Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 25, 2024 Thu

Time: 3:26 am

Results for hackers

2 results found

Author: Dupont, Benoit

Title: Skills and Trust: A Tour Inside the Hard Drives of Computer Hackers

Summary: Stories of the exploits of computer hackers who have broken into supposedly secure government and corporate information systems appear almost daily on the front pages of newspapers and technology websites, yet we know very little about the individuals behind these headlines. Most media accounts and academic studies on hackers suffer from a number of biases that this research attempts to overcome. A case study based on the seized communication logs of ten confirmed co-offenders is used to expand our knowledge of the social norms and practices that govern interactions between malicious hackers. After presenting the data and how the material became available to the author, the remaining sections focus on the two variables that define this criminal network’s performance: skills and trust. The skills under consideration are the three different sets of cognitive and practical abilities that malicious hackers need in order to succeed financially. Monetization and social skills, in addition to technical skills, play key roles in profit-oriented malicious hacking and explain why earning a decent living in the computer underground remains a laborious endeavour, even for advanced hackers. Trust, which facilitates the diffusion of technical, monetization, and social skills and fosters collaboration, was found to be much lower in this network than is generally assumed in the literature. The need for monetization and social skills as well as the lack of trust between members may partly explain why hacker networks are so ephemeral and vulnerable to law enforcement disruption.

Details: Montreal: School of Criminology, University of Montreal, 2012. 51p.

Source: Internet Resource: Accessed October 15, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2154952

Year: 2012

Country: United States

URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2154952

Shelf Number: 126746

Keywords:
Computer Crimes
Hackers
Internet Crimes
Online Victimization
Social Network Analysis

Author: Ablon, Lillian

Title: Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

Summary: Markets are good because they facilitate economic efficiency, but when that efficiency facilitates criminal activity, such "black markets" can be deemed harmful. Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets in both the tools (e.g., exploit kits) and the take (e.g., credit card information). As with most things, intent is what can make something criminal or legitimate, and there are cases where goods or services can be used for altruistic or malicious purposes (e.g., bulletproof hosting and zero-day vulnerabilities). This report describes the fundamental characteristics of these markets and how they have grown into their current state in order to give insight into how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options that could minimize the potentially harmful influence these markets impart. This report assumes the reader has a basic understanding of the cyber, criminal, and economic domains, but includes a glossary to supplement any gaps. This report should be of interest to cybersecurity, information security, and law enforcement communities. It was sponsored by Juniper Networks as part of a multiphase study on the future security environment.

Details: Santa Monica, CA: RAND, 2014. 83p.

Source: Internet Resource: Accessed April 19, 2014 at: https://www.rand.org/content/dam/rand/pubs/research_reports/RR600/RR610/RAND_RR610.pdf

Year: 2014

Country: International

URL: https://www.rand.org/content/dam/rand/pubs/research_reports/RR600/RR610/RAND_RR610.pdf

Shelf Number: 132082

Keywords:
Black Markets
Computer Crimes
Cybercrimes
Cybersecurity
Hackers
Illegal Markets
Internet Crime