Chinese Organized Crime Research Papers (original) (raw)
NOW, WITH THIS TECHNOLOGY, EVERYBODY KNOWS EVERYTHING. EVERYWHERE, ANYTIME, WE ARE EXPOSED! THIS TREND IS EVIDENT. STARTING AS A SMALL, NICHY CRAFT, the hacking progressed as we also grew every day, more dependent on computer and digital... more
NOW, WITH THIS TECHNOLOGY, EVERYBODY KNOWS EVERYTHING. EVERYWHERE, ANYTIME, WE ARE EXPOSED!
THIS TREND IS EVIDENT. STARTING AS A SMALL, NICHY CRAFT, the hacking progressed as we also grew every day, more dependent on computer and digital systems, along with smart phones and Social Media. From petty cyber theft, to digital & cyber terrorism, to cyber wars: now we observe the (these) gigantic volumes of stolen data and intrusive digitals espionage. Nobody is immune, almost anybody. Only two decades ago an amateur business, went now full-professional and not only professional, but organized and refined to a degree it is difficult to detect in real-time. On the side of the companies, the work load is increasing, as well, because they have to protect, to corral an ever increasing volume of data and biometric information.
Key Words: massive data breaches, dedicated hacking, cyber security, old computer systems, old policies, old security system and encryption, new biometric security, state sponsored hacking and espionage, investment in new modern computing system, national security, organized digital crimes, organized cyber-crimes.