1,087 research outputs found
More Amazon than Mafia: analysing a DDoS stresser service as organised cybercrime
The internet mafia trope has shaped our knowledge about organised crime groups online, yet the evidence is largely speculative and the logic often flawed. This paper adds to current knowledge by exploring the development, operation and demise of an online criminal group as a case study. In this article we analyse a DDoS (Distributed Denial of Service) stresser (also known as booter) which sells its services online to enable offenders to launch attacks. Using Social Network Analysis to explore the service operations and payment systems, our findings show a central business model that is similar to legitimate e-commerce websites in the way product, price and costumers are differentiated. It also illustrates that its organisation is distributed and not hierarchical and the overall income yield is comparatively low, requiring further organisational activity to make it pay. Finally, we show that the users of the service (mainly offenders) are not only a mixed group of actors, but that it is also possible to discriminate between different levels of seriousness of offending according to the particular service they purchased
Policing Elvis: Legal Action and the Shaping of Post-Mortem Celebrity Culture as Contested Space
Celebrity cultures are neither benign nor static, they have their own careers during and beyond the lives of their creators. While they are shaped primarily by creativity and sustained by market forces, as soon as celebrity is created it becomes a contested space and a power struggle ensues. This article explores the use of legal and quasi-legal actions in the shaping of celebrity culture as contested space. It draws upon an analysis of the post-mortem career of Elvis Presley to illustrate how our knowledge of Elvis has been formed by the various legal actions which assisted the passage of his name, image and likeness from the public to the private domain and also the various ‘policing’ governance strategies that have since been employed to maintain control over the use of his image.Central to the discussion is an exploration of the paradox of circulation and restriction, whereby the holder of an intellectual property right in a celebrity culture needs to circulate it in order to exploit its popularity and thus generate income streams, while simultaneously regulating the ways that the celebrity culture is consumed in order to maintain legal control over it in order to preserve those same income streams. The ‘paradox’ arises from the observation that, on the one hand, too much open circulation of a celebrity culture can lead to the development of secondary or even generic meaning that not only threatens the holder’s exclusive rights over the property, but also has the potential to demean, debase or even destroy the overall integrity of the culture. On the other hand, too much restriction through over zealous control could effectively strangle the celebrity culture by killing off sensibilities of personal ownership and affiliation.It will be argued that not only will the balance between circulation and restriction never be an easy fit, but it is also wrong to perceive it simply as a zero sum equation. The relationship between the two is far more complex than assumed by the traditional legalistic model because the paradox provokes conflicting inter-pretations of the truth, which subsequently fuels debates about the celebrity, retains public interest and ultimately keeps the celebrity culture alive. The ‘ contestability’ of celebrity culture is therefore not the traditionally assumed death threat to popular culture, rather, it is an important, if not essential, aspect of the career of a posthumous celebrity culture.This article is largely concerned with US intellectual property law, particularly the right of publicity whose origins lie in the right of privacy; however, the discussion has potential significance for European jurisdictions because of the development there of privacy rights under EU law
Cascade and Chain Effects in Big Data Cybercrime: Lessons from the TalkTalk hack
Big data and cybercrime are creating 'upstream', big data related cyber-dependent crimes such as data breaches. They are essential components in a cybercrime chain which forms a cybercrime ecosystem that cascades 'downstream' to give rise to further crimes, such as fraud, extortion, etc., where the data is subsequently monetized. These downstream crimes have a massive impact upon victims and data subjects. The upstream and downstream crimes are often committed by entirely different offending actors against different victim groups, which complicates and frustrates the reporting, recording, investigative and prosecution processes. Taken together the crime stream's cascade effect creates unprecedented societal challenges that need addressing in the face of the advances of AI and the IoT. This phenomenon is explored here by unpacking the TalkTalk case study to conceptualize how big data and cloud computing are creating cascading effects of disorganized, distributed and escalating data crime. As part of the larger CRITiCal project, the paper also hypothesizes key factors triggering the cascade effect and suggests a methodology to further investigate and understand it
Enemies Within: Redefining the insider threat in organizational security policy
The critical importance of electronic information exchanges in the daily operation of most large modern organizations is causing them to broaden their security provision to include the custodians of exchanged data – the insiders. The prevailing data loss threat model mainly focuses upon the criminal outsider and mainly regards the insider threat as ‘outsiders by proxy’, thus shaping the relationship between the worker and workplace in information security policy. A policy that increasingly takes the form of social policy for the information age as it acquires the power to include and exclude sections of society and potentially to re-stratify it? This article draws upon empirical sources to critically explore the insider threat in organizations. It looks at the prevailing threat model before deconstructing ‘the insider’ into various risk profiles, including the well-meaning insider, before drawing conclusions about what the building blocks of information security policy around the insider might be
The Back-Door Governance of Crime: Confiscating Criminal Assets in the UK
The policy and practice of confiscating criminal assets to control crime and recover illicit wealth has come to occupy a central position in national and international policing and security agendas. However, this practice has raised many questions about agencies’ abilities to measure success and also the social impacts of asset confiscation. This article contributes to the crime control debates by exploring contemporary literature and drawing upon a subset of data from the Joint Asset Recovery Database (JARD). The first part of the article briefly outlines the key legislative provisions of asset recovery in the UK. The second part explores what the JARD data tells us about the performance of the confiscation of proceeds of crime approach and it will argue that seizing illicit wealth has not been the main priority for government. It will argue instead that the proceeds of crime approach, originally designed to target the most serious and organised crime, has effectively become a disciplining and symbolic tool against relatively lower level acquisitive crimes. It concludes that while technical measures of impact remain inconclusive, it is more important to subject the ideological underpinnings of the proceeds of crime law to critical scrutiny
An empirical study of ransomware attacks on organisations: an assessment of severity and salient factors affecting vulnerability
This study looks at the experiences of organizations that have fallen victim to ransomware attacks. Using quantitative and qualitative data of 55 ransomware cases drawn from 50 organizations in the UK and North America, we assessed the severity of the crypto-ransomware attacks experienced and looked at various factors to test if they had an influence on the degree of severity. An organization’s size was found to have no effect on the degree of severity of the attack, but the sector was found to be relevant, with private sector organizations feeling the pain much more severely than those in the public sector. Moreover, an organization’s security posture influences the degree of severity of a ransomware attack. We did not find that the attack target (i.e. human or machine) or the crypto-ransomware propagation class had any significant bearing on the severity of the outcome, but attacks that were purposefully directed at specific victims wreaked more damage than opportunistic ones
Edging your bets: advantage play, gambling, crime and victimisation
Consumerism, industrial development and regulatory liberalisation have underpinned the ascendance of gambling to a mainstream consumption practice. In particular, the online gambling environment has been marketed as a site of ‘safe risks’ where citizens can engage in a multitude of different forms of aleatory consumption. This paper offers a virtual ethnography of an online ‘advantage play’ subculture. It demonstrates how advantage players have reinterpreted the online gambling landscape as an environment saturated with crime and victimisation. In this virtual world, advantage play is no longer simply an instrumental act concerned with profit accumulation to finance consumer desires. Rather, it acts as an opportunity for individuals to engage in a unique form of edgework, whereby the threat to one’s well-being is tested through an ability to avoid crime and victimisation. This paper demonstrates how mediated environments may act as sites for edgeworking and how the potential for victimisation can be something that is actively engaged with
Plasmodium P-Type Cyclin CYC3 Modulates Endomitotic Growth during Oocyst Development in Mosquitoes
Cell-cycle progression and cell division in eukaryotes are governed in part by the cyclin family and their regulation of cyclin-dependent kinases (CDKs). Cyclins are very well characterised in model systems such as yeast and human cells, but surprisingly little is known about their number and role in Plasmodium, the unicellular protozoan parasite that causes malaria. Malaria parasite cell division and proliferation differs from that of many eukaryotes. During its life cycle it undergoes two types of mitosis: endomitosis in asexual stages and an extremely rapid mitotic process during male gametogenesis. Both schizogony (producing merozoites) in host liver and red blood cells, and sporogony (producing sporozoites) in the mosquito vector, are endomitotic with repeated nuclear replication, without chromosome condensation, before cell division. The role of specific cyclins during Plasmodium cell proliferation was unknown. We show here that the Plasmodium genome contains only three cyclin genes, representing an unusual repertoire of cyclin classes. Expression and reverse genetic analyses of the single Plant (P)-type cyclin, CYC3, in the rodent malaria parasite, Plasmodium berghei, revealed a cytoplasmic and nuclear location of the GFP-tagged protein throughout the lifecycle. Deletion of cyc3 resulted in defects in size, number and growth of oocysts, with abnormalities in budding and sporozoite formation. Furthermore, global transcript analysis of the cyc3-deleted and wild type parasites at gametocyte and ookinete stages identified differentially expressed genes required for signalling, invasion and oocyst development. Collectively these data suggest that cyc3 modulates oocyst endomitotic development in Plasmodium berghei
Introgression of a major QTL from an inferior into a superior population using genomic selection
<p>Abstract</p> <p>Background</p> <p>Selection schemes aiming at introgressing genetic material from a donor into a recipient line may be performed by backcross-breeding programs combined with selection to preserve the favourable characteristics of the donor population. This stochastic simulation study investigated whether genomic selection can be effective in preserving a major quantitative trait locus (QTL) allele from a donor line during the backcrossing phase.</p> <p>Methods</p> <p>In a simulation study, two fish populations were generated: a recipient line selected for a production trait and a donor line characterized by an enhanced level of disease resistance. Both traits were polygenic, but one major QTL affecting disease resistance was segregating only within the donor line. Backcrossing was combined with three types of selection (for total merit index) among the crossbred individuals: classical selection, genomic selection using genome-wide dense marker maps, and gene-assisted genomic selection. It was assumed that production could be observed directly on the selection candidates, while disease resistance had to be inferred from tested sibs of the selection candidates.</p> <p>Results</p> <p>Classical selection was inefficient in preserving the target QTL through the backcrossing phase. In contrast, genomic selection (without specific knowledge of the target QTL) was usually effective in preserving the target QTL, and had higher genetic response to selection, especially for disease resistance. Compared with pure genomic selection, gene-assisted selection had an advantage with respect to disease resistance (28–40% increase in genetic gain) and acted as an extra precaution against loss of the target QTL. However, for total merit index the advantage of gene-assisted genomic selection over genomic selection was lower (4–5% increase in genetic gain).</p> <p>Conclusion</p> <p>Substantial differences between introgression programs using classical and genomic selection were observed, and the former was generally inferior with respect to both genetic gain and the ability to preserve the target QTL. Combining genomic selection with gene-assisted selection for the target QTL acted as an extra precaution against loss of the target QTL and gave additional genetic gain for disease resistance. However, the effect on total merit index was limited.</p
- …