113 avsnitt • Längd: 30 min • Månadsvis
Cybercrimeology is a podcast about cybercrime, its research and its researchers. We talk to top researchers from around the world to learn about different forms of cybercrime and their research. We learn about cybercrime theory, organized crime online, Darknet drug markets, cybercrime awareness and crime prevention, technology-facilitated intimate partner violence and much more.
The podcast has been running since November of 2019 and there is still so much to learn. I am happy to have you along for the journey into this fascinating subject.
The podcast Cybercrimeology is created by Cybercrimeology. The podcast and the artwork on this page are embedded on this page using the public podcast feed (RSS).
Dr Marleen Weulen Kranenbarg
https://research.vu.nl/en/persons/marleen-weulen-kranenbarg
Hack the Box - A popular online platform offering a variety of CTF challenges to test and improve cybersecurity skills.
NorthSec - A popular in-person CTF competition designed for everyone excited about cybersecurity.
HackerOne - A leading bug bounty platform connecting ethical hackers with organizations to find and fix vulnerabilities.
Bugcrowd - A platform that hosts bug bounty programs for a wide range of companies and industries.
About Our Guest:
Dr. Tom Holt
https://cj.msu.edu/directory/holt-tom.html
Key Topics Discussed:
Papers and Resources Mentioned:
Other:
This episode was recorded on location in at HEC Montreal. The occasional background noise from students only adds to the vibrant atmosphere of the discussion. So you can’t complain about the noise being distracting, consider it an authentic experience!
Episode Summary
About Our Guest:
Asier Moneva
https://nscr.nl/en/medewerker/asier-moneva/
https://www.thuas.com/research/research-groups/team-cybercrime-cybersecurity
Resources and References Mentioned in This Episode:
The Open Science Framework (OSF)
The OSF is an open-source platform supporting transparent and reproducible research across disciplines.
The Open Science Framework:
Paper Introducing Registered Reports
This foundational paper outlines the concept of registered reports, a publishing model aimed at reducing bias and enhancing research rigor.
Paper introducing "registered reports":
https://psycnet.apa.org/fulltext/2014-20922-001.html
Retraction Case Study
A recent retraction of a notable article on the replicability of social-behavioral research findings offers insights into challenges within open science practices.
RETRACTED ARTICLE: High replicability of newly discovered social-behavioural findings is achievable:
https://www.nature.com/articles/s41562-023-01749-9
Retraction Note: High replicability of newly discovered social-behavioural findings is achievable:
https://www.nature.com/articles/s41562-024-01997-3
Podcast episode discussing the retraction in depth:
https://open.spotify.com/episode/3rygrbUNocfCEEGd1Byn0V?si=vJDuzQT3S7yJqDEUMycF1w&t=178
Other:
This episode was recorded in a hotel lobby corner with music playing in the background. If the audio sounds a little unusual at times it is because of the noise removal being used to remove that noise being combined with other ‘sound enhancement’ features. I had to go back in and play around with the audio directly before I was even a little happy. The tools work well but they are a little unpredictable. I am increasingly wary of ‘it just works’ audio editing tools. I would have left it in, but the bots chasing copyright infringement are ravenous and indiscriminate.
Episode Notes:
About our Guest:
Maike Raphael
https://www.itsec.uni-hannover.de/en/usec/team/raphael
Papers or resources mentioned in this episode:
Raphael, M. M., Kanta, A., Seebonn, R., Dürmuth, M., & Cobb, C. (2024). Batman hacked my password: A subtitle-based analysis of password depiction in movies. In Proceedings of the Twentieth Symposium on Usable Privacy and Security (pp. 199-211). USENIX Association. https://www.usenix.org/conference/soups2024/presentation/raphael
Other relevant resources:
Information and supplementary materials on the paper "Batman Hacked My Password"
https://www.itsec.uni-hannover.de/de/usec/forschung/medien/password-depiction-in-movies
If you are interested in the right to download the subtitles.
The data source (opensubtitles.org) statement regarding copyright.
https://www.opensubtitles.org/en/dmca
The website has an API with the no limit to the total number of subitles that can be downloaded, only rate limiting. The research team didn't obtain the subtitles this way, but the source they got them from may have. In either case it shows opensubtitles.org views about how their service can be used.
https://opensubtitles.stoplight.io/docs/opensubtitles-api/e3750fd63a100-getting-started
Other:
I had a bunch of movie clips that I was going to include as examples, but with the way that platforms handle DMCA I just don't want to have to bother with trying to assert a claim to fair use. If you are interested I would recommend having a look at the password scene from Horse Feathers (1932) with Groucho Marx, and there is a scene in Iron Man 3 (2013) where Tony Stark asks James Rhodes for his password, and everyone laughs at the bad password. I recommend you watch Kung Fury from 2015 for their parody treatment of the "hackerman". It is actually on YouTube https://youtu.be/bS5P_LAqiVg?si=-OL8Mr1OLY9Dd081
About our Guest:
Judith Donath
https://cyber.harvard.edu/people/jdonath
Key Discussion Points:
Papers and Books Mentioned:
Turing, A. M. (1950). Computing machinery and intelligence. Mind, 59(236), 433-460. https://doi.org/10.1093/mind/LIX.236.433
Zahavi, A. (1975). Mate selection—a selection for a handicap. Journal of Theoretical Biology, 53(1), 205-214. https://doi.org/10.1016/0022-5193(75)90111-3
Veblen, T. (1899). The Theory of the Leisure Class. New York: Macmillan.
https://moglen.law.columbia.edu/LCS/theoryleisureclass.pdf
https://dn720401.ca.archive.org/0/items/theoryofleisurec01vebl/theoryofleisurec01vebl.pdf
Weizenbaum, J. (1966). ELIZA—A computer program for the study of natural language communication between man and machine. Communications of the ACM, 9(1), 36-45. https://doi.org/10.1145/365153.365168
Donath, J. S. (2002). Identity and deception in the virtual community. In Communities in cyberspace (pp. 37-68). Routledge.
https://vivatropolis.com/papers/Donath/IdentityDeception/IdentityDeception.pdf
Current Progress on the forthcoming book: Signals, Truth & Design
https://vivatropolis.com/judith/signalsTruthDesign.html
Donath, J. (2014). The social machine: designs for living online. MIT Press.https://direct.mit.edu/books/monograph/4037/The-Social-MachineDesigns-for-Living-Online
Other:
The Story about the Ferrari executive Deepfake attempt
https://www.carscoops.com/2024/07/ferrari-ceo-impersonator-uncovered-by-colleague-in-deepfake-call/
We geeked out for a moment on Programming languages. Learn about them here.
The C language
https://en.wikipedia.org/wiki/C_(programming_language)
Introduction to C
https://www.w3schools.com/c/c_intro.php
APL Language
https://en.wikipedia.org/wiki/APL_(programming_language)
Learn APL
https://xpqz.github.io/learnapl/intro.html
Try APL
LISP Language
https://en.wikipedia.org/wiki/Lisp_(programming_language)
Learn LISP
Notes:
About our guests:
Dr Miranda Bruce:
https://www.sociology.ox.ac.uk/people/miranda-bruce
https://www.unsw.edu.au/staff/miranda-bruce
Papers or resources mentioned in this episode:
Other:
If you were interested in the topic of this episode, you might also enjoy episode 36 "Cyber criminals are people too".
Notes:
About our guests:
Dr. Laura Huey
https://sociology.uwo.ca/people/profiles/Huey.html
Papers or resources mentioned in this episode:
Huey, L., & Ferguson, L. (2024). ‘No one wants to end up on YouTube’: sousveillance and ‘cop-baiting’ in Canadian policing. Policing and Society, 1–18. https://doi.org/10.1080/10439463.2024.2329239
Huey, L., & Ferguson, L. (2024). “All These Crazies”: Right-Wing Anti-Authoritarian Politics and the Targeting of Public Police. Deviant Behavior, 1–20. https://doi.org/10.1080/01639625.2024.2338890
Huey, L. (2024) The Cascade Effect: An Oral History of the Policing of the Convoy Protests, Independant: 979-8882979859
Other:
Dr Huey provided her own ‘bleep’ noises for this episode to save me the work of having to add them in post production.
Notes:
About our guests:
Joakim Kävrestad
https://ju.se/personinfo.html?sign=KAVJOA
https://www.linkedin.com/in/joakimkavrestad/
Papers or resources mentioned in this episode:
Other:
The button that makes a noise at a street crossing is called a “pedestrian call button” Interestingly they work differently in different countries, They look different, they feel different, they make different noises, some of them have haptic indicators, some call for the lights to change, some don’t, some make sound all the time others just provide more accessible indicators when pressed.
Notes:
About our guests:
Dr. Alice Hutchings:
https://www.cl.cam.ac.uk/~ah793/
Anh V. Vu
https://www.cst.cam.ac.uk/people/vv301
Papers or resources mentioned in this episode:
Anh V. Vu, Alice Hutchings, Ross Anderson. No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment. In Proceedings of the IEEE Symposium on Security and Privacy (S&P'24)
Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross Anderson. Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict. In Proceedings of the ACM World Wide Web Conference (WWW'24)
Other:
Episode Notes:
About our guests:
Dr. Tom Holt
https://cj.msu.edu/directory/holt-thomas.html
https://www.linkedin.com/in/tom-holt-3242a322/
Papers or resources mentioned in this episode:
Cassandra Cross & Thomas J. Holt (2023) More than Money: Examining the Potential Exposure of Romance Fraud Victims to Identity Crime, Global Crime, 24:2, 107-121, DOI: 10.1080/17440572.2023.2185607
Holt, T. J., Turner, N. D., Freilich, J. D., & Chermak, S. M. (2022). Examining the Characteristics That Differentiate Jihadi-Associated Cyberattacks Using Routine Activities Theory. Social Science Computer Review, 40(6), 1614-1630. https://doi.org/10.1177/08944393211023324
Thomas J. Holt, Jin Ree Lee, Joshua D. Freilich, Steven M. Chermak, Johannes M. Bauer, Ruth Shillair& Arun Ross (2022) An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks, Terrorism and Political Violence, 34:7, 1305-1320, DOI: 10.1080/09546553.2020.1777987
Thomas J. Holt, Joshua D. Freilich & Steven M. Chermak (2022) Examining the Online Expression of Ideology among Far-Right Extremist Forum Users, Terrorism and Political Violence, 34:2, 364-384,DOI: 10.1080/09546553.2019.1701446
Other:
Wait for wisdom, Learn to listen, Succession is Success.
Notes:
About our guests:
Dr Lennon Chang
https://www.deakin.edu.au/about-deakin/people/lennon-chang
Papers or resources mentioned in this episode:
Other:
The intro an outro was drafted using generative AI. I think it gave a different flavour.
Notes:
About our guests:
Russell Brewer
https://researchers.adelaide.edu.au/profile/russell.brewer#professional-activities
Bryce Westlake
https://www.sjsu.edu/justicestudies/about-us/directory/westlake-bryce.php
Papers or resources mentioned in this episode:
Brewer R et al. 2023. Advancing child sexual abuse investigations using biometrics and social network analysis. Trends & issues in crime and criminal justice no. 668. Canberra: Australian Institute of Criminology. https://doi.org/10.52922/ti78948
Westlake B et al. 2022. Developing automated methods to detect and match face and voice biometrics in child sexual abuse videos. Trends & issues in crime and criminal justice no. 648. Canberra: Australian Institute of Criminology. https://doi.org/10.52922/ti78566
DEVELOPING AUTOMATED SOFTWARE TOOLS: To Detect Child Sexual Abuse Material Online.
https://adelaidecybercrime.org/software
Other:
This interview
About our guests:
Russell Brewer
https://researchers.adelaide.edu.au/profile/russell.brewer
Lennon Chang
https://www.deakin.edu.au/about-deakin/people/lennon-chang
Benoit Dupont
https://www.benoitdupont.net/en/
Steven Kemp
https://www.udg.edu/ca/directori/pagina-personal?ID=2003705
Rutger Leukfedt
https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1
Katalin Parti,
Bryce Westlake.
Papers or resources mentioned in this episode:
Harari, Y. N. (2015). Sapiens. Harper.
https://www.ynharari.com/book/sapiens-2/
Other:
I edited this one on the road, apologies if the quality is not quite what you are used to.
The next episode will be at the start of next month.
Summary:
The main points of this episode are:
About our guests:
Alloy:
https://platform.openai.com/docs/guides/text-to-speech
voicing generations from
ChatGPT
https://openai.com/blog/chatgpt
Papers or resources mentioned in this episode:
The BART model:
https://huggingface.co/docs/transformers/model_doc/bart
The DistilBERT model:
https://huggingface.co/docs/transformers/model_doc/distilbert
Results:
Which terms were spoken about the most and what was the sentiment around those ?
Noun | Occurrences | FilesOccurredIn | SentimentScoreSum |
people | 2529 | 94 | 92.60830581188202 |
time | 1133 | 83 | 79.5210649 |
research | 1396 | 80 | 79.49750900268553 |
way | 1005 | 74 | 73.79837167263031 |
things | 1238 | 73 | 72.45885318517685 |
lot | 1117 | 71 | 70.87118428945543 |
data | 903 | 46 | 44.24124717712402 |
kind | 667 | 44 | 43.9891608 |
crime | 885 | 43 | 42.725725710392005 |
cyber | 805 | 41 | 39.68457114696503 |
cybercrime | 481 | 38 | 36.90566980838775 |
thing | 393 | 36 | 35.59294366836548 |
security | 527 | 31 | 30.89444762468338 |
information | 467 | 29 | 28.87013864517212 |
Was there a change in the sentiment of the podcast after the end of pandemic conditions, assuming that the pandemic ended at the end of Q3 2021?
The model is given by:
yi∼Normal(μi,σ)yi∼Normal(μi,σ)
where
μi=β0+βafter_event⋅xiμi=β0+βafter_event⋅xi
Here, the parameters are defined as follows:
This provided the results as follows:
Population-Level Effects:
Estimate Est.Error l-95% CI u-95% CI Rhat Bulk_ESS Tail_ESS
Intercept 0.37 0.06 0.26 0.48 1.00 3884 2917
after_event 0.39 0.08 0.23 0.54 1.00 3561 2976
Family Specific Parameters:
Estimate Est.Error l-95% CI u-95% CI Rhat Bulk_ESS Tail_ESS
sigma 0.38 0.03 0.33 0.44 1.00 3608 2817
Other:
The model overlooked Mike Levi's contribution to the History series. That is a bit unfair.
Where there were multiple guests, I did not include them all in the database, hence "no specific guest listed"
Notes:
- Rutger Leukfeldt discusses his background and how he became involved in cybersecurity research. - The importance of cybersecurity education and the new cybersecurity bachelor program at Leiden University.
- The need for a multidisciplinary approach to cybersecurity, which includes not only technical skills but also social and legal aspects.
- Hack_Right is a program designed for juvenile offenders in the Netherlands who have committed cyber-dependent crimes. The program aims to provide education and support to help young offenders turn away from cybercrime and develop positive skills and behaviors. Dr Leukfeldt emphasizes that the program is not about Russian hackers or fraudsters who make millions, but rather about those kids who are experimenting and need help. He also mentions that the program was evaluated through a research study conducted by the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), which found that the program was effective in reducing recidivism among young offenders who participated in the program.
- Regarding interdisciplinary research, Dr Leukfeldt explains that it can be difficult because different disciplines have different traditions and expectations when it comes to research. For example, one discipline may prioritize publishing in academic journals, while another may prioritize presenting at conferences. This can create practical issues for a team that is trying to work together, as different members may have different timelines and goals. Additionally, traditional reviewers may not be familiar with other fields, which can make it challenging to defend interdisciplinary research against criticism. Rutger notes that these challenges can be overcome through effective communication and collaboration, but they do require effort and a willingness to work across disciplines.
- Rutger emphasizes the importance of being constructive and thoughtful in providing feedback. He suggests that reviewers should not only point out flaws in a paper but also offer suggestions for improvement. Additionally, he notes that good reviewers should try to approach a paper with an open mind and be willing to learn from it, even if they are not experts in the field. By doing so, reviewers can help to ensure that research is rigorous, relevant, and impactful. Rutger encourages everyone to strive to be that kind of reviewer who provides constructive feedback and helps to improve the quality of research.
About our Guest:
https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1
https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/
https://www.linkedin.com/in/rutgerleukfeldt
Papers or resources mentioned in this episode:
J. A. M. Schiks, Susanne van ’t Hoff-de Goede & Rutger E. Leukfeldt (2023) An alternative intervention for juvenile hackers? A qualitative evaluation of the Hack_Right intervention, Journal of Crime and Justice, DOI: 10.1080/0735648X.2023.2252394
Loggen, J., Moneva, A., & Leukfeldt, R. (2024). A systematic narrative review of pathways into, desistance from, and risk factors of financial-economic cyber-enabled crime. Computer Law & Security Review, 52, 105858.
https://doi.org/10.1016/j.clsr.2023.105858
Other:
Dutch police send young hackers to intern at IT companies
https://nltimes.nl/2018/12/18/dutch-police-send-young-hackers-intern-companies
20 Companies Pledge Support for the Hack_Right Program
Notes:
- Dr. Benoît Dupont has written a book on the ecology of cybercrime, which was born from his frustration with the segmentation of research on cybercrime within criminology and between disciplines.
- The book argues that all research on cybercrime should be connected because we all live in the same digital ecosystem. - There are many hurdles and obstacles in the way of making positive change in the fight against cybercrime, but Dr. Dupont is optimistic about our chances.
- Residual cybercrime will always subsist, but it can also help identify vulnerabilities in technologies that the industry hasn't identified, which can help improve security.
- It's important to address the needs of victims of cybercrime, which is often forgotten.
- The government has the data or the tools to generate the data but needs to work with the private sector and academia to make sense of the data and agree on a roadmap for anti-cybercrime and anti-cybercrime control and prevention.
About our Guest:
Dr. Benoît Dupont
https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15263/sg/Benoît Dupont/
https://www.linkedin.com/in/benoit-dupont-9369702/
Papers or resources mentioned in this episode:
Dupont, B., Grabosky, P., & Shearing, C. (2003). The Governance of Security in Weak and Failing States. Criminal Justice, 3(4), 331-349. https://doi.org/10.1177/146680250334001
Berg, J., Nakueira, S. & Shearing, C. 2014. Global Non- State Auspices of Security Governance. In: Bersot, H. & Ariigo, B. Eds. The Routledge Handbook of International Crime and Justice Studies. Routledge, 77-97
Other:
“Much time and energy have been devoted by taxonomists to isolating morphological patterns of species and subspecies and determining the geographic ranges of each. This is only a stepping stone to further progress in many lines- units around which accumulations of knowledge could be formed for comparison with one another. Until such units are stabilized so that they can be recognized, specific knowledge cannot accumulate - it will of necessity be generalized because, without such standardization, one worker cannot add to the specific knowledge of others.” pp.3.
Woodbury, A. M. (1952). Ecological taxonomy. Science, 115(2992), 3-3.
Notes:
About our guest:
Dr Steven Kemp
https://www.udg.edu/ca/directori/pagina-personal?ID=2003705
https://www.linkedin.com/in/steven-kemp-ed/
Papers or resources mentioned in this episode:
Kemp, S., Buil-Gil, D., Miró-Llinares, F., & Lord, N. (2023). When do businesses report cybercrime? Findings from a UK study. Criminology & Criminal Justice, 23(3), 468-489. https://doi.org/10.1177/17488958211062359
Kemp, S. (2023). Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. Computers & Security, 127, 103089.
https://doi.org/10.1016/j.cose.2022.103089
Kemp, S. (2022). Fraud reporting in Catalonia in the Internet era: Determinants and motives. European Journal of Criminology, 19(5), 994-1015. https://doi.org/10.1177/1477370820941405
Other:
I am pretty sure I mis-pronounced ‘Girona’, my apologies to the good people from that part of the world.
About our guests:
Dr. Katalin Parti
https://www.linkedin.com/in/partikat
Papers or resources mentioned in this episode:
PROS: Performances to Reduce Online Scams
Parti, Katalin, and Faika Tahir. 2023. "“If We Don’t Listen to Them, We Make Them Lose More than Money:” Exploring Reasons for Underreporting and the Needs of Older Scam Victims" Social Sciences 12, no. 5: 264. https://doi.org/10.3390/socsci12050264
Parti, K. (2022). “Elder Scam” Risk Profiles: Individual and Situational Factors of Younger and Older Age Groups’ Fraud Victimization.
Boal, A. (2000). Theater of the Oppressed. United Kingdom: Pluto.
Freire, P. (1970). Pedagogy of the Oppressed. United States: Herder and Herder.
https://envs.ucsc.edu/internships/internship-readings/freire-pedagogy-of-the-oppressed.pdf
Other:
https://en.wikipedia.org/wiki/Pedagogy_of_the_Oppressed
https://en.wikipedia.org/wiki/Theatre_of_the_Oppressed
My laptop died a few hours before completing this episode. At this point I am guessing it was some kind of issue with the latest update. It is currently a brick. Good thing I spend a lot of time thinking about resilience otherwise this episode would not have happened.
About our guests:
Kenrick Bagnall
https://www.linkedin.com/in/kenrickbagnall/
Papers or resources mentioned in this episode:
KonCyber the Podcast
https://koncyberthepodcast.podbean.com
Other:
If I took anything from Kenrick's story, besides of course all of the policing and technical stuff, it was that you are not too old to seek or take advice nor are you too old to start again.
About our Guest:
Dr Teresa Scassa
https://techlaw.uottawa.ca/people/scassa-teresa
Papers or resources mentioned in this episode:
Robinson, P., & Scassa, T. (2022). The Future of Open Data.
https://ruor.uottawa.ca/bitstream/10393/43648/1/9780776629759_WEB.pdf
Scassa, T. (2020). Designing data governance for data sharing: lessons from sidewalk Toronto.
Scassa, T., Robinson, P., & Mosoff, R. (2022). The Datafication of Wastewater:: Legal, Ethical and Civic Considerations. Technology and Regulation, 2022, 23-35
Scassa, T. (2022). The surveillant university: Remote proctoring, AI, and human rights. Can. J. Comp. & Contemp. L., 8, 271.
Scassa, T. (2023). Regulating AI in Canada: A critical look at the proposed artificial intelligence and data act. The Canadian Bar Review, 101(1)
Other:
This episode was edited using an 'AI' tool for part of the workflow and part of the intro was written by AI. The intro was then rewritten and some of the work of the other AI tool had to be redone manually. We are at the 'click a button and it is done' stage yet.
About our guests:
Dr. Richard Frank
https://www.sfu.ca/criminology/about/faculty/criminology-faculty/richard-frank.html
Noelle Warkentin
https://www.sfu.ca/iccrc/members/memberprofiles/Noelle-Warkentin.html
Papers or resources mentioned in this episode:
Noelle Warkentin, Richard Frank, Yuxuan (Cicilia) Zhang & Naomi Zakimi (2022) Potential cyber-threats against Canada’s critical infrastructure: an investigation of online discussion forums,Criminal Justice Studies, 35:3, 322-345, DOI: 10.1080/1478601X.2022.2081568
Frank, R., & Mikhaylov, A. (2020). Beyond the ‘Silk Road’: Assessing illicit drug marketplaces on the public web. Open Source Intelligence and Cyber Crime: Social Media Analytics, 89-111.
https://link.springer.com/chapter/10.1007/978-3-030-41251-7_4
A. T. Zulkarnine, R. Frank, B. Monk, J. Mitchell and G. Davies, "Surfacing collaborated networks in dark web to find illicit and criminal content," 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA, 2016, pp. 109-114, doi: 10.1109/ISI.2016.7745452.
https://ieeexplore.ieee.org/abstract/document/7745452
Other:
About our guests:
Allysa Czerwinsky
https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/
Diana Benitez
Kwasi Boakye-Boateng
https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/
https://www.unb.ca/cic/membership/researchers.html
Rachel Bleiman
https://liberalarts.temple.edu/content/rachel-bleiman
Shabnam Saderi
https://www.unb.ca/cic/membership/researchers.html
Vicky Desjardins
About our guests:
Allysa Czerwinsky
https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/
Diana Benitez
Kwasi Boakye-Boateng
https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/
https://www.unb.ca/cic/membership/researchers.html
Rachel Bleiman
https://liberalarts.temple.edu/content/rachel-bleiman
Shabnam Saderi
https://www.unb.ca/cic/membership/researchers.html
Vicky Desjardins
About our guests:
Allysa Czerwinsky
https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/
Diana Benitez
Kwasi Boakye-Boateng
https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/
https://www.unb.ca/cic/membership/researchers.html
Rachel Bleiman
https://liberalarts.temple.edu/content/rachel-bleiman
Shabnam Saderi
https://www.unb.ca/cic/membership/researchers.html
Vicky Desjardins
About our guests:
Rachel Bleiman
https://liberalarts.temple.edu/content/rachel-bleiman
Prof Nicolas Vermeys
Papers or resources mentioned in this episode:
Rege, A., & Bleiman, R. (2021, December). Collegiate Social Engineering Capture the Flag Competition. In 2021 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-11). IEEE.
Rege, A., Nguyen, T., & Bleiman, R. (2020, August). A social engineering awareness and training workshop for STEM students and practitioners. In 2020 IEEE Integrated STEM Education Conference (ISEC) (pp. 1-6). IEEE.
Rege, A., & Bleiman, R. (2023, March). A Free and Community-Driven Critical Infrastructure Ransomware Dataset. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20–21 June; Wales (pp. 25-37). Singapore: Springer Nature Singapore.
Other:
The CARE Lab
https://sites.temple.edu/care/social-engineering/course-projects/
The Critical Infrastructure Ransomware Attacks (CIRA) Dataset
https://sites.temple.edu/care/cira/
The Summer Social Engineering School
https://sites.temple.edu/socialengineering/
This episode was edited in part using a text based editing tool that uses machine learning. I think the results were a bit mixed on this episode, particularly in terms of workflow. The tools offer promise though.
About our guests:
Allysa Czerwinsky
https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/
Prof Nicolas Vermeys
Papers or resources mentioned in this episode:
Julia R. DeCook & Megan Kelly (2022) Interrogating the “incel menace”: assessing the threat of male supremacy in terrorism studies, Critical Studies on Terrorism, 15:3, 706-726, DOI: 10.1080/17539153.2021.2005099
Kelly, M., DiBranco, A., & DeCook, J. R. (2022). Misogynist incels and male supremacist violence. In Male supremacism in the United States (pp. 164-180). Routledge.
DeCook, Julia (19 March, 2021) The Issue Isn’t Incels. It’s Racist Misogyny, Global Network on Extremism & Technology**,** https://gnet-research.org/2021/03/19/the-issue-isnt-incels-its-racist-misogyny/
Other:
Research by Tim Squirrell et al
https://www.isdglobal.org/isd-publications/?fwp_publication_category=hate-and-polarisation
News articles regarding the Toronto Van attack:
https://www.vice.com/en/article/bvx4kq/incel-toronto-van-killer-found-guilty-of-murdering-10-people
The interview with Allysa was created as part of the secrev.org conference.
This episode was edited in part using text first audio edition that uses machine learning. It's not bad but I think there are some improvements.
About our guests:
Dr Kevin Steinmetz
https://www.k-state.edu/sasw/faculty/steinmetz.html
https://scholar.google.com/citations?user=mEgRonIAAAAJ&hl=en
Prof Nicolas Vermeys
Papers or resources mentioned in this episode:
Steinmetz, K. F., & Henderson, H. (2012). Hip-Hop and Procedural Justice: Hip-Hop Artists’ Perceptions of Criminal Justice. Race and Justice, 2(3), 155–178. https://doi.org/10.1177/2153368712443969
Kevin F. Steinmetz (2023) Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis,Journal of Applied Security Research, 18:2, 246-266, DOI: 10.1080/19361610.2021.2002119
Steinmetz, K. F., & Holt, T. J. (2023). Falling for Social Engineering: A Qualitative Analysis of Social Engineering Policy Recommendations. Social Science Computer Review, 41(2), 592–607. https://doi.org/10.1177/08944393221117501
Goffman, E. (2002). The presentation of self in everyday life. 1959. Garden City, NY, 259.
Agnew, R. (2006). Pressured into crime: An overview of general strain theory.
Other:
This episode was in part edited using a text based audio editing which is an interesting application of machine learning technology to software.
About our guests:
Dr Jennifer L. Schally
https://cjrc.la.psu.edu/people/jennifer-l-schally/
Prof Nicolas Vermeys
Papers or resources mentioned in this episode:
Derrickson, K. (2023). Advance-Fee Pet Scams Through the Lens of Narrative Victimology.
https://etda.libraries.psu.edu/catalog/25084ksd5317
Whittaker, J. M., & Button, M. (2020). Understanding pet scams: A case study of advance fee and non-delivery fraud using victims’ accounts. Australian & New Zealand Journal of Criminology, 53(4), 497-514.
Button, M., & Whittaker, J. (2021). Exploring the voluntary response to cyber-fraud: From vigilantism to responsibilisation. International Journal of Law, Crime and Justice, 66, 10048
Pemberton, A., Mulder, E., & Aarten, P. G. (2019). Stories of injustice: Towards a narrative victimology. European Journal of Criminology, 16(4), 391-412.
https://journals.sagepub.com/doi/pdf/10.1177/1477370818770843
Other:
The American Kennel Club on “How to Spot a Puppy Scam Online”
https://www.akc.org/expert-advice/puppy-information/spot-puppy-scam/
Brent, Y.(Nov 30, 2022) Beware kitten and puppy scams, as pandemic leads to spike in pet ripoffs, CBC News Canada.
https://www.cbc.ca/news/canada/kitten-pet-puppy-scam-spike-pandemic-canada-us-bbb-fraud-1.6667008
About our guests:
Jordan Howell
https://cina.gmu.edu/people/c-jordan-howell/
Prof Nicolas Vermeys
Papers or resources mentioned in this episode:
Marie Ouellet, David Maimon, Jordan C Howell, Yubao Wu, The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces, The British Journal of Criminology, Volume 62, Issue 6, November 2022, Pages 1518–1536, https://doi.org/10.1093/bjc/azab116
Howell, C. J., Fisher, T., Muniz, C. N., Maimon, D., & Rotzinger, Y. (2023). A Depiction and Classification of the Stolen Data Market Ecosystem and Comprising Darknet Markets: A Multidisciplinary Approach. Journal of Contemporary Criminal Justice, 10439862231158005.
https://journals.sagepub.com/doi/pdf/10.1177/10439862231158005
Other:
An assessment of ransomware distribution on darknet markets
The episode with Dr. Eden Kamar talking about using chatbots for research
https://cybercrimeology.com/episodes/my-parents-are-home-it-would-be-weird-chatbots-grooming-guardians
About our guests:
Dr Kyung-shick Choi
https://www.bu.edu/met/profile/kyung-shick-choi/
Prof Nicolas Vermeys
Other:
Regarding the Canadian cybercrime laws mentioned:
About our Guest:
Dr Eden Kamar
https://www.linkedin.com/in/eden-kamar/
Prof Nicolas Vermeys
Mentioned in this Episode:
Kamar, E., Maimon, D., Weisburd, D., & Shabat, D. (2022). Parental guardianship and online sexual grooming of teenagers: A honeypot experiment. Computers in Human Behavior, 137, 107386.
https://doi.org/10.1016/j.chb.2022.107386
Other:
Thanks to Dr David Maimon for arranging this interview. Dr Eden Kamar was awarded her document and very quickly hired in the period between the recording and publishing of this episode. Congratulations the London Metropolitan University gaining an exciting new associate professor.
About our Guest:
Thomas Dearden
Scott Wright
https://www.linkedin.com/in/scottwright/
Mentioned in this Episode:
France moving away from deterrence.
“using a deterrent approach in cyberspace that would force any attacker to exercise restraint against France is fanciful, but adopting response strategies that galvanise all the options the State has available, both European and international, means cyber attacks can be made particularly costly for attackers”- pp 131, page 39.
Secrétariat général de la défense et de la sécurité nationale (2022) National strategic review 2022 République Française
http://www.sgdsn.gouv.fr/uploads/2022/12/rns-uk-20221202.pdf
Australia moving towards deterrence.
Reuters 2022, 11 November Australia unveils joint cyber police taskforce to 'hunt down' hackers
The name of the mobile game developed in Vietnam was Flappy Bird.
https://en.wikipedia.org/wiki/Flappy_Bird
Other:
Apologies for the audio in this one, we were in a room that suddenly became a lot more crowded after we pressed record. If you hear yourself in the background, next time come over and say 'hi'.
About our Guests:
Dr Marti DeLiema
https://www.cehd.umn.edu/ssw/people/mdeliema/
Scott Wright
https://www.linkedin.com/in/scottwright/
Papers Mentioned in this Episode:
DeLiema, M., Li, Y., & Mottola, G. (2022). Correlates of responding to and becoming victimized by fraud: Examining risk factors by scam type. International Journal of Consumer Studies.https://onlinelibrary.wiley.com/doi/10.1111/ijcs.12886
DeLiema, M., Burnes, D., & Langton, L. (2021). The financial and psychological impact of identity theft among older adults. Innovation in Aging, 5(4), igab043. https://doi.org/10.1093/geroni/igab043
Carpenter, P., & Roer, K. (2022). The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer . John Wiley & Sons.
About our Guest:
Thomas Hyslip
https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx
Greg
Scott Wright
https://www.linkedin.com/in/scottwright/
Papers Mentioned in this Episode:
Paquet-Clouston, M., Paquette, S. O., Garcia, S., & Erquiaga, M. J. (2022). Entanglement: cybercrime connections of a public forum population. Journal of Cybersecurity, 8(1), tyac010.
Heath, C., & Heath, D. (2007). Made to stick: Why some ideas survive and others die. Random House.
https://heathbrothers.com/books/made-to-stick/
Other:
(Australia) Cyber Security Minister Clare O'Neil flags multiple reforms to protect personal data after Medibank data leaks
https://www.abc.net.au/news/2022-11-13/medibank-data-breach-cybersecurity-latest/101648178
International Counter Ransomware Task Force
https://www.homeaffairs.gov.au/cyber-security-subsite/Pages/counter-ransomware-initiative.aspx
About our Guest:
Dr Volkan Topalli
https://aysps.gsu.edu/profile/volkan-topalli/
Scott Wright
https://www.linkedin.com/in/scottwright/
Papers Mentioned in this Episode:
National Crime Victimization Survey (NCVS) Data Dashboard (N-DASH)
National Incident-Based Reporting System (NIBRS)
https://www.fbi.gov/how-we-can-help-you/more-fbi-services-and-information/ucr/nibrs
Wang, F., & Topalli, V. (2022). Understanding Romance Scammers Through the Lens of Their Victims: Qualitative Modeling of Risk and Protective Factors in the Online Context. American Journal of Criminal Justice , 1-37.
https://link.springer.com/article/10.1007/s12103-022-09706-4
Other:
Old wine in new bottles is an old expression, that probably predates the modern English language. As Brinton Webb Woodward put in back in the 1890s book Old Wine in New Bottles for Old and New Friends, “ … we thresh over the same old straw. In literature we find, and decant, and bottle up the old wine,. We pour over the old liquor into new packages and put on labels of our own. Haply we filter away the lees and dregs which time had precipitated to the bottom.” This is quite a nice spin on the phrase as it suggests time as an important element in the process of refining ideas and the process of transference as one that removes the garbage and possibly leaving a little space for the new. That is more positive than the modern interpretation of old institutions with a new name. Interestingly, as it pertains to this particular conversation it could be seen as a turn on the biblical expression of new wine in old wineskins, “. And no man putteth new wine into old bottles; else the new wine will burst the bottles, and be spilled, and the bottles shall perish.” Luke 3:37. This older expression can be taken to suggest that new ideas must be received into a new institutions or there could be a problematic conflict between older structure, or that prior knowledge can negatively affect the understanding of new concepts.
All this to say that the phrase ‘old wine in new bottles’ could be very appropriate to the process that is required for cybersecurity research, if we take Woodward’s interpretation. But it could really be a case of us struggling with ‘new wine in old bottles’.
In either case, the value of new researchers doing new forms of research with new theory is apparent.
About our guests:
Dr Yi Ting Chua
https://cj.ua.edu/people/dr-yi-ting-chua/
Dr Doris Krakrafaa-Bestman
Fangzhou Wang
https://aysps.gsu.edu/phd-student/wang-fangzhou/
Scott Wright
https://www.linkedin.com/in/scottwright/
Papers or resources mentioned in this episode:
Wang, F., & Zhou, X. (2022). Persuasive Schemes for Financial Exploitation in Online Romance Scam: An Anatomy on Sha Zhu Pan (杀猪盘) in China. Victims & Offenders , 1-28.
https://doi.org/10.1080/15564886.2022.2051109
Other:
Newman, L.H. (Jan 2, 2023) Hacker Lexicon: What Is a Pig Butchering Scam?
https://www.wired.com/story/what-is-pig-butchering-scam/
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter, Kai Roer
https://www.securityculturebook.com
I called this episode “Fraudiculture”, because I thought it interesting how the metaphors used to communicate the techniques seemed to target those with an understanding of agriculture, such as raising cows and pigs as endeavours performed with great care and even empathy, but an ultimate aim of exploitation.
I am not vegan, I just like to provide metaphorical options for those that prefer less violent phrasing.
“These are the cries of the carrots, the cries of the carrots! You see, Reverend Maynard Tomorrow is harvest day and to them it is the holocaust”
Tool (1993) Disgustipated[song]. On Undertow. Zoo entertainment.
About Our Guests:
Dr Thomas Dearden
Jordan Howell
https://cina.gmu.edu/people/c-jordan-howell/
Dr Marti DeLiema,
https://www.cehd.umn.edu/ssw/people/mdeliema/
Dr Volkan Topali,
https://aysps.gsu.edu/profile/volkan-topalli/
Eden Komar
https://ebcs.gsu.edu/profile/eden-kamar/
Dr Thomas Hyslip
https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx
And Gary
Scott Wright
https://www.linkedin.com/in/scottwright/
Conferences Mentioned in this Episode:
https://hicss.hawaii.edu | The Hawaii International Conference on System Sciences | Hawaii, USA |
https://chi2023.acm.org | ACM CHI Conference on Human Factors in Computing Systems is the premier international conference of Human-Computer Interaction (HCI). | Hamburg, Germany |
https://spritehub.org/sprite-conference-belfast-28-29-june/ | SPRITE+ Conference (Security Privacy Identity and Trust Engagement Network) | Belfast, Ireland |
https://eurosp2023.ieee-security.org | 8th IEEE European Symposium on Security and Privacy | Delft, The Netherlands |
https://weis2023.econinfosec.org | Workshop on the Economics of Information Security (WEIS). The main topic of the conference is Digital Sovereignty | Geneva, Switzerland |
https://www.usenix.org/conference/soups2023 | Symposium on Usable Privacy and Security | Anaheim, USA |
https://defcon.org | DEFCON31 | Las Vegas, USA |
https://www.blackhat.com | Black Hat USA | Las Vegas, USA |
https://eurocrim2023.com | European Society of Criminology | Florence, Italy |
https://asc41.com/events/ | American Society of Criminology | Philadelphia, USA |
Also Look out for:
https://www.hfc-conference.com
https://www.cambridgecybercrime.uk
Other:
Bloom's Taxonomy
https://en.wikipedia.org/wiki/Bloom's_taxonomy
This episode was a bit different because it was for the start of the year. Back to the normal style next episode.
About our Guests:
Dr. Lauren Shapiro
https://www.jjay.cuny.edu/faculty/lauren-r-shapiro-phd
Scott Wright
https://www.linkedin.com/in/scottwright/
Papers or resources mentioned in this episode:
Shapiro, L. R. (2022). Cyberpredators and Their Prey. CRC Press.
https://www.routledge.com/Cyberpredators-and-Their-Prey/Shapiro/p/book/9780367551698
Shapiro, L. R., & Maras, M. H. (2015). Multidisciplinary investigation of child maltreatment. Jones & Bartlett Publishers.
https://www.worldcat.org/title/875351759
Other:
To all my fellow Internuts, try to take a few moments away from the screen to share the holiday period with the people around you, then you can get straight back on there :).
About our Guests:
Dr. Rainer Böhme
https://informationsecurity.uibk.ac.at/people/rainer-boehme/
https://scholar.google.com/citations?hl=en&user=ez_Q6GMAAAAJ&view_op=list_works&sortby=pubdate
Scott Wright
https://www.linkedin.com/in/scottwright/
Papers or resources mentioned in this episode:
Böhme, R., Laube, S., & Riek, M. (2019). A fundamental approach to cyber risk analysis. Variance, 12(2), 161-185.
Woods, DW & Böhme, R 2021, 'How Cyber Insurance Shapes Incident Response: A Mixed Methods Study', Paper presented at The 20th Annual Workshop on the Economics of Information Security, 28/06/21 - 29/06/21. https://weis2021.econinfosec.org/wp-content/uploads/sites/9/2021/06/weis21-woods.pdf
Böhme, R., & Kataria, G. (2006, September). On the limits of cyber-insurance. In International Conference on Trust, Privacy and Security in Digital Business (pp. 31-40). Springer, Berlin, Heidelberg.
https://link.springer.com/content/pdf/10.1007/11824633_4.pdf
Other:
Virtual Assets Insurance (by Rainer Böhme), Actuarial Research Conference 2020
About our Guests:
Dr Michael Wilson
http://profiles.murdoch.edu.au/myprofile/michael-wilson/
Vanessa Henri
https://www.linkedin.com/in/vanessahenri
Papers or resources mentioned in this episode:
Wilson, M., Cross, C., Holt, T., & Powell, A. (2022). Police preparedness to respond to cybercrime in Australia: An analysis of individual and organizational capabilities. Journal of Criminology , 55 (4), 468–494. https://doi.org/10.1177/26338076221123080
Cross, C., Holt, T., Powell, A., Wilson, M., (2021), Responding to cybercrime: Results of a comparison between community members and police personnel, Trends and Issues in Crime and Criminal Justice, 653, August 2021, pages 1 - 20.
Other:
That was the last episode in the series with Vanessa Henri, she is very busy running a business ;). https://henriwolf.law
About our Guests:
https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/
Vanessa Henri
https://www.linkedin.com/in/vanessahenri
Papers or resources mentioned in this episode:
L. M. J. Bekkers & E. R. Leukfeldt (2022) Recruiting money mules on instagram: a qualitative examination of the online involvement mechanisms of cybercrime, Deviant Behavior, DOI: 10.1080/01639625.2022.2073298
Peelen, A. A. E., van de Weijer, S. G. A., van den Berg, C. J. W., & Leukfeldt, E. R. (2022). Employment Opportunities for Applicants with Cybercrime Records: A Field Experiment. Social Science Computer Review, 0(0). https://doi.org/10.1177/08944393221085706
Other:
I had a lot of issues with the equalization on this one. My apologies if the apparent volume varies too much through the episode for your tastes.
About our Guests:
Dr Christian Leuprecht
https://www.queensu.ca/academia/leuprecht/
Caitlyn Jenkins
https://www.queensu.ca/iigr/jenkins-caitlyn
Rhianna Hamilton
https://www.queensu.ca/iigr/hamilton-rhianna
Vanessa Henri
https://www.linkedin.com/in/vanessahenri
Papers or resources mentioned in this episode:
Leuprecht, C., Jenkins, C. and Hamilton, R. (2022), "Virtual money laundering: policy implications of the proliferation in the illicit use of cryptocurrency", Journal of Financial Crime, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/JFC-07-2022-0161
Cullen Commission (2022) Commission of Inquiry into Money Laundering in British Columbia
https://cullencommission.ca/com-rep/
Other:
Financial Action Task Force (FATF) is the global money laundering and terrorist financing watchdog
https://www.fatf-gafi.org/home/
About our Guests:
Dr Ruth Shillair
https://comartsci.msu.edu/our-people/ruth-shillair
Vanessa Henri
https://www.linkedin.com/in/vanessahenri
Papers or resources mentioned in this episode:
Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & Von Solms, B. (2022). National Level Evidence-Based Results, Challenges, and Promise. Computers & Security, 102756.
https://doi.org/10.1016/j.cose.2022.102756
Humphrey, W. S. (1988). Characterizing the software process: a maturity framework. IEEE software, 5(2), 73-79.
Other:
The Global Cyber Security Capacity Centre
https://www.cybersecurity.ox.ac.uk/research/global-security-cyber-capacity
I said "graciolussly" at the start of the episode, I don't think that is a real word. I meant graciously.
About our Guests:
Dr Sunil Chaudhary
https://www.ntnu.edu/employees/sunil.chaudhary
Vanessa Henri
https://www.linkedin.com/in/vanessahenri
Papers or resources mentioned in this episode:
Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the effectiveness of cybersecurity awareness program. Journal of Cybersecurity , https://doi.org/10.1093/cybsec/tyac006
Other:
About our Guests:
Dr Masarah Paquet-Clouston
https://www.linkedin.com/in/masarah-paquet-clouston-54b29587/
Vanessa Henri
https://www.linkedin.com/in/vanessahenri
Papers or resources mentioned in this episode:
Paquet-Clouston, M., Paquette, S. O., Garcia, S., & Erquiaga, M. J. (2022). Entanglement: cybercrime connections of a public forum population. Journal of Cybersecurity, 8(1), tyac010.
https://academic.oup.com/cybersecurity/article/8/1/tyac010/6644916
Paquet-Clouston, M., & Bouchard, M. (2022). A Robust Measure to Uncover Community Brokerage in Illicit Networks. Journal of Quantitative Criminology, 1-29.
https://www.crimrxiv.com/pub/nhorzdki
Paquet-Clouston, M. C. (2021). The Role of Informal Workers in Online Economic Crime (Doctoral dissertation, Arts & Social Sciences: School of Criminology).
https://summit.sfu.ca/_flysystem/fedora/2022-08/input_data/21455/etd21636.pdf
Other:
This interview was done in person, I haven't done one of those for a long time and think my microphone technique is a little rusty, not only that I forgot to record some room tone.
About our Guests:
Dr. Periwinkle Doerfler
https://scholar.google.com/citations?user=beizXWkAAAAJ&hl=en
Vanessa Henri
https://www.linkedin.com/in/vanessahenri
Papers or resources mentioned in this episode:
Doerfler, P., Forte, A., De Cristofaro, E., Stringhini, G., Blackburn, J., & McCoy, D. (2021). " I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW2), 1-32.
https://arxiv.org/pdf/2104.11145.pdf
Other:
Burke, Katie L. ( 2017, Sep) Harassment in Science, American Scientist, from:
https://www.americanscientist.org/article/harassment-in-science
Nogrady, Bianca (2021, 13 Oct) ‘I hope you die’: how the COVID pandemic unleashed attacks on scientists, Retreived from Nature.com:
https://www.nature.com/articles/d41586-021-02741-x
O'Grady, Cathleen (2022, 24 Mar) In the Line of Fire:Scientists have been harassed for years. But a Science survey shows the pandemic has made things far worse for some
Advice for researchers experiencing harassment by the Science Media Centre
About our Guests:
Dr David Lyon
https://www.sscqueens.org/people/david-lyon
Vanessa Henri
https://www.linkedin.com/in/vanessahenri
Papers or resources mentioned in this episode:
Beyond Big Data Surveillance: Freedom and Fairness
https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released
David Lyon (1994) Electronic Eye: The Rise of Surveillance Society
https://www.goodreads.com/book/show/237851.Electronic_Eye
David Lyon (2001) Surveillance Society: Monitoring Everyday Life
https://www.goodreads.com/book/show/237855.Surveillance_Society
David Lyon (2018) The Culture of Surveillance: Watching as a Way of Life
https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance
David Lyon (2022) Pandemic Surveillance
https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302
Michel Foucault (1975) Discipline and Punish: The Birth of the Prison
https://www.goodreads.com/book/show/80369.Discipline_and_Punish
Smith, Richard Angus (2015) Spying and Surveillance in Shakespeare’s Dramatic Courts (Ph.D Thesis)
https://ses.library.usyd.edu.au/handle/2123/11591
Other:
History of Henry V
Act 2, Scene 2
DUKE OF BEDFORD:
The king hath note of all that they intend,
By interception which they dream not of.
The Tragedy of Hamlet, Prince of Denmark
Act 3, Scene 1
KING CLAUDIUS:
Her father and myself, lawful espials,
Will so bestow ourselves that, seeing, unseen,
We may of their encounter frankly judge,
And gather by him, as he is behaved,
If 't be the affliction of his love or no
That thus he suffers for.
About our Guests:
Dr David Lyon
https://www.sscqueens.org/people/david-lyon
Vanessa Henri
https://www.linkedin.com/in/vanessahenri
Papers or resources mentioned in this episode:
Beyond Big Data Surveillance: Freedom and Fairness
https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released
David Lyon (1994) Electronic Eye: The Rise of Surveillance Society
https://www.goodreads.com/book/show/237851.Electronic_Eye
David Lyon (2001) Surveillance Society: Monitoring Everyday Life
https://www.goodreads.com/book/show/237855.Surveillance_Society
David Lyon (2018) The Culture of Surveillance: Watching as a Way of Life
https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance
David Lyon (2022) Pandemic Surveillance
https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302
Michel Foucault (1975) Discipline and Punish: The Birth of the Prison
https://www.goodreads.com/book/show/80369.Discipline_and_Punish
Smith, Richard Angus (2015) Spying and Surveillance in Shakespeare’s Dramatic Courts (Ph.D Thesis)
https://ses.library.usyd.edu.au/handle/2123/11591
Other:
History of Henry V
Act 2, Scene 2
DUKE OF BEDFORD:
The king hath note of all that they intend,
By interception which they dream not of.
The Tragedy of Hamlet, Prince of Denmark
Act 3, Scene 1
KING CLAUDIUS:
Her father and myself, lawful espials,
Will so bestow ourselves that, seeing, unseen,
We may of their encounter frankly judge,
And gather by him, as he is behaved,
If 't be the affliction of his love or no
That thus he suffers for.
http://shakespeare.mit.edu/hamlet/hamlet.3.1.html
About our Guests:
Holly Ann Garnett
https://www.rmc-cmr.ca/en/political-science-and-economics/holly-ann-garnett
https://www.queensu.ca/iigr/holly-ann-garnett
Michael Pal
https://commonlaw.uottawa.ca/en/people/pal-michael
Vanessa Henri
https://www.linkedin.com/in/vanessahenri
Papers or resources mentioned in this episode:
Garnett HA, Pal M (2022) Cyber-Threats to Canadian Democracy,.
https://www.mqup.ca/cyber-threats-to-canadian-democracy-products-9780228011477.php
https://books.google.ca/books/about/Cyber_Threats_to_Canadian_Democracy.html?id=_qOwzgEACAAJ&
Other:
There was a lot of noise happening outside my apartment as I was recording part of this episode and it was very distracting. Apologies if I sound a little weird :)
About our Guest:
Sinead Tuite
Innovation, Science and Economic Development (ISED) Canada
https://www.ic.gc.ca/eic/site/icgc.nsf/eng/home
Papers or resources mention in this episode:
Safeguarding your Research
This website provides information on how to safeguard your research and innovation.
https://science.gc.ca/eic/site/063.nsf/eng/h_97955.html
The Government of Canada's National Security Guidelines for Research Partnerships
https://science.gc.ca/eic/site/063.nsf/eng/h_98257.html
The US Government's Executive Order on Improving the Nation’s Cybersecurity
The UK Centre for the Protection of National Infrastructure (CPNI) Trusted Research Guidance for Academia
https://www.cpni.gov.uk/trusted-research-academia
Australia's Cybersecurity Strategy 2020 (Section 40, Page 23)
https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf
About our Guest:
Dr Victoria Lemieux
https://ischool.ubc.ca/profile/victoria-lemieux/
Dominic Vogel
https://ca.linkedin.com/in/domvogel
Papers or resources mention in this episode:
Lemieux, V. L. (2022). Searching for Trust: Blockchain Technology in an Age of Disinformation. Cambridge University Press.
https://www.cambridge.org/core/books/searching-for-trust/B2F64551393899EBC6306EB42FCBE856
Lemieux, V. L., & Feng, C. (2021). Building Decentralized Trust. Springer International Publishing. https://doi. org/10.1007/978-3-030-54414-0.
Other:
Here is the oldest surviving record of the 60% of hacked SMBs go bankrupt claim,
https://docs.house.gov/meetings/SM/SM00/20150422/103276/HHRG-114-SM00-20150422-SD003-U4.pdf
National Cyber Security Alliance (NCSA) Statement Regarding Incorrect Small Business Statistic
60% of Hacked Small Businesses Fail. How Reliable Is That Stat?
https://www.bankinfosecurity.com/blogs/60-hacked-small-businesses-fail-how-reliable-that-stat-p-2464
The fact that we can't find who is responsible for these numbers is kind of the point of having record keeping.
Just to put this claim in context in 2015 the US had 28.8 million Small businesses (https://www.sba.gov/sites/default/files/advocacy/United_States.pdf)
If half of those businesses were hacked, as claimed that would be 14.4million Breaches. If 60% of those went out of business, that would be 8.64 million businesses folding, which you might expect would be noticed economically. In particular, it would mean that around half of the US population lost their job. I suspect that we might have noticed that.
About our Guests
Dr Asier Moneva
Dominic Vogel
https://ca.linkedin.com/in/domvogel
Papers or resources mention in this episode:
Moneva, A., Leukfeldt, E.R. & Klijnsoon, W. Alerting consciences to reduce cybercrime: a quasi-experimental design using warning banners. J Exp Criminol (2022). https://doi.org/10.1007/s11292-022-09504-2
https://link.springer.com/article/10.1007/s11292-022-09504-2
Moneva, A., Leukfeldt, E. R., Van De Weijer, S. G., & Miró-Llinares, F. (2022). Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective. Computers in Human Behavior, 126, 106984.
https://www.sciencedirect.com/science/article/pii/S0747563221003071
Miró-Llinares, F., & Moneva, A. (2020). Environmental criminology and cybercrime: Shifting focus from the wine to the bottles. The Palgrave handbook of international cybercrime and cyberdeviance, 491-511.
https://link.springer.com/content/pdf/10.1007/978-3-319-78440-3_30.pdf
Other
Hacker Mobility in Cyberspace and the Least Effort Principle: Examining Efficiency in the Journey to Cybercrime
Bhuiyan, Johana (2022, 4 Apr) How can US law enforcement agencies access your data? Let’s count the ways, The Guardian, https://www.theguardian.com/technology/2022/apr/04/us-law-enforcement-agencies-access-your-data-apple-meta
Carcamo, Cindy (2022, 10 May) Immigration officials created network that can spy on majority of Americans, report says, Los Angeles Times, https://www.latimes.com/california/story/2022-05-10/report-immigration-officials-spying-on-majority-of-americans
About our guest:
You can find out more about the design team for Northsec at https://nsec.io/team/
Papers or resources mentioned in this episode:
Challenges from previous northsec competitions can be found here:
https://nsec.io/competition-write-ups/
In particular, we referred to this challenge:
https://github.com/JaneBdemented/NSEC2019_DEFEC8ED_Walkthroughs
Other:
If you want to have a try at CTF challenges, you can try this site from Carnegie Mellon University
You can also try this website for getting started with hacking techniques
Jax was actually feeling ill during this interview but did it anyway, what a champion.
About our guests:
Dr Susanne van’t Hoff de Goede
https://www.linkedin.com/in/susanne-van-t-hoff-de-goede-8057a98/
https://victimologie.nl/netwerkleden/susanne-van-t-hoff-de-goede/
Dominic Vogel
https://ca.linkedin.com/in/domvogel
Papers or resources mentioned in this episode:
Van ’t Hoff-de Goede, S., Leukfeldt, R., Van der Kleij, R., & Van de Weijer, S. (2020). The online behaviour and victimization study: The development of an experimental research instrument for measuring and explaining online behaviour and cybercrime victimization. In M. Weulen Kranenbarg & R. Leukfeldt (Eds.), Cybercrime in Context. The human factor in victimization, offending and policing. Springer.
Van der Kleij, R., Van ’t Hoff-de Goede, S., Van de Weijer, S., & Leukfeldt, R. (2021). How safely do we behave online? An explanatory study into the cybersecurity behaviors of Dutch citizens. In M. Zallio, C. Raymundo Ibañez, & J.H. Hernandez (Eds), Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity. AHFE 2021. Lecture Notes in Networks and Systems, vol 268. Springer, Cham. https://doi.org/10.1007/978-3-030-79997-7_30
Other:
We weren't able to include all of the discussion in the podcast, but there is an interesting discussion to be had around the relationship between theory and research method. Often this kind of discussion is around how a theory might shape the research methods that are chosen, in this case Dr van’t Hoff de Goede raised the issue of methods and theory reinforcing each other as the method provides proof of the theory and the theory provides valid application of the method. I am not a great discussant for this particular debate, but I would say that it provides an argument for a greater range of research methods being a component of strong science.
About our Guests:
Dr Tommy Van Steen
https://www.universiteitleiden.nl/en/staffmembers/tommy-van-steen#tab-1
Dominic Vogel
https://ca.linkedin.com/in/domvogel
Papers or resources mentioned in this episode:
Van Steen, T., Norris, E., Atha, K., & Joinson, A. (2020). What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use?. Journal of Cybersecurity, 6 (1)
https://academic.oup.com/cybersecurity/article-abstract/6/1/tyaa019/6032830
Michie S, Richardson M, Johnston M, Abraham C, Francis J, Hardeman W, Eccles MP, Cane J, Wood CE. The behavior change technique taxonomy (v1) of 93 hierarchically clustered techniques: building an international consensus for the reporting of behavior change interventions. Ann Behav Med. 2013 Aug;46(1):81-95. doi: 10.1007/s12160-013-9486-6. PMID: 23512568.
https://pubmed.ncbi.nlm.nih.gov/23512568/
Canada Revenue Agency, Be Scam Smart – Tax Refund
https://www.youtube.com/watch?v=lGNb7JCElzY&list=PLWsWrJHQSlisHkd5uCkyfaO3x2h4P2rsq&index=2
Other:
The Behaviour Change Wheel organizes the taxonomy into a way that allows it to be used as a tool during the design and implementation of tools. You can find a presentation from Dr Susan Mitchie, presenting that approach in this video https://www.youtube.com/watch?v=2-KvaIsb0fM
Thanks to Domenic Vogel’s son for providing some background ambience during the interview. Its always amazing how the sound of a child playing helps adults to remember to play too.
About Our Guests:
Dr. David Maimon
https://news.gsu.edu/expert/david-maimon/
Dr. Joshua James
Papers or resources mentioned in this article:
Maimon, D., Howell, C. J., Perkins, R. C., Muniz, C. N., & Berenblum, T. (2021). A Routine Activities Approach to Evidence-Based Risk Assessment: Findings From Two Simulated Phishing Attacks. Social Science Computer Review. https://doi.org/10.1177/08944393211046339
Maimon, D., Howell, C. J., & Burruss, G. W. (2021). Restrictive deterrence and the scope of hackers’ reoffending: Findings from two randomized field trials. Computers in Human Behavior https://www.sciencedirect.com/science/article/abs/pii/S0747563221002661
Other:
Dr Maimon mentions sending a link with a EULA or End User License Agreement. A EULA is a contract between a software producer and the eventual user of the product, specifying the terms and conditions of use.
The music for this episode is called “G0n3 Ph1sh1ng”. I do like a good metaphor.
One thou is 25 micrometres. Metric is more precise. In practice, I use both. Such is the joy of Canada.
You might get 40 rods to the hog’s head and like it that way; I respect that.
About our guests:
Dr. Marleen Weulen Kranenbarg
https://research.vu.nl/en/persons/marleen-weulen-kranenbarg
Dr. Joshua James
Papers or resources mentioned in this article:
Weulen Kranenbarg, M., & Leukfeldt, R. (2021). Cybercrime in Context . Springer International Publishing.
https://link.springer.com/book/10.1007/978-3-030-60527-8
Weulen Kranenbarg, M., Ruiter, S., & Van Gelder, J. L. (2021). Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders. European Journal of Criminology, 18(3), 386-406.
Weulen Kranenbarg, M., van der Toolen, Y., & Weerman, F. (2022). Understanding cybercriminal behaviour among young people.
Weulen Kranenbarg, M., Ruiter, S., Van Gelder, J. L., & Bernasco, W. (2018). Cyber-offending and traditional offending over the life-course: An empirical comparison. Journal of developmental and life-course criminology, 4(3), 343-364.
Other:
The episode with Dr. David Decary-Hetu is episode 55, you can go back a couple of episodes to find that or look here: https://cybercrimeology.com/episodes/dark-data-scraping-studying-on-the-dark-web-publishing-on-the-open-web
I edited this episode a little more aggressively to get it down to 30 minutes, it may have lost a little of its smoothness, but it is concentrated goodness ;).
About our Guests
Dr Maria Grazia Porcedda
https://www.tcd.ie/research/profiles/?profile=mariagrp
Dr. Joshua James
Papers or resources mentioned in this article:
Porcedda, M. G., & Wall, D. S. (2021, September). Modelling the Cybercrime Cascade Effect in Data Crime. In 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 161-177). IEEE.
The Cambridge Computer Crime Database (Maintained by Alice Hutchings )
https://www.cl.cam.ac.uk/~ah793/cccd.html
The Computer Evidence Database of Computer Misuse Act cases (Maintained by Michael Turner)
https://www.computerevidence.co.uk/Cases/CMA.htm
Other:
During the outro I managed to say "Mater data" instead of "Meta data". I don't think that mater data exists as a term but perhaps we will need it or something like it to describe the data that gave birth to other data. If we keep having to chase data back to its point of origin and it is being transformed and transferred by automatic processes we might well one day have deliberate conversations about mater data. That hasn't happened yet and in this case it was just another of my many mangled mispronunciations.
About our Guests:
Dr David Décary-Hetu
Dr. Joshua James
Papers or resources mentioned in this article:
The Crim Archive.
Human Cyber-Centric Cybersecurity Partnership
Ouellet, Marie; Décary-Hétu, David; and Bergeron, Andréanne, "Cryptomarkets and the Returns to Criminal Experience" (2022). CSLF Articles. 3. https://scholarworks.gsu.edu/ays_cslf_articles/3
David Décary-Hétu & Benoit Dupont (2012) The social network of hackers, Global Crime, 13:3, 160-175, DOI: 10.1080/17440572.2012.702523
Flamand, C., & Décary-Hétu, D. (2019). The Open and Dark Web. The Human Factor of Cybercrime, 34-50.
Other:
My husky voice is as a result of testing how much my lung capacity has degraded as a result of covid-19 with a short work through metre deep snow. Turns out it has degraded a lot. If you have wondered if show shoes are worth the hassle, they absolutely are.
About our Guests:
Dr. Bridget Harris
https://www.qut.edu.au/about/our-people/academic-profiles/bridget.harris
Dr. Joshua James
Papers or resources mentioned in this article:
Harris, B. (2021). Technology-enabled abuse: how'safety by design' can reduce stalking and domestic violence. The Conversation.
Harris, B., & Woodlock, D. (2021). ‘For my safety’: experiences of technology-facilitated abuse among women with intellectual disability or cognitive disability.
https://apo.org.au/sites/default/files/resource-files/2021-09/apo-nid314044.pdf
The Australian eSafety Commissioner
https://www.esafety.gov.au/industry/safety-by-design
The eSafety Commissioner
Safety by Design (SbD)
https://www.esafety.gov.au/about-us/who-we-are/our-legislative-functions
Other:
I said the allegory of motor vehicles was revealing. An allegory generally considered to be a story poem or picture with a symbolic meaning such as a moral point of view. Although it didn’t make the final edit there is something to be learned from the story of automobile safety is that safety requires regulation, standards and education and it can be effective.
About Our Guests
(In Order of Appearance)
Dr. Jin Lee,
https://cls.gmu.edu/people/jlee331
Dr. David Buil-Gil
https://www.research.manchester.ac.uk/portal/david.builgil.html
Dr. Bridget Harris
https://www.qut.edu.au/about/our-people/academic-profiles/bridget.harris
and
Dr. Cathy Marcum
https://gjs.appstate.edu/directory/dr-cathy-marcum
Other:
I will be honest with you, the mix on this episode is a little rough, forgive me for rushing it a little.
'Bisney' isn't a word. 'Busy' is what I was aiming for there.
This episode's track is called ONOSCOMOSOMO. They don't all get names, but this one did.
About Our Guest:
Dr Elisabeth Carter
https://www.linkedin.com/in/elisabeth-carter-8b372444
Papers mentioned in this Episode:
Carter, E. (2021). Distort, extort, deceive and exploit: Exploring the inner workings of a romance fraud. The British Journal of Criminology, 61(2), 283-302.
https://doi.org/10.1093/bjc/azaa072
Carter, E. (2015). Laughing matters: A conversation analytic account the use of laughter by suspects and officers in the police interview. Essex Graduate Journal of Sociology, 7(1), 99-113.
https://bucks.repository.guildhe.ac.uk/id/eprint/9401/1/Carter,%20Elisabeth%20Laughing%20matters.pdf
Carter, E. (2015). The anatomy of written scam communications: An empirical analysis. Crime, Media, Culture, 11(2), 89-103.
https://journals.sagepub.com/doi/pdf/10.1177/1741659015572310
A Guide to Spotting Romance Fraudsters
TinEye is a reverse image search tool. You can search with an image for other similar images.
If you can't access that then, you can also reverse image search on google.
https://www.google.com/imghp?hl=en
About our Expert Guest:
Dr. Joshua James
https://www.youtube.com/DFIRScience
What we learned:
What happens where there is a difference in analysis between digital forensics investigators ?
Like physical evidence there is little room for differences regarding the facts of a case. There might be a different in explanation of the meaning of a piece of evidence depending on the story they are presenting. The tools are an instrument of interpreting the meaning of information on a device and tools can make mistakes. Using multiple tools that extract and analyze data from devices reduces the chance of this happening.
Other:
Thanks very much to my neighbours for assisting with the voice over for this episode. I do hope the human/furniture couples ballroom dancing and hollering team goes well in whichever competition you are preparing for. Also thanks to my audio editing software for deciding to have a meltdown and give me the opportunity to do the final mastering twice.
This episode's track is called 'curious diamonds'. Not all of the songs for podcast episodes get a name, but it did this time.
About our Interview Guest:
Dr Anita Lavorgna
https://www.southampton.ac.uk/sociology/about/staff/ai11n14.page
Papers and Publications Mentioned in this Episode:
Lavorgna, A., & Holt, T. J. (Eds.). (2021). Researching cybercrimes : methodologies, ethics, and critical approaches. Palgrave Macmillan. https://doi.org/10.1007/978-3-030-74837-1
This book contains the following major sections:
Lavorgna, A., & Ugwudike, P. (2021). The datafication revolution in criminal justice: An empirical exploration of frames portraying data-driven technologies for crime prevention and control. Big Data & Society, 8(2), 20539517211049670.
https://journals.sagepub.com/doi/pdf/10.1177/20539517211049670
About our Expert Guest:
Dr. Joshua James
https://www.youtube.com/DFIRScience
What we learned:
What is the difference between digital evidence and physical evidence for investigators ?
Digital evidence always requires active interpretation because it is an abstract series of electrical symbols. Because of this, the interpretation is very important but very difficult. Unlike physical evidence, it can be tested and analyzed indefinitely because it can be copied perfectly, and the accuracy of copies can be verified with hashes.
Other:
This episode's track is called 'surfing on white noise'. Not all of the songs for podcast episodes get a name, but it did this time.
About Our Guest:
Dr. Jerry Ratcliffe
Reducing Crime, Podcast, Blog and Book
https://www.reducingcrime.com/
Other:
The introduction at the start of the episode is from the Prelinger archives at archive.org.
About our Guest:
Dr. Chad Whelan
https://www.deakin.edu.au/about-deakin/people/chad-whelan#
Papers mentioned in this episode:
Dupont, B., & Whelan, C. (2021). Enhancing relationships between criminology and cybersecurity. Journal of criminology, 00048658211003925.
https://doi.org/10.1177%2F00048658211003925
Manuscript available from the University of Montreal
Other:
About the Darkside cybercrime group:
https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/
https://en.wikipedia.org/wiki/DarkSide_(hacking_group)
About the REvil cybercrime group:
https://en.wikipedia.org/wiki/REvil
Some technical information:
https://unit42.paloaltonetworks.com/revil-threat-actors/
A timeline of some interesting developments related to this issue:
2021, May 14.
The moral underground? Ransomware operators retreat after Colonial Pipeline hack
https://intel471.com/blog/darkside-ransomware-shut-down-revil-avaddon-cybercrime
2021, June 7 .
Department of Justice Seizes $2.3 Million in Cryptocurrency Paid to the Ransomware Extortionists Darkside
2021, July 20
Operation Orcus Task Force Established To Fight Ransomware Gangs
2021, Aug 5
Ransomware Gangs and the Name Game Distraction
https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/
2021, Oct 5.
NSA chief predicts U.S. will face ransomware ‘every single day’ for years to come ("Ransomware is a national security issue. I firmly believe that.”)
2021, Oct 7.
Netherlands can use intelligence or armed forces to respond to ransomware attacks
2021, Oct 11.
UK cyber head says Russia responsible for 'devastating' ransomware attacks
https://www.bbc.co.uk/news/uk-58877433.amp
2021, Oct 21.
Governments turn tables on ransomware gang REvil by pushing it offline
2021, Oct 25.
Groove Calls for Cyberattacks on US as REvil Payback
https://threatpost.com/groove-ransomware-revil-revenge-us-cyberattacks/175726/
Other Other:
The intro for this was drawn from a 1968 film on the role of PSYOPS in assisting developing countries in cementing their shiny new system of government installed by the US called "Psychological Operations in Support of Internal Defense and Development Assistance Programs " which is in the Public Domain and available from https://archive.org/details/0095_Psychological_Operations_in_Support_of_Internal_Defense_and_Dev_07_21_47_00
About our Guest
The Canadian Anti-Fraud Centre collects information on fraud and identity theft.
https://www.antifraudcentre-centreantifraude.ca/index-eng.htm
The CAFC involves the Royal Canadian Mounted Police, the Competition Bureau Canada, and the Ontario Provincial Police and recently come together with the Canadian Centre for Cyber Security to fight fraud and cybercrime.
Report Fraud
Call the CAFC Toll free: 1-888-495-8501 Monday to Friday, from 9 am to 4:45 pm (Eastern time) and close on holidays.
Online with the RCMP
Mentioned in this episode:
(KYC) Know Your Customer or Know Your Client
Organizations that deal with large amounts of money are required to follow regulations related to the control of the proceeds of crime and terrorist financing. In Canada this is FINTRAC and you can find out more here.
https://www.fintrac-canafe.gc.ca/guidance-directives/client-clientele/1-eng
You can find out more about the KYC requirements of other countries here:
https://en.wikipedia.org/wiki/Know_your_customer
Other:
The introduction for this episode was from the film " How to Use the Dial Phone" By AT&T in 1927 and preserve by the Prelinger Archive at archive.org. https://archive.org/details/HowtoUse1927
This was our 2 year anniversary. Yay Us.
About Our Guest
Kara Brisson-Boivin
https://mediasmarts.ca/about-us/staff#k_boivin
MediaSmarts
Take part in Cybersecurity Awareness Month Canada
https://www.getcybersafe.gc.ca/en/cyber-security-awareness-month
Other
The audio from the start of this episode is from a famous film called "Duck and Cover" available from the Prelinger archive online at archive.org
https://archive.org/details/DuckandC1951
Kara said I could use the title for the episode. It is still hers though, you can ask her if you would like to use it somewhere.
About Our Guest:
Dr Tom Cockcroft
https://www.leedsbeckett.ac.uk/staff/dr-tom-cockcroft/
Papers mentioned in this Episode:
Cockcroft, T., Shan-A-Khuda, M., Schreuders, Z. C., & Trevorrow, P. (2021). Police cybercrime training: perceptions, pedagogy, and policy. Policing: A Journal of Policy and Practice, 15(1), 15-33.
https://academic.oup.com/policing/article-abstract/15/1/15/5145767
Cockcroft T (2020) Police Occupational Culture: Research and Practice. Bristol: Policy Press.
Cockcroft T (2012) Police culture: themes and concepts. Abingdon: Routledge.
Notes:
The intro for this episode was from a 1951 film called "This is your Police Department" about the Detroit police department that romantically traces the training and career of a police officer in that city. Its available on the Prelinger archive.
About Our Guest
The Smart CyberPhysical Systems Lab
Resources Mentioned in this Episode
Yazdinejad, A., Zolfaghari, B., Azmoodeh, A., Dehghantanha, A., Karimipour, H., Fraser, E., ... & Duncan, E. (2021). A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures. Applied Sciences, 11(16), 7518.
https://www.mdpi.com/2076-3417/11/16/7518
You can watch their video for farmers here:
https://www.youtube.com/watch?v=Ysv57jbMt7k
Other:
The book "who moved my cheese?" is a good read if you would like to consider change and how to adapt. Everything is going to be connected to the internet and the cheese is going to move.
https://en.wikipedia.org/wiki/Who_Moved_My_Cheese%3F
I wanted to add a note of clarification here, I asked if Dr Karimipour had been toughened by her experiences. I said I don't like the term and that's becuase I don't see being 'toughened up' as a positive outcome. If you are forced to change by a situation that is still change by force and if that situation is created by discrimination then that is unacceptable in an equitable society.
I attempted to swap the phrase "a double edged sword" with "every rose has its thorns", I am not sure how well that went but perhaps it will catch one " thorns come with roses ? Something like that perhaps ?
The audio at the start of this episode was again from the Prelinger Archives at archive.org, a wonderful resources. Not the music though, that was courtesy of an MPC one, a Korg NTS-1 and a glass of Jamesons.
About out Guest:
https://research.jcu.edu.au/portfolio/roberto.dillon/
Papers Mentioned in this Episode
Dillon, R., Chawla, S., Hristova, D., Göbl, B., & Jovicic, S. (2020). Password Policies vs. Usability: When Do Users Go “Bananas”?. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 148-153). IEEE.
Grassi, P. A., Fenton, J. L., Newton, E. M., Perlner, R. A., Regenscheid, A. R., Burr, W. E., ... & Theofanos, M. F. (2017). Nist special publication 800-63b. digital identity guidelines: authentication and lifecycle management. Bericht, NIST.
https://pages.nist.gov/800-63-3/sp800-63b.html
Other:
Holiday from Rules? by Portafilms, part of the Prelinger archive available at archive.org.
https://archive.org/details/Holidayf1959
About our Guest:
Dr Fawn Ngo
https://www.sarasotamanatee.usf.edu/academics/faculty-listing/dr-fawn-ngo.aspx
Papers Mentioned in this Episode:
Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773.
https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1015&context=cjp_facpub_sm
Ngo, F. T., Piquero, A. R., LaPrade, J., & Duong, B. (2020). Victimization in Cyberspace: Is It How Long We Spend Online, What We Do Online, or What We Post Online?. Criminal Justice Review, 45(4), 430-451.
Other:
The intro from this week was from the Prelinger archives and drew from an 1940s encyclopedia britannica film about immigration, and a Folgers coffee commercial.
About our Guest:
Dr Daren Fisher
Papers Mentioned in this Episode:
Fisher, D., Maimon, D., & Berenblum, T. (2021). Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: a randomized experiment. Security Journal, 1-23.
https://link.springer.com/article/10.1057/s41284-020-00282-y
The death and life of great American cities by Jane Jacobs; Publisher: New York : Random House ©1961
https://www.worldcat.org/title/death-and-life-of-great-american-cities/oclc/500754
https://en.wikipedia.org/wiki/The_Death_and_Life_of_Great_American_Cities
You can learn more about the Maryland Scale for Scientific Evidence in this report Mapping the standards of evidence used in UK social Policy
https://www.alliance4usefulevidence.org/assets/2018/05/Mapping-Standards-of-Evidence-A4UE-final.pdf
Other:
There were a fair few pops and clicks in the audio on this one, unfortunately that was the best I could do using automated tools. I decided to leave it as is, the discussion was delightful and I was concerned that if we re-recorded it would come out with the same flavour. My apologies if it was too distracting, I hope you listened through until the end anyway as there was some good discussion there.
This might be episode 42, and may as well be the answer to life the universe and everything but I still don't understand the question and perhaps I never will.
About our Guest:
https://www.shsu.edu/~icc_www/_inc/dir.php?mode=view&item=467
https://www.shsu.edu/today@sam/T@S/article/2020/victim-studies-chair
Papers Mentioned in this episode :
Clevenger, S., Navarro, J. N., Marcum, C. D., & Higgins, G. E. (2018). Understanding victimology: an active-learning approach. Routledge.
Clevenger, S., & Gilliam, M. (2020). Intimate Partner Violence and the Internet: Perspectives. The Palgrave Handbook of International Cybercrime and Cyberdeviance, 1333-1351.
https://link.springer.com/referenceworkentry/10.1007%2F978-3-319-78440-3_58
Other:
Frankenstein; or, the Modern Prometheus 1818 by Mary Wollstonecraft (Godwin) Shelley
https://www.gutenberg.org/files/84/84-h/84-h.htm
https://en.wikipedia.org/wiki/Captain_America
https://en.wikipedia.org/wiki/The_Incredible_Hulk_(comic_book)
https://en.wikipedia.org/wiki/Squirrel_Girl
Clip at the start taken from the public domain film "Jesse James Meets Frankenstein's Daughter (1966)" online at https://publicdomainmovie.net/movie/jesse-james-meets-frankensteins-daughter-1966
Tiny clips from criminal minds used for an educative purpose.
About our Guest:
https://www.research.manchester.ac.uk/portal/david.builgil.html
Papers Mentioned in this Episode.
Buil-Gil, D., Lord, N., & Barrett, E. (2021). The Dynamics of Business, Cybersecurity and Cyber-Victimization: Foregrounding the Internal Guardian in Prevention. Victims & Offenders, 16(3), 286-315. https://www.tandfonline.com/doi/abs/10.1080/15564886.2020.1814468
Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior , 37(3), 263–280.
https://www.tandfonline.com/doi/full/10.1080/01639625.2015.1012409
Miró Llinares, F., & Johnson, S. D. (2017). Cybercrime and place: Applying environmental criminology to crimes in cyberspace. In G. J. N.Bruinsma & S. D.Johnson (Eds.), The Oxford handbook of environmental criminology (pp. 883–906). Oxford University Press.
https://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780190279707.001.0001/oxfordhb-9780190279707-e-39
Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology , 2(4), 407–427.
https://doi.org/10.1177/147737080556056
Cyber Security Breaches Survey:
https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8638 (2020)
https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8480 (2019)
https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8406 (2018)
Other:
The except at the start is from a 1960s film on Safety by general Motors that is part of the Prelinger Archive, a most valuable resource and can be found here:
https://archive.org/details/0257_Safest_Township_Anywhere_The_M04696_11_00_44_00
The track segment at the end of the episode was made with a little Korg NTS-1. What a wonderful time to be alive, when such things are obtainable and can make being stuck inside for fear of infection so much more bearable.
About Our Guest:
https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html
Articles Mentioned in this Episode:
Dearden, T. E., Parti, K., & Hawdon, J. (2021). Institutional Anomie Theory and Cybercrime—Cybercrime and the American Dream, Now Available Online. Journal of Contemporary Criminal Justice, 10439862211001590.
Muftic, L. (2006). Advancing institutional anomie theory: A microlevel examination connecting culture, institutions, and deviance. International Journal of Offender Therapy and Comparative Criminology, 50(6), 630–653.
Other
You should check out this book if these ideas were interesting:
Messner, S. F., & Rosenfeld, R. (1994). Crime and the American Dream
There are many new editions printed.
Learn more about Skin Cancer here:
https://www.cancer.gov/types/skin
Seriously, if you have spent anytime outside, make sure you are aware of skin cancer. Some forms of it might be rare, but it is anything but, I know many many people both younger and older than me who have had them cut out.
The audio at the start of this episode was from a prelinger archive public domainfilm called "The Relaxed Wife", https://archive.org/details/RelaxedW1957.
Pfizer started importing Atarax or Hydroxine into the US in the late 50s and promoted it with these kinds of films advocating that people just relax and stop worrying about things so much.
About our Guest:
https://www.benoitdupont.net/en/benoit/bio/
Articles Mentioned in this Episode:
Dupont, B., & Lusthaus, J. (2021). Countering distrust in illicit online networks: the dispute resolution strategies of cybercriminals. Social science computer review, 0894439321994623.
"Policing in the information age: technological errors of the past in perspective" is a chapter in
Enders, M., & Dupont, B. (Eds.). (2001). Policing the lucky country. Hawkins Press.
Dr Dupont mentioned the work of Dr Gabriela Coleman, a book to read if you are interested is here:
Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. Verso books.
Other:
We mentioned Xylitol, their blog can be found here:
https://www.xylibox.com/2013/04/darkode-leak.html
Draw an iceberg and see how it will float
https://joshdata.me/iceberger.html
The sample from the start of this episode is from Kansas City Confidential
https://publicdomainmovie.net/movie/kansas-city-confidential
I was very busy when I was editing this one so the sound is not quite smooth as it usually is. We used Zoom as well, and sometime it sounds like it has made an edit when it is managing bandwidth. So, Apologies for that. Also, I had allergies when doing the interviews, but it cleared up by the time I got to doing some inserts to help with the story flow, it sounds a little odd because of that. I wouldn't tell this to just anyone, but as you have been reading these show notes for so long I feel like we have gotten to be a little closer.
About our Guest:
Dr Yi Ting Chua:
https://www.cl.cam.ac.uk/~ytc36/
Papers Mentioned in this Episode:
Chua, Y. T., Parkin, S., Edwards, M., Oliveira, D., Schiffner, S., Tyson, G., & Hutchings, A. (2019, November). Identifying unintended harms of cybersecurity countermeasures. In 2019 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-15). IEEE.
https://ieeexplore.ieee.org/abstract/document/9037589
Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours
Parkin, S., & Chua, Y. T. (2021, March). Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours. Springer.
https://discovery.ucl.ac.uk/id/eprint/10112991/
Other:
The voice at the start of the episode is from a video on increasing precision in the manufacture of automobiles at general motors from the 1960s. It is available at the valuable archive.org as part of the Prelinger archives.
I use Ikea FANTAST temperature probes, there are probably better ones out there, but these are cheap enough that I don't feel bad when they break.
https://www.ikea.com/ca/en/p/fantast-meat-thermometer-timer-digital-black-80100406/
About our Guest:
Dr. Jonathan Lusthaus
https://www.sociology.ox.ac.uk/people/jonathan-lusthaus#/
Articles Mentioned in this episode:
Industry of Anonymity: Inside the Business of Cybercrime by Jonathan Lusthaus
https://www.goodreads.com/book/show/38502106-industry-of-anonymity
DarkMarket: Cyberthieves, Cybercops and You by Misha Glenny
https://www.goodreads.com/book/show/11024696-darkmarket
Jonathan Lusthaus (2012) Trust in the world of cybercrime, Global Crime, 13:2, 71-94, DOI: 10.1080/17440572.2012.674183
https://www.tandfonline.com/doi/abs/10.1080/17440572.2012.674183
J. Lusthaus, M. Bruce and N. Phair, "Mapping the Geography of Cybercrime: A Review of Indices of Digital Offending by Country," 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy, 2020, pp. 448-453, doi: 10.1109/EuroSPW51379.2020.00066.
https://ieeexplore.ieee.org/abstract/document/9229673
Other:
Flappy Bird.
https://en.wikipedia.org/wiki/Flappy_Bird
The voice sample is from the Prelinger archive at archive.org. An important resource.
The song this week is called "Departed on Platform 2". I write all the songs we use on the show, I just thought you might like to know why I thought this one was appropriate for this episode.
About our Guest:
https://www.cmu.edu/epp/people/faculty/kathleen-m-carley.html
Papers mentioned in this episode:
Carley, K. M. (2020). Social cybersecurity: an emerging science. Computational and Mathematical Organization Theory, 26(4), 365-381
https://link.springer.com/article/10.1007/s10588-020-09322-9
The Advertisement at the end was from the mid 1990s (1995) and was used to advertise the America Online (AOL) web service. Even in Australia everyone ended up with dozens of AOL CDs that were supposed to help us get online somehow.
The Audio from the start of the episode is from the Prelinger Archive. A Movie from 1968 explaining the US perspective on the use of Psychological Operations (PsyOps) in another country to influence the feelings of the populace.
https://archive.org/details/Psycholo1968_2
About our guest:
Dr Olivier Ribaux.
https://applicationspub.unil.ch/interpub/noauth/php/Un/UnPers.php?PerNum=922493&LanCode=37
Papers Mentioned in this Episode:
Ribaux, O., & Souvignet, T. R. (2020). “Hello are you available?” Dealing with online frauds and the role of forensic science. Forensic Science International: Digital Investigation, 33, 300978.
https://doi.org/10.1016/j.fsidi.2020.300978
Assistance with this episode provided by:
Vicky Desjardins and Traian Toma from the CRPC (https://www.prevention-cybercrime.ca/etudiants-et-stagiaires-1)
Louis Melançon from the University of McGill (https://lmelancon.net/a-propos/)
Other:
I am aware that the sound of music was set in Austria but the two countries share a mountain range and I couldn't think of a better way to evince the feeling of grassy foothills, glacial lakes and packed lunches in wicker baskets.
About Our Guest:
https://staff.qut.edu.au/staff/ca.cross
Papers Mentioned in the Show
Cassandra Cross & Thomas J. Holt (2021) The Use of Military Profiles in Romance Fraud Schemes, Victims & Offenders, 16:3, 385-406, DOI: 10.1080/15564886.2020.1850582
Cross, C. (2020). ‘Oh we can’t actually do anything about that’: The problematic nature of jurisdiction for online fraud victims. Criminology & Criminal Justice, 20(3), 358–375. https://doi.org/10.1177/1748895819835910
Cross, C. (2019), "Who is to blame? Exploring accountability in fraud victimisation", Journal of Criminological Research, Policy and Practice, Vol. 6 No. 1, pp. 35-48. https://doi.org/10.1108/JCRPP-07-2019-0054
Cassandra Cross, Molly Dragiewicz, Kelly Richards, Understanding Romance Fraud: Insights From Domestic Violence Research, The British Journal of Criminology, Volume 58, Issue 6, November 2018, Pages 1303–1322, https://doi.org/10.1093/bjc/azy005
Other:
Introduction voices are from the Prelinger Archives at archive.org.
Bonus points are not redeemable for anything at all. All the same, its still nice to get some points isn't it?
More about our Guest:
Dr. Fernando Miró-Llinares
https://www.umh.es/contenido/Estudiantes/:persona_27957/datos_es.html
Papers mentioned in this Episode:
Asier Moneva, Fernando Miró-Llinares & Timothy C. Hart (2020) Hunter or Prey? Exploring the Situational Profiles that Define Repeated Online Harassment Victims and Offenders, Deviant Behavior, DOI: 10.1080/01639625.2020.1746135
Miró-Llinares F., Moneva A. (2020) Environmental Criminology and Cybercrime: Shifting Focus from the Wine to the Bottles. In: Holt T., Bossler A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_30
David Buil-Gil, Fernando Miró-Llinares, Asier Moneva, Steven Kemp & Nacho Díaz-Castaño (2020) Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK, European Societies, DOI: 10.1080/14616696.2020.1804973
Kemp, S., Miró-Llinares, F. & Moneva, A. The Dark Figure and the Cyber Fraud Rise in Europe: Evidence from Spain. Eur J Crim Policy Res 26, 293–312 (2020). https://doi.org/10.1007/s10610-020-09439-2
Farrell, G., Birks, D. Did cybercrime cause the crime drop?. Crime Sci 7, 8 (2018). https://doi.org/10.1186/s40163-018-0082-8
Miró-Llinares, F., Moneva, A. What about cyberspace (and cybercrime alongside it)? A reply to Farrell and Birks “Did cybercrime cause the crime drop?”. Crime Sci 8, 12 (2019). https://doi.org/10.1186/s40163-019-0107-y
Farrell, G., & Birks, D. (2020). Further rejection of the cybercrime hypothesis. Crime Science, 9, 1-4.https://doi.org/10.1186/s40163-020-00113-w
Other:
The introduction referenced the Spanish dubbed version of the 1983 movie "Juegos de guerra" or "War Games" a Metro-Goldwin Mayer film that is available for streaming online from MGM.
You can play dig dug from 1983 online here: https://archive.org/details/msdos_Dig_Dug_1983
Show Notes:
Elissa Redmiles:
https://www.cs.umd.edu/~eredmiles/
Papers Mentioned in this Episode.
Redmiles, E. M., Kross, S., & Mazurek, M. L. (2016, October). How i learned to be secure: a census-representative survey of security advice sources and behavior. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 666-677).
https://dl.acm.org/doi/abs/10.1145/2976749.2978307
Redmiles, E. M., Kross, S., & Mazurek, M. L. (2017, May). Where is the digital divide? a survey of security, privacy, and socioeconomics. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 931-936).
https://dl.acm.org/doi/abs/10.1145/3025453.3025673
Redmiles, E. M., Warford, N., Jayanti, A., Koneru, A., Kross, S., Morales, M., ... & Mazurek, M. L. (2020). A comprehensive quality evaluation of security and privacy advice on the web. In 29th {USENIX} Security Symposium ({USENIX} Security 20) (pp. 89-108).
https://www.usenix.org/conference/usenixsecurity20/presentation/redmiles
Redmiles, E. M., Mazurek, M. L., & Dickerson, J. P. (2018, June). Dancing pigs or externalities? measuring the rationality of security decisions. In Proceedings of the 2018 ACM Conference on Economics and Computation (pp. 215-232).
https://dl.acm.org/doi/abs/10.1145/3219166.3219185
Redmiles, E. M. (2019). Quality and Inequity in Digital Security Education (Doctoral dissertation).
https://drum.lib.umd.edu/handle/1903/25404
The Evening statesman., March 20, 1906, Page TWO
This scam was about Spanish prisoner fraud, which is an old form of advance fee fraud. You can see an example of one from 1903 that is being sold from an action house here:
https://www.pbagalleries.com/images/lot/1209/12090_0.jpg
Probably the first record of these is in a New York Times articles titled "AN OLD SWINDLE REVIVED", from Dec. 26, 1878
Read more here:
https://www.atlasobscura.com/articles/the-9-lives-of-the-spanish-prisoner-the-treasure-dangling-scam-that-wont-die
This episodes music samples old traffic safety videos found at the Prelinger Archives available at archive.org.
About our guest:
Howard Bilodeau is an economist at Statistics Canada.
Mentioned in the Show.
Cyber Security and Cybercrime in Canada, 2017
https://www150.statcan.gc.ca/n1/pub/71-607-x/71-607-x2018007-eng.htm
About one-fifth of Canadian businesses were impacted by cyber security incidents in 2019
https://www150.statcan.gc.ca/n1/daily-quotidien/201020/dq201020a-eng.htm
~~~
I really liked this episode, I hope you did as well. Did you know that the end piece on a tape measure is loose accurately to the width of the metal catch so that you can put it against a wall or over the edge of a board without it being off by a milimetre or so. The little gap in that metal tab is there so you can put it over the head of a screw and then mark out a circle radius. Very handy measure.
More about our Guests
Dr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University.
https://cj.msu.edu/directory/holt-thomas.html
Dr Yi Ting Chua is a research associate at the Cambridge Cybercrime Centreat the Department of Computer Science and Technology, Cambridge University.
https://www.cl.cam.ac.uk/~ytc36/
Dr Rutger Leukfeldt is senior researcher and the cybercrime cluster coordinator at the NSCR. as well as the director of the Cybersecurity & SMEs Research Center of the Hague University of Applied Sciences.
https://www.nscr.nl/en/author/rutger/
https://www.cybercrimeworkingroup.com/rutger-leukfeldt
Parler - The Social network
Big thanks to the acrobatic elephants upstairs and the snow movers for making recording and mixing this episode such a joy.
I have had the song for this episode stuck in my head for a month. I hope it isn't such an earworm for you as well.
More about our Guests
Dr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University.
https://cj.msu.edu/directory/holt-thomas.html
Dr. Hyunwook Chun is a Deputy Director at the Korean Institute of Criminology and affiliated professor at Dongguk University
Dr Rutger Leukfeldt is senior researcher and the cybercrime cluster coordinator at the NSCR. as well as the director of the Cybersecurity & SMEs Research Center of the Hague University of Applied Sciences.
https://www.nscr.nl/en/author/rutger/
https://www.cybercrimeworkingroup.com/rutger-leukfeldt
~~~
This episode was about the future so there isn't much to link about here, I guess in a few years I might have to come back and put the links in for the things that haven't happened yet.
~~~
This episode took a lot more mixing than usual. I hope you like the result.
Show Notes
More About Our Guest:
https://www.cardiff.ac.uk/people/view/38041-levi-michael
Names Dropped
Peter Grabosky
https://researchers.anu.edu.au/researchers/grabosky-pn
David Wall
https://essl.leeds.ac.uk/law/staff/238/professor-david-s-wall-facss
Benoit Dupont
https://recherche.umontreal.ca/english/our-researchers/professors-directory/researcher/is/in15263/
Cassandra Cross
https://staff.qut.edu.au/staff/ca.cross
Monica Whitty
https://unsw.adfa.edu.au/our-people/professor-monica-whitty
Mark Button
https://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/mark-button
Papers Mentioned
Evidence-based approaches to regulating 'organized crime'
https://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=16095637
You can see a rather interesting regulatory response to the problem of cell phone theft here:
https://www.zdnet.com/article/south-korea-to-mandate-anti-theft-mobile-feature/
This interview went for over an hour and a half. What a great discipline of research where people are willing to share their time for the benefit of others.
More about our Guest:
https://www.cardiff.ac.uk/people/view/38041-levi-michael
Mentioned in this Show:
SNC Lavalin and Trudeau
https://en.wikipedia.org/wiki/SNC-Lavalin_affair
The Hungarian Circle
https://en.wikipedia.org/wiki/Henry_Oberlander
There have been a lot of Riots in Bristol
https://en.wikipedia.org/wiki/Bristol_riots#National_riots,_August_2011
Displacement
https://en.wikipedia.org/wiki/Crime_displacement
Dr Carlo Morselli
https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in14440/sg/Carlo Morselli/
I am very much paraphrasing Dr Morselli at the end of this episode, I unfortunately only took short hand notes as he delivered this message in french in a speech that tied together a class on criminology that included much discussion and exercises that was as awesome, engaging, funny, and inspiring as it was inimitable.
A Thousand Cuts
Death by a thousand paper cuts is a figure of speech that refers to the failure of an organization by the introduction of bureaucracy and many small inefficiencies and issues that slowly leads to bankruptcy.
Obligatory Joke:
I laughed quite a bit during the taping of this episode but I had to edit most of it out so as not to distract from Dr Levi. I probably owe you a laugh.
When I was a kid, my mother told me I could be anyone I wanted to be.
Turns out, identity theft is a crime.
This episode was recorded in July 2020.
More about Our Guest
https://faculty.nps.edu/dedennin/
From this Episode:
Morris Wilkes: https://en.wikipedia.org/wiki/Maurice_Wilkes
His book "Time-sharing computer systems" from 1968 provide for the Security of the System on page 91 noting that "Passwords, if used must be carefully guarded and changed frequently; the console printing should be switched off when the users is invited to type in his password". So perhaps we can give Bill Burr a break. I learned about that line from a Dorothy Denning Lecture
A Declaration of the Independence of Cyberspace by John Perry Barlow
https://www.eff.org/cyberspace-independence
the Cult of the Dead Cow
https://en.wikipedia.org/wiki/Cult_of_the_Dead_Cow
CARNAVORE
https://en.wikipedia.org/wiki/Carnivore_(software)
https://computer.howstuffworks.com/carnivore.htm
Honeypots
https://en.wikipedia.org/wiki/Honeypot_(computing)
https://www.projecthoneypot.org/index.php
Napster
https://en.wikipedia.org/wiki/Napster
Did you know there were viral videos and memes before Facebook, YouTube and even Gmail?
Money Good. Napster Bad
https://tvtropes.org/pmwiki/pmwiki.php/WebAnimation/NapsterBad
More about Our Guest
https://researchers.anu.edu.au/researchers/grabosky-pn
Janke, Art (2005) Alexey Ivanov and Vasiliy Gorshkov: Russian Hacker Roulette
Hacking Theft of $10 Million From Citibank Revealed
https://www.latimes.com/archives/la-xpm-1995-08-19-fi-36656-story.html
Vladimir Levin
https://en.wikipedia.org/wiki/Vladimir_Levin
2007 cyberattacks on Estonia
https://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
Operation Olympic Games
https://en.wikipedia.org/wiki/Operation_Olympic_Games
Cyber Resiliency: A Clear and Urgent Necessity for Modern Railroads
Sanger, D. E. (2019) The perfect weapon: War, sabotage, and fear in the cyber age
C. Stoll (1989) Cuckoo’s Egg
More about Our Guest
https://researchers.anu.edu.au/researchers/grabosky-pn
From this Episode:
Michael A. Sussmann, (1999) The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium, 9 Duke Journal of Comparative & International Law 451-489
https://scholarship.law.duke.edu/djcil/vol9/iss2/5/
Kim Dotcom
https://en.wikipedia.org/wiki/Kim_Dotcom
Malaysian Cybercrime Law
Yew, Wong Malaysian Law and Computer Crime (SANS Reading Room Whitepaper)
https://www.sans.org/reading-room/whitepapers/legal/malaysian-law-computer-crime-670
Appudurai, J., & Ramalingam, C. L. (2007). Computer Crimes: A Case Study of What Malaysia Can Learn from Others?. Journal of Digital Forensics, Security and Law, 2(2), 1.
https://commons.erau.edu/cgi/viewcontent.cgi?article=1020&context=jdfsl
Drink or Die
https://en.wikipedia.org/wiki/DrinkOrDie
Sanger, David E. (2018)The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
Bruce Sterling The Hacker Crackdown: Law and Disorder on the Electronic Frontier (1992)
More about Our Guest
https://researchers.anu.edu.au/researchers/grabosky-pn
Persons of Note:
Abbie Hoffman
JoyBubbles, Josef Carl Engressia Jr.
https://en.wikipedia.org/wiki/Joybubbles
Captain Crunch
(VIDEO) 2015: "History of Hacking" by John "Captain Crunch" Draper
https://www.youtube.com/watch?v=DK-352AWaKk
Yan Laura (22 Oct 2019) An Early Hacker Used a Cereal Box Whistle to Take Over Phone Lines
CSO, (20 Nov, 2017) Captain Crunch aka John Draper banned from DefCon for sexual misconduct
Captain Zap
Delio, Michelle (Feb 6, 2001) The Greatest Hacks of All Time
https://www.wired.com/2001/02/the-greatest-hacks-of-all-time/
CaptainZap
https://hackstory.net/Captain_Zap
Steve Jobs and Steve Wozniak
Lapsley, Phil (Feb 20, 2013) The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking
(VIDEO) 1984: "Wozniak Meets Steve Jobs: Blue Box Free Phone Calls Worldwide" by Steve Wozniak
https://www.youtube.com/watch?v=oeVOpDUWwpU
Reading
Donn B Parker Crime by Computer (1976)
August Bequai Computer Crime (1978)
Steve Levy Hackers: Heroes of the computer revolution (1984)
Gordon Meyer & Jim Thomas COMPUTER UNDERGROUND DIGEST (1990-2000)
http://www.computer-underground-digest.org/
Clough and Mungo Approaching Zero 1992
C. Stoll Cuckoo’s Egg (1989)
Other
A few things that you missed:
You could read this paper from 1977, in which August Bequai attempts to define and illustrate the then 100 million dollar problem of computer crime :
https://heinonline.org/HOL/P?h=hein.journals/polqua6&i=22
The Equity Funding Scam.
https://en.wikipedia.org/wiki/Equity_Funding
Barbash, Fred(Nov 16, 1982) High Court to Review SEC Action on Whistleblower,
Initial findings of the SEC on The Equity Funding Corporation
https://www.sec.gov/litigation/aljdec/1978/id19780901djm.pdf
MIT still has a Model railway club
Rod Stewart (https://en.wikipedia.org/wiki/Rod_Stewart) is a railway enthusiast. I once worked with a guy who had a beer with Rod Stewart and insisted he was a good bloke.
https://www.bbc.com/news/entertainment-arts-50403561
Information wants to be free
https://en.wikipedia.org/wiki/Information_wants_to_be_free
What is a punch card?
https://www.computerhope.com/jargon/p/punccard.htm
DARPA, the group behind the internet infrastructure, still exists
About the Guest:
https://www.cybercrimelaw.net/biography.html
The History of Cybercrime: 1976-2016 by Stein Schjolberg.
https://www.amazon.co.uk/dp/B01N7XVFY8/ref=cm_sw_em_r_mt_dp_EmUnFb8VZZ79T
In this episode we spoke about:
The Council of Europe convention of cybercrime: https://www.coe.int/en/web/cybercrime/home
The United Nations program on cybercrime.
https://www.unodc.org/unodc/en/cybercrime/global-programme-cybercrime.html
~~~~
Light Reading
Clough, J. (2014). A world of difference: the Budapest convention of cybercrime and the challenges of harmonisation. Monash UL Rev., 40, 698.
https://www.monash.edu/__data/assets/pdf_file/0019/232525/clough.pdf
Cnews.ru via CCRC (Mar 28, 2008)Putin defies Convention on Cybercrime
http://www.crime-research.org/news/28.03.2008/3277/
David Ignatius (Oct 24, 2017) Russia is pushing to control cyberspace. We should all be worried.
Allison Peters (Sept. 16, 2019) Russia and China Are Trying to Set the U.N.’s Rules on Cybercrime
About the Guest:
https://www.cybercrimelaw.net/biography.html
The History of Cybercrime: 1976-2016 by Stein Schjolberg.
https://www.amazon.co.uk/dp/B01N7XVFY8/ref=cm_sw_em_r_mt_dp_EmUnFb8VZZ79T
~~~~
We mentioned Donn Parker.
https://en.wikipedia.org/wiki/Donn_B._Parker
The Santayana reference is from the book "The Life of Reason" by George Santayana, which can be found at : https://www.gutenberg.org/files/15000/15000-h/15000-h.htm
About the Guest
https://unsw.adfa.edu.au/our-people/professor-monica-whitty
Papers Mentioned:
Whitty, M. T. (2019). Predicting susceptibility to cyber-fraud victimhood. Journal of Financial Crime.
https://www.emerald.com/insight/content/doi/10.1108/JFC-10-2017-0095/full/html
~~~
Other:
The cybersafety library resource program I mentioned is called cybersec101, you can find it here https://cybersec101.ca
The hilarious PSA film "Safety: Harm Hides at home" used for the sample at the start can be found in the Prelinger archives at archive.org here: https://archive.org/details/safety_harm_hides
Music made with software (looper) from AudioKit. https://audiokitpro.com/
About the Guest:
https://uwaterloo.ca/school-of-accounting-and-finance/people-profiles/w-alec-cram
Papers Mentioned in this Episode:
Cram, W. A., D'arcy, J., & Proudfoot, J. G. (2019). Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance. MIS Quarterly, 43(2), 525-554.
Other Notes:
There was the punchline for an old joke in there, the original version is needlessly gendered, so I'll switch it and give the setup,
An engineer (Practitioner) and a Mathematician (Theorist) were drinking at a bar. They both order a pint, and the Mathematician shares, "If I drink half of this beer now, half of the remainder in after a minute, half again in two minutes, and so on I will be able to drink for the rest of time". The Engineer replies, "Yes but in five minutes you will be drunk enough to order another (Close enough to finished for all practical purposes)".
~~~
The sample from the start is from a film about factory safety that is in the Prelinger archives available at archive.org https://archive.org/details/1280FactorySafety
Piano is .... a piano. Cheezy casio drums are from https://lmms.io/.
About the Guest:
https://research.qut.edu.au/qut-law-lab/people/bridget-harris/
Papers Mentioned in this Episode:
Harris, B. A., & Woodlock, D. (2019). Digital coercive control: Insights from two landmark domestic violence studies. The British Journal of Criminology, 59(3), 530-550.
https://doi.org/10.1093/bjc/azy052
DeKeseredy, W. S., Schwartz, M. D., Harris, B., Woodlock, D., Nolan, J., & Hall-Sanchez, A. (2019). Technology-Facilitated Stalking and Unwanted Sexual Messages/Images in a College Campus Community: The Role of Negative Peer Support. SAGE Open. https://doi.org/10.1177/2158244019828231
Stark, E. (2007). Coercive control: The entrapment of women in personal life. Oxford University Press.
Harris, Bridget (2020) Technology, domestic and family violence: perpetration, experiences and responses. QUT Centre for Justice.
https://eprints.qut.edu.au/199781/
~~~~~~
Monkey Fashion Incident was referring to the events of the article below. It is hard to describe visual thinks like this without being offensive, my apologies if the reference was upsetting.
Blanchard, Tasmin (2019/02/08) Courting controversy: from H&M’s ‘coolest monkey’ to Gucci’s blackface jumper, The Guardian
https://www.theguardian.com/fashion/2019/feb/08/courting-controversy-from-hms-coolest-monkey-to-guccis-blackface-jumper
~~~~~~~~~
Online Safety resources in Australia :
https://wesnet.org.au/
https://www.esafety.gov.au/
~~~~
I drank a cup of tea before recording the introduction and close. Black Tea can make your mouth a little dry and it is not a good idea to drink it before recording voice. I put the milk in after the hot water, I can not dismiss the suggestion that it is better that way(https://en.wikipedia.org/wiki/Lady_tasting_tea). If you listen to this with good quality headphones, I am sorry about the mouth noise. The tea was good.
~~~~~~~
Introduction was sampled from the "The Town and the Telephone" part of the Prelinger archives available at Archive.org. (https://archive.org/details/Townandt1950)
Music made with software from AudioKit. https://audiokitpro.com/
Find out more about the Ontario Provincial Police here:
~~~
No papers in this episode, it was so very practical.
The Office of the privacy Commissioner of Canada was mentioned.
SERENE-RISC was mentioned a few times. That's my day job. You can find them (us) here: www.serene-risc.ca.
The opening was from a 1940s recruitment advertisement for the police service, part of the Prelinger archives on archive.org.
https://archive.org/details/0456ElementsOfInvestigation01010403
If you do go and watch that movie, immediately cleanse your palate with episode 23 of the reducing crime podcast, to hear Mo McGough talk about the work to change this presentation and reality of the police.
https://www.reducingcrime.com/podcast
About the guest:
https://www.eur.nl/people/wytske-van-der-wagen
Papers mentioned in this episode:
Wytske van der Wagen, The Significance of ‘Things’ in Cybercrime: How to Apply Actor-network Theory in (Cyber)criminological Research and Why it Matters, Journal of Extreme Anthropology, Volume 3 Number 1, 2019
Assistant Professor at Erasmus University, Department of Criminology
DOI: https://doi.org/10.5617/jea.6895
Wytske van der Wagen, Wolter Pieters, From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks, The British Journal of Criminology, Volume 55, Issue 3, May 2015, Pages 578–595,
https://doi.org/10.1093/bjc/azv009
van der Wagen, W., & Pieters, W. (2018). The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory. European Journal of Criminology. https://doi.org/10.1177/1477370818812016
Wytske van der Wagen, From cybercrime to cyborg crime
Authors Manuscript version:
https://www.rug.nl/research/portal/files/61493330/Chapter_1.pdf
Extract from:
van der Wagen, W. (2018). From cybercrime to cyborg crime: An exploration of high-tech cybercrime,
offenders and victims through the lens of Actor-Network Theory. [Groningen]: Rijksuniversiteit Groningen.
https://www.rug.nl/research/portal/en/publications/from-cybercrime-to-cyborg-crime(f3a5c5e0-ff0f-4dad-ac6c-2bc91d96a1b4).html
Other:
The Samy Kamkar MySpace Worm
Greatest Moments in Hacking History: Samy Kamkar Takes Down Myspace
5 minute Video from MotherBoard.
https://www.youtube.com/watch?v=DtnuaHl378M
~~~~~
That EternalBlue thing that became crimeware
The Leaked NSA Spy Tool That Hacked the World by Lily Hay Newman on Wired.com (03/07/2018)
https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world/
WannaCry – Important lessons from the first NSA-powered ransomware cyberattack
By Pierluigi Paganini, May 16, 2017
~~~~
The BredoLab Botnet
Bredolab: Jail for man who masterminded botnet of 30 million computers
by Graham Cluley, 23 MAY 2012
https://nakedsecurity.sophos.com/2012/05/23/bredolab-jail-botnet/
Wikipedia on the BedoLab botnet
https://en.wikipedia.org/wiki/Bredolab_botnet
~~~~~
Sorry for the Pronunciation of Kubernētēs, I tried, but I am not sure than I managed more than a "foreign word" accent.
If all you have is a hammer, all you see is nails, but every tool's a hammer.
https://en.wikipedia.org/wiki/Law_of_the_instrument
https://www.goodreads.com/book/show/43319933-every-tool-s-a-hammer
About the Guest:
https://aysps.gsu.edu/profile/david-maimon-2/
The Evidence-Based Cybersecurity Research Group
Papers mentioned in this episode:
MAIMON, D., ALPER, M., SOBESTO, B. and CUKIER, M. (2014), RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM. Criminology, 52: 33-59. doi:10.1111/1745-9125.12028
Testa, A., Maimon, D., Sobesto, B. and Cukier, M. (2017), Illegal Roaming and File Manipulation on Target Computers. Criminology & Public Policy, 16: 689-726. doi:10.1111/1745-9133.12312
David Maimon, Theodore Wilson, Wuling Ren, Tamar Berenblum, On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents, The British Journal of Criminology, Volume 55, Issue 3, May 2015, Pages 615–634, https://doi.org/10.1093/bjc/azu104
Other:
Not mentioned at all but this series of white papers compiling evidence for particular defensive tools or strategies is very handy.
https://scholarworks.gsu.edu/ebcs_tools/
About the Guest:
https://www.bu.edu/met/faculty/full-time/kyung-shick-choi/
https://services.bridgew.edu/Directory/search_person.cfm?personList=1361
Papers mentioned in this episode:
Choi, K. S., & Lee, J. R. (2017). Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory. Computers in Human Behavior, 73, 394-402.
https://www.sciencedirect.com/science/article/pii/S0747563217302212
Choi, K. S. (2010). Risk factors in computer-crime victimization. LFB Scholarly Pub..
https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=260371
Other:
International Journal of Cybersecurity Intelligence & Cybercrime
More about the Guest :
http://intra.cbcs.usf.edu/PersonTracker/common/cfm/Unsecured/criminology/bio.cfm?ID=659
Papers Mentioned in this episode:
Thomas J. Holt, George W. Burruss & Adam M. Bossler (2010) SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD, Journal of Crime and Justice, 33:2, 31-61, DOI: 10.1080/0735648X.2010.9721287
Burruss, G. W., Bossler, A. M., & Holt, T. J. (2013). Assessing the Mediation of a Fuller Social Learning Model on Low Self-Control’s Influence on Software Piracy. Crime & Delinquency, 59(8), 1157–1184. https://doi.org/10.1177/0011128712437915
Burruss, G. W., Holt, T. J., & Bossler, A. (2019). Revisiting the Suppression Relationship Between Social Learning and Self-Control on Software Piracy. Social Science Computer Review, 37(2), 178–195. https://doi.org/10.1177/0894439317753820
Other:
It is important to note that criminological theories discuss 'deviance' using the term without a negative connotation. It is used in the sense that a set of behaviours or attitudes diverge from the usual standards for a particular society. In this sense there is little difference between gang members, drug users, monks or fans of the insane clown posse. To make the idea of deviancy less alien, it helps to think of non-criminal groups that are different from the mainstream. In this case we discussed drug use and bronies as a way of placing hacking and digital piracy in a context of a different social group with associated definitions and values. Neither of us has a problem with bronies. Personally, I think that they are an important group helping to expose and break down traditional and potentially toxic gender roles. Also, they are a great example of the importance of art in both shaping and permitting wider societal expression. If you don't know what a brony is there are plenty of documentaries, but this page is quite helpful : https://haenfler.sites.grinnell.edu/subcultures-and-scenes/bronies/
Find out more about the guest:
Dr Catherine Marcum is an Assistant Chair of Government and Justice studies at Appalachian State University
https://gjs.appstate.edu/directory/dr-cathy-marcum
~~~~
Texts Mentioned in this show:
Marcum, C.D., Higgins, G.E., & Nicholson, J. (2018). Crossing Boundaries Online in Romantic Relationships: An Exploratory Study of the Perceptions of Impact on Partners by Cyberstalking Offenders. Deviant Behavior, 39(6
Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the intersection of self-control, peer association and neutralization in explaining digital piracy. Western Criminology Review, 12(3), 60.
Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014). Sexting behaviors among adolescents in rural North Carolina: a theoretical examination of low self-control and deviant peer association. International Journal of Cyber Criminology, 8(2).
Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35(7), 581-591.
More:
You can learn about the DARE Program here:
https://www.history.com/topics/1980s/just-say-no
https://en.wikipedia.org/wiki/Drug_Abuse_Resistance_Education
The introduction from this show was extracted from an educational show about the value of science. Check out the Prelinger archives for public domain videos containing interesting history. A wonderful resource. https://archive.org/details/prelinger
Find out more about the guest:
Dr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University.
https://cj.msu.edu/directory/holt-thomas.html
~~~~
Texts Mentioned in this show:
Holt, T. J., & Bossler, A. M. (2015). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.
~~~~~~~
Deterrence Theory
https://www.sciencedirect.com/topics/computer-science/deterrence-theory
General Theory - Self control
https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0004.xml?
Social Learning Theory
https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0002.xml?
Sub-Cultures of Crime
https://soztheo.de/theories-of-crime/learning-subculture/subcultural-theory-cohen/?lang=en
Techniques of Neutralization and Drift
https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0140.xml
Actor Network Theory
https://en.wikipedia.org/wiki/Actor%E2%80%93network_theory
Drake presents a story of moving from the bottom to here, not sure where here is though. https://youtu.be/RubBzkZzpUA
Gauthier and Forsyth provide an analysis of "Bug-Chasing".
K. Gauthier, D., & J. Forsyth, C. (1999). Bareback sex, bug chasers, and the gift of death. Deviant Behavior, 20(1), 85-100.
https://www.tandfonline.com/doi/abs/10.1080/016396299266605
If you are curious about the rules of the internet, bear in mind that these have always been very dynamic. The link below shows a list. Keep in mind that a lot of this is a joke, and there was never any real process for deciding on this rules, apart from they should be funny. Rumour is that rule 34 was the first rule. If you have no idea what this is all about then take care in researching as it is all 'fringe' internet culture, mostly NSFW and some things cannot be unseen. The link below is picture free, apart from some ascii graphics.
https://web.archive.org/web/20160217040548/http://rulesoftheinternet.com/index.php?title=Main_Page
The introduction from this show was extracted from an educational show about the value of science. Check out the Prelinger archives for public domain videos containing interesting history. A wonderful resource. https://archive.org/details/prelinger
Find out more about the guest:
http://rasmusmunksgaard.net/
Darknet and Anonymous Research Center
https://www.thedarc.org/en/
~~~~~~~~~~~~~~~~~~~~~~
Papers Mentioned in this Show:
Cryptomarkets: A Research Companion (2019) James Martin, Jack Cunliffe and Rasmus Munksgaard, Emerald Group Publishing, ISBN 1838670300, 9781838670306
Martin, J., Munksgaard, R., Coomber, R., Demant, J., & Barratt, M. J. (2019). Selling Drugs on Darkweb Cryptomarkets: Differentiated Pathways, Risks and Rewards. The British Journal of Criminology.
https://www.gwern.net/docs/sr/2019-martin.pdf
~~~~~~~~~~~~~~~~~~~~~~~~~~~
Other notes:
Commando was apparently upset because his daughter was kidnapped by a friend. https://www.imdb.com/title/tt0088944/
Rambo was struggling with PTSD in First blood, in the rest of the movies he seems to be trying to end war by shooting it. https://en.wikipedia.org/wiki/Rambo_(franchise)
Demolition man appears to be making a case for police brutality, still a great film though. Stalone is upset because he can't operate three shells and Snipes is upset because he was paying tax. https://www.imdb.com/title/tt0106697/
John Wick was upset because he had retired and had recently formed a close bond with a car and a dog. https://www.imdb.com/title/tt2911666/
Nice Burn at 34:20 Rasmus!, action movies were popular culture once upon a time :p.
In Breaking Bad, Walter White started selling meth for the money, not sure that was the only reason by the end of the show. https://www.imdb.com/title/tt0903747/
The introduction for this episode was extracted from Gangbusters, a radio show from the 1950s. It was supposedly a series of dramatized real FBI cases. Produced and directed by Phillips H. Lord together with Bureau director J. Edgar Hoover. Crime Awareness way back when. You can find it and other public domain resources at archive.org, https://archive.org/details/Gangbusters-Otr.
Find out more about the researcher:
https://people.clas.ufl.edu/natalieebner/
Papers Mentioned in this show:
Ebner, N. C., Ellis, D. M., Lin, T., Rocha, H. A., Yang, H., Dommaraju, S., & Oliveira, D. S. (2018). Uncovering susceptibility risk to online deception in aging. The Journals of Gerontology: Series B.
http://www.daniela.ece.ufl.edu/Research_files/gerontology18.pdf
More to read:
Lin, T., Capecci, D. E., Ellis, D. M., Rocha, H. A., Dommaraju, S., Oliveira, D. S., & Ebner, N. C. (2019). Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content. ACM Transactions on Computer-Human Interaction (TOCHI), 26(5), 1-28.
https://dl.acm.org/doi/abs/10.1145/3336141
Oliveira, D.S., Lin, T., Rocha, H. et al. Empirical analysis of weapons of influence, life domains, and demographic-targeting in modern spam: an age-comparative perspective. Crime Sci 8, 3 (2019) doi:10.1186/s40163-019-0098-8
https://crimesciencejournal.biomedcentral.com/articles/10.1186/s40163-019-0098-8
The intro from this show is from an educational video from the Prelinger Archives. https://archive.org/details/prelinger
More About the researcher:
https://www.northumbria.ac.uk/about-us/our-staff/n/james-nicholson/
Papers mentioned in this episode:
Nicholson, J., Coventry, L., & Briggs, P. (2019, April). If It's Important It Will Be A Headline: Cybersecurity Information Seeking in Older Adults. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (p. 349). ACM.
https://dl.acm.org/doi/10.1145/3290605.3300579
~~~~~
The introduction was from a video on the importance of radio. Check out the Prelinger archives for public domain videos containing interesting history. https://archive.org/details/prelinger
"Turn up your Radio" was a song by Australian Rock group the Master's Apprentices. If you read this far, treat yourself ;)/
Learn more about Dr. Ruth Shillair:
https://comartsci.msu.edu/our-people/ruth-shillair
Papers Mentioned in this Show:
Mind the Gap: Perceived Self- Efficacy, Domain Knowledge and Their Effects on Responses to a Cybersecurity Compliance Message
~~~~~~~
Multiple Sources for Security: Seeking Online Safety Information and their Influence on Coping Self-efficacy and Protection Behavior Habits
https://scholarspace.manoa.hawaii.edu/handle/10125/41766
~~~~~
Robin L. Nabi, David Roskos-Ewoldsen & Francesca Dillman Carpentier (2008) Subjective Knowledge and Fear Appeal Effectiveness: Implications for Message Design, Health Communication, 23:2, 191-201, DOI: 10.1080/10410230701808327
The introduction was from a PSA on the dangers of bad habits. Check out the Public Domain content of the Prelinger archives for more interesting historical recordings. https://archive.org/details/prelinger
Find out more about Dr Leukfedlt:
https://www.nscr.nl/en/author/rutger/
https://www.cybercrimeworkingroup.com/rutger-leukfeldt
Publication mentioned in the Podcast:
A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists
Leukfeldt, E.R., Kleemans, E.R. & Stol, W.P. Crime Law Soc Change (2017) 67: 21. https://doi.org/10.1007/s10611-016-9662-2
News article:
Cryptocurrency Entrepreneur and Investor Michael Terpin Sues “Too Big to Care” AT&T for Permitting $23.8 Million Theft in “SIM Swap” Scam by Authorized Agent
More Background for this discussion:
Criminal networks in a digitised world: on the nexus of borderless opportunities and local embeddedness
Leukfeldt, E.R., Kleemans, E.R., Kruisbergen, E.W. et al. Trends Organ Crim (2019) 22: 324. https://doi.org/10.1007/s12117-019-09366-7
Book
The Human Factor of Cybercrime
by Rutger Leukfeldt, Thomas J. Holt
https://www.crcpress.com/The-Human-Factor-of-Cybercrime/Leukfeldt-Holt/p/book/9781138624696
Find out more about Dr. Alice Hutchings:
https://www.cl.cam.ac.uk/~ah793/
Find the paper mentioned in this show:
Hutchings, A., & Pastrana, S. (2019). Understanding eWhoring. arXiv preprint arXiv:1905.04576.
Find out more about Diana Freed:
https://infosci.cornell.edu/content/freed
Find out more about Sam Havron:
The find the papers mentioned in this show:
Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T., & Dell, N. (2018, April). “A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (p. 667). ACM.
https://dl.acm.org/citation.cfm?id=3174241
Havron, S., Freed, D., Chatterjee, R., McCoy, D., Dell, N., & Ristenpart, T. (2019). Clinical computer security for victims of intimate partner violence. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 105-122).
Find out more about Dr Diarmaid Harkin:
https://www.deakin.edu.au/about-deakin/people/diarmaid-Harkin
Find the report mentioned in this show:
The Consumer Spyware Industry An Australian-based analysis of the threats of consumer spyware.
Find the paper mentioned in this show:
Harkin, D., Molnar, A., & Vowles, E. (2019). The commodification of mobile phone surveillance: An analysis of the consumer spyware industry. Crime, Media, Culture, 1741659018820562.
https://journals.sagepub.com/doi/abs/10.1177/1741659018820562
Find our more about Dr. Heather Douglas:
https://law.uq.edu.au/profile/1347/heather-douglas
For the paper referred to in this show please read:
Douglas, H., Harris, B. A., & Dragiewicz, M. (2019). Technology-facilitated domestic and family violence: Women’s experiences. The British Journal of Criminology, 59(3), 551-570.
En liten tjänst av I'm With Friends. Finns även på engelska.