Top Secret Science in Cybercrime and Espionage
Top Secret Science in Cybercrime and Espionage
Hackers Needed
Hackers are in demand for jobs at tech companies such as Google, Facebook, and Microsoft. Some companies even advertise for “ethical hackers.” Ethical hackers are hired to try to break into company computer networks to find flaws in software. In other words, they think and work like a black hat hacker to help save the company from other black hats. White hat and ethical hacking has its appeal, but some hackers dabble in both black and white hacking.
Like other books in the series “Top Secret Science”, Top Secret Science in Cybercrime and Espionage relies heavily on the ‘Top Secret’ hype to engage students. More than the other books in the series, this book about crime and espionage plays up fear and anxiety. Chapter headings are “The Dark Future”, “Hack Attack”, “Connected and Vulnerable”, “Predators and Prey”, “Fighting Cybercrime” and “What’s Next?”
Every double-page spread throughout the book includes a section titled either “Dark Science Secrets” or “Tomorrow’s Secrets”. It is very questionable whether these ‘secrets’ are very secret, but many of them may include information that is new to young readers. Some of the “Dark Science Secrets” may highlight information that may be new but not necessarily desirable information to spread. For example, “Dark Science Secrets” on page 7 highlights a 16-year-old cyberhacker who “was eventually caught and spent five years in prison for computer fraud. When he got out, he wrote books on hacking and became a computer security consultant for companies that wanted to protect their data against hackers. He used his knowledge to become a cybersecurity expert.” Although this “Dark Science Secret” has a happy ending for the hacker, without a fuller explanation of the harm done by this person, I’m not sure this is necessary information to include.
Canadian statistics and examples are used in a variety of topics including mention of the FBI and the RCMP in fighting cybercrime. Although the book does not identify Amanda Todd as a Canadian, her suicide at age 15, after being bullied and harassed online, is included as a “Dark Science Secrets” in the topic “Sinister Cybercrime”. Unfortunately, the one Canadian source listed in “Learning More” at the back of the book is really a link to a cybersecurity sales site. It does include statistics, but it is mainly trying to use those statistics to make viewers of their website become sufficiently worried about cybercrimes to hire them.
While some of the “Dark Science Secrets” may be questionable to include, “Tomorrow’s Secrets” can more accurately be named “Tomorrow’s News” or even “Yesterday’s News”.
The Internet Crime Complaint Centre (IC3) is the FBI’s “complaints central” for people who want to report Internet crime. If you are ever hacked, scammed, or taken advantage of, and want it known or investigated, you can report the incident to IC3 online or over the phone. IC3 also posts information on scams, and gives advice on how to protect your computer and personal information.
Information about how to report a cybercrime should not be labeled as any kind of a secret. Unfortunately, there is no corresponding information about what Canadians can do to report cybercrimes.
Chapter 5, “Fighting Cybercrime” includes the topic “Fighting Secrets”. It describes the role and activities of hacktivists “who use their skills as instruments of social change or to promote a political opinion.” The activities of the hacktivist collective Anonymous, Edward Snowden, and other whistleblowers in exposing governments and businesses who they believe are not acting ethically are included.
Like other books in the “Top Secret Science” series, Top Secret Science in Cybercrime and Espionage ends with “Your Mission”. This section is titled “Be a Cybercrime Specialist” and includes some higher-level thinking questions and activities for students to reflect on, or complete. The final question is presented as “Top Secret” and asks students to comment on the ethics of keeping scientific secrets.
Would you sell your protection plans, or would you share your knowledge with the world, so that everybody knew about it? Do you think completed cybersecurity systems should be kept secret? Explain your decision.
Although I am not a fan of the ‘secret’ tone of this book, I suspect that it will appeal to some students who want to know more about cybercrime and espionage. My main concern is whether there is enough background content to avoid glorifying cybercrime.
Dr. Suzanne Pierson is a recently retired on-line instructor of Library courses at Queen’s University in Kingston, Ontario.