PortadaGruposCharlasMásPanorama actual
Buscar en el sitio
Este sitio utiliza cookies para ofrecer nuestros servicios, mejorar el rendimiento, análisis y (si no estás registrado) publicidad. Al usar LibraryThing reconoces que has leído y comprendido nuestros términos de servicio y política de privacidad. El uso del sitio y de los servicios está sujeto a estas políticas y términos.

Resultados de Google Books

Pulse en una miniatura para ir a Google Books.

Cargando...

Cybercrime and the Darknet

por Cath SENKER

MiembrosReseñasPopularidadValoración promediaConversaciones
2231,026,632 (3.33)Ninguno
With the growth of the internet came a new type of crime. Using the un-indexed corners of the internet that make up what is known as the "dark net" criminals carry on their business online as fluently as in the real world. Identity theft and fraud have become both simpler and more profitable for enterprising criminals. New black markets like the "silk road" have sprung up that allow customers to buy anything they desire-from drugs to guns to child pornography. Meanwhile authorities struggle to regulate these new arenas. The internet has also created new threats to international security through cyber attacks like the "stuxnet" virus. Not all hacking is so bad --some hackers try to use their skills for humane and political purposes. From the Wikileaks revelation to the DDOS attacks of Anonymous, groups of activist hackers have attempted to hold authorities to account and force them into greater transparency.… (más)
Ninguno
Cargando...

Inscríbete en LibraryThing para averiguar si este libro te gustará.

Actualmente no hay Conversaciones sobre este libro.

Mostrando 3 de 3
As society tries to catch up with the overwhelming advancements in technology of the past few decades, it is unsurprising that governments and legislators find themselves plugging the gaps where criminality can flourish. Developments in encryption, obfuscation, distribution and anonymisation give criminals and privacy activists alike a broad toolkit for conducting their activities away from prying eyes. In Cybercrime and the Dark Net, Cath Senker offers a brief and easily digested overview of this bewildering digital landscape. The book is essentially a collection of short vignettes covering a wide variety of different forms of cybercrime, with an essentially separate second section surveying the dark net.

This is a successfully written book, but unfortunately hardly a well-written one. There is nothing wrong with the craft, nothing wrong with the content per se, but it reads very much like an undergraduate essay written with an eye to meeting a word count, rather than sculpting a theory or trying to convey specific information. I would call the style journalistic, in the sense that there is a tendency to focus on individual instances, leading to sweeping generalisations without any valid attempt at contextualisation. We’re treated to two pages detailing an instance of a young American woman whose social security number had been stolen and used to file false tax returns. Senker makes some unfounded statements about what the thieves could have done with the information, and offers the rather dubious claim that people are now filing their tax returns earlier for fears someone else will file them first, before then revealing that the IRS responded to the woman in question saying that the issue had been settled. The victim never discovered how the security breach had happened, ergo this needn’t even have been a cybercriminal offence and has little relevance for the subject matter.

Senker has clearly done a decent amount of research into this subject. Give that this is designed to be a popular introductory book on the subject, a few small mistakes in the technical nuances are relatively moot, and can certainly be forgiven given that the author isn’t an expert in the field. Subjects are well introduced and explained, while plenty of footnotes are provided for those interested in following a matter of particular interest. But again, bearing more than a passing resemblance to a university essay, the text is peppered with quotes and statistics which only ostensibly support the text and in fact rather serve to bring up more questions. In a section on online grooming, we’re told that technology facilitates the contact between paedophiles and children. A fair claim, but to bolster this argument, the next sentence tells us that Childline reported a 50% annual increase in online grooming cases in December 2015. That’s it; the line is left without further comment. But how does this bombshell fact actually support her argument? Did technology change so significantly in 2015 to lead to such an explosion in online grooming? Is this part of a general year-on-year trend or a statistical outlier? Maybe this is evidence that support services are using more successful tactics to reach those in need and should actually be interpreted as a positive indicator? Or is this evidence of groomers changing their tactics? Since the site reveals that the sample size is only in the hundreds, it would seem rather sensationalist to see any significance in the figure, and its uncommented conclusion here seems not only unnecessary, but extremely misleading.

While many of the footnotes feel like cosmetic extras, there are also occasions in the text where it is anything but clear what the author actually wants to say. In the section covering the darknet and methods of encrypting emails, we’re told that Irish-Islandic privacy activist Smári McCarthy encourages people to use encryption to increase the costs of government surveillance. This is followed by the statement: ‘if they did the cost would rise from 13 US cents a day (9p) to US $10,000 (more than 7,000 GBP).’ The cost of what, government surveillance? Measured in what? Obviously this statement can’t be taken at face value, but I’m stumped as to what these numbers are supposed to refer to. She concludes this short section by stating that this might lead governments to place only suspicious persons under surveillance, or alternatively for governments to spend more resources on surveillance, driving ever more people to communicate via the darknet. While I don’t expect the author to have access to a crystal ball, the entire section is muddled and lacks clarity.

Frustrations like this sadly abound in this lightweight volume. Somewhere under the editor’s chisel there may be a fairly decent introductory book. As it stands, I found the numerous non sequiturs, sensationalist statistics, minor inconsistencies and incongruities to make this a dissatisfying reading experience. The book lacks a certain clarity of purpose and instead attempts to cover and tie together too many bases in barely 150 pages. ( )
  Fips | Dec 7, 2023 |
Repetitive on a lot of the points it has to make about the reasons behind the rise of the darknet popularity. ( )
  booksonbooksonbooks | Jul 24, 2023 |
Repetitive on a lot of the points it has to make about the reasons behind the rise of the darknet popularity. ( )
  booksonbooksonbooks | Jul 24, 2023 |
Mostrando 3 de 3
sin reseñas | añadir una reseña
Debes iniciar sesión para editar los datos de Conocimiento Común.
Para más ayuda, consulta la página de ayuda de Conocimiento Común.
Título canónico
Título original
Títulos alternativos
Fecha de publicación original
Personas/Personajes
Lugares importantes
Acontecimientos importantes
Películas relacionadas
Epígrafe
Dedicatoria
Primeras palabras
Citas
Últimas palabras
Aviso de desambiguación
Editores de la editorial
Blurbistas
Idioma original
DDC/MDS Canónico
LCC canónico

Referencias a esta obra en fuentes externas.

Wikipedia en inglés

Ninguno

With the growth of the internet came a new type of crime. Using the un-indexed corners of the internet that make up what is known as the "dark net" criminals carry on their business online as fluently as in the real world. Identity theft and fraud have become both simpler and more profitable for enterprising criminals. New black markets like the "silk road" have sprung up that allow customers to buy anything they desire-from drugs to guns to child pornography. Meanwhile authorities struggle to regulate these new arenas. The internet has also created new threats to international security through cyber attacks like the "stuxnet" virus. Not all hacking is so bad --some hackers try to use their skills for humane and political purposes. From the Wikileaks revelation to the DDOS attacks of Anonymous, groups of activist hackers have attempted to hold authorities to account and force them into greater transparency.

No se han encontrado descripciones de biblioteca.

Descripción del libro
Resumen Haiku

Debates activos

Ninguno

Cubiertas populares

Enlaces rápidos

Valoración

Promedio: (3.33)
0.5
1
1.5
2 1
2.5
3
3.5
4 2
4.5
5

¿Eres tú?

Conviértete en un Autor de LibraryThing.

 

Acerca de | Contactar | LibraryThing.com | Privacidad/Condiciones | Ayuda/Preguntas frecuentes | Blog | Tienda | APIs | TinyCat | Bibliotecas heredadas | Primeros reseñadores | Conocimiento común | 206,822,872 libros! | Barra superior: Siempre visible