Sources Directory     A to Z Index     Topic Index News Releases     RSS Sources Select News RSS Feed     Sources Calendar      

Cybercrime: Experts and Sources
Sources Directory - Subject Index


Sources Experts & Spokespersons

News Releases

Companies that cooperate with dictatorships must be sanctioned
2011-09-06
Reporters without Borders
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.

Sources Select Resources

Companies that cooperate with dictatorships must be sanctioned
Sources News Release
Article
2011
Reporters without Borders
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
Did the US Accidentally Give the World's Most Powerful Cyberweapon to Terrorists?
Sony Hack: Made in America?
Lee, Peter
Article
2015
CounterPunch
Documents Reveal Canada's Secret Hacking Tactics
Gallagher, Ryan
Article
2015
The Intercept
Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified do...
Netizen Report: Why Did YouTube Censor Your Videos? You May Never Know.
Global Voices Advocacy's Netizen Report offers an international snapshot of challenges, victories, and emerging trends in Internet rights ar
Netizen Report Team
Article
2017
GlobalVoices
Amid an apparent shift in YouTube’s approach to monitoring for rules violations and staying in the good graces of advertisers, a wave of YouTube users have found their work either blocked or relegated...
Obama Order Sped Up Wave of Cyberattacks Against Iran
Sanger, David E.
Article
2012
New York Times
Polishing Putin: hacked emails suggest dirty tricks by Russian youth group
Elder, Miriam
Article
2012
Guardian
Nashi runs web of online trolls and bloggers paid to praise Vladimir Putin and denigrate enemies.
Preparing for a Digital 9/11
Greenberg, Karen
Article
2012
TomDispatch
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
Researchers Find 'Astonishing' Malware Linked to NSA Spying
Gallagher, Peter
Article
2015
The Intercept
Security researchers have uncovered highly sophisticated malware that is linked to a secret National Security Agency hacking operation.
Richard O'Dwyer: living with the threat of extradition
Student who set up website posting links to TV and film content fears being used as a guinea pig by Hollywood giants
Ball, James
Article
2012
The Guardian
Richard O'Dwyer's web-linking site would place him at the heart of the titanic running battle between the Hollywood giants – struggling to keep their beleaguered business model intact in the online er...
Stuxnet and the Bomb
Benedict, Kennette
Article
2012
Bulletin of the Atmoic Scientists
Over the past decade, US experts have strenuously warned about the ominous possibility of other nations, rogue states, or even terrorist groups attacking US infrastructure through the Internet. As it ...
Stuxnet on the Loose
Security for the One Percent
Blunden, Bill
Article
2012
CounterPunch
Suspicions that the Stuxnet computer worm was indeed developed by the United States and Israel has once again exposed American exceptionalism. Espionage and sabotage are presented as intolerable crimi...
Stuxnet-Like Digital Attack on Iran Nuclear Talks May Have Come from Israel, Security Researchers Say
Alimardani, Mahsa
Article
2015
Global Voices
Moscow-based technical security company Kaspersky Lab last week revealed evidence of a new cyber attack on both its own network and those of several European hotels that hosted nuclear negotiations be...
The 10 Tools of Online Oppressors
O'Brien, Danny
Article
2011
Committee to Protect Journalists
The world’s worst online oppressors are using an array of tactics, some reflecting astonishing levels of sophistication, others reminiscent of old-school techniques. From China’s high-level malware at...
US: Offensive Cyber-Warfare is Illegal... Unless We Do It
Glaser, John
Unclassified
2013
Antiwar.com
The US government declares that cyberwarfare directed against the US would be an act of war -- and, oh, by the way, that it is agressively engaged in cyberwarfare against foreign countries.
US was 'key player in cyber-attacks on Iran's nuclear programme'
Obama reported to have approved bid to target Tehran's nuclear efforts
Beaumont, Peter; Hopkins, Peter
Article
2012
The Guardian
Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.
Where the Anti-Russian Moral Panic is Leading Us
Raimondo, Justin
Article
2017
Antiwar
This is how the smear campaign scores points: you don't have to be on the Russian payroll -- you can be a "useful idiot" just because of your political views, which condemn you as an "unwitting" agent...
Windows and online banking - Just say no
Article
2009
The Register
There has been a rash of online heists that have stolen millions of dollars from businesses and non-profit organizations. While circumstances are different in each case, they all point to a single poi...

Sources Bookshelf

Dark Market
Cybethieves, Cybercops and You
Glenny, Misha
Book
2011
Investigative research into a hackers' cybermarket where cyberthieves exchange tricks and tips. The author finds the individuals who founded the site and also tackles the problem of policing these cri...


Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2021. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.