Cyber Crime Quotes

We've searched our database for all the quotes and captions related to Cyber Crime. Here they are! All 46 of them:

We went on a Senate kiss-ass tour, but apparently, I have a genetic inability to pucker.
Guy Morris (Swarm)
If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology. BRUCE SCHNEIER Cyber
Marc Goodman (Future Crimes)
People, like buildings, have facades. Tom created his. His walk was a feat. It had taken him twenty years of killing bad guys and a pair of Tony Lama boots to perfect the illusion. He made sure that everyone felt it by the third clunk of his boot heel. When he entered a crime scene there was a hush, and no one ever quite knew why they were holding their breath. But he did. A crime scene was theater and the stage was his.
Michael Ben Zehabe
Well, bingo, his name popped up in the database on this crime ring’s computer as one of their own. Sloane, Wilma, KazuKen, Celi-hag, BunnyMuff, were all part of the illegal and criminal cyber-bullying ring that used blackmail to extort celebrities and famous authors, musicians, schools like Aunt Sookie Acting Academy for money or they will post lies, false rumors, photo shopped fake photos, and accusations of fake awards, fake credentials on the internet. They did that to Summer and tried to do that with Aunt Sookie, apparently. But as seemingly innocent as they seem, using young girls’ photos as their supposed fake identities, they really were part of a larger crime ring.”, Loving Summer by Kailin Gow
Kailin Gow (Loving Summer (Loving Summer, #1))
privacy invasion and incidence of cyber crimes and misdemeanors. To be able to effectively respond to internet intrusion incidents, me
폰캐시 카톡PCASH
My crime is that of outsmarting you, something that you will never forgive me for.
Parmy Olson (We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency)
Like people who smoke a joint with someone to make sure that person isn’t a cop. Or a hooker who asks her john, “Are you a cop? You know you have to tell me if you are.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
This Saturday? As in tomorrow Saturday? We have to give lectures in twelve hours? We're not prepared for that! I can't just pull a cyber-crimes lecture out of my ass!" He could, but it was the principle of the thing.
Abigail Roux (Divide & Conquer (Cut & Run, #4))
I was cyber-bullied before all those Myspace-related suicides, so my school principal wasn't really impressed when my mom complained about what was happening to me on my Xanga blog and on AIM chat. “Get your life sorted out, you fucking scitzo [sic] dyke tranny bitch,” one comment might say. Another comment would say something like, “I know she's reading this, she's so pathetic.” And, perhaps most frightening of all: “I'm going to fuck you up until your mother bleeds.
Nenia Campbell (Freaky Freshman)
China has secretly developed an army of 180,000 cyber spies and warriors, mounting an incredible ninety thousand computer attacks a year against the U.S. Defense Department networks alone. The totality of the thefts and their impact on American national security are breathtaking.
Marc Goodman (Future Crimes)
Real cybersecurity means that your Security Operations team is consistently pen testing your network with the same stealth and sophistication as the Russian nation state, the same desperation as China’s 13th Five Year Plan, the same inexhaustible energy of the Cyber Caliphate and the same greed and ambition for monetary payoff as a seasoned cyber-criminal gang.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
An investigation by the House Energy and Commerce Committee revealed that “more than a dozen American utility companies reported ‘daily,’ ‘constant,’ or ‘frequent’ attempted cyber-attacks ranging from phishing to malware infection to unfriendly probes. One utility reported that it had been the target of more than 10,000 attempted cyber attacks each month.” The report concluded that foreign governments, criminals, and random hackers were all hard at work either planning or attempting to take down the grid.
Marc Goodman (Future Crimes)
As he looked around the computer, he realized the PC was acting as the back-end system for the point-of-sale terminals at the restaurant—it collected the day’s credit card transactions and sent them in a single batch every night to the credit card processor. Max found that day’s batch stored as a plain text file, with the full magstripe of every customer card recorded inside. Even better, the system was still storing all the previous batch files, dating back to when the pizza parlor had installed the system about three years earlier.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
You can never trust the deceptive, manipulative and abusive financial solicitors/beggars of political funds of handsome putschists who commit defamation, calumny, polemics mongering, gossip-mongering, mob lynching, group bullying, cyber libel, threats, blackmail, digital aggression, character assassination, mudslinging and Machiavellian manipulators who habitually commit various crimes: forgery, fraud, libel, slander, identity theft, racketeering, and malversation of funds. ~ Angelica Hopes, an excerpt from Sfidatopia Book 2, Stronzata Trilogy Genre: Inspirational, political literary novel © Ana Angelica Abaya van Doorn
Angelica Hopes
Go away.” I stick my elbow in his ribs and force him to step back. “Sit on the couch and keep your hands to yourself,” I instruct, then follow him to the sofa and grab my Dating and Sex for Dummies books off the coffee table and shove them into my sock drawer while he laughs. “You’re making me miss my show,” I gripe as I toss things into the suitcase. “Your show? You sound like you’re eighty.” He glances at the TV behind me then back to me. “Murder on Mason Lane,” he says. “It was the neighbor. She was committing Medicare fraud using the victim’s deceased wife’s information. He caught on so she killed him.” I gasp. “You spoiler! You spoiling spoiler who spoils!” Then I shrug. “This is a new episode. You don’t even know that. It’s the daughter. She killed him. I’ve had her pegged since the first commercial break.” “You’re cute.” “Just you wait,” I tell him, very satisfied with myself. I’m really good at guessing whodunnit. “Sorry, you murder nerd, I worked on this case two years ago. It’s the neighbor.” “Really?” I drop my makeup bag into the suitcase and check to see if he’s teasing me. “I swear. I’ll tell you all the good shit the show left out once we’re on the plane.” I survey Boyd with interest. I do have a lot of questions. “I thought you were in cyber crimes, not murder.” “Murder isn’t a department,” he replies, shaking his head at me. “You know what I mean.” “Most crimes have a cyber component to them these days. There’s always a cyber trail.” Shit, that’s hot.
Jana Aston (Trust (Cafe, #3))
This is likely to bring about an increase in privacy invasion and incidence of cyber crimes and misdemeanors. To be able to effectively
폰캐시 카톡PCASH
Stuxnet is perhaps the most infamous of APTs, but it has cousins such as Flame and Duqu, along with many others yet to be discovered. Worse, now that Stuxnet, a tool developed to attack industrial control systems and take power grids off-line, is out in the wild and available for download, it has been extensively studied by Crime, Inc., which is rapidly emulating its techniques and computer code to build vastly more sophisticated attacks. The deep challenge society faces from the growth of the malware-industrial complex is that once these offensive tools are used, they have a tendency to leak into the open. The result has been the proliferation of open-source cyber weapons now widely available on the digital underground for anybody to redesign and arm as he or she sees fit. How long will it be before somebody picks up one of these digital Molotov cocktails and lobs it back at us with the intent of attacking our own critical infrastructure systems? Sadly, preparations may already be under way.
Marc Goodman (Future Crimes)
In the early twenty-first century, as criminals figured out ways to monetize their malicious software through identity theft and other techniques, the number of new viruses began to soar. By 2015, the volume had become astonishing. In 2010, the German research institute AV-Test had assessed that there were forty-nine million strains of computer malware in the wild. By 2011, the antivirus company McAfee reported it was identifying two million new pieces of malware every month. In the summer of 2013, the cyber-security firm Kaspersky Lab reported it identified and isolated nearly 200,000 new malware samples every single day.
Marc Goodman (Future Crimes)
Marc Goodman is a cyber crime specialist with an impressive résumé. He has worked with the Los Angeles Police Department, Interpol, NATO, and the State Department. He is the chief cyber criminologist at the Cybercrime Research Institute, founder of the Future Crime Institute, and now head of the policy, law, and ethics track at SU. When breaking down this threat, Goodman sees four main categories of concern. The first issue is personal. “In many nations,” he says, “humanity is fully dependent on the Internet. Attacks against banks could destroy all records. Someone’s life savings could vanish in an instant. Hacking into hospitals could cost hundreds of lives if blood types were changed. And there are already 60,000 implantable medical devices connected to the Internet. As the integration of biology and information technology proceeds, pacemakers, cochlear implants, diabetic pumps, and so on, will all become the target of cyber attacks.” Equally alarming are threats against physical infrastructures that are now hooked up to the net and vulnerable to hackers (as was recently demonstrated with Iran’s Stuxnet incident), among them bridges, tunnels, air traffic control, and energy pipelines. We are heavily dependent on these systems, but Goodman feels that the technology being employed to manage them is no longer up to date, and the entire network is riddled with security threats. Robots are the next issue. In the not-too-distant future, these machines will be both commonplace and connected to the Internet. They will have superior strength and speed and may even be armed (as is the case with today’s military robots). But their Internet connection makes them vulnerable to attack, and very few security procedures have been implemented to prevent such incidents. Goodman’s last area of concern is that technology is constantly coming between us and reality. “We believe what the computer tells us,” says Goodman. “We read our email through computer screens; we speak to friends and family on Facebook; doctors administer medicines based upon what a computer tells them the medical lab results are; traffic tickets are issued based upon what cameras tell us a license plate says; we pay for items at stores based upon a total provided by a computer; we elect governments as a result of electronic voting systems. But the problem with all this intermediated life is that it can be spoofed. It’s really easy to falsify what is seen on our computer screens. The more we disconnect from the physical and drive toward the digital, the more we lose the ability to tell the real from the fake. Ultimately, bad actors (whether criminals, terrorists, or rogue governments) will have the ability to exploit this trust.
Peter H. Diamandis (Abundance: The Future is Better Than You Think)
Xang Xu, the name read beneath his picture. Wanted for computer fraud and various other cyber crimes. By the freaking FBI and god
Kaylea Cross (Marked (Hostage Rescue Team #1))
It is clear that criminals, hacktivists, and terrorists use our interconnectivity against us, whether for profit, politics, or massacre. They have schooled themselves in science and technology and have proven a formidable force in exploiting the fundamentally insecure nature of our twenty-first-century technological skin. Yet thieves, hackers, activists, and terrorists are not the sole inhabitants of the digital underground. They are accompanied by a phalanx of nation-states, cyber warriors, and foreign intelligence services, each handily playing in the so-called fifth domain, fully leveraging for their own purposes the insecurity of the underlying digital infrastructure that unifies the planet.
Marc Goodman (Future Crimes)
Charity had learned to accept the bitterness Max brought back from prison: Living with him meant never again watching a crime drama on TV, because any depiction of the police as good guys set Max fuming.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
A few months before Max went to jail, a white-hat hacker had invented a sport called “war driving” to highlight the prevalence of leaky networks in San Francisco. After slapping a magnetically mounted antenna to the roof of his Saturn, the white hat cruised the city’s downtown streets while his laptop scanned for beaconing Wi-Fi access points.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
The Honeynet Project would secretly wire a packet sniffer to the system and place it unprotected on the Internet, like an undercover vice cop decked out in pumps and a short skirt on a street corner.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
When his birthday came soon after the party, she sent a decorated box of balloons to his office at MPath, and Max was moved nearly to tears by the gesture.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
Business exploded overnight. Cesar built his own website, began vending on Shadowcrew, got an 800 number, and started accepting e-gold, an anonymous online currency favored by carders.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
fraud against its customers, and rising cyber-insurance
Marc Goodman (Future Crimes)
To analyse cyber-security, we need to augment our current research to include monitoring at the centre, and this too needs to dive deep into the packet structure. As
Mark Osborne (Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency: Is Hollywood's blueprint for Chaos coming true (In the Brown Stuff Series Book 1))
Word is you guys have one of the best cyber-crime units in the country.” “The best. It’s headed up by Mark Wolfe. He’s a legend in law-enforcement circles.
Laura Griffin (Beyond Limits (Tracers #8))
Congress is a federation of fiefdoms, subject to the vicissitudes of constant fundraising and the lobbying of those who have donated the funds.
Richard A. Clarke
Behind them, the long wooden pews were mostly empty: no friends, no family, no Charity; she’d already told Max she wasn’t going to wait for him.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
The Codex of Seeds Serpent_120 Dragon woke up. He did his daily routine, and went out into the city. The quickly growing city of GemFall was where this assassin lived. Of course, no one knew he was an assassin. Except for, ya know, the city's sworn enemies, and his partner in crime, Cyber. Their mission was to just get to know the civilians, maybe make some friends, and maybe just, sneak their way up through the military ranks, and maybe detonate all of the city's explosives so they could steal a high-tech blueprint? But that’s just a maybe of course. He met up with Cyber where every highly trained assassin goes to meet up. It was discreet. It was luxurious. It was MCDONALDS. No, seriously. Surly no one would suspect a person at McDonalds. Dragon quickly took a seat and waited for Cyber to arrive. After a while, Cyber arrived. "Wonderful news," Cyber said "You talk like a child, not a professional." "Wow, going after the way I talk now, that’s so mature. Either way, while you were up there lazing in your high-rise apartment, I have been doing work, and now, I have control over the shed." "Wonderful, so now I will be doing the actual important work and completing this mission," said Dragon Cyber sneered at him, gave him the shed pass, and they left. Dragon walked over to the military district in the city. He found the shed, and was about to walk in the door, when he was stopped. "Heya chump, you don't look like Commander Cyber. You can't go in there." A guard stopped him. "Oh really, I seem to have the shed pass, giving me authorization to come in there. If you refuse my entry, that would put your job in jeopardy, and we wouldn't want that, would we?" Dragon liked to be as condescending as possible. He liked when people hated him. He strolled in, grabbed a couple explosives, and headed back out. Then he began he trek towards the vault. It was very uneventful. Then, he got to the vault. He began planting explosives around, in strategic locations. He, well, obviously, then ran away. And waited. \ / - BOOM - / \ Dragon smiled. He saw the small, scorched piece of paper on the ground. He smiled. He snuck over and picked it up. He then felt a tap on his shoulder. "Hello good friend," Cyber said as he plucked the paper out of Dragon's hand. "I believe this belongs to me now." Cyber smirked. He waltzed away as Dragon stared in shock as the military surrounded him, and took him away... It was a long trek from GemFall to the DarkStalk's secret base. But Cyber could handle it. He was happy knowing that his annoying little "teammate" was locked up somewhere far away. Somewhere where he could never tell Cyber's superiors what happened. The real truth of what happened that afternoon... EGamer7201 As I looked upon the enemy that towered above me, I took a step back. This was the worst enemy I had ever seen, and to be honest, I was scared. I took my Nexus Orbs, 3 of them, and got ready to fight. I put the orbs that I had protected with my life on my belt. I took out my glowing blade, with the mystical rune, quintuple darkness stab. This enemy was called Ending. It had Glowing red eyes, and was pure black, and had white spots. I looked at it, scanned it, and the stats were: HP: 13000001 AP (Attack points) : 9999 DP (Defense points) :2000000 Few, this is gonna be hard. I screamed, "FOR THE NEXUS!!!" and teleported toward Ending. TO BE CONTINUED... (Hopefully!) Q & A Blox Is the series almost over?
Pixel Ate (The Accidental Minecraft Family: Book 32: Search & Rescue: First Mission)
Honourable Breeze - a behavioural haiku from the chapter, “Poetic Justice” Honourable Heart? You were spreading smear campaigns. Is that honesty? Honourable mind? You committed forgery. Your cyber libel. Honourable soul? You intentionally hurt, Con, scam, and slander. Honourable mouth? Your habitual offenses Fraud, lies, bullying. Dishonourable. Politicians’ instrument: Machiavellian. Justify your end? with your Machiavellian ways? Note: crime does not pay! Crowned thorny cactus, you pretend to be “yellow,” Ask funding from them. Thorny toxic lies, You discredit whom you scammed. Your: libel, slander. Manipulator, Fraud, bully, provocateur, Machiavellian! Politicians served: You’re a very good person. Thorny irony. People you slandered, Scammed, libeled, deceived, abused. Forgery you did. Your former victim, From twelve or ten years ago: said, “you’re a devil.” “Move away from her,” Your past victims had warned me. I thanked their warning. Warning was too late. Thorny, toxic harridan: you used and abused! Honourable Breeze? For people who benefit from your deceptions. Honourable Breeze? For dirty politicians, Donations and votes. Honourable Breeze? for needy politicians: delivered service. Delivered service? At the expense of others, you manipulate. Manipulations, your catch-me-if-you-can games, Your confidence games! Politicians’ smears, means won’t justify your end, Machiavellian bitch! ~ Angelica Hopes, an excerpt from Life Unfolds © 2021 Ana Angelica Abaya van Doorn
Angelica Hopes
The key to cracking a full-disk encryption program is to get at it while it’s still running on the computer. At that point, the disk is still fully encrypted, but the decryption key is stored in RAM, to allow the software to decrypt and encrypt the data from the hard drive on the fly.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
On another occasion, he claimed, he walked into a bank and wrote a note on the back of a deposit slip: “This is a robbery. I have a bomb. Give me money or I’ll blow the bank.” Then he put the slip back on the pile as a surprise for the next customer.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
DarkMarket turned out to be an unguarded spot. A British carder called JiLsi ran the site, and he’d made the mistake of choosing the same password—“MSR206”—everywhere, including Carders Market, where Max knew everyone’s passwords. Max could just walk in and take over.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
But the swindler had one more trick up his sleeve. Two weeks later he managed to get his bond reinstated, bailed from the detention center, and promptly vanished. Anglerphish was a debacle. After 1,500 hours of work, the government was left with a fugitive informant and tens of thousands of dollars in new fraud.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
According to an FBI report, China has secretly developed an army of 180,000 cyber spies and warriors, mounting an incredible ninety thousand computer attacks a year against the U.S. Defense Department networks alone. The totality of the thefts and their impact on American national security are breathtaking.
Marc Goodman (Future Crimes)
According to a study by the Gartner group, worldwide spending on security software totaled nearly $20 billion in 2012 and is forecast to skyrocket to $94 billion spent annually on cyber security by 2017.
Marc Goodman (Future Crimes)
The following sections survey some of the many US federal computer crime statutes, including         •  18 USC 1029: Fraud and Related Activity in Connection with Access Devices         •  18 USC 1030: Fraud and Related Activity in Connection with Computers         •  18 USC 2510 et seq.: Wire and Electronic Communications Interception and Interception of Oral Communications         •  18 USC 2701 et seq.: Stored Wire and Electronic Communications and Transactional Records Access         •  The Digital Millennium Copyright Act         •  The Cyber Security Enhancement Act of 2002
Daniel Regalado (Gray Hat Hacking: The Ethical Hacker's Handbook)
The Rand Corporation has noted that the nationwide shortage of technical security professionals within the federal government is so critical that it is putting both our national and our homeland security at risk. The finding was echoed by Cisco’s 2014 Annual Security Report, which estimated that there was a talent scarcity of more than a million cyber-security professionals worldwide, expected to grow to two million by 2017. We desperately need more public engagement in protecting our technological future, and even the channels of officialdom have begun to concede the point.
Marc Goodman (Future Crimes)
When we become an autonomous organization, we will be one of the largest unadulterated digital security organizations on the planet,” he told the annual Intel Security Focus meeting in Las Vegas. “Not only will we be one of the greatest, however, we will not rest until we achieve our goal of being the best,” said Young. This is the main focus since Intel reported on agreements to deactivate its security business as a free organization in association with the venture company TPG, five years after the acquisition of McAfee. Young focused on his vision of the new company, his roadmap to achieve that, the need for rapid innovation and the importance of collaboration between industries. “One of the things I love about this conference is that we all come together to find ways to win, to work together,” he said. First, Young highlighted the publication of the book The Second Economy: the race for trust, treasure and time in the war of cybersecurity. The main objective of the book is to help the information security officers (CISO) to communicate the battles that everyone faces in front of others in the c-suite. “So we can recruit them into our fight, we need to recruit others on our journey if we want to be successful,” he said. Challenging assumptions The book is also aimed at encouraging information security professionals to challenge their own assumptions. “I plan to send two copies of this book to the winner of the US presidential election, because cybersecurity is going to be one of the most important issues they could face,” said Young. “The book is about giving more people a vision of the dynamism of what we face in cybersecurity, which is why we have to continually challenge our assumptions,” he said. “That’s why we challenge our assumptions in the book, as well as our assumptions about what we do every day.” Young said Intel Security had asked thousands of customers to challenge the company’s assumptions in the last 18 months so that it could improve. “This week, we are going to bring many of those comments to life in delivering a lot of innovation throughout our portfolio,” he said. Then, Young used a video to underscore the message that the McAfee brand is based on the belief that there is power to work together, and that no person, product or organization can provide total security. By allowing protection, detection and correction to work together, the company believes it can react to cyber threats more quickly. By linking products from different suppliers to work together, the company believes that network security improves. By bringing together companies to share intelligence on threats, you can find better ways to protect each other. The company said that cyber crime is the biggest challenge of the digital era, and this can only be overcome by working together. Revealed a new slogan: “Together is power”. The video also revealed the logo of the new independent company, which Young called a symbol of its new beginning and a visual representation of what is essential to the company’s strategy. “The shield means defense, and the two intertwined components are a symbol of the union that we are in the industry,” he said. “The color red is a callback to our legacy in the industry.” Three main reasons for independence According to Young, there are three main reasons behind the decision to become an independent company. First of all, it should focus entirely on enterprise-level cybersecurity, solve customers ‘cybersecurity problems and address clients’ cybersecurity challenges. The second is innovation. “Because we are committed and dedicated to cybersecurity only at the company level, our innovation is focused on that,” said Young. Third is growth. “Our industry is moving faster than any other IT sub-segment, we have t
Arslan Wani
In 1995 GCHQ also found itself investigating cyber attacks on banks in the City of London. Working with the Department of Trade and Industry and the Bank of England, it began to probe crimes which the banks were extremely anxious to hide. Outwardly, they claimed to be secure, but in fact they had paid out millions of pounds to blackmailers who had gained entry to their systems and threatened to wipe their computer databases. GCHQ was hampered by limited cooperation from the banks, which were reluctant to admit the extent to which they had been damaged, for fear of undermining the confidence of investors. Nevertheless, GCHQ was able to identify forty-six attacks that had taken place over a period of two years, including attacks on three British banks and one American investment house.
Richard J. Aldrich (GCHQ)
Go out the north exit of Nakano Station and into the Sun Mall shopping arcade. After a few steps, you'll see Gindaco, the takoyaki (octopus balls) chain. Turn right into Pretty Good #1 Alley. Walk past the deli that specializes in okowa (steamed sticky rice with tasty bits), a couple of ramen shops, and a fugu restaurant. Go past the pachinko parlor, the grilled eel stand, the camera shops, and the stairs leading to Ginza Renoir coffee shop. If you see the bicycle parking lot in front of Life Supermarket, you're going the right way. During the two-block walk through a typical neighborhood, you've passed more good food than in most midsized Western cities, even if you don't love octopus balls as much as I do. Welcome to Tokyo. Tokyo is unreal. It's the amped-up, neon-spewing cyber-city of literature and film. It's an alley teeming with fragrant grilled chicken shops. It's children playing safely in the street and riding the train across town with no parents in sight. It's a doughnut chain with higher standards of customer service than most high-end restaurants in America. A colossal megacity devoid of crime, grime, and bad food? Sounds more like a utopian novel than an earthly metropolis.
Matthew Amster-Burton (Pretty Good Number One: An American Family Eats Tokyo)
GUCCI LIFE, ANKARA POCKET I discovered this thing about we youths of nowadays; “we actually want to live a “Gucci” life, but with an “Ankara” pocket”, that is; we want to live large but we are not financially qualified to do so; and that is where immorality comes in. Obviously, our insatiable desire for money and other worldly things will definitely leads to us getting involved in immoral acts such as; cyber crime, armed robbery, kidnapping, terrorism etc. Therefore, we have to look for ways to curb or eradicate this, and that is one of the purposes of this association. We need a lot of “Abraham Lincoln”, “Karl Marx”, “Mahatma Gandhi”, “Nelson Mandela”, “Lee Kwan Yew”, “Martin Luther King”, “Gani Fawehinmi”, etc, in our midst to actually make this work. Those who fight for the masses, people who are not self-centred......we have to think of better ways to make things work in this country, but first we have to kill the “Gucci life, Ankara pocket” mentality.
Rahman Abolade Shittu
The internet we know is full of places, languages, territories, and it’s an alternate world in itself. The strange thing is that, deep down, we don’t reinvent anything in this new world. We have this powerful tool, this parallel space that should be ideal, in theory, since it’s completely controlled by us, its creators. And yet it has the same functional faults as the physical world—the real one, you might say. All the social problems of our world exist online: theft, pedophilia, pornography, organized crime, drug trafficking, assassinations… The only difference is that everyone dares to be criminals or morally wrong, at least once, in the cyber world, but even when we do, we’re embarrassed, as if we’re incapable of thinking outside the original format. Humans have created this fantastic space of freedom and made it into a carbon copy of the world system. It’s as if we weren’t creative enough to invent a new moral code that would work online or new representations of ourselves that challenge the ones we’ve always had.
Mónica Ojeda (Nefando)