Here are a few basic sites. Wikipedia even has one.
Cybercrime: U.S. Department of Justice
For a foreign slant: Interpol and Cyber Crime
Drug Lords and Rackets: Cyber Crime and Money Laundering
I hope this gives you some food for thought. If you need something more imaginative, you can grab a copy of The Shadow Warriors.

The Shadow Warriors is a genre-busting novel of suspense, incorporating international locales (Singapore, Hong Kong, Boston, Brussels and Germany), technology (software agents) and the derring-do at a German university. The story is framed by an outbreak of information warfare. Emma Lee Davis, a web security consultant, must dredge up a painful summer in her past to discover a means to end the info-war that has disrupted civilization.
Showing posts with label cybercrime now. Show all posts
Showing posts with label cybercrime now. Show all posts
Tuesday, January 22, 2013
Saturday, July 28, 2012
CyberSecurity: people just don't get it!
Gaaa! After reading about the Olympic grand slam opening last night, I caught sight of a NY Times article about taking the teeth out of a CyberSecurity bill because it would be too hard (read expensive), for businesses to comply with. Business would be the first to scream and rant if a cyber war broke out and they were brought down by infrastructure problems or a ripped-to-shreds economy.
I worked in IT for 20+ years, and believe me, business is always dragging its security heels. I had to scream loud and long before the customer service people stopped leaving orders by the fax and copy machines, orders with the customers' credit card numbers and expiration dates. I had to beg for a shredder for confidential information. I had to preach and tear my hair before everyone understood that by law you could not put the credit card CVVC number on an electronic file. I cannot tell you how many forms used to ask for that number. Duh! Business is in business to do business and as the old saying goes, the devil take the hindmost. Credit card processors are hide bound and dragged their feet for as long as possible before the fines outweighed the cost of cleaning up their act.
Business will never implement security measures because it's always more important to please the marketing department who comes up with some meatball idea that needs implementation yesterday! Executives are mostly focused on sales, not the security infrastructure. Someone has to mind the CyberSecurity store and right now it's looking like that someone is no one.
When the cyber war breaks out, don't blame me and don't blame your president. Blame those who didn't want to spend a few bucks to beef up their systems: electric grids, transportation, nuclear power plants, all those pieces of our infrastructure that may be vulnerable to cyber-attacks. Brother can you spare a dime?
I worked in IT for 20+ years, and believe me, business is always dragging its security heels. I had to scream loud and long before the customer service people stopped leaving orders by the fax and copy machines, orders with the customers' credit card numbers and expiration dates. I had to beg for a shredder for confidential information. I had to preach and tear my hair before everyone understood that by law you could not put the credit card CVVC number on an electronic file. I cannot tell you how many forms used to ask for that number. Duh! Business is in business to do business and as the old saying goes, the devil take the hindmost. Credit card processors are hide bound and dragged their feet for as long as possible before the fines outweighed the cost of cleaning up their act.
Business will never implement security measures because it's always more important to please the marketing department who comes up with some meatball idea that needs implementation yesterday! Executives are mostly focused on sales, not the security infrastructure. Someone has to mind the CyberSecurity store and right now it's looking like that someone is no one.
When the cyber war breaks out, don't blame me and don't blame your president. Blame those who didn't want to spend a few bucks to beef up their systems: electric grids, transportation, nuclear power plants, all those pieces of our infrastructure that may be vulnerable to cyber-attacks. Brother can you spare a dime?
Tuesday, April 10, 2012
Cassandra Syndrome
Counter-terrorism czar Richard Clarke discusses cyber war in this month's (April 2012) Smithsonian Magazine. This story sounds so much like The Shadow Warriors (the Stuxnet virus) that I too feel like Cassandra, for having first written about Info War after hitting upon the idea for the "Warriors" from Paul Strassman in an article way back in 1995. Can you believe it?
I recommend anyone interested in the topic of cyber or info war to head to your nearest library and sit down with the April Smithsonian Magazine. According to Clarke, the U.S. can go on the offensive but we are virtually (!) helpless against an offense. Where are Wayne, Christof, Kathy Chang and even Emma (my characters) when we need their expertise so badly? Bring on the Skunk Works!
Lots of questions, few answers, but Richard Clarke has his ideas about Stuxnet. Endlessly fascinating.
The Shadow Warriors hit the nail on the head. Read about it now, before the Cyber War brings down your computers.
I recommend anyone interested in the topic of cyber or info war to head to your nearest library and sit down with the April Smithsonian Magazine. According to Clarke, the U.S. can go on the offensive but we are virtually (!) helpless against an offense. Where are Wayne, Christof, Kathy Chang and even Emma (my characters) when we need their expertise so badly? Bring on the Skunk Works!
Lots of questions, few answers, but Richard Clarke has his ideas about Stuxnet. Endlessly fascinating.
The Shadow Warriors hit the nail on the head. Read about it now, before the Cyber War brings down your computers.
Sunday, September 11, 2011
Friday, June 24, 2011
Advanced, Persistant Threats - Cybercrime Now
The Next Generation of Cybercrime: How it’s evolved, where it’s going. I downloaded this from Computer World's White Pages today. Very interesting. APT are a form of Info Warfare.
Want to read some fictional cybercrime? Have a Kindle? The Shadow Warriors are lurking in the wings.
Want to read some fictional cybercrime? Have a Kindle? The Shadow Warriors are lurking in the wings.
Subscribe to:
Posts (Atom)