Murderboard Chapter 04 (EN): Trojan Horses or: State Hacking

Murderboard Chapter 04 (EN): Trojan Horses or: State Hacking

Feeding Pigeons in the Park: Espionage Knowledge is power. Knowing nothing makes one envious when looking at the model of modern information societies. The natural application of networks that transport information is espionage. So the Internet early made acquaintance with it. The aspect of smuggling messages in and out of an area is obvious. It…

Murderboard Chapter 03 (EN): Serial Hackers: Organized Crime or Grand Theft Data

Murderboard Chapter 03 (EN): Serial Hackers: Organized Crime or Grand Theft Data

Motivations and Motifs of the “Cosa Data” Elevate data to a valuable commodity and it gets automatically traded, hoarded, stolen and counterfeited. We can use digital processes both legally and illegally, just like the economy in the physical world. However, cyber crime is about much more than data. Accounts with certain privileges also represent value…

Murderboard Prequel (EN): Where Crime Fiction, Privacy and IT-Security Come Together

Murderboard Prequel (EN): Where Crime Fiction, Privacy and IT-Security Come Together

It was a warm summer day when I got a call from an acquaintance who wanted to hire me for data protection coaching with one of his clients. Besides crime writing, I also work in data protection, helping self-employed people and small businesses to set up their websites and also their internal processes in a…