Press "Enter" to skip to content

The Deep Universe of Cybercrime | Alberto Pellicanò | TEDxBocconiUSalon


with living guys so I will start with a

very easy question to you how many of

you here own a computer

don’t be shy okay this is exactly what I

expected

well you know today in our computers we

contain our lives we have photos we have

documents with everything in our

computers imagine if someone can steal

your computer imagine if someone can own

everything that you contain in your

computer imagine for example a knocker

that can I have access to your browser

history of course in our daily life we

can visit the Financial Times The

Washington Post the Uni book only delete

and then you burn we can access to

everything we can of course you guys

when you are in front of your computer

during the evening you actually are in

front of the screen and then you access

to everything up through the internet so

imagine when this happens to someone –

if if our computer is access a is

entered by a person who is on the other

side of the globe it can be Russian

hacker it can be a Chinese occur that

actually knows your photos your

documents you can write everything on

your computer but well guys this happens

to us and our data’s our personal

details are very very important for us

but imagine if the same thing happens to

multinational companies imagine if they

can even if they can enter the bank

accounts of dismantle insurance

companies they can enter the database in

which there are our personal details the

personal details of all of you and this

happens very very often so maybe in this

moment someone is observing the screen

of your computer but maybe someone is

observing the screen of the next layer

database or of Zahraa and so on could

you imagine that are you really aware of

the fact the actually at the end of the

day everything that we could we have in

our computer is not safe technological

tools are deeply unsafe or inherently

unsafe they make our lives easier but

today we can know we can be observed in

every moment of our lives because we we

have lives in our PC but let’s see some

types of cyber crimes could you mention

some types of cyber crimes

well there is a leak on toxic financial

operations cracks my boat sails through

internet interaction among criminals by

use of emails and other technological

platforms

do you know telegram telegram is very

safe for terrorists and for criminal

organization they can interact among

them being very very sure about the fact

that they are not going to be

intercepted theft of password and

accessing network codes unlawful

information coming including commercial

and confidential one and then of course

a carrot ax Akers can do whatever they

want they can access they accessed my

online banking actually one time one day

when I was in the United States I saw

that actually someone was buying stuff

soon amazona in Norwegian in Norway in

Finland they just used my credit card

and that’s it and there was a depth of

7600 euros on my on my credit card this

is crazy but it can happen every every

day of course this is a very legal

problem this is a very a very very

serious legal problem and you know guys

there is no real legal definition

in any law or in any regulation there is

just there are just some case law of the

European Commission which actually

mentioned this problem and they find

cybercrime of criminal acts that are

committed online by using electronic

communication networks and information

systems but this is very general I mean

it doesn’t mean anything you don’t have

a piece of law a piece of written law

which actually takes into a text

seriously into consideration the problem

of cybercrime but actually nowadays

subprime is really is really a piece of

criminal law can be considered as a

piece of Korean law as itself well we

can distinguish between three types of

cybercrime three be very very broad

categories first of all we have site

crimes which are specifically related to

the internet such as attacks against

information system or phishing then we

have the online fraud and forgery

so large-scale fraud can be committed

online through instruments such as

identity theft fishing or spamming of

course you receive tones of these emails

where they ask to insert the data of

your credit card or maybe they ask you

to they they actually reported you to

you a problem with your credit card

maybe we post a pay or PayPal and so on

I received tons and tons of this kind of

emails

well actually we can experience this

kind of stuff every day and they are

very dangerous because of course we can

be smart but we can be also very further

stupid and then there are illegal online

content including pornographic material

involving children inside incitement to

racism an incitement to

violence glorification of violence and

xenophobia we experience every day even

on Facebook even on Twitter the fact

that actually actually this kind of

content can be published on websites and

social media and people sometimes are

not aware of the fact that they are

committing a crime of course it is a

very serious problem but then we have

also to take into consideration the fact

that cyber crimes a very very specific

characteristic first of all the

technological device can be the aim so a

knocker wants to access the computer in

order to store all your personal data

but then it can be also the tool of

course as cycles cyber stalking stalking

in the past was very difficult

you should phone the person and you can

be intercepted by the police and so on

but now cyber stalking is talking this

is is further much it more easy more

easier through the internet you can just

write to the victim on facebook on

Twitter on whatsapp on telegram and so

on and then of course of course how much

of course we hear every day about by the

pornography on the internet there are

some crimes which nowadays are

absolutely easier to be done through the

internet so now we should take into

consideration some famous cases which

were very which actually are a kind of

tricky so the first one is the Sony

Pictures Entertainment tag so Sony a

Sony Pictures studios were producing a

movie called the interview which was

which plot was based on the

assassination of Kim Jong Hyun the

dictator of North Korea actually another

group called the guardians of peace

leaked the damp access indict the

database

of Sony Pictures Entertainment and are

we and actually access to access to to a

very confidential report regarding sony

Sony Pictures and regarding the creation

of this movie

there are many suspects about about the

fact that actually the the accurate act

was done by North Korea the North Korean

government then another case is the

Ashley Madison AK the action where is

Iraq is a kind of funny but even tragic

case have you ever heard about Ashley

Madison well actually Ashley Madison is

is a website which main focus is

extramarital affairs so actually this

group of actor had access and published

the database of this website and so the

names the surnames and the um addresses

and then the declared sexual fantasies

of those people were published on the

Internet this led of course to public

shame but it lets it leads also to

suicide there were people who had so

many troubles that actually decide

themselves and then target the target

case involved this very big

multinational company which is very

popular in North America which is target

it is similar to Zara or IKEA or H&M and

so the data’s and the credit cards of

more than forty million customers were

published and were used by these actors

in order to make in order to buy stuffs

all over the world actually target

during the period between 2013 and 2014

had to pay damages for more than 300

millions of dollars so you can

understand how even the most sensitive

details such as the one involving

extramarital affairs hurry the end of

these people you should reflect that but

then now if we look at the very at the

very current situation we should take

into consideration a very very dangerous

phenomena such as Isis well Isis is very

dangerous because actually Isis us today

the possibility to deal with all these

technological devices that were not

existing when al-qaeda arise in 2001 in

fact if you think about the 11 September

attacks after the 11th September attack

Osama bin Laden recorded a speech in

Arabic and sent it to other Syria the

Arabic television but you know so this

is actually this type trip was

transmitted on al-jazeera and that’s it

and then some television reported it and

so on but nowadays what Isis can do is

to publish contents on social media such

as Facebook and Twitter and then the

these speeches can be translated in less

than 10 minutes all over the world so

this makes size is so so so dangerous

and this is the reason why actually Isis

is becoming so powerful because in the

past when an al-qaeda was acting people

had to go to Afghanistan in order to

train themselves but nowadays you can

train yourself even from your computer

every one of you here can became an Isis

terrorist you can in for example

use some techniques in order to make you

anonymous on the Internet and serve very

very safely on the Internet

so nowadays Isis is really becoming a

media phenomenon Isis publish on the

Internet

comics videos cartoons and there are

people who really wants to become an

Isis supporter because at the end of the

day there are some people even that

don’t commit terrorist attacks but they

really claim these attacks because it’s

like a social status maybe for us it’s

crazy but there are some areas and some

people who really need this kind of

stuffs in order to be recognized by the

society so but now we should take into

consideration why it is so hard to fight

cybercrime we already understood that

actually did actually cyber crimes are

characterized by a real real huge trans

boundary trans boundary content so

actually the victim and the victim and

the aggressor usually are located in

different areas of the world and this

makes everything easier but then there

is also a problem of enforcement because

as I already said as I already said from

the legal point of view laws are really

different all around the world for

example spam is not considered a

criminal offence in more than this in

more than 60% of the countries of the

world so there are some countries in

which you can go to jail for spamming

but there are some countries in which

you have just to pay a fine and then of

course there is also a police problem

because you have to coordinate all the

effort and this is very expensive and

then which is the other reason why

fighting against cybercrime is so

difficult because the web is huge it

tends to infinity I’ve never heard about

the Deep Web in the dark web

so actually you should imagine the web

as a nice burger and the web that we

access every day actually is just the

top of this iceberg because if you use

some software’s such as you are you can

actually go on anima slee on the

internet and serve a very very secret

part of the web because you know

potentially the Internet service

provider who is the guy with the person

with the company which actually every

day has the control of when and where

people exist on the internet if you

normally go on the Internet the internet

service provider actually knows when and

where you are going on the Internet

but if you use this software which is

called the tio are you can access the

Internet Angra and actually you can hide

your IP number so since you have hide

your IP number you can just enter this

part of the web which is totally secret

at the first step you can find your

personal details so very basically even

your email or your or your bank account

is part of the Deep Web because it’s

something that can be accessed only

through the use of password so it cannot

be inducted by a normal search engine

but then if you go step by step if you

go to the bottom of the iceberg you can

find the unthinkable you can find you

can buy drugs you can buy weapons you

can buy people the Deep Web is used by

Isis and

women organization in order in order to

empower human trafficking so guys this

is just these are just some tips in

order to understand how useful is

technologies

technology makes our lives easier of

course we cannot live without

technologies today if you want to use

car sharing if you want to if you want

to see your marks at the at the final

exam of course we cannot live without

technology but you have to take into

consideration the top of all this

information one day can be used against

of you so be aware about the fact that

everything that we are doing even this

video is going to remain on the web and

everyone can use it against me

every day in every moment of the life I

don’t know maybe my one day when I’m

going to work somewhere this is going to

be this is going to be not appreciated

by someone so I hope that my speech was

interesting and thank you very much and now we open the floor to the debate

Please follow and like us:

Be First to Comment

Leave a Reply