Logo
    Search

    Podcast Summary

    • The Journey of Default: From Curiosity to Becoming a Part of AnonymousThe internet provides a platform for curious individuals to explore and learn, leading to unexpected paths. Anonymous, although controversial, represents a pivotal moment in the growth of hacking and collective action online.

      Default's journey into hacking and becoming a part of Anonymous showcases the power and allure of the internet, especially during the time in the late 2000s. Starting as a curious teenager who wanted to know how things worked, Default stumbled upon the world of hacking through video games and an inquisitive mindset. Being grounded by his mom only fueled his desire to learn more, leading him to crack his neighbor's WiFi and regain access to the internet. Through message boards, IRC chatrooms, and the rise of Anonymous, Default found himself at the center of a movement where like-minded individuals congregated and stood up for their beliefs. Despite the chaos and controversy surrounding Anonymous, Default sees it as a necessary stepping stone in the evolution of hacking and collective action on the internet.

    • The Early Days of Anonymous: Hazing Rituals and the Formation of Factions.The intense initiation rituals and lack of trust within Anonymous led to the formation of factions and the need for more selective interactions, pushing some members to pursue their own paths.

      The early days of Anonymous were characterized by intense and disturbing content shared in chatrooms. To prove themselves, new members were often subjected to hazing rituals like eating strange substances on camera. The purpose of this graphic spamming was to create a barrier that would discourage law enforcement, journalists, and others from infiltrating the group. However, this strategy also had its drawbacks, as it made it difficult to distinguish between genuine members and potential threats. As a result, factions and subgroups started to form, with some even distancing themselves from Anonymous altogether. Trust became scarce, and the need for more selective and underground interactions became apparent. While some hackers were politically motivated or sought to amplify causes, others, like Default, were driven solely by curiosity and the desire to learn. In an environment of constant surveillance and uncertainty, finding trustworthy allies was a challenge, leading Default to part ways with radicalized members and continue on his own path of exploration.

    • Collective Action: Power and DangersIn the world of hacking, collective action can be a powerful force for change, but it also comes with risks and moral complexities.

      In short, one big takeaway from this story is the power of collective action and the potential dangers it can bring. The narrator, Default, initially joined a hacker group out of frustration and a desire for change. Their first operation targeted the corrupt water payment system in Detroit, causing it to go offline and preventing people from paying their bills. This act highlighted the ability to disrupt and challenge systems of power. However, the group's focus on pedophiles revealed a common thread of moral outrage among hackers. Pedophilia was universally condemned, even in a space that otherwise tolerated graphic and disturbing content. This alignment provided a sense of purpose and justification for their actions. The story emphasizes the intoxicating mix of power and rebellion, particularly for young individuals with hacking skills. It serves as a reminder of the complexities and dangers that can arise when collective actions fuel personal motivations.

    • The thrill and dangers of hackingHacking can be exhilarating, but it's important to be aware of the addictive nature and potential ethical dilemmas associated with it. Proceed with caution and consider the potential consequences.

      Hacking can bring about a sense of power and excitement for those involved. The act of exposing illegal activities or bringing about positive change through hacking can give individuals a rush of serotonin and an adrenaline rush. However, this thrill can become addictive, leading hackers to continuously chase that high and potentially losing sight of the original purpose or crossing ethical boundaries. Additionally, hacking groups often have a complex infrastructure in place, including data stores and tool shops, and sometimes even build botnets to route their attacks through, using control of multiple computers. It's important to recognize the consequences and potential dangers associated with hacking and to proceed with caution and ethical considerations.

    • The exhilaration and ethical concerns of remote hackingThe story emphasizes the need for responsible use of power and the consideration of consequences when accessing sensitive information remotely.

      The power of hacking and accessing sensitive information remotely can be exhilarating for some individuals. Default, the hacker in this story, felt a sense of satisfaction and empowerment by deleting $9 million worth of debt from a university's student records. This incident and subsequent hacking exploits demonstrate the immense power that can be exerted over the internet. However, as Default's actions became more serious and escalated to accessing various systems, it raises ethical concerns about the responsible use of such power. The story highlights the need for individuals to consider the consequences of their actions, especially when they possess the ability to bring about significant change.

    • Government's Lack of Security Leaves Personal Information Vulnerable to HacksThe ease with which hackers accessed sensitive data emphasizes the urgent need for government agencies and individuals to prioritize cybersecurity and protect sensitive information.

      The lack of security within the government leaves us vulnerable to hacks and exposes the personal information of high-profile individuals, even those in the intelligence community. This story highlights the need for proper operational security and the consequences of not practicing it. Despite the public nature of some personal information, such as names and addresses, the ease with which hackers were able to access sensitive data like social security numbers and redirect phone calls raises concerns about the overall security measures in place. The exposure of these vulnerabilities should serve as a wake-up call for government agencies and individuals to prioritize cybersecurity and take steps to protect themselves and the sensitive information they handle.

    • The CIA director's email hacking incident highlights the vulnerability of high-profile individuals to low-tech hacking methods.Even experts can fall victim to hacking; it's crucial to stay proactive and take necessary precautions in safeguarding personal information.

      Even high-profile individuals like the CIA director can fall victim to low-tech hacking methods. This incident serves as a disturbing and cautionary tale, highlighting the importance of privacy and security in the digital age. The hacker in this case used a simple ruse, pretending to be a Verizon technician to gain access to John Brennan's personal AOL email account. Through a series of calls, they were able to gather enough information to reset the account password and gain access to sensitive emails and attachments. This incident reveals that no matter how knowledgeable one is about privacy and security, human error can still lead to major security breaches. It serves as a reminder to be vigilant and take necessary precautions to protect personal information.

    • Government Hackers: Unveiling Vulnerabilities and Raising ConcernsThe infiltration of high-level government accounts by hackers reveals the potential dangers of interconnected technology and questions the government's ability to protect sensitive information.

      These hackers were able to infiltrate high-level government accounts and databases, causing widespread panic and exposing major security flaws. It became evident that the intelligence community and government agencies were not as impenetrable as they claimed to be. The hackers uncovered personal information of FBI agents and even gained control over individuals' smart devices, highlighting the potential dangers of interconnected technology. The audacity and relentlessness of these hackers stemmed from their frustration with government corruption and hypocrisy. This incident serves as a stark reminder that even the most secure systems are not immune to vulnerabilities, and it raises concerns about the government's ability to protect sensitive information.

    • The Importance of Data Security and the Risks of CybercrimeSafeguarding private data is crucial for all organizations and individuals, as cybercriminals can target anyone, including federal agencies and law enforcement. Constant vigilance and robust cybersecurity measures are necessary to prevent data breaches.

      The security of private and sensitive data is of utmost importance, regardless of the organization or agency involved. The breach of the LEEP database, the CIA Director's personal emails, and the Miami Dade Police Department highlights the vulnerabilities and potential risks associated with the digital world. It is concerning that even federal agencies and law enforcement can fall victim to cybercriminals. This incident underscores the need for robust cybersecurity measures, constant vigilance, and proactive defense strategies. The consequences of data breaches can be far-reaching, impacting individuals, organizations, and national security. This serves as a reminder that safeguarding private data should be a top priority for everyone, from individuals to large institutions.

    • The Decline of Empathy and the Rise of SurveillanceSociety's decline in empathy and complacency has allowed for increased surveillance and hacking activities, highlighting the importance of protecting personal information in the digital age.

      There seems to be a decline in empathy and concern for others in society. The interviewee mentions that people have become complacent and content with the way things are, leading to a dangerous situation where important issues are being overlooked. Meanwhile, organizations like the NSA and Five Eyes are becoming more aggressive in their surveillance and hacking activities. This lack of empathy and complacency is a stark contrast to the past when groups like Anonymous fought against injustices and threats. The interviewee also highlights the potential dangers of hacking and invasion of privacy, stating that the NSA may have played a role in his capture. This suggests the need for increased vigilance and protection of personal information in the digital age.

    • The Risks and Consequences of Illegal Online ActivitiesEngaging in illegal activities online can lead to serious consequences, as shown in the story of DEFAULT. Even advanced security measures can be compromised, and archiving incriminating evidence can strengthen a case against you.

      Engaging in illegal activities online can lead to serious consequences. The story of DEFAULT highlights the risks involved in hacking and unauthorized access to sensitive information. After being involved in hacking activities and getting linked to Julian Assange and the NSA, DEFAULT's computer was hacked and monitored by federal authorities. Despite his precautions to encrypt his hard drive, he was unable to protect himself when faced with armed officials. This shows that even advanced security measures can be compromised. Additionally, DEFAULT's tendency to archive incriminating evidence and videos further played against him, making it easier for authorities to build a strong case. This serves as a cautionary tale about the potential dangers and potential legal repercussions of engaging in illegal activities online.

    • Safeguarding Your Digital Presence and Embracing Personal GrowthTake proactive steps to protect your digital privacy and security, such as encrypting personal devices and practicing secure online habits. Learn from mistakes and embrace personal growth.

      Digital privacy and security are crucial in protecting ourselves from potential harm and consequences. The story highlights the dangers of not encrypting personal devices and the risks associated with recording incriminating evidence. It also sheds light on the devastating effects of having private information exposed to the public, as seen with government officials who were doxxed and had their lives severely impacted. The narrative emphasizes the importance of taking proactive measures to safeguard our digital presence, such as encryption, strong passwords, and secure online practices. Additionally, it imparts a message of resilience and the possibility for personal growth and redemption, even in the face of adversity and mistakes.

    • Protecting our Privacy in an Insecure Digital WorldWe need to prioritize our privacy by being cautious about sharing personal information, exploring alternative methods of authentication, and advocating for a comprehensive and holistic approach to data protection.

      There is a pressing need for a better system to protect our private information and provide tools to maintain our privacy. Data breaches, doxxing, and companies sharing our data have made it increasingly difficult to keep our personal information secure. We need to be more cautious about who we share our information with and reduce the situations that require us to provide it. Additionally, we should explore alternative methods of authentication that don't rely solely on private information. While there are some solutions available, they are fragmented and complicated. A comprehensive and holistic approach is necessary to address this problem and safeguard our most important data from falling into the wrong hands.

    Recent Episodes from Darknet Diaries

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    137: Predator

    137: Predator
    A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then suck up all the data from it. Contacts, text messages, location, and more. This malware is being sold to intelligence agencies around the world. In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching this story which was published here: https://www.lighthousereports.com/investigation/flight-of-the-predator/. We also hear from Bill Marczak and John Scott-Railton from Citizen Lab. If you want to hear about other mercenary spyware, check out episodes 99 and 100, about NSO group and Pegasus. To hear another episode about Greece check out episode 64 called Athens Shadow Games. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Break The Internet

    Break The Internet
    In 1999, most of America's tech hysteria centered around Y2K. But at that same time, a teenager in Canada named Mike Calce was messing around in chat rooms, meeting hackers, and learning tricks. At 15, he decided to put his knowledge to the test. To push up against the Internet's limits, and in some places, break them. In the end, he managed to pull off something no one had ever seen before. Today, we talk to the self-proclaimed “MafiaBoy.” Say hello on Twitter, Facebook and Instagram. Sign up for our occasional newsletter, The Accomplice. Follow the show and review us on Apple Podcasts: iTunes.com/CriminalShow. We also make This is Love and Phoebe Reads a Mystery. Artwork by Julienne Alexander. Check out our online shop.  Episode transcripts are posted on our website. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    EP56 | 網路安全中的社交工程,小心別上當了! feat. 鄧達鈞校長

    EP56 | 網路安全中的社交工程,小心別上當了! feat. 鄧達鈞校長
    【本集重點】 你有沒有聽過「社交工程」呢? 如何辨識社交工程操作手法呢? 利用人性的弱點,好奇心是最大的安全漏洞! 防禦與避免~隨時啟動社交工程演練! 【本集來賓】 鄧達鈞候用校長/桃園市政府教育局 📢 想瞭解更多資訊素養與倫理相關內容嗎? 歡迎來 eliteracy 官網找我們唷! 👉 eliteracy 傳送門 https://linktr.ee/funsurfing

    IPP 2012 (Big Data): Welcome and Plenary Panel

    IPP 2012 (Big Data): Welcome and Plenary Panel
    Panellists discuss the opportunities and challenges posed by big data for research and public policy-making at the conference "IPP2012: Big Data: Big Challenges". This is the opening plenary panel of the conference Internet, Politics, Policy 2012: Big Data, Big Challenges? organised by the OII-edited journal Policy and Internet (Oxford, 20-21 September 2012). The panellists discuss the potential and challenges of big data for public policy-making. Big data offers enormous scope for understanding societal behaviour and citizens' willingness - or unwillingness - in terms of civic engagement. It can allow the design of efficient and realistic policy and administrative change. Also, however, it brings ethical challenges, for example when big data is used for probabilistic policy-making, raising issues of justice, equity and privacy. And big data generation and analysis requires expertise and skills which can challenge governmental organizations in particular, given their dubious record on the guardianship of large scale datasets, the management of large technology-based projects, and capacity to innovate.

    Related Podcasts

    Dads & Daughters Talk!

    Dads & Daughters Talk!
    Family based podcast, discussing imperative topics regarding fathers, families, community and the next generation. We see issues everyday that leads to the statement, "It Starts at Home". Well, now we can talk about home, out loud! Fathers play a major role in a family household, but who knows, someone may think otherwise! Let's talk about it!

    By: Sharice Taylor

    Total Episodes: 6

    Topics:government

    The Plebeian Power Hour

    The Plebeian Power Hour
    A podcast by ordinary folks that shows just how extra ordinary they really are. Hosted by Kim and Tiffer, and covering a range of topics from history and current events, and sometimes just some casual conversation from a couple of regular folks.

    By: Kim and Tiffer

    Total Episodes: 44

    Topics:historygovernment