Think the roofs. Whitfield and stephanie strong. Party in chat with musicians from around the world. Make grooves every week. Now these guys might try to look scary but honestly theyre so Nine Hundred Ninety todays criminals dont need massed stroll bars or guns to get their hands on your cash the requirements for brazen burglars nowadays include a computer a solid wife i connection and preferably some coding skills welcome to made where
our topic this week is cyber crime a first report takes us to the philippines where a ring of online fraudsters was busted last year and a massive operation the perpetrators exploited peoples hopes dreams and greed and sweet talk them into handing over shoot sums of cash. On june sixth twenty eighteen a Special Police Unit raided a call center near manila and detained almost five hundred people working there. The outfit was allegedly involved in a scam that cost unwitting people around the world hundreds of millions of dollars. Theyd all received a phon
the two thousand and eight cyber attack on one of the world s biggest payment processors the hackers in that case wrote their own software smuggled it into the payment firms computer system and made off with up to one hundred thirty million credit card numbers. but distinguishing the color of a hackers hat isn t always easy when it comes to hacking what s right and what s legal is not always clear cut. sometimes illegal behavior can end up revealing other illegal behavior. a good example of this is the panama paper scandal in it gray hat hackers accessed millions of documents illegally. then they used them to expose tax evasion and fraud by well known and influential people. back in one thousand nine hundred two with the four one forced hacking was in its infancy now it s become a massive it s you in a digital networked world. and in a virtual world just as in the real one the dividing line between good and bad is
this isn t his real name and we can show his face the work he does is highly sensitive. he works in cyber espionage germany s foreign intelligence agency the b.m.d. but no one is supposed to know that. we hardly allowed to film anything including handing in our cellphones and passing through a number of security checks. we need lucas in a distant corner of the building the press box person and the safety officer up present throughout the entire interview. what exactly do you do you know obviously i can t go into detail about what exactly it is i do basically i m a hacker that i intrude into i t. systems to gain information that it s true that the typical cases involve figuring out what s happening abroad and you might want to know what s going on in country x. or y.
this isn t his real name and we can show his face the work he does is highly sensitive. he works in cyber espionage at germany s foreign intelligence agency the b.m.d. but no one is supposed to know that. we hardly allowed to film anything including handing in our cellphones and passing through a number of security checks. we need lucas in a distant corner of the building the press box person and the safety officer i present throughout the entire interview. what exactly do you do you know obviously i can t go into detail about what exactly it is i do basically i m a hacker that i intrude into i t. systems to gain information that it s true that the typical cases involve figuring out what s happening abroad. you might want to know what s going on in country x. or y. . for example you want to find out about weapons and defense technology somewhere
i m sure a toddler is being hit by his mother. breaking up lots. of child sleeps in the streets because her family through her. fear. online bullying. pushes a teenager over the edge. just because you can see violence against children doesn t mean it isn t there make the invisible visible of us might violence against children disappear.