ֱ̽ of Cambridge - cybercrime /taxonomy/subjects/cybercrime en Opinion: I spent three years in a paedophile hunting team – here’s what I learned /research/news/opinion-i-spent-three-years-in-a-paedophile-hunting-team-heres-what-i-learned <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/gettyimages-516621461.jpg?itok=68JS5Vvc" alt="Hooded figure using a laptop computer" title="Hooded figure using a laptop computer, Credit: iStock / Getty Images Plus" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p class="legacy">By the time you finish reading this article, at least one new case of child sexual abuse will have been reported. In the US, a child is sexually assaulted <a href="https://rainn.org/statistics">every nine minutes</a>. In the UK, this figure is closer to one <a href="https://www.nspcc.org.uk/about-us/news-opinion/2020/child-sexual-offences-rise/">every seven minutes</a>. ֱ̽sexual abuse of children is a horrifying and widespread problem that <a href="https://www.bbc.co.uk/news/uk-england-50302912">police admit</a> they cannot arrest their way out of.</p>&#13; &#13; <p>High-profile cases of systemic child sexual abuse – Jimmy Savile, Jeffrey Epstein, Larry Nassar, cardinals, bishops and priests – have placed the threat front of mind and led members of the public to take matters into their own hands. Social media has given them the means to do so effectively.</p>&#13; &#13; <p>Pretending to be children online, hunters wait for predators to initiate sexual communications. When predators ignore reminders that they are talking to “children”, hunters expose them in livestreamed “stings” once they have sufficient evidence of grooming. Several <a href="https://www.gov.uk/government/news/sentences-increased-for-men-involved-in-attempted-child-sex-offences">cases</a> have shown that talking to decoys as though they were a real child can be grounds enough for sentencing.</p>&#13; &#13; <p>These stings take place in public (where a predator has asked a child to meet him in a park or shopping mall) or at the predator’s home. In the UK alone, over 150 hunting teams were collectively responsible for 1,148 confrontations with suspected paedophiles in 2021. Their evidence helped secure prosecutions in <a href="https://www.bbc.co.uk/news/uk-england-50302912">hundreds of cases</a>.</p>&#13; &#13; <p>I spent <a href="https://journals.aom.org/doi/abs/10.5465/amj.2020.1492">three years embedded</a> with one of the UK’s most prolific hunting teams. An analysis of 356,799 words of private, online team chats during this period, and 831 pages of field notes and interviews, offers unique insights into what it’s like to hunt another human being.</p>&#13; &#13; <p>For many involved in these groups, there’s the thrill of the chase. But some also found a deep sense of purpose in confronting a moral pandemic. Many hunters themselves have experienced abuse, and this colours how they view their hunting activities. “So many in this community have been deeply affected by these scum”, one said. “If I can save one child from seeing the world through a survivor’s life then I am blessed”, another added.</p>&#13; &#13; <p>Hunters spend nearly as much time judging each other’s stings as they do baiting predators. They do so to reaffirm the purity of their motive – to keep children safe – compared to other teams they accuse of hunting purely for entertainment by poking fun at predators or being physically or verbally abusive.</p>&#13; &#13; <p>Still, almost all teams value viewing figures and having an audience. As one explained: " ֱ̽two we did this weekend have some great exposure: a quarter of a million and 200,000 [viewers]."</p>&#13; &#13; <h2> ֱ̽hero’s journey</h2>&#13; &#13; <p> ֱ̽way paedophile hunters talk about their work follows a narrative akin to the hero’s journey found in tales like Batman. A selfless hero saves his community from an evil threat when formal institutions (police, politicians) fail to do so. Having restored the moral order, the superhero recedes into obscurity.</p>&#13; &#13; <p>Hunters refer to sexual predators as “monsters” and “vile beasts” that prey on “the innocent”. They constantly remind each other to “keep safe” during stings, even as hunters outnumber predators four or more to one.</p>&#13; &#13; <p>This attitude offers a logic and a moral justification for what hunters do. Believing that “police should be grateful we are doing their job for them”, they position themselves as society’s last line of defence.</p>&#13; &#13; <p>These characters feed off each other: the more impotent the police or parents are perceived to be, the more vulnerable the child, the more beastly the monster, the more heroic the hunter.</p>&#13; &#13; <h2>Relationship with police</h2>&#13; &#13; <p>While police broadly welcome citizen involvement in fighting crime, <a href="https://www.bbc.co.uk/news/uk-england-50302912">they think hunters unhelpful</a>, even given the role of the evidence they collect. ֱ̽police accuse hunters of acting on insufficiently robust evidence and jeopardising ongoing investigations. They also say hunters fail to safeguard suspects with learning difficulties who may prove difficult to prosecute, nor do they take sufficient action to protect suspects and their families from reprisals by neighbours and psychological injury.</p>&#13; &#13; <p>It can be difficult to understand why hunting teams persist with live streaming stings when less harmful alternatives are easily available. They could, for example, simply hand any evidence to police, upload sting footage only after convictions are secured in court or avoid filming the target’s face to not reveal his identity online.</p>&#13; &#13; <p>Since predators are typically released on bail following arrest, hunters argue that live streaming alerts the public of a predator in their midst. Parents deserve to know “there’s a nonce roaming the neighbourhood”, they reason.</p>&#13; &#13; <p>My experience suggests that hunters persist with live streaming stings not because they are not aware of less harmful alternatives, but because it is the apotheosis of their quest. ֱ̽sting is the final battle between good and evil that tests the character of a hunter and must be played out before a live audience – any subsequent convictions in court are, for some teams, neither here nor there. What police presume is a means to an end is, for hunters as heroes, an end itself.<!-- Below is ֱ̽Conversation's page counter tag. Please DO NOT REMOVE. --><img alt=" ֱ̽Conversation" height="1" src="https://counter.theconversation.com/content/176290/count.gif?distributor=republish-lightbox-basic" style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important" width="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. ֱ̽page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p>&#13; &#13; <p><span><a href="https://theconversation.com/profiles/mark-de-rond-147809">Mark de Rond</a>, Professor of Organisational Ethnography, <em><a href="https://theconversation.com/institutions/cambridge-judge-business-school-2729">Cambridge Judge Business School</a></em></span></p>&#13; &#13; <p>This article is republished from <a href="https://theconversation.com"> ֱ̽Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/i-spent-three-years-in-a-paedophile-hunting-team-heres-what-i-learned-176290">original article</a>.</p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Professor Mark de Rond from Cambridge Judge Business School discusses his three years embedded with one of the UK's most prolific paedophile hunting teams, in this article for <em> ֱ̽Conversation</em>.</p>&#13; </p></div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/" target="_blank">iStock / Getty Images Plus</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Hooded figure using a laptop computer</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; ֱ̽text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. Images, including our videos, are Copyright © ֱ̽ of Cambridge and licensors/contributors as identified.  All rights reserved. We make our image and video content available in a number of ways – as here, on our <a href="/">main website</a> under its <a href="/about-this-site/terms-and-conditions">Terms and conditions</a>, and on a <a href="/about-this-site/connect-with-us">range of channels including social media</a> that permit your use and sharing of our content under their respective Terms.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Wed, 11 May 2022 23:00:02 +0000 Anonymous 232101 at Honour among thieves: the study of a cybercrime marketplace in action /research/news/honour-among-thieves-the-study-of-a-cybercrime-marketplace-in-action <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/crop_208.jpg?itok=QwBTRxOF" alt="Someone programming a website in HTML" title="Someone programming a website in HTML, Credit: Mika Baumeister on Unsplash" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Having seen a large rise in illegal transactions during the first national lockdown last spring, the researchers warned that the second lockdown is likely to result in another surge in cybercrime activities. But they also offer insights on how such activity can be disrupted.</p>&#13; &#13; <p> ֱ̽researchers have been collecting the data on illicit trades from HackForums – the world’s largest and most popular online cybercrime community. Two years ago, it set up a market where contracts had to be logged for all transactions as an attempt to protect members of the community from scamming and frauds.</p>&#13; &#13; <p> ֱ̽contract system was introduced in 2018, and then made mandatory in spring 2019, for all market users. It logged all the illicit buying and selling of – among other things – malicious software (malware), currencies including Bitcoin and gift vouchers, eWhoring ‘packs’ (e.g. of photos and videos with sexual content), hacking tutorials and tools that allow users illegally to access or control remote servers.   </p>&#13; &#13; <p>Ironically, HackForums had introduced the contract logging system in response to its members’ concerns that trades were being abused and they were being scammed. But in doing so, it unwittingly lifted the lid on the way such underground markets operate.</p>&#13; &#13; <p> ֱ̽data the contract logging generated has been collected by researchers here. And after analysing it and using statistical modelling approaches, the researchers have been able to shed important new light on the way a cybercrime market operates, hopefully to the benefit of the security community.</p>&#13; &#13; <p> ֱ̽researchers watched the market initially function as a forum where many individual users conducted one-off transactions. Then it changed. As the contract system became mandatory, within a few months, the market was becoming concentrated around a small group of ‘power-users’ offering goods and services that were attractive to many.</p>&#13; &#13; <p>“This small group of users – representing about 5 per cent of all users – are involved in around 70 per cent of all the transactions,” said Anh Vu, a research assistant in the Cambridge Cybercrime Centre and co-author of the paper the Centre has just produced, <a href="https://www.cl.cam.ac.uk/~vv301/papers/imc20.pdf">‘<em>Turning Up the Dial: the Evolution of a Cybercrime Market through Set-up, Stable, and Covid-19 Eras’</em></a> .</p>&#13; &#13; <p>And then came the global declaration of the coronavirus pandemic in March 2020. ֱ̽research team saw the virus and the resulting lockdowns that were introduced significantly “turn up the dial” on the number of market transactions.</p>&#13; &#13; <p>“There was a big rise in transactions in what we call the ‘Covid-19 era’,” said Anh. “Looking at the discussion forums, we could see that a period of mass boredom and economic change – when presumably some members were not able to go to school and others had lost their jobs – really stimulated the market.</p>&#13; &#13; <p>“Members needed to make money online and they had a lot of time on their hands, and so we saw a rise in trading activity. We expect to see another rise during the second lockdown, but we don’t think it will be as large as during the first.”</p>&#13; &#13; <p> ֱ̽increase in business during the pandemic also meant that contracts for transactions were concluded much faster. Where in the early months of the market, the completion time for contracts was around 70 hours, during the pandemic it dropped to less than 10 hours.</p>&#13; &#13; <p>Online underground forums like HackForums are communities used for trading in illicit material and sharing knowledge. ֱ̽forums support a plethora of cybercrimes, allowing members to learn about and engage in criminal activities such as trading virtual items obtained by illicit means, launching denial of service attacks, or obtaining and using malware. They facilitate a variety of illicit businesses aiming at making easy money.</p>&#13; &#13; <p> ֱ̽Cambridge Cybercrime Centre researchers have done some previous work looking at underground forums. “But this is the first dataset we are aware of that provides insights about the contracts made in these forums,” says Anh. Previously, while traders might meet online in a forum, they would likely trade offline via private messaging. But the introduction of the contract system means all trades are now logged – and can therefore be tracked.</p>&#13; &#13; <p>Using the data, the researchers looked at a variety of trading activities taking place in the market. ֱ̽largest activities were currency exchanges and payments – for example, exchanging Bitcoin (a very popular currency in illicit trading because people believe that it leaves no trace) for PayPal funds.</p>&#13; &#13; <p>This activity was followed by trades in gift cards (including Amazon gift cards) and software licences. “When you install a software package like Windows,” Anh said. “You have to input a key to activate it. People often buy software keys illegally in a market like this because it is cheaper for them than purchasing it officially from Microsoft – and sometimes they can obtain it for free in exchange for other items.”</p>&#13; &#13; <p>Other products and services they found being traded in the underground market were hacking tutorials, remote access tools and eWhoring materials – photos and videos with sexual content that are sold to a third party, who pays for them believing that they are paying for an online sexual encounter.</p>&#13; &#13; <p>They used several methods to try and estimate the values of trades taking place via HackForums and concluded that taking both public and private transactions into account and extrapolating by each contract type, the lower bound total of trades was in excess of $6 million.</p>&#13; &#13; <p>What the researchers learned about the operation of an underground cybercrime market is valuable, they believe, to the security community. ֱ̽logging of contracts when goods were traded has allowed users to build up a form of trust and reputation and this in turn led to the rise of the ‘power-users’ in the market.</p>&#13; &#13; <p>“And now we know a small group of power-users are responsible for a large number of transactions, it would make sense to focus interventions on them,” Anh said. “As that will have a much bigger impact than going after a large number of individuals.”</p>&#13; &#13; <p>In their paper they suggest interventions to undermine the perceived reputations and trustworthiness of the big players – for example by posting false negative reviews of them and using other methods, known as Sybil attacks, that disrupt the market’s reputation systems.</p>&#13; &#13; <p>And the researchers are continuing to watch the market. “We’re interested to know how the marketplace evolves during this second lockdown and afterwards,” said Anh. “And will be looking to see whether any new trading activities emerge.”</p>&#13; &#13; <p><strong><em>Reference: </em></strong><br />&#13; <a href="https://www.cl.cam.ac.uk/~vv301/papers/imc20.pdf">‘<em>Turning Up the Dial: the Evolution of a Cybercrime Market through Set-up, Stable, and Covid-19 Eras’</em></a><em> was presented at a seminar series of the 2020 Internet Measurement Conference. It was also presented at the <a href="https://www.cst.cam.ac.uk/seminars/list/152692">Workshop on Security and Human Behaviour</a> taking place on Thursday 5 November 2020</em>.</p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Researchers at the Cambridge Cybercrime Centre have revealed what they’ve learned from analysing hundreds of thousands of illicit trades that took place in an underground cybercrime forum over the last two years.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">We’re interested to know how the marketplace evolves during this second lockdown and afterwards, and will be looking to see whether any new trading activities emerge</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Anh Vu</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://unsplash.com/photos/flat-screen-computer-monitor-displaying-white-and-black-screen-J5yoGZLdpSI" target="_blank">Mika Baumeister on Unsplash</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Someone programming a website in HTML</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; ֱ̽text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. Images, including our videos, are Copyright © ֱ̽ of Cambridge and licensors/contributors as identified.  All rights reserved. We make our image and video content available in a number of ways – as here, on our <a href="/">main website</a> under its <a href="/about-this-site/terms-and-conditions">Terms and conditions</a>, and on a <a href="/about-this-site/connect-with-us">range of channels including social media</a> that permit your use and sharing of our content under their respective Terms.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Fri, 06 Nov 2020 16:19:06 +0000 Anonymous 219481 at Lockdown 'helps fuel rise in cybercrime' /research/news/lockdown-helps-fuel-rise-in-cybercrime <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/philipp-katzenberger-iijruoerocq-unsplash.jpg?itok=Zns9odQR" alt="Close-up of a laptop&#039;s keyboard" title="Closeup of laptop computer, Credit: Photo by Philipp Katzenberger on Unsplash" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>That’s the warning from a team of researchers including Dr Ben Collier from the <a href="https://www.cambridgecybercrime.uk/">Cambridge Cybercrime Centre</a>, part of Cambridge's <a href="https://www.cst.cam.ac.uk/">Department of Computer Science and Technology</a>.</p>&#13; &#13; <p> ֱ̽researchers have been analysing data collected by the Centre from underground forums, chat channels and marketplaces used by cybercrime communities. And in a briefing paper they have just written for Police Scotland, they say it indicates that the social changes put in place in response to the coronavirus pandemic 'have stimulated… the cybercrime economy.'</p>&#13; &#13; <p>Some of the cybercrimes taking place are new. For example, early in the lockdown, some scammers sent fake texts, purporting to come from the UK's HM Revenue &amp; Customs, telling recipients they were going to be fined £250 for leaving their homes more than once a day.​</p>&#13; &#13; <p>And the researchers are also concerned that the rollout of the prospective NHS contact-tracing app has the potential to generate clear risks for those vulnerable to fraud. They warn that such people may be conned into handing over sensitive personal information by fake apps or scam texts purporting to be from the NHS.</p>&#13; &#13; <p>“We’re also seeing some general repurposing of existing cybercrime,” said Collier. “For example, there have long been fake online shops, but now instead of selling clothes, they are selling face masks or bogus ‘cures’ for the coronavirus.”</p>&#13; &#13; <p>And meanwhile, there has been a general rise in the levels of cybercrime.  ֱ̽Cambridge Cybercrime Centre has tracked a three-fold increase in ‘denial of service’ attacks from around 12,000 per day to close to 30,000 attacks per day. These attacks – which can be purchased for small amounts of money from specialised online services – can be used to knock others offline, often opponents in online games.</p>&#13; &#13; <p>Such attacks, the report says, have serious implications beyond being a nuisance for gamers, as many of these children and young people will be sharing internet connections with siblings engaged in online or blended learning and parents working from home.</p>&#13; &#13; <p>We are vulnerable to such risks, Collier and his colleagues say, because we are spending much more time online as we work, or school our children, from home. And it is partly happening because “many internet users, including adolescents and young adults, are currently confined to home with no school or work for much of the day. ֱ̽increased boredom they feel may well be a key driver of online petty crime.”</p>&#13; &#13; <p>“Anxiety over serious economic problems – such as job losses and business closures – may be prompting some people to step up existing harmful online activity as a means of generating income,” said Collier. </p>&#13; &#13; <p>In their paper, the research team – Dr Collier, Dr Shane Horgan from Edinburgh Napier ֱ̽, Dr Richard Jones from the ֱ̽ of Edinburgh and Dr Lynsay Shepherd from Abertay ֱ̽ – also voice their concerns about the potential for a steep rise in the volume of other online harms. These include online bullying, stalking and harassment of minority groups and victims of domestic abuse.</p>&#13; &#13; <p>Their paper is a rapid response briefing aimed at offering guidance on the policing of cybercrime to Police Scotland. But its findings have relevance across the UK.</p>&#13; &#13; <p>It says that while the UK has a sophisticated cybersecurity apparatus particularly at the national level, it currently lacks sufficient capability at the local level to police a significant increase in ‘volume’ cybercrime offences.</p>&#13; &#13; <p>And it recommends that with levels of such crimes increasing, police forces need to engage more with their local communities and work with them on measures to prevent such crimes.</p>&#13; &#13; <p> ֱ̽paper also recommends that police forces, including Police Scotland, immediately undertake a wide-ranging review of their cybercrime policing and prevention practices and capabilities to assess their current adequacy and potential future resilience in the event that the number of cybercrime offences increases significantly in the near future.</p>&#13; &#13; <p><a href="https://www.sipr.ac.uk/assets/files/REiP%20-%20Pandemic%20Cyber%20-%20Collier_Horgan_Jones_Shepherd.pdf"><em> ֱ̽implications of the COVID-19 pandemic for cybercrime policing in Scotland: A rapid review of the evidence and future considerations’</em></a> is published by the Scottish Institute for Policing Research.</p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Take extra care before buying face masks or testing kits online, or responding to texts apparently sent to you by the UK Government or the NHS. Because while lockdown has helped reduce the spread of the coronavirus, it is also helping fuel a rise in cybercrime.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">Anxiety over serious economic problems – such as job losses and business closures – may be prompting some people to step up existing harmful online activity as a means of generating income</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Ben Collier</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://unsplash.com/photos/closeup-photo-of-turned-on-blue-and-white-laptop-computer-iIJrUoeRoCQ" target="_blank">Photo by Philipp Katzenberger on Unsplash</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Closeup of laptop computer</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; ֱ̽text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. Images, including our videos, are Copyright © ֱ̽ of Cambridge and licensors/contributors as identified.  All rights reserved. We make our image and video content available in a number of ways – as here, on our <a href="/">main website</a> under its <a href="/about-this-site/terms-and-conditions">Terms and conditions</a>, and on a <a href="/about-this-site/connect-with-us">range of channels including social media</a> that permit your use and sharing of our content under their respective Terms.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Wed, 03 Jun 2020 10:24:06 +0000 rg580 215072 at Prevention better than cure at keeping young users from getting involved in cybercrime /research/news/prevention-better-than-cure-at-keeping-young-users-from-getting-involved-in-cybercrime <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/crop_150.jpg?itok=gfqxZcar" alt="Eyeglasses" title="Eyeglasses, Credit: Photo by Kevin Ku on Unsplash" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p> ֱ̽study, by researchers from the ֱ̽ of Cambridge and ֱ̽ of Strathclyde, looked at four different types of law enforcement interventions, the first evaluation of the their effectiveness for this particular type of cybercrime.</p>&#13; &#13; <p>They found that while high-profile arrests and sentencing of cybercriminals only lead to a short drop in the number of attacks taking place, the takedown of infrastructure and targeted messaging campaigns were strongly associated with a sharper and longer-term reduction in attack numbers. ֱ̽results will be presented today (21 October) at the ACM Internet Measurement Conference in Amsterdam.</p>&#13; &#13; <p>For just a few dollars, almost anyone can become involved in cybercrime through the use of ‘booter’ service websites, where users can purchase targeted denial of service (DoS) attacks. A DoS attack generates large amounts of traffic which overwhelm end users or web services, taking them offline.</p>&#13; &#13; <p>DoS attacks have been used in the past as a protest tactic, but because of booter services and the relative ease of using them, they are commonly used by users of gaming sites, as a form of retaliation against other users – the largest booter provider carries out between 30,000 and 50,000 such attacks every day.</p>&#13; &#13; <p>While DoS attacks are usually targeted at a specific end users, they can often cause collateral damage, knocking out other users or systems.</p>&#13; &#13; <p>“Law enforcement are concerned that DoS attacks purchased from a booter site might be like a ‘gateway drug’ to more serious cybercrime,” said <a href="https://www.cl.cam.ac.uk/~bjc63/">Ben Collier</a> from Cambridge’s Department of Computer Science &amp; Technology, the paper’s first author. “A big problem is that there is still relatively little evidence as to what best practice looks like for tackling cybercrime.”</p>&#13; &#13; <p>“Even people running booter services think that booting is lame,” said <a href="https://personal.cis.strath.ac.uk/d.thomas/">Dr Daniel Thomas</a> from Strathclyde’s Department of Computer and Information Sciences. “This makes the market particularly vulnerable to disruption.”</p>&#13; &#13; <p>Collier and his colleagues from the <a href="https://www.cambridgecybercrime.uk/">Cambridge Cybercrime Centre</a> used two datasets with granular data about the attacks from booter sites, and modelled how the data correlated with different intervention tactics from the National Crime Agency (NCA) in the UK, the Federal Bureau of Investigation (FBI) in the US, and other international law enforcement agencies.</p>&#13; &#13; <p>While operating a booter service or purchasing a DoS attack is illegal in most jurisdictions, earlier research has found that most booter operators were unconcerned about the possibility of police action against them.</p>&#13; &#13; <p> ֱ̽researchers found that arrests only had a short-term effects on the volume of DoS attacks – about two weeks – at which point activity went back to normal. Sentencing had no widespread effect, as attackers in one country weren’t affected by sentences in another country.</p>&#13; &#13; <p>Taking down infrastructure – as the FBI did at the end of 2018 – had a far more noticeable effect, and suppressed the booter market for months. “This FBI action also reshaped the market: before, it was what you’d expect in a mature ecosystem, where there several large booter services and lots of smaller ones,” said Collier. “But now there’s really just one large booter service provider, and you’re starting to see a few smaller ones start to come back.”</p>&#13; &#13; <p> ֱ̽most interesting results were around targeted messaging. From late December 2017 to June 2018, the NCA bought targeted Google adverts aimed at young men in the UK. When a user searched for booter services, a targeted advert popped up, explaining that DoS attacks are illegal.</p>&#13; &#13; <p>“It’s surprising, but it seems to work, like a type of digital guardianship,” said Collier. “At the exact moment you get curious about getting involved in cybercrime, you get a little tap on the shoulder.</p>&#13; &#13; <p>“It might not work for people who are already involved in this type of cybercrime, but it appeared to dramatically decrease the numbers of new people getting involved.”</p>&#13; &#13; <p>While the researchers say this evidence suggests that targeted online messaging has the potential to be a potent tool for preventing crime, it also poses questions about what accountability structures might be required for its wider use as a police tactic.</p>&#13; &#13; <p>This has already had direct policy impact, and the FBI and NCA have used this research to inform their strategies for dealing with booter services.</p>&#13; &#13; <p> ֱ̽research was supported by the Engineering and Physical Sciences Research Council.</p>&#13; &#13; <p><strong><em>Reference:</em></strong><br />&#13; <em>Ben Collier, Daniel Thomas, Richard Clayton and Alice Hutchings. ‘Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks.’ Paper presented at the <a href="https://conferences.sigcomm.org/imc/2019/program/">ACM Internet Measurement Conference 2019</a>. Amsterdam, the Netherlands. </em></p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Highly-targeted messaging campaigns from law enforcement can be surprisingly effective at dissuading young gamers from getting involved in cybercrime, a new study has suggested.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">A big problem is that there is still relatively little evidence as to what best practice looks like for tackling cybercrime</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Ben Collier</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://unsplash.com/photos/closeup-photo-of-eyeglasses-w7ZyuGYNpRQ" target="_blank">Photo by Kevin Ku on Unsplash</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Eyeglasses</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; ֱ̽text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. Images, including our videos, are Copyright © ֱ̽ of Cambridge and licensors/contributors as identified.  All rights reserved. We make our image and video content available in a number of ways – as here, on our <a href="/">main website</a> under its <a href="/about-this-site/terms-and-conditions">Terms and conditions</a>, and on a <a href="/about-this-site/connect-with-us">range of channels including social media</a> that permit your use and sharing of our content under their respective Terms.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Sun, 20 Oct 2019 23:20:52 +0000 sc604 208322 at Cambridge to host transatlantic cyber security competition /news/cambridge-to-host-transatlantic-cyber-security-competition <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/news/crop_11.jpg?itok=7ttNuLzq" alt="Inter-ACE Cyber Challenge 2017" title="Inter-ACE Cyber Challenge 2017, Credit: Frank Stajano" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p> ֱ̽“Cambridge2Cambridge” cyber security competition, backed by government and industry, is the brainchild of the ֱ̽ of Cambridge and the Massachusetts Institute of Technology (MIT) in the US, and will see talented students pitted against each other in a three-day showdown.</p>&#13; &#13; <p>In total, 110 students from 25 universities from the UK and USA will form mixed transatlantic teams and battle against a fictional rogue state in the life-like cyber security competition backed by the National Cyber Security Centre (NCSC) and Cabinet Office.</p>&#13; &#13; <p> ֱ̽annual event is now in its second year with prize money up for grabs for the winners. It will be held from 24-26 July at Trinity College, Cambridge.</p>&#13; &#13; <p>With <a href="https://www.computerweekly.com/news">major cyber-attacks on the increase,</a> according to the NCSC, the need for cyber security experts is more important than ever before.</p>&#13; &#13; <p>Professor Frank Stajano, Head of the Academic Centre of Excellence in Cyber Security Research at Cambridge’s Computer Laboratory and the co-founder of Cambridge2Cambridge, said that the competition has been designed to promote greater cyber security collaboration between the UK and USA, and to give students the platform to explore creative ways to combat global cyber-attacks.</p>&#13; &#13; <p>“ ֱ̽aim of the competition is also to bring together different individuals in a fun and inclusive environment, where they can apply their cyber security abilities in a collaborative and competitive setting, allowing students to implement the skills they have been taught, while learning new ones in the process,” he said.</p>&#13; &#13; <p>It also gives budding cyber enthusiasts the opportunity to meet like-minded individuals, and learn more about careers in the sector by introducing them to key players in the industry and government.</p>&#13; &#13; <p><a href="https://cambridge2cambridge.csail.mit.edu/">https://cambridge2cambridge.csail.mit.edu/</a></p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>A major cyber security challenge, aimed at educating and inspiring the next generation of cyber defenders from across the UK and US, will be held at the ֱ̽ of Cambridge next week. </p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"> ֱ̽aim of the competition is to bring together different individuals in a fun and inclusive environment, where they can apply their cyber security abilities in a collaborative and competitive setting.</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Frank Stajano</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/" target="_blank">Frank Stajano</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Inter-ACE Cyber Challenge 2017</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; ֱ̽text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">Creative Commons Attribution 4.0 International License</a>. For image use please see separate credits above.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Thu, 20 Jul 2017 08:55:49 +0000 Anonymous 190532 at Combating cybercrime when there's plenty of phish in the sea /research/features/combating-cybercrime-when-theres-plenty-of-phish-in-the-sea <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/features/161020teqis-graffitti-phishlasthuckleberry.jpg?itok=sC6xqJpZ" alt="" title="TeQi&amp;#039;s Graffitti Phish, Credit: LastHuckleBerry" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>We’ve all received the emails, hundreds, maybe thousands of them. Warnings that our bank account will be closed tomorrow, and we’ve only got to click a link and send credit card information to stop it from happening. Promises of untold riches, and it will only cost a tiny fee to access them. Stories of people in desperate circumstances, who only need some kind soul to go to the nearest Western Union and send a money transfer to save them.</p> <p>Tricking people into handing over sensitive information such as credit card details – known as ‘phishing’ – is one of the ways criminals scam people online. Most of us think we’re smarter than these scams. Most of us think that we could probably con the con artist if we tried. But we would be wrong.</p> <p>Across the world, cybercrime is booming. When the UK government included cybercrime in the national crime statistics for the first time in 2015, it doubled the crime rate overnight. Millions of people worldwide are victimised by online scams, whether it’s blocking access to a website, stealing personal or credit card information, or attempting to extort money by remotely holding the contents of a personal computer hostage.</p> <p>“Since 2005, the police have largely ignored cybercrime,” says Professor Ross Anderson of Cambridge’s Computer Laboratory. “Reported crime fell by as much as a half in some categories. Yet, now that online and electronic fraud are included, the number of reported crimes has more than doubled. Crime was not falling; it was just moving online.”</p> <p>In 2015, computer scientists, criminologists and legal academics joined forces to form the <a href="https://www.cambridgecybercrime.uk/">Cambridge Cybercrime Centre</a>, with funding from the Engineering and Physical Sciences Research Council. Their aim is to help governments, businesses and ordinary users to construct better defences.</p> <p>To understand how the criminals operate, researchers use machine learning and other techniques to recognise bad websites, understand what kinds of brands tend to be attacked and how often, determine how many criminals are behind an attack by looking at the pattern of the creation of fake sites and how effective the various defence systems are at getting them taken down.</p> <p>One way in which studying cybercrime differs from many other areas of research is that the datasets are difficult to come by. Most belong to private companies, and researchers need to work hard to negotiate access. This is generally done through nondisclosure agreements, even if the data is out of date. And once researchers complete their work, they cannot make the data public, since it would reduce the competitive advantage of corporate players, and it may also make it possible for criminals to reverse engineer what was detected (and what wasn’t) and stay one step ahead of law enforcement.</p> <p>One of the goals of the Cambridge Cybercrime Centre is to make it easier for cybercrime researchers from around the world to get access to data and share their results with colleagues.</p> <p>To open up cybercrime research to colleagues across the globe, the team will leverage their existing relationships to collect and store cybercrime datasets, and then any bona fide researcher can sign a licence with the Centre and get to work without all the complexity of identifying and approaching the data holders themselves.</p> <p>“Right now, getting access to data in this area is incredibly complicated,” says Dr Richard Clayton of Cambridge’s Computer Laboratory, who is also Director of the Centre. “But we think the framework we’ve set up will create a step change in the amount of work in cybercrime that uses real data. More people will be able to do research, and by allowing others to work on the same datasets more people will be able to do reproducible research and compare techniques, which is done extremely rarely at the moment.”</p> <p>One of the team helping to make this work is Dr Julia Powles, a legal researcher cross-appointed between the Computer Laboratory and Faculty of Law. “There are several hurdles to data sharing,” says Powles. “Part of my job is to identify which ones are legitimate – for example, when there are genuine data protection and privacy concerns, or risks to commercial interests – and to work out when we are just dealing with paper tigers. We are striving to be as clear, principled and creative as possible in ratcheting up research in this essential field.”</p> <p>Better research will make for better defences for governments, businesses and ordinary users. Today, there are a lot more tools to help users defend themselves against cybercrime – browsers are getting better at recognising bad URLs, for example – but, at the same time, criminals are becoming ever more effective, and more and more people are getting caught in their traps.</p> <p>“You don’t actually have to be as clever as people once thought in order to fool a user,” says Clayton when explaining how fake bank websites are used to ‘phish’ for user credentials. “It used to be that cybercriminals would register a new domain name, like Barclays with two Ls, for instance. But they generally don’t do that for phishing attacks anymore, as end users aren’t looking at the address bar, they’re looking at whether the page looks right, whether the logos look right.”</p> <p> ֱ̽Centre is also looking at issues around what motivates someone to commit cybercrime, and what makes them stop.</p> <p>According to Dr Alice Hutchings, a criminologist specialising in cybercrime, cybercriminals tend to fall into two main categories. ֱ̽first category is the opportunistic offender, who may be motivated by a major strain in their lives, such as financial pressures or problems with gambling or addiction, and who uses cybercrime as a way to meet their goals. ֱ̽second type of offender typically comes from a more stable background, and is gradually exposed to techniques for committing cybercrime through associations with others.</p> <p>Both groups will usually keep offending as long as cybercrime meets their particular needs, whether it’s financial gratification, or supporting a drug habit, or giving them recognition within their community. What often makes offenders stop is the point at which the costs of continuing outweigh the benefits: for instance, when it takes a toll on their employment, other outside interests or personal relationships.</p> <p>“Most offenders never get caught, so there’s no reason to think that they won’t go back to cybercrime,” says Hutchings. “They can always start again if circumstances in their lives change.</p> <p>“There is so much cybercrime happening out there. You can educate potential victims, but there will always be other potential victims, and new ways that criminals can come up with to social engineer somebody’s details, for example. Proactive prevention against potential offenders is a good place to start.”</p> <p>Criminologist Professor Lawrence Sherman believes the collaboration between security engineering and criminology is long overdue, both at Cambridge and globally: “Cybercrime is the crime of this century, a challenge we are just beginning to understand and challenge with science.”</p> <p>“We’re extremely grateful to the people giving us this data, who are doing it because they think academic research will make a difference,” says Clayton.  “Our key contribution is realising that there was a roadblock in terms of being able to distribute the data. It’s not that other people couldn’t get the data before, but it was very time-consuming, so only a limited number of people were doing research in this area – we want to change that.”</p> <p>“Our Cybercrime Centre will not only provide detailed technical information about what’s going on, so that firms can construct better defences,” says Anderson. “It will also provide strategic information, as a basis for making better policy.”</p> </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>As more and more crime moves online, computer scientists, criminologists and legal academics have joined forces in Cambridge to improve our understanding and responses to cybercrime, helping governments, businesses and ordinary users construct better defences.</p> </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">You don’t actually have to be as clever as people once thought in order to fool a user</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Richard Clayton</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://www.flickr.com/photos/zippidyserendipity/16423188579/in/photolist-r2g8MM-2Trrxt-2Tr8Rc-fot6Xg-9Q6RQu-2TvRhf-2Tr8Nr-a56GGq-9deUiG-JNHovd-JRJrcK-2TriKX-78okxd-2TvLa9-JqYBqh-HVpqjy-2TvPVu-HVkJRR-qZmSti-2TvRo3-JGNDnE-2Tvxr9-2TvLKw-JGJU15-2TvNXY-2Trj1B-2TriVk-JRXjF2-pL2PUE-GpB4w2-2Trpdz-a8D7vn-6vHa6F-2TvPnL-JNHnm9-6aPh2c-Jr8Sps-JNHmzQ-HVCauh-2TvAm1-2Trrii-2TvMkd-2TvMbG-2TvR79-2TrpPM-a54xrr-2TvRS9-2TvGLY-2TrcDB-2TroSz" target="_blank"> LastHuckleBerry</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">TeQi&#039;s Graffitti Phish</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br /> ֱ̽text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">Creative Commons Attribution 4.0 International License</a>. For image use please see separate credits above.</p> </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div><div class="field field-name-field-license-type field-type-taxonomy-term-reference field-label-above"><div class="field-label">Licence type:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/imagecredit/attribution-sharealike">Attribution-ShareAlike</a></div></div></div><div class="field field-name-field-related-links field-type-link-field field-label-above"><div class="field-label">Related Links:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="https://www.cambridgecybercrime.uk/">Cambridge Cybercrime Centre</a></div></div></div> Fri, 21 Oct 2016 07:51:23 +0000 sc604 180172 at UK’s top student hackers compete for cyber security /research/news/uks-top-student-hackers-compete-for-cyber-security <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/keyboard.png?itok=QN2tiKvI" alt="" title="A backlit laptop computer keyboard, Credit: Colin via Wikimedia Commons" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p> ֱ̽best student hackers in the UK will take place in a cyber security competition this weekend, in order to demonstrate and improve their skills both as attackers and defenders in scenarios similar to the TalkTalk hack and the leak of the Panama Papers.</p> <p> ֱ̽event, hosted by the ֱ̽ of Cambridge Computer Laboratory in partnership with Facebook, will bring together 10 of the UK’s <a href="https://www.cesg.gov.uk/articles/academic-centres-excellence-cyber-security-research" target="_blank">Academic Centres of Excellence in Cyber Security Research</a> – the first time they have taken part in such an event together. ֱ̽hacking event will take place on Saturday, 23 April.</p> <p>Cyber security is considered one of the biggest threats facing our economy and infrastructure today, and talented hackers are being recruited by government and other agencies to fight cyber criminals. This hacking event will showcase the best student hackers in the country.</p> <p> ֱ̽students will be working on challenges which require them to exploit some common vulnerabilities - the very type that underpinned recent high-profile hacking incidents.</p> <p>Each of the 10 universities is sending a team of four students to this ‘Capture the Flag’-themed event. Throughout the afternoon, the hackers will attempt to solve a series of puzzles, with the winners gaining points; and compete in a series of challenges by attempting to hack the other teams.</p> <p>An example of the type of challenges the hackers may face is to hack into a server and attempt to keep the other teams from getting in for as long as they can. ֱ̽Panama Papers hack likely involved exploiting vulnerabilities in Wordpress and Drupal and the competitors may be tasked with finding similar holes in other software.</p> <p>Facebook has chosen to visualise the progress of the game on a board loosely based on the classic game Risk. ֱ̽goal is to conquer the world, with points awarded for each country that is captured. Each country has a couple of challenges based on different areas of cyber security, and students must be able to extract the ‘flag’ to claim the points for that country.</p> <p>In addition to the teams taking part in the event in Cambridge, other students from the participating universities will also be able to take part in the event remotely, in order that additional students can polish their hacking skills.</p> <p>“We have a huge cyber security skills gap looming in the UK, and we need to close it,” said Dr Frank Stajano of Cambridge’s Computer Laboratory, Head of the <a href="http://www.cl.cam.ac.uk/projects/ace-csr/">Cambridge Academic Centre of Excellence in Cyber Security Research</a>. “Training our students for those challenges closes the gap between theory and practice in cyber security education. With any type of security, you can’t develop a strong defence against these types of attacks if you’re not a good attacker yourself – you need to stay one step ahead of the criminals.”</p> <p>These hacking events also help highlight the different challenges involved in attack and defence. “Attacking is more difficult in general because there is no guaranteed recipe for finding a vulnerability, but in many ways it’s actually easier,” he said. “If you’re defending something, you have to keep absolutely everything safe all the time, but if you’re attacking, all you’ve got to do is find the one weak point and then you’re in – like finding the one weak point in the Death Star that allowed it to be destroyed. When attackers and defenders run on similar platforms it is also the case that, if you attack your opponents, they may reverse-engineer your attack and reuse it against you.”</p> <p>In a meeting last year, Prime Minister Cameron and President Obama agreed to strengthen the ties between the UK and the US, and to cooperate on matters of cyber security affecting both countries.</p> <p>A ‘Cambridge 2 Cambridge’ cyber security competition, held last month at MIT, was one of the outcomes of the meeting between the two leaders, who also expressed a desire that part of this cooperation should include an improvement in cyber security teaching and training for students.</p> <p>From next year, some of the exercises prepared for these events will be part of the undergraduate teaching programme at Cambridge.</p> <p>“Our team was able to gel well together, and that feeling of being ‘in the zone’ and working seamlessly together in attacking other teams, scripting our exploits and rushing to patch our services was fantastic,” said computer science undergraduate Daniel Wong, following last month’s <a href="https://www.cl.cam.ac.uk/events/cam-cam-cyber/">Cambridge 2 Cambridge</a> event.</p> <p>“Maybe somewhat surprisingly for a computer hacking competition, the Cambridge 2 Cambridge event was also an exercise in interpersonal skills, since effectively collaborating with people you have just met under significant time pressure in a generally stressful environment does not come naturally, but I was very fortunate to have had teammates that really made this aspect feel like a walk in the park,” said fellow computer science undergraduate Gábor Szarka, a co-winner of the $15,000 top team prize at the Cambridge 2 Cambridge event.</p> <p> ֱ̽Academic Centres of Excellence in Cyber Security Research (ACE-CSR) scheme is sponsored by the Department for Business, Innovation and Skills, the Centre for the Protection of National Infrastructure, Government Communications Headquarters, the Office of Cyber Security and Information Assurance and Research Councils UK.</p> <p> ֱ̽10 universities sending a team to Saturday’s event are: Imperial College London, Queens ֱ̽ Belfast, Royal Holloway ֱ̽ of London, ֱ̽ College London, ֱ̽ of Birmingham, ֱ̽ of Cambridge, ֱ̽ of Kent, ֱ̽ of Oxford, ֱ̽ of Southampton, and ֱ̽ of Surrey. </p> </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Students from the UK’s top cyber security universities will compete in Cambridge this weekend, in part to address the country’s looming cyber security skills gap.</p> </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">We have a huge cyber security skills gap looming in the UK, and we need to close it. </div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Frank Stajano</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://commons.wikimedia.org/wiki/File:Backlit_keyboard.jpg#/media/File:Backlit_keyboard.jpg" target="_blank">Colin via Wikimedia Commons</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">A backlit laptop computer keyboard</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br /> ֱ̽text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">Creative Commons Attribution 4.0 International License</a>. For image use please see separate credits above.</p> </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div><div class="field field-name-field-license-type field-type-taxonomy-term-reference field-label-above"><div class="field-label">Licence type:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/imagecredit/attribution-sharealike">Attribution-ShareAlike</a></div></div></div> Fri, 22 Apr 2016 11:08:10 +0000 sc604 171932 at Opinion: FBI backs off from its day in court with Apple this time – but there will be others /research/discussion/opinion-fbi-backs-off-from-its-day-in-court-with-apple-this-time-but-there-will-be-others <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/discussion/160330smartphone.jpg?itok=D0wlsYX_" alt="Smartphone rituals" title="Smartphone rituals, Credit: Nicolas Nova" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>After a <a href="https://theconversation.com/why-apple-is-making-a-stand-against-the-fbi-54925">very public stand-off</a> over an encrypted terrorist’s smartphone, the FBI has <a href="https://www.theguardian.com/technology/2016/mar/21/fbi-apple-court-hearing-postpone-unlock-terrorist-iphone">backed down</a> in its court case against Apple, stating that an “outside party” – rumoured to be <a href="https://www.rt.com/usa/336948-fbi-israel-crack-iphone/">an Israeli mobile forensics company</a> – has found a way of accessing the data on the phone.</p>&#13; &#13; <p> ֱ̽exact method is not known. Forensics experts <a href="https://www.zdziarski.com/blog/?p=5966">have speculated</a> that it involves tricking the hardware into not recording how many passcode combinations have been tried, which would allow all 10,000 possible four-digit passcodes to be tried within a fairly short time. This technique would apply to the iPhone 5C in question, but not newer models, which have stronger hardware protection through the so-called <a href="https://support.apple.com/guide/security/welcome/web">secure enclave</a>, a chip that performs security-critical operations in hardware. ֱ̽FBI has denied that the technique involves <a href="https://www.washingtonpost.com/world/national-security/the-fbi-is-testing-a-code-based-way-to-get-into-the-san-bernardino-iphone/2016/03/24/bc79cd14-f1dc-11e5-a61f-e9c95c06edca_story.html">copying storage chips</a>.</p>&#13; &#13; <p>So while the details of the technique <a href="https://www.theguardian.com/technology/2016/mar/22/apple-fbi-san-bernardino-iphone-method-for-cracking">remain classified</a>, it’s reasonable to assume that <a href="https://theintercept.com/2016/03/08/snowden-fbi-claim-that-only-apple-can-unlock-phone-is-bullshit/">any security technology can be broken</a> given sufficient resources. In fact, the technology industry’s dirty secret is that most products are frighteningly insecure.</p>&#13; &#13; <p>Even when security technologies are carefully designed and reviewed by experts, mistakes happen. For example, researchers recently found a way of <a href="https://blog.cryptographyengineering.com/2016/03/21/attack-of-week-apple-imessage/">breaking the encryption of Apple’s iMessage service</a>, one of the most prominent examples of end-to-end encryption (which ensures that even the service provider cannot read the messages travelling via its network).</p>&#13; &#13; <p>Most products have a much worse security record, as they are not designed by security experts, and often contain flaws that are easily found by attackers. For example, <a href="https://boingboing.net/2016/01/19/griefer-hacks-baby-monitor-te.html">internet-connected baby monitors</a> that could be hacked and allow strangers to <a href="https://sfglobe.com:443/2016/01/06/stranger-hacks-familys-baby-monitor-and-talks-to-child-at-night/">talk to their child</a> at night. Insecure cars that <a href="https://theconversation.com/auto-industry-must-tackle-its-software-problems-to-stop-hacks-as-cars-go-online-45325">could be controlled via an internet connection</a> while being driven. Drug infusion pumps at US hospitals that could be hacked by an attacker to <a href="https://www.boxer.senate.gov/?p=release&amp;id=3254">manipulate drug dosage levels</a>.</p>&#13; &#13; <p>Even national infrastructure is vulnerable, with software weaknesses exploited to cause serious damage at a <a href="http://www.bbc.co.uk/news/technology-30575104">German steel mill</a>, bring down parts of the <a href="https://theconversation.com/the-cyberattack-on-ukraines-power-grid-is-a-warning-of-whats-to-come-52832">Ukrainian power grid</a>, and <a href="https://news.softpedia.com/news/hackers-modify-water-treatment-parameters-by-accident-502043.shtml">alter the mix of chemicals added to drinking water</a>. While our lives depend more and more on “smart” devices, they are frequently designed in incredibly stupid ways.</p>&#13; &#13; <h2>Insecure by design</h2>&#13; &#13; <p> ֱ̽conflict between Apple and the FBI was particularly jarring to security experts, seen as an attempt to deliberately make technology less secure and win legal precedent to gain access to other devices in the future. Smartphones are becoming increasingly ubiquitous, and we know from the Snowden files that the NSA can <a href="https://www.theguardian.com/world/2014/feb/01/edward-snowden-intelligence-leak-nsa-contractor-extract">turn on a phone’s microphone</a> remotely without the owner’s knowledge. We are heading towards a state in which every inhabited space contains a microphone (and a camera) that is connected to the internet and which might be recording anything you say. This is not even a paranoid exaggeration.</p>&#13; &#13; <p>So, in a world in which we are constantly struggling to make things more secure, the FBI’s desire to create a backdoor to provide it access is like pouring gasoline on the fire.</p>&#13; &#13; <p> ֱ̽problem with security weaknesses is that it is impossible to control who can use them. Responsible researchers report them to the vendor so that they can be fixed, and sometimes receive a <a href="https://www.tripwire.com/state-of-security/11-essential-bug-bounty-programs-of-2015">bug bounty</a> in return. But those who want to make more money may <a href="https://www.wired.com/2015/11/heres-a-spy-firms-price-list-for-secret-hacker-techniques/">secretly sell the knowledge to the highest bidder</a>. Customers of this <a href="https://theconversation.com/trusting-hackers-with-your-security-youd-better-be-able-to-sort-the-whitehats-from-the-blackhats-44477">dark trade in vulnerabilities</a> often include <a href="https://citizenlab.ca/2015/08/hacking-team-leak-highlights-citizen-lab-research/">governments with repressive human rights records</a>.</p>&#13; &#13; <p>If the FBI has found a means of getting data off a locked phone, that means the intelligence services of other countries have probably independently developed the same technique – or been sold it by someone who has. So if an American citizen has data on their phone that is of intelligence interest to another country that data is at risk if the phone is lost or stolen.</p>&#13; &#13; <p>Most people will never be of intelligence interest of course, so perhaps such fears are overblown. But the push from governments, for example through the pending <a href="https://theconversation.com/us/topics/investigatory-powers-bill-22352">Investigatory Powers Bill</a> in the UK, to allow the security services to hack devices in bulk – even if the devices belong to people who are not suspected of any crime – cannot be ignored.</p>&#13; &#13; <p>Bulk hacking powers, taken together with insecure, internet-connected microphones and cameras in every room, are a worrying combination. It is a cliche to conjure up Nineteen Eighty-Four, but the picture it paints is something very much like Orwell’s telescreens.</p>&#13; &#13; <p> </p>&#13; &#13; <figure><iframe allowfullscreen="" frameborder="0" height="260" src="https://www.youtube.com/embed/CCfW6HFP5cI?wmode=transparent&amp;start=0" width="440"></iframe></figure><p> </p>&#13; &#13; <h2>Used by one, used by all</h2>&#13; &#13; <p>To some extent law enforcement has historically benefited from poor computer security, as hacking a poorly secured digital device is easier and cheaper than planting a microphone in someone’s house or rifling their physical belongings. No wonder that the former CIA director <a href="https://www.wired.com/2012/03/petraeus-tv-remote/">loves the Internet of Things</a>.</p>&#13; &#13; <p>This convenience often tempts governments to deliberately weaken device security – the FBI’s case against Apple is just one example. In the UK, the proposed Investigatory Powers Bill allows the secretary of state to issue “<a href="https://www.theguardian.com/technology/2015/nov/09/tech-firms-snoopers-charter-end-strong-encryption-britain-ip-bill">technical capability notices</a>”, which are secret government orders to demand manufacturers make a device or service deliberately less secure than it could be. GCHQ’s new MIKEY-SAKKE standard for encrypted phone calls is also <a href="https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/">deliberately weakened</a> to allow easier surveillance.</p>&#13; &#13; <p>But a security flaw that can be used by one can be used by all, whether legitimate police investigations or hostile foreign intelligence services or organised crime. ֱ̽fears of <a href="https://cyber.harvard.edu/pubrelease/dont-panic/Dont_Panic_Making_Progress_on_Going_Dark_Debate.pdf">criminals and terrorists “going dark” are overblown</a>, but the risk to life from insecure infrastructure is real: fixing these weaknesses should be our priority, not striving to make devices less secure for the sake of law enforcement.</p>&#13; &#13; <p><em><strong><span><a href="https://theconversation.com/profiles/martin-kleppmann-229401">Martin Kleppmann</a>, Research associate, <a href="https://theconversation.com/institutions/university-of-cambridge-1283"> ֱ̽ of Cambridge</a></span></strong></em></p>&#13; &#13; <p><em><strong>This article was originally published on <a href="https://theconversation.com/"> ֱ̽Conversation</a>. Read the <a href="https://theconversation.com/fbi-backs-off-from-its-day-in-court-with-apple-this-time-but-there-will-be-others-56932">original article</a>.</strong></em></p>&#13; &#13; <p><em> ֱ̽opinions expressed in this article are those of the individual author(s) and do not represent the views of the ֱ̽ of Cambridge.</em></p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Martin Kleppmann (Computer Laboratory) discusses how vulnerable security technologies really are, and how these vulnerabilities could be exploited by both law enforcement and criminals.</p>&#13; </p></div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://www.flickr.com/photos/nnova/15143063700/in/photolist-p59agb-oV8kWF-dKM4XF-w4mU6u-rtLRaL-6WpyLA-5w1x7B-iPbkXS-5w5So7-5w5Shb-5w5SiQ-ewuJkS-qB7cNm-5w1xqg-raxYPc-4GyQ3B-e7SruD-dJ86M7-pKTwkQ-dt59yY-agSJHn-fcEmHq-fHr5pX-rBuFur-86jRy1-pwsJsG-ncMHe3-ro7xHZ-ae1cnm-aaBHGD-gxrsm-aeuiYT-D3NJb-e8Z9yL-87mW2q-gA3McR-8YMPun-nmbTzF-7vcjwV-opLsGL-a39Vsb-a99Hec-6WcTys-BSZ9N-dwF3pv-D3NQ8-DHRMmJ-a9Xz3a-87mW35-afa19p" target="_blank">Nicolas Nova</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Smartphone rituals</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; ֱ̽text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">Creative Commons Attribution 4.0 International License</a>. For image use please see separate credits above.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div><div class="field field-name-field-license-type field-type-taxonomy-term-reference field-label-above"><div class="field-label">Licence type:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/imagecredit/attribution-noncommerical">Attribution-Noncommerical</a></div></div></div> Wed, 30 Mar 2016 12:57:18 +0000 Anonymous 170332 at