Cybercrimeology

By: Cybercrimeology
  • Summary

  • Cybercrimeology is a podcast about cybercrime, its research and its researchers. We talk to top researchers from around the world to learn about different forms of cybercrime and their research. We learn about cybercrime theory, organized crime online, Darknet drug markets, cybercrime awareness and crime prevention, technology-facilitated intimate partner violence and much more. The podcast has been running since November of 2019 and there is still so much to learn. I am happy to have you along for the journey into this fascinating subject.
    Show more Show less
activate_Holiday_promo_in_buybox_DT_T2
Episodes
  • Cinematic Cybersecurity: What are movies teaching us about passwords?
    Oct 1 2024

    Episode Notes:

    • The research focuses on analyzing the representation of passwords and cyber threats in films, particularly how password guessing and hacking scenes influence public perceptions of security.
    • Movies both reflect societal attitudes towards cybersecurity and shape them, as many viewers learn about cyber behaviors through entertainment rather than formal education.
    • The research indicates that films often oversimplify or dramatize hacking scenes, leading to unrealistic expectations about password security.
    • A key finding from the research is that while weak passwords (e.g., “12345”) are mocked in films, even strong passwords are often guessed or hacked with ease, sending the wrong message to audiences about the value of strong security practices.
    • There may be value to educating the public about cybersecurity in the same way people are taught first aid in Germany—everyone should know the basics.
    • One of the challenges of using crowd-sourced subtitle data for academic research was that it required additional work to assure reviewers that the research is ethical.

    About our Guest:

    Maike Raphael

    https://www.itsec.uni-hannover.de/en/usec/team/raphael

    Papers or resources mentioned in this episode:

    Raphael, M. M., Kanta, A., Seebonn, R., Dürmuth, M., & Cobb, C. (2024). Batman hacked my password: A subtitle-based analysis of password depiction in movies. In Proceedings of the Twentieth Symposium on Usable Privacy and Security (pp. 199-211). USENIX Association. https://www.usenix.org/conference/soups2024/presentation/raphael

    Other relevant resources:

    Information and supplementary materials on the paper "Batman Hacked My Password"

    https://www.itsec.uni-hannover.de/de/usec/forschung/medien/password-depiction-in-movies

    If you are interested in the right to download the subtitles.

    The data source (opensubtitles.org) statement regarding copyright.

    https://www.opensubtitles.org/en/dmca

    The website has an API with the no limit to the total number of subitles that can be downloaded, only rate limiting. The research team didn't obtain the subtitles this way, but the source they got them from may have. In either case it shows opensubtitles.org views about how their service can be used.

    https://opensubtitles.stoplight.io/docs/opensubtitles-api/e3750fd63a100-getting-started

    Other:

    I had a bunch of movie clips that I was going to include as examples, but with the way that platforms handle DMCA I just don't want to have to bother with trying to assert a claim to fair use. If you are interested I would recommend having a look at the password scene from Horse Feathers (1932) with Groucho Marx, and there is a scene in Iron Man 3 (2013) where Tony Stark asks James Rhodes for his password, and everyone laughs at the bad password. I recommend you watch Kung Fury from 2015 for their parody treatment of the "hackerman". It is actually on YouTube https://youtu.be/bS5P_LAqiVg?si=-OL8Mr1OLY9Dd081

    Show more Show less
    29 mins
  • Signals, Deception, and AI: Navigating Trust in the Digital World
    Sep 1 2024
    About our Guest:Judith Donathhttps://cyber.harvard.edu/people/jdonathKey Discussion Points:Understanding Signaling Theory:The foundation of signaling theory in communication.The balance between honest and deceptive signals.Evolutionary Biology and Communication:Darwin's insights on animal communication.Zahavi's Handicap Principle and its role in ensuring signal honesty.Maynard Smith's Index Signals and their reliability without cost.AI and the Evolution of Communication:The impact of AI on the reliability of communication signals.Challenges posed by deepfakes in video and audio.The arms race between deception technologies and verification methods.Cultural and Institutional Roles:How culture and institutions uphold the reliability of signals.The interplay between technological advancements and societal norms.Future of Communication in the Digital Age:Strategies for developing secure communication channels.Balancing privacy with the need for verification.The role of trusted sources in maintaining signal integrity.Papers and Books Mentioned:Turing, A. M. (1950). Computing machinery and intelligence. Mind, 59(236), 433-460. https://doi.org/10.1093/mind/LIX.236.433Zahavi, A. (1975). Mate selection—a selection for a handicap. Journal of Theoretical Biology, 53(1), 205-214. https://doi.org/10.1016/0022-5193(75)90111-3Veblen, T. (1899). The Theory of the Leisure Class. New York: Macmillan.https://moglen.law.columbia.edu/LCS/theoryleisureclass.pdfhttps://dn720401.ca.archive.org/0/items/theoryofleisurec01vebl/theoryofleisurec01vebl.pdfWeizenbaum, J. (1966). ELIZA—A computer program for the study of natural language communication between man and machine. Communications of the ACM, 9(1), 36-45. https://doi.org/10.1145/365153.365168Donath, J. S. (2002). Identity and deception in the virtual community. In Communities in cyberspace (pp. 37-68). Routledge.https://vivatropolis.com/papers/Donath/IdentityDeception/IdentityDeception.pdfCurrent Progress on the forthcoming book: Signals, Truth & Designhttps://vivatropolis.com/judith/signalsTruthDesign.htmlDonath, J. (2014). The social machine: designs for living online. MIT Press.https://direct.mit.edu/books/monograph/4037/The-Social-MachineDesigns-for-Living-OnlineOther:The Story about the Ferrari executive Deepfake attempthttps://www.carscoops.com/2024/07/ferrari-ceo-impersonator-uncovered-by-colleague-in-deepfake-call/We geeked out for a moment on Programming languages. Learn about them here.The C languagehttps://en.wikipedia.org/wiki/C_(programming_language)Introduction to Chttps://www.w3schools.com/c/c_intro.phpAPL Languagehttps://en.wikipedia.org/wiki/APL_(programming_language)Learn APLhttps://xpqz.github.io/learnapl/intro.htmlTry APLhttps://tryapl.orgLISP Languagehttps://en.wikipedia.org/wiki/Lisp_(programming_language)Learn LISPhttps://www.geeksforgeeks.org/introduction-to-lisp/
    Show more Show less
    44 mins
  • Mapping the Digital Threat: The Geography of Cybercrime
    Aug 1 2024

    Notes:

    • Background in Sociology: Dr. Miranda Bruce started in sociology, focusing on the dynamics of power and institutions.
    • PhD Research: Her PhD explored the Internet of Things (IoT) using post-structuralist French theory to understand technological reality.
    • Transition to Cybercrime: Transitioned from IoT research to a project on the geography of cybercrime, partnering with a local Australian university and the University of Oxford.
    • Cybercrime as a Local Phenomenon: Emphasized that cybercrime is not just a global issue but has significant local dimensions.
    • Mapping Cybercrime: Developed methods to map cybercrime hotspots to understand where cybercrime is coming from and why.
    • Importance of Local Factors: Identified that local factors play a crucial role in the proliferation of cybercrime in specific areas.
    • Intervention Strategies: Stressed that intervention strategies must be tailored to local conditions as one-size-fits-all approaches are ineffective.
    • Challenges in Measuring Cybercrime: Discussed the difficulties in accurately measuring where cybercrime originates due to technical limitations.
    • Survey of Experts: Utilized expert surveys from cybercrime intelligence and investigations to gather data on cybercrime hotspots.
    • Bias in Data Collection: Addressed potential biases in the data collection process and took steps to ensure diverse and reliable sources.
    • Use of Proxy Data: Chose expert survey data over technical measures or legal cases to get more accurate insights into cybercrime geography.
    • Findings: Key findings indicated that countries like Russia, Ukraine, China, the United States, and Nigeria are significant sources of cybercrime.
    • Analysis of Results: Plans to analyze the collected data to create theoretical models explaining why cybercrime is prevalent in certain areas.
    • Future Research Directions: Aims to develop detailed case studies and collaborate with policymakers to use the data for effective interventions.
    • Open Data: Highlighted the importance of making the data open source to enable further research and collaboration across disciplines.

    About our guests:

    Dr Miranda Bruce:

    https://www.sociology.ox.ac.uk/people/miranda-bruce

    https://www.unsw.edu.au/staff/miranda-bruce

    Papers or resources mentioned in this episode:

    • Bruce, M., Lusthaus, J., Kashyap, R., Phair, N., & Varese, F. (2024). Mapping the global geography of cybercrime with the World Cybercrime Index. PLOS ONE. https://doi.org/10.1371/journal.pone.0249850
    • Bruce, M., & Phair, N. (2020). Mapping the geography of cybercrime: A review of indices of digital offending by country. IEEE European Symposium on Security and Privacy. https://doi.org/10.1109/EuroSPW51379.2020.00013

    Other:

    If you were interested in the topic of this episode, you might also enjoy episode 36 "Cyber criminals are people too".

    Show more Show less
    33 mins

What listeners say about Cybercrimeology

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.