Freedom From Fear Magazine logo

Menu

Skip to content
  • Home
  • About
  • Current Issue
  • Past Issues
    • Issue 1
    • Issue 2
    • Issue 3
    • Issue 4
    • Issue 5
    • Issue 6
    • Issue 7
    • Issue 8
    • Issue 9
    • Issue 10
    • Issue 11
    • Issue 12
    • Issue 13
    • Issue 14
Issue 7index
download
read

Issue Index

  • Humankind’s: Suffering is Not Something One Can Get Used to
  • Reporting in Times of War
  • The New Convergence between International Criminal Law, Nuclear Non-Proliferation and Maritime Security
  • Cybernetics and Law
  • Crime and Policing in Virtual Worlds
  • Privacy vs. Security? A Dilemma of the Digital Era
  • Global Cybersecurity Agenda
  • The Internet: Anonymous Forever
  • From Encryption to Failure of Traditional Investigation Instruments
  • Estimating and Interpreting the Prevalence of E-fraud across the World
  • Defending Quality of Life through Critical Infrastructure Protection
  • Interview with a Hacker
  • Terrorist Use of the Internet and Legal Response
  • The State of Cybercrimes
  • That Was Then, This Is Now
  • Cyberwar: Myth or Reality?
  • Avoid Becoming a Victim of Cybercrime
  • Online Crimes against Children
  • Cyber Crime and Organized Crime
  • Hackers Profiling: Who Are the Attackers?
  • Award notification

Humankind’s: Suffering is Not Something One Can Get Used to

WRITTEN BY Laura Boldrini

unphoto_r-lemoyne_56994 I decided to write a book in the summer of 2009 when the Italian government started intercepting and turning back migrants at sea. I thought it would have helped me analyse what has been going on these years and what is not happening nowadays. Despite the apparent calm that was looming over the waters of the Mediterranean in the absence of disembarkments, apprehension still arose from the many stories of the men and women who had reached, one after the other and throughout the years, the Favarolo dock of Lampedusa and the southern coasts of Italy.

Read more...

Reporting in Times of War

WRITTEN BY Francesca Caferri

Once upon a time there was journalism. Many have recited the de profundis for the reporting profession over the last few years. Because of the economic crisis, which has been stifling newspapers for the last two years.

Read more...

The New Convergence between International Criminal Law, Nuclear Non-Proliferation and Maritime Security

WRITTEN BY Stefano Betti

For decades, the international community’s approach to issues of nuclear proliferation on the one hand, and of the use of criminal law mechanisms on the other, has hardly been an integrated one. In the post-Cold War environment, the events of 9/11 have acted as a powerful catalyst for change.

Read more...

Cybernetics and Law

WRITTEN BY Javier Livas

Most governments and founding charters originated at least 200 years ago: the United States Constitution (which then also served as a basis in most Latin American countries), and democratic governments such as those of the United Kingdom and France. Moreover, the concept of democracy is even older than that, dating back to the ideas of Socrates, Plato and Aristotle. Cybernetics, however, which is literally the science of government as it studies the structure of regulatory systems, is only about 63 years old. Many years ago I asked myself: What are current governments doing right or missing? What does Cybernetics have to do with the world of Law, given that laws are about controlling people’s behaviour?

Read more...

Crime and Policing in Virtual Worlds

WRITTEN BY Marc Goodman

The rapidly changing nature of information and communications technologies suggests that as soon as new hardware, software or other applications are introduced, they will be exploited in some form or fashion by international criminal organisations. The speed at which criminals can exploit these technologies is truly remarkable. Unfortunately, law enforcement and the criminal justice system, bound by limited budgets, finite training, and traditional legal regimes are much slower in their abilities to respond.

Read more...

Global Cybersecurity Agenda

WRITTEN BY ITU (International Telecommunication Union)

ITU (International Telecommunication Union) recognizes that information and technology security are critical priorities for the international community. Cybersecurity is in everyone’s best interest and this can only be achieved through collaborative efforts. Cyber threat issues are global and therefore their solutions must be global too.

Read more...

Privacy vs. Security? A Dilemma of the Digital Era

WRITTEN BY Giuseppe Vaciago

Over the coming years a crucial issue in dealing with cybercrime will be the delicate balance that must necessarily be struck between personal data protection, public order, and security.

Read more...

The Internet: Anonymous Forever

WRITTEN BY Bruce Schneier

Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we can ensure only the proper people have access to their own information. We will know who is sending us spam and who is trying to hack into corporate networks.

Read more...

From Encryption to Failure of Traditional Investigation Instruments

WRITTEN BY Marco Gercke

The shift from industrial societies to information societies,(1) and the related dependence of the society as well as the economy on the availability of Internet services have moved the attention of politics towards the cybercrime topic.

Read more...

Estimating and Interpreting the Prevalence of E-fraud across the World

WRITTEN BY Jan Van Dijk

Survey-based Estimates

The International Crime Victimisation Survey (ICVS) is a standardized survey on experiences of crime that has been carried out five times since 1989 in a large sample of European countries, in the USA and in Canada.

Read more...

Defending Quality of Life through Critical Infrastructure Protection

WRITTEN BY Marco Carbonelli, Luisa Franchina, Laura Gratta, Fabio Guasconi, Daniele Perucchini

Foreword

In the last decades the most developed countries of the world have realized a social model characterized by a high “quality of life” of their citizens. There are, in fact, many services and opportunities available to every citizen, which contribute to satisfying their needs or expressing their attitudes.

Read more...

Interview with a Hacker

WRITTEN BY Raoul Chiesa

Chronicles of a Black Hat

How you would define yourself with respect to the hacking activities you are conducting? I’m a Black Hat. This means that hacking is my job and gives me salary. I run black-ops for those hiring me. I’m quite expensive.

Read more...

Terrorist Use of the Internet and Legal Response

WRITTEN BY Marco Gercke, Daniel Thelesklaf

Without doubt terrorist organisations today are using the Internet for various purposes. Unlike the early debate when the focus was on potential terrorist-related network-based attacks against critical infrastructure and the use of information technology in armed conflicts (cyberwarfare), it is widely recognised that the range of activities is more complex.(1)

Read more...

The State of Cybercrimes

WRITTEN BY Levi Gundert

Your computer may be “pwned.”(1) While you’re reading this article a miscreant might be virtually peering over your shoulder, or worse. Then again, perhaps you follow best practices for securing your computer: you patch your operating system, you maintain a current anti-virus software subscription, and your Web surfing habits are fastidiously cautious. Unfortunately your computer may still be pwned.

Read more...

That Was Then, This Is Now

WRITTEN BY Ioan Landry

a Concise Look Back on the Hacker Subculture

There is no argument that since the Internet’s widespread commercialization roughly twenty years ago, it has exponentially improved, automated and streamlined much of our lifestyle with every passing year. The advantages of living in a wired (or, wireless) world are apparent, but not without risks: the media is rife with speculation on hackers and every week a new phishing ring is busted or a massive data breach is reported. But who are these much-maligned hackers, and where do they come from?

Read more...

Cyberwar: Myth or Reality?

WRITTEN BY Bruce Schneier

The biggest problems in discussing cyberwar are the definitions. The things most often described as cyberwar are really cyberterrorism, and the things most often described as cyberterrorism are more like cybercrime, cybervandalism or cyberhooliganism - or maybe cyberespionage.

Read more...

Avoid Becoming a Victim of Cybercrime

WRITTEN BY Scot Huntsberry

The news is full of reports detailing the stories of victims who have lost thousands, even millions, of dollars at the hands of cyber criminals. Many of us know someone who has already been the victim of one of these crimes.

Read more...

Online Crimes against Children

WRITTEN BY John Carr

The emergence of the Internet as a mass consumer product has not necessarily created any entirely new genres of crime, but it has certainly given a new twist to some very old and familiar ones.

Read more...

Cyber Crime and Organized Crime

WRITTEN BY Tatiana Tropina

The current era of cybercrime is no longer dominated by hackers accessing computer systems just for fun or notoriety. The development and growth of the digital economy has changed the criminal landscape dramatically.

Read more...

Hackers Profiling: Who Are the Attackers?

WRITTEN BY Raoul Chiesa

Who is attacking you? “We don’t know...” When talking about attackers and hacking it often happens that I ask people working at customer’s sites “who is scaring you?” Most of the time the answer I hear is not “Well, you know… I’m scared by script kids, playing with those couple of unpatched machines I have,” nor is it “I’m really scared about industrial spies.” Rather, 98% of the time the answer is “I don’t know.”

Read more...

Award notification

WRITTEN BY Doris Buddenberg

Congratulations your identity has been sold!

All our lauded technological progress -- our very civilization - is like the axe in the hand of the pathological criminal. (Albert Einstein) Over the last years we have witnessed changes as we analyzed criminal trends and elaborated new strategies to confront crime. New scenarios have emerged, which have obliged us to improve knowledge and to rethink strategies. These changes are the direct consequences of a wired world driven by global markets where frontiers are abolished mainly in the name of economics. This new world, dominated by new information and communication technologies, has also redefined the criminals’ profile and their modus operandi.

Read more...

UNICRI
Viale Maestri del Lavoro, 10
10127 Turin Italy
unicri.publicinfo@un.org
UNICRI logo