SlideShare a Scribd company logo
1 of 2
Unearned Fame and Stolen Fortune in 21st-Century Cyberspace
“In the future, everyone will be famous for 15 minutes,” pop icon Andy Warhol archly
predicted.
Warhol himself didn’t live long enough to witness many of the technological innovations
that would make that true. He may have seen the original Macintosh, but he missed the
Internet, the decade of the 90s, Y2K, MySpace, iPhones, and YouTube’s dramatic
launch in 2005, which featured a short clip of a man at a zoo.
And he missed out on seeing his prediction turn out to be an incredible understatement.
In the digital age, an Instagram influencer or a mouse who tidies up a workroom can live
on forever in cyberspace. Fame has no end, no rhyme or reason, no gatekeeper.
This new reality opens up unlimited possibilities, but also comes with a darker set of
temptations, choices and outcomes. There are whole new categories of crimes, and
new ways to defame and intimidate. Hackers and cyberbullies lurk in the shadows,
keyboard warriors nursing grudges and obsessing over ideologies.
Even as many of the sources of information the Internet offers up, whether TikTok or
Reddit, often lack credibility, these same sources are trusted by millions. Because there
is no managing editor on the Internet, anyone can post anything.
When it comes to personal reputation, this presents a tremendous challenge. People of
goodwill spend a lifetime creating reputations based on conscientious choices made
with integrity. And yet, a single craven post can sweep it all away.
There are also vast new opportunities for misrepresentation and fraud. It wasn’t long
ago that most Internet fraud was self-evident, and often entertaining. Who among us
has never received a direct request from a wealthy Nigerian prince, a hapless potentate
who is curiously unable to open a checking account in his own name?
For years, the man has had millions of dollars burning a hole in his pocket, with no
place to put it. By now, the obstacles facing this phishing, fictional royal are well-known:
unrest in the Congo, a consignment shipment languishing on the dock, a shift in the
local economy from the gold standard to gift cards, or outrageous ATM fees.
Today online crimes are infinitely more sophisticated, and much more serious.
Scammers hold reputations for hostage, offer to withdraw their libels for a fee, plant
malware on home computers, corrupt hospital medical records, infiltrate power grids,
spread disinformation, generate fake photos, empty bank accounts, upend markets by
impersonating government regulators, steal identities, evict homeowners, sow division
and traffic in fear.
It doesn’t take an organized ring to do incredible damage. A lone individual logging on
to Yelp, Glassdoor, Healthgrades, Facebook or RealSelf can have an immense impact
on a person’s life or a company’s future. In the end, a potential victim's sole defenses
are vigilance, knowledge and awareness.
As a society and a civilization, we’ve ventured far from Thomas Jefferson’s ideal: “Truth
is great and will prevail if left to herself, that she is the proper and sufficient antagonist
to error.” Now the more relevant quote is an observation from a New York City
prosecutor, who not long ago remarked: “The Internet is the crime scene of the 21st
Century.”

More Related Content

Similar to Unearned Fame and Stolen Fortune in 21st-Century Cyberspace.docx

2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)Felipe Prado
 
Soap Creative's 2017 Future Predictions
Soap Creative's 2017 Future PredictionsSoap Creative's 2017 Future Predictions
Soap Creative's 2017 Future PredictionsSoap Creative
 
Metaverse, by Guilherme Ravache - Forum Edify 2022
Metaverse, by Guilherme Ravache - Forum Edify 2022Metaverse, by Guilherme Ravache - Forum Edify 2022
Metaverse, by Guilherme Ravache - Forum Edify 2022Gui Ravache
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)Felipe Prado
 
WebSummit - key themes and humorous visuals
WebSummit - key themes and humorous visualsWebSummit - key themes and humorous visuals
WebSummit - key themes and humorous visualsJennifer Crowley
 
2011 Global Brand - Miguel Guedes de Sousa
2011 Global Brand - Miguel Guedes de Sousa2011 Global Brand - Miguel Guedes de Sousa
2011 Global Brand - Miguel Guedes de SousaMiguel Guedes de Sousa
 
The hacker crackdown 4 the civil libertarians
The hacker crackdown 4 the civil libertariansThe hacker crackdown 4 the civil libertarians
The hacker crackdown 4 the civil libertariansrmvvr143
 
Quoting A Play In An Essay Harvard
Quoting A Play In An Essay HarvardQuoting A Play In An Essay Harvard
Quoting A Play In An Essay HarvardKatie Harris
 
What Can I Do If I Am Having Trouble Writing An Essay RWritingbeast
What Can I Do If I Am Having Trouble Writing An Essay RWritingbeastWhat Can I Do If I Am Having Trouble Writing An Essay RWritingbeast
What Can I Do If I Am Having Trouble Writing An Essay RWritingbeastAshley Hernandez
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftAlireza Ghahrood
 
Manifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO communityManifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO communityVladislav Solodkiy
 
Cybercrime and Warfare: All that matters
Cybercrime and Warfare: All that mattersCybercrime and Warfare: All that matters
Cybercrime and Warfare: All that matters- Mark - Fullbright
 
CultureLab's 10 Trends to Watch in 2014
CultureLab's 10 Trends to Watch in 2014CultureLab's 10 Trends to Watch in 2014
CultureLab's 10 Trends to Watch in 2014Kevin Walker
 

Similar to Unearned Fame and Stolen Fortune in 21st-Century Cyberspace.docx (20)

2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 
Alumni Meetinfg2022-August.pptx
Alumni Meetinfg2022-August.pptxAlumni Meetinfg2022-August.pptx
Alumni Meetinfg2022-August.pptx
 
Afrofutures?
Afrofutures?Afrofutures?
Afrofutures?
 
Soap Creative's 2017 Future Predictions
Soap Creative's 2017 Future PredictionsSoap Creative's 2017 Future Predictions
Soap Creative's 2017 Future Predictions
 
Metaverse, by Guilherme Ravache - Forum Edify 2022
Metaverse, by Guilherme Ravache - Forum Edify 2022Metaverse, by Guilherme Ravache - Forum Edify 2022
Metaverse, by Guilherme Ravache - Forum Edify 2022
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
 
WebSummit - key themes and humorous visuals
WebSummit - key themes and humorous visualsWebSummit - key themes and humorous visuals
WebSummit - key themes and humorous visuals
 
B2B2-Chapter-2.pdf
B2B2-Chapter-2.pdfB2B2-Chapter-2.pdf
B2B2-Chapter-2.pdf
 
2011 Global Brand - Miguel Guedes de Sousa
2011 Global Brand - Miguel Guedes de Sousa2011 Global Brand - Miguel Guedes de Sousa
2011 Global Brand - Miguel Guedes de Sousa
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
The hacker crackdown 4 the civil libertarians
The hacker crackdown 4 the civil libertariansThe hacker crackdown 4 the civil libertarians
The hacker crackdown 4 the civil libertarians
 
Quoting A Play In An Essay Harvard
Quoting A Play In An Essay HarvardQuoting A Play In An Essay Harvard
Quoting A Play In An Essay Harvard
 
What Can I Do If I Am Having Trouble Writing An Essay RWritingbeast
What Can I Do If I Am Having Trouble Writing An Essay RWritingbeastWhat Can I Do If I Am Having Trouble Writing An Essay RWritingbeast
What Can I Do If I Am Having Trouble Writing An Essay RWritingbeast
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
 
Top 10 Scams Targeting Seniors
Top 10 Scams Targeting SeniorsTop 10 Scams Targeting Seniors
Top 10 Scams Targeting Seniors
 
Manifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO communityManifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO community
 
Cybercrime and Warfare: All that matters
Cybercrime and Warfare: All that mattersCybercrime and Warfare: All that matters
Cybercrime and Warfare: All that matters
 
ES_16 Author- Niyati Khandelwal
ES_16 Author- Niyati KhandelwalES_16 Author- Niyati Khandelwal
ES_16 Author- Niyati Khandelwal
 
CultureLab's 10 Trends to Watch in 2014
CultureLab's 10 Trends to Watch in 2014CultureLab's 10 Trends to Watch in 2014
CultureLab's 10 Trends to Watch in 2014
 

Recently uploaded

Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsrahman018755
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxChloeMeadows1
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?Linksys Velop Login
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkklolsDocherty
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.Tortogel
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresencePC Doctors NET
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appscristianmanaila2
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfOndejSur
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirtrahman018755
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfappinfoedgeca
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideVarun Mithran
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsrahman018755
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsrahman018755
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebJie Liau
 

Recently uploaded (17)

Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 

Unearned Fame and Stolen Fortune in 21st-Century Cyberspace.docx

  • 1. Unearned Fame and Stolen Fortune in 21st-Century Cyberspace “In the future, everyone will be famous for 15 minutes,” pop icon Andy Warhol archly predicted. Warhol himself didn’t live long enough to witness many of the technological innovations that would make that true. He may have seen the original Macintosh, but he missed the Internet, the decade of the 90s, Y2K, MySpace, iPhones, and YouTube’s dramatic launch in 2005, which featured a short clip of a man at a zoo. And he missed out on seeing his prediction turn out to be an incredible understatement. In the digital age, an Instagram influencer or a mouse who tidies up a workroom can live on forever in cyberspace. Fame has no end, no rhyme or reason, no gatekeeper. This new reality opens up unlimited possibilities, but also comes with a darker set of temptations, choices and outcomes. There are whole new categories of crimes, and new ways to defame and intimidate. Hackers and cyberbullies lurk in the shadows, keyboard warriors nursing grudges and obsessing over ideologies. Even as many of the sources of information the Internet offers up, whether TikTok or Reddit, often lack credibility, these same sources are trusted by millions. Because there is no managing editor on the Internet, anyone can post anything. When it comes to personal reputation, this presents a tremendous challenge. People of goodwill spend a lifetime creating reputations based on conscientious choices made with integrity. And yet, a single craven post can sweep it all away. There are also vast new opportunities for misrepresentation and fraud. It wasn’t long ago that most Internet fraud was self-evident, and often entertaining. Who among us has never received a direct request from a wealthy Nigerian prince, a hapless potentate who is curiously unable to open a checking account in his own name? For years, the man has had millions of dollars burning a hole in his pocket, with no place to put it. By now, the obstacles facing this phishing, fictional royal are well-known: unrest in the Congo, a consignment shipment languishing on the dock, a shift in the local economy from the gold standard to gift cards, or outrageous ATM fees. Today online crimes are infinitely more sophisticated, and much more serious. Scammers hold reputations for hostage, offer to withdraw their libels for a fee, plant
  • 2. malware on home computers, corrupt hospital medical records, infiltrate power grids, spread disinformation, generate fake photos, empty bank accounts, upend markets by impersonating government regulators, steal identities, evict homeowners, sow division and traffic in fear. It doesn’t take an organized ring to do incredible damage. A lone individual logging on to Yelp, Glassdoor, Healthgrades, Facebook or RealSelf can have an immense impact on a person’s life or a company’s future. In the end, a potential victim's sole defenses are vigilance, knowledge and awareness. As a society and a civilization, we’ve ventured far from Thomas Jefferson’s ideal: “Truth is great and will prevail if left to herself, that she is the proper and sufficient antagonist to error.” Now the more relevant quote is an observation from a New York City prosecutor, who not long ago remarked: “The Internet is the crime scene of the 21st Century.”