with living guys so I will start with a
very easy question to you how many of
you here own a computer
don’t be shy okay this is exactly what I
expected
well you know today in our computers we
contain our lives we have photos we have
documents with everything in our
computers imagine if someone can steal
your computer imagine if someone can own
everything that you contain in your
computer imagine for example a knocker
that can I have access to your browser
history of course in our daily life we
can visit the Financial Times The
Washington Post the Uni book only delete
and then you burn we can access to
everything we can of course you guys
when you are in front of your computer
during the evening you actually are in
front of the screen and then you access
to everything up through the internet so
imagine when this happens to someone –
if if our computer is access a is
entered by a person who is on the other
side of the globe it can be Russian
hacker it can be a Chinese occur that
actually knows your photos your
documents you can write everything on
your computer but well guys this happens
to us and our data’s our personal
details are very very important for us
but imagine if the same thing happens to
multinational companies imagine if they
can even if they can enter the bank
accounts of dismantle insurance
companies they can enter the database in
which there are our personal details the
personal details of all of you and this
happens very very often so maybe in this
moment someone is observing the screen
of your computer but maybe someone is
observing the screen of the next layer
database or of Zahraa and so on could
you imagine that are you really aware of
the fact the actually at the end of the
day everything that we could we have in
our computer is not safe technological
tools are deeply unsafe or inherently
unsafe they make our lives easier but
today we can know we can be observed in
every moment of our lives because we we
have lives in our PC but let’s see some
types of cyber crimes could you mention
some types of cyber crimes
well there is a leak on toxic financial
operations cracks my boat sails through
internet interaction among criminals by
use of emails and other technological
platforms
do you know telegram telegram is very
safe for terrorists and for criminal
organization they can interact among
them being very very sure about the fact
that they are not going to be
intercepted theft of password and
accessing network codes unlawful
information coming including commercial
and confidential one and then of course
a carrot ax Akers can do whatever they
want they can access they accessed my
online banking actually one time one day
when I was in the United States I saw
that actually someone was buying stuff
soon amazona in Norwegian in Norway in
Finland they just used my credit card
and that’s it and there was a depth of
7600 euros on my on my credit card this
is crazy but it can happen every every
day of course this is a very legal
problem this is a very a very very
serious legal problem and you know guys
there is no real legal definition
in any law or in any regulation there is
just there are just some case law of the
European Commission which actually
mentioned this problem and they find
cybercrime of criminal acts that are
committed online by using electronic
communication networks and information
systems but this is very general I mean
it doesn’t mean anything you don’t have
a piece of law a piece of written law
which actually takes into a text
seriously into consideration the problem
of cybercrime but actually nowadays
subprime is really is really a piece of
criminal law can be considered as a
piece of Korean law as itself well we
can distinguish between three types of
cybercrime three be very very broad
categories first of all we have site
crimes which are specifically related to
the internet such as attacks against
information system or phishing then we
have the online fraud and forgery
so large-scale fraud can be committed
online through instruments such as
identity theft fishing or spamming of
course you receive tones of these emails
where they ask to insert the data of
your credit card or maybe they ask you
to they they actually reported you to
you a problem with your credit card
maybe we post a pay or PayPal and so on
I received tons and tons of this kind of
emails
well actually we can experience this
kind of stuff every day and they are
very dangerous because of course we can
be smart but we can be also very further
stupid and then there are illegal online
content including pornographic material
involving children inside incitement to
racism an incitement to
violence glorification of violence and
xenophobia we experience every day even
on Facebook even on Twitter the fact
that actually actually this kind of
content can be published on websites and
social media and people sometimes are
not aware of the fact that they are
committing a crime of course it is a
very serious problem but then we have
also to take into consideration the fact
that cyber crimes a very very specific
characteristic first of all the
technological device can be the aim so a
knocker wants to access the computer in
order to store all your personal data
but then it can be also the tool of
course as cycles cyber stalking stalking
in the past was very difficult
you should phone the person and you can
be intercepted by the police and so on
but now cyber stalking is talking this
is is further much it more easy more
easier through the internet you can just
write to the victim on facebook on
Twitter on whatsapp on telegram and so
on and then of course of course how much
of course we hear every day about by the
pornography on the internet there are
some crimes which nowadays are
absolutely easier to be done through the
internet so now we should take into
consideration some famous cases which
were very which actually are a kind of
tricky so the first one is the Sony
Pictures Entertainment tag so Sony a
Sony Pictures studios were producing a
movie called the interview which was
which plot was based on the
assassination of Kim Jong Hyun the
dictator of North Korea actually another
group called the guardians of peace
leaked the damp access indict the
database
of Sony Pictures Entertainment and are
we and actually access to access to to a
very confidential report regarding sony
Sony Pictures and regarding the creation
of this movie
there are many suspects about about the
fact that actually the the accurate act
was done by North Korea the North Korean
government then another case is the
Ashley Madison AK the action where is
Iraq is a kind of funny but even tragic
case have you ever heard about Ashley
Madison well actually Ashley Madison is
is a website which main focus is
extramarital affairs so actually this
group of actor had access and published
the database of this website and so the
names the surnames and the um addresses
and then the declared sexual fantasies
of those people were published on the
Internet this led of course to public
shame but it lets it leads also to
suicide there were people who had so
many troubles that actually decide
themselves and then target the target
case involved this very big
multinational company which is very
popular in North America which is target
it is similar to Zara or IKEA or H&M and
so the data’s and the credit cards of
more than forty million customers were
published and were used by these actors
in order to make in order to buy stuffs
all over the world actually target
during the period between 2013 and 2014
had to pay damages for more than 300
millions of dollars so you can
understand how even the most sensitive
details such as the one involving
extramarital affairs hurry the end of
these people you should reflect that but
then now if we look at the very at the
very current situation we should take
into consideration a very very dangerous
phenomena such as Isis well Isis is very
dangerous because actually Isis us today
the possibility to deal with all these
technological devices that were not
existing when al-qaeda arise in 2001 in
fact if you think about the 11 September
attacks after the 11th September attack
Osama bin Laden recorded a speech in
Arabic and sent it to other Syria the
Arabic television but you know so this
is actually this type trip was
transmitted on al-jazeera and that’s it
and then some television reported it and
so on but nowadays what Isis can do is
to publish contents on social media such
as Facebook and Twitter and then the
these speeches can be translated in less
than 10 minutes all over the world so
this makes size is so so so dangerous
and this is the reason why actually Isis
is becoming so powerful because in the
past when an al-qaeda was acting people
had to go to Afghanistan in order to
train themselves but nowadays you can
train yourself even from your computer
every one of you here can became an Isis
terrorist you can in for example
use some techniques in order to make you
anonymous on the Internet and serve very
very safely on the Internet
so nowadays Isis is really becoming a
media phenomenon Isis publish on the
Internet
comics videos cartoons and there are
people who really wants to become an
Isis supporter because at the end of the
day there are some people even that
don’t commit terrorist attacks but they
really claim these attacks because it’s
like a social status maybe for us it’s
crazy but there are some areas and some
people who really need this kind of
stuffs in order to be recognized by the
society so but now we should take into
consideration why it is so hard to fight
cybercrime we already understood that
actually did actually cyber crimes are
characterized by a real real huge trans
boundary trans boundary content so
actually the victim and the victim and
the aggressor usually are located in
different areas of the world and this
makes everything easier but then there
is also a problem of enforcement because
as I already said as I already said from
the legal point of view laws are really
different all around the world for
example spam is not considered a
criminal offence in more than this in
more than 60% of the countries of the
world so there are some countries in
which you can go to jail for spamming
but there are some countries in which
you have just to pay a fine and then of
course there is also a police problem
because you have to coordinate all the
effort and this is very expensive and
then which is the other reason why
fighting against cybercrime is so
difficult because the web is huge it
tends to infinity I’ve never heard about
the Deep Web in the dark web
so actually you should imagine the web
as a nice burger and the web that we
access every day actually is just the
top of this iceberg because if you use
some software’s such as you are you can
actually go on anima slee on the
internet and serve a very very secret
part of the web because you know
potentially the Internet service
provider who is the guy with the person
with the company which actually every
day has the control of when and where
people exist on the internet if you
normally go on the Internet the internet
service provider actually knows when and
where you are going on the Internet
but if you use this software which is
called the tio are you can access the
Internet Angra and actually you can hide
your IP number so since you have hide
your IP number you can just enter this
part of the web which is totally secret
at the first step you can find your
personal details so very basically even
your email or your or your bank account
is part of the Deep Web because it’s
something that can be accessed only
through the use of password so it cannot
be inducted by a normal search engine
but then if you go step by step if you
go to the bottom of the iceberg you can
find the unthinkable you can find you
can buy drugs you can buy weapons you
can buy people the Deep Web is used by
Isis and
women organization in order in order to
empower human trafficking so guys this
is just these are just some tips in
order to understand how useful is
technologies
technology makes our lives easier of
course we cannot live without
technologies today if you want to use
car sharing if you want to if you want
to see your marks at the at the final
exam of course we cannot live without
technology but you have to take into
consideration the top of all this
information one day can be used against
of you so be aware about the fact that
everything that we are doing even this
video is going to remain on the web and
everyone can use it against me
every day in every moment of the life I
don’t know maybe my one day when I’m
going to work somewhere this is going to
be this is going to be not appreciated
by someone so I hope that my speech was
interesting and thank you very much and now we open the floor to the debate
Be First to Comment