminology and Economic Theory | Scoop.it
Federal authorities have shut down Silk Road 2.0 and other anonymous narcotics marketplaces in what seems to be a coordinated global sting.

Via Gust MEES
more...
Gust MEES's curator insight, November 6, 3:27 PM

Federal authorities have shut down Silk Road 2.0 and other anonymous narcotics marketplaces in what seems to be a coordinated global sting.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Mandy Burris's comment, November 7, 12:51 AM
I’m sure that Benthall doesn’t feel like he did anything wrong and that he was making money protesting the tyranny of a society that does not allow dangerous and addictive drugs to be used recreationally. As long as there are people willing to be the keystone in endeavors like this we will have to continue to become more creative in how to catch these people and stop the import of those drugs. Sounds like the international cooperation on this investigation could be very interesting to observe and understand.
Rescooped by Rob Duke from ICT Security-Sécurité PC et Internet
Scoop.it!

1-15 January 2013 Cyber Attacks Timeline

1-15 January 2013 Cyber Attacks Timeline | Criminology and Economic Theory | Scoop.it
So here we are with the first Cyber Attacks Timeline for 2013 covering the first half of January. Apparently the new year has begun with an intense activity by Cyber Crooks. Hacktivists and Cyber C...

Via Gust MEES
more...
Gust MEES's curator insight, January 18, 2013 1:42 PM

A LOT from Education in there, about time to learn the basics of Cyber-Security ;)

 

Check ALSO:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

 

Rescooped by Rob Duke from ICT Security-Sécurité PC et Internet
Scoop.it!

Here's Enough Digital Espionage to Scare James Bond [INFOGRAPHIC]

Here's Enough Digital Espionage to Scare James Bond [INFOGRAPHIC] | Criminology and Economic Theory | Scoop.it
Like James Bond does in the new hit film Skyfall, secret agents all over the world are now dealing with digital threats. Is this malware giving them a digital license to kill?

 

Read more, a MUST! See the reality and learn basics of Cyber-Security:

http://mashable.com/2012/11/10/james-bond-malware/

 


Via Gust MEES
more...
No comment yet.