In class we were given the task to draw a mindmap as a group of four of known stakeholders that are relevant in the cyber world. We found out that stakeholders range from individuals to organisations with the main reasons for obtaining data being for money or personal information.
A photograph of a seller illegally selling music on USB flash drives at a street market in Mexico. It is interesting to see in the comments section people’s reaction to the image. There are sceptical readers commenting “Don’t buy it. Just don’t. They are probably filled with so many viruses, all your passwords will be known to him soon.”, and others are praising the idea; “GOD BLESS PIRACY”. It’s interesting how the flash drives are more related to malware as opposed to when pirated music used to be on CDs.
A screenshot from a file sharing website. “Advertisers” attempt to con website visitors by making their ad appear like the download button. It is very easy for an unaware user to click on the wrong link and unintendedly download unwanted software or malware onto their computers.
A relatively new cybercrime known as swatting involves hoaxing real life emergency services to the location of targeted victims. This image in particular involves an online Counter Strike player known as Kootra being the victim of swatting while live streaming his match through Twitch. “A 911 caller claimed a man had shot several co-workers in the Creatures LLC office building he was playing in “. Swatting demonstrates how cybercrimes are not restricted to the cyber world where real life resources can be involved as well.
A screenshot taken from the science fiction videogame Deus Ex depicting the ‘Aug Incident’. The game is set in the future where technology has progressed to the point where augmentation has become a customary part of modern society. Three augmentation types in the game are mechanical, physiopharmaceutical and nanotechnological augmentation. An incident occurs where an international signal is sent out affecting the biochips of almost all augmented users that force them to lose control and become extremely violent. Though the game is fiction, an incident like this is entirely plausible if technology advances to such a point.
Another assumption with hacking is that it occurs on screen and is software based. It is easy to forget or overlook the fact that hacking can occur in hardware as well. This photo depicts a user hacking a printer’s hardware to accept any type of toner and be restricted to its own brand cartridges.
Windows popping up with fast typing and codes appearing in command prompt is the most common conception of hacking. This image is a screenshot from http://www.hackertyper.net
, an amusing website that takes any keystroke and converts it into useless code gibberish to replicate the depiction of hacking in movies and popular media.
A print publication that explores Apple’s End User Licence Agreement through poetry. The book is a printed form of Apple’s EULA with pages of black out transparencies overlaying some text for the reader to read out a poem that reflects on how users ignore terms and condition and EULA forms. The poem reads: “This is a story of a man, who one day was too busy or maybe too lazy that he, too quickly, clicked on I agree. What the latter did not foresee, is that he could never again disagree. The lesson of this story is that one shall not concede, to something one does not read.”
An art installation by Jakub Geltner depicts numerous security cameras installed in public spaces in a way that almost gives them an animalistic character. Geltner’s work comments on how technology is ‘infesting’ our lives. The work aims to draw attention of the public of how almost everything they do is being monitored or watched.
This image depicts leet speak, a language that was originally devised to counter keyword searches when discussing forbidden topics. An assumption in regards to hacking is that it involves a completely different language that the common internet user would not understand. Though there is the assumption that hacking occurs in code or l337 5p3ak there are some hacking techniques that simply involve speaking to a victim over the phone in plain English.
reddit. 2016. This is how they sell music in the streets of México. : pics. https://www.reddit.com/r/pics/comments/54obya/this_is_how_they_sell_music_in_the_streets_of/.>
Anica Padilla. 2016. Gamer Kootra 'swatted' while livestreaming: Jordan Mathewson talks about how he reacted in the video - 7NEWS Denver TheDenverChannel.com. <:http://www.thedenverchannel.com/news/local-news/gamer-kootra-swatted-while-livestreaming-jordan-mathewson-talks-about-how-he-reacted-in-the-video.>
Deus Ex Wiki. 2016. Aug Incident | Deus Ex Wiki | Fandom powered by Wikia. <http://deusex.wikia.com/wiki/Aug_Incident.>
Beautiful/Decay. 2016. A Sign Of The Times: Jakub Geltner's Creepy Installations Made From Surveillance Equipment Are Always Watching You - Beautiful/Decay. <http://beautifuldecay.com/2015/07/14/sign-times-jakub-geltners-creepy-installations-made-surveillance-equipment-always-watching/.>
YouTube. 2016. Leet Speak Powerpoint Presentation (FIXED INTRO) - YouTube. <https://www.youtube.com/watch?v=yk012u5nAMg.>
Hacker Typer. 2016. Hacker Typer. <http://hackertyper.net/.>
Peter Vidani. 2016. R▲ (installed chip with custom firmware into the...). <http://cf-12.tumblr.com/post/110986347035.>
UnderConsideration LLC. 2016. FPO: "The Man who Agreed - Apple Terms and Conditions" Booklet. < http://www.underconsideration.com/fpo/archives/2015/01/the-man-who-agreed---apple-terms-and-conditions.php.>