Journal Paper Published in the Computer Law & Security Review

“Defence Against the Dark Artefacts: Smart Home Cybercrimes and Cybersecurity Standards”

post by Stanislaw Piasecki (2018 cohort)

Dr. Lachlan Urquhart (Lecturer in Technology Law, University of Edinburgh and former CDT student) had the first idea in terms of the paper’s topic, which has evolved quite significantly since then concerning its content, structure and methodology. The paper has been written by myself, Lachlan and Professor Derek McAuley (Professor of Digital Economy, Faculty of Science, University of Nottingham). The initial version was based on the practice-led project module completed during the 2018-2019 academic year (part of the Horizon CDT PhD programme). The first title of the project was “Defence Against Dark Artefacts: Mapping Smart Home Cybersecurity Standards”. While I was working on the PLP, the United Kingdom Department for Digital, Culture, Media and Sport (DCMS) published a series of documents aggregating various standards in its “Code of Practice for Consumer Internet of Things (IoT) Security” and the associated “Mapping of IoT security recommendations, guidance and standards to the UK’s Code of Practice for Consumer IoT Security”. During the same period of time, the European Union Agency for Network and Information Security (ENISA) mapped standards in its “IoT Security Standards Gap Analysis”. We realised that the mapping has already been done both at national and EU levels and, as a result, focused our work on analysing the assumptions underpinning emerging EU and UK smart home cybersecurity standards, changing the article’s title to “Defence Against the Dark Artefacts: Smart Home Cybercrimes and Cybersecurity Standards”. Staying up to date was crucial to making our paper relevant and as accurate as possible. I considered the publication of the documents mentioned above as a positive development as I was able to completely focus on the analysis of the assumptions upon which IoT standards are based, the most interesting aspect of our project in my view. My motivation to write this paper has always been to stir discussions about those assumptions and contribute to moving policies into a positive direction for EU and UK citizens. While the main objective of our work has not changed, the means to achieve our goals did. For example, as a result of team discussions, we decided to use the routine activity criminological theory to explain security risks associated with the current design of many smart products. This theory has supported effective policymaking and crime prevention strategies for a long time and has recently been applied more frequently to “virtual” world-related scenarios. Discussing and contributing ideas with my co-authors was a great experience, which certainly improved the content of our article.

We started discussing the outline of the paper already in 2019. My professional background is in law and politics, and our project also involved work in fields such as computer science, cybersecurity and criminology. For this reason, the interdisciplinary nature of our team was helpful and important. In addition to online research and team discussions, I organised meetings with experts from the University and with people I met during various events (such as the 2019 EUROCRIM conference in Ghent, Belgium) to receive advice. However, the interdisciplinary nature of our project remained a challenge for me and involved much reading and discussions to better understand the computer science and criminological aspects of our article, especially at the beginning of my PhD journey (I was still getting familiar with certain basic terminology used in the computer science field). In my opinion, this part of the paper preparation process greatly enhanced my research knowledge and skills. While I will never become a computer scientist, learning about this field of study by reading journal papers, books but also asking questions to computer scientists continues to help me in proposing the most relevant and accurate legal solutions, as my work often lies at the intersection of law and technology. Writing this journal paper has reminded me of the value and importance of interdisciplinary work.

In terms of the review process, the initial journal, to which we submitted our paper had difficulties in finding reviewers and we decided to withdraw our submission. We made this decision before any reviewer was found. I discussed this with my co-authors to make sure that this was ethical (until then, I did not know that withdrawing the submission was in some cases an acceptable decision) and we contacted together the journal in question to be certain that they are comfortable with this as well. This is why the publication process has been much longer than anticipated. This has also influenced our work as we had to stay up to date with new research and technological developments, and include them into our paper while waiting for reviews. Subsequently, we decided to submit our article to the Computer Law and Security Review journal, known for its interdisciplinary nature. The reviewers were quickly selected and we started working on their comments.

Two persons reviewed our work and, in my opinion, the comments were fair. The reviewers were open to discussing them and it felt as if they really wanted to improve our paper rather than just criticise it. The article required a minor revision, which has been completed after two cycles of amendments. While we agreed with some comments, we disagreed with others but always found a common solution. I did anticipate some suggestions. For example, in terms of the structure of the paper, I have suspected that this might be something that they could comment on as I was hesitating myself on how to order specific sections. In this regard, the reviewers helped me in seeing this issue more clearly and finding the right solution. They also suggested citing additional articles, defining certain technical terms and giving more examples of real-world situations to illustrate my arguments. This has definitely improved our paper. In terms of the remarks we disagreed with, we were able to explain to the reviewers what we meant by particular statements and convince them that they are important. This also allowed us to refine those statements and make them clearer for future readers.

While publishing our paper took a rather long time due to the necessity to withdraw our first submission and switch journals, writing this article was a valuable and challenging process, my first publication of interdisciplinary work, an opportunity to collaborate with more experienced researchers and learn about various aspects of journal paper publications. I have already applied what I learned by submitting a second paper this year (based on the first two chapters of my PhD), which has been recently conditionally accepted for publication. Among others, this time I tried to use more concrete real-life examples to support my statements and define technical terms. Even though there might be very well-written articles, I think that there is always room for reviewers’ suggestions to further improve them, and I look forward to participating in the review process again in the future.

 

Covid-19 and Cybercrime

Post by Neeshé Khan (2018 Cohort)

After being in self isolation for what feels like an eternity like many others I am also starting to get warped for what time it is. It’s hard for me to remember when things happened or which day we’re on. I’m experiencing a weird fatigue setting in which is the same for many of the people I’ve been speaking to, despite LinkedIn being on steroids. The fatigue also means that I’m finding it hard to find inspiration to write this blog but here we are – it’s Friday and things must get done. So, welcome to another blog post!

In my earlier posts I wrote about remote working and some pitfalls this could bring for your cybersecurity during Covid-19. Unsurprisingly, as more people have shifted to working from home (WFH) cyberthreats have been on a sharp increase. Some of you might be aware of Zoom (group meet up software) vulnerabilities that allowed hackers or unauthorised users to attend closed sessions which quickly became known as Zoom Bombings. Some kids innocently did some Zoom Bombings to prank their teachers while hackers used this to cause disruptions to virtual classrooms in Singapore.

The National Centre for Cyber Security (NCSC) and the National Centre in the US have issued a joint statement this month to announce that cybercriminals are using Covid-19 themed content to lure in users that are then cyberattacked.

This really shouldn’t be a surprise. There was an interesting mapping done by one of the US universities that showed how the virus moved across the US after spring breakers partied and went back to their respective homes. In the UK there have been several news stories on the BBC talking about an app by the government which will track Covid-19 infections. Given this context it doesn’t take a rocket scientist to see what the easiest bait is for a cybercriminal. To me it’s the same as discussing that you’re planning to upgrade your home with new windows in public places (either online or in real life) and then suddenly seeing adverts that talk about a local window company or worse, getting cold calls from them. Plus, with a pandemic that’s sucker punched economies, had impacts that were unforeseen or unknown and where you have authorities proactively conceal the number of infections, it’s not surprising that Covid-19 becomes an interesting concept to explore, track and be ‘in the know’ for.

So, what can you do to stay safe online. I would suggest reading the news once or twice a day from a trusted source, ideally in static text (such as articles as opposed to interactive graphs), avoid disclosing your location to check the number of cases in your local area and always be wary of clicking links that are from people you don’t know. Even if the links are from people you might frequently speak with, be alert and notice if something ‘doesn’t feel right’ because their account could’ve been hacked. Trust your instincts with content online, listen to that small voice in your head that’s usually right and try to supress (if not temporarily extinguish) your curiosity for the time being. While you’re focusing on suppressing your curiosity, practice some mindfulness or Netflix binge watch the Tiger King.

Stay safe and my best wishes your way. Until next time!

–originally posted on Neeshé’s blog

Human Aspects of Cyber-crime and Online Fraud Summer school

Post by Melanie Wilson (2018 Cohort)

This summer school was presented by Canterbury University in collaboration with the Leicester Castle Business School of De Montfort University, Leicester.

I attended on the Monday & Tuesday of this three-day event, as I had a family commitment on the Wednesday.

The presentations on the Monday were specifically addressing ideas around cyber-crime, social engineering and fraud. These are particularly relevant to me as my PhD is around increasing children’s abilities to identify and resist activities and approaches whilst online. I am addressing these from the perspective of enabling children to recognise attempts from others to engage in social engineering and to have the confidence and personal autonomy to reject anything they feel uncomfortable with, and to seek help where it is needed.

I am working with the Northamptonshire Police cyber-crime team on this and as such have a valuable insight into the challenges they have seen children facing as well as my own perspective as a psychotherapist working with children.

The summer school was the first of its kind to be run at Canterbury University and was led with great enthusiasm and skill by Jason Nurse. The summer school involved people from academia, social enterprise and industry which allowed a large variety of input and ideas to be expressed. Jason was skilful in accommodating discussions within the topics and I found that this approach, rather than the “talked at” approach, was very beneficial. Cyber-crime is a fast-growing field and the traditional approaches of academic study, which often take years to complete, are at risk of being overtaken as both technology and its associated exploitation by criminals proceeds at a rate far outstripping the slower traditional progress of academic work.

I feel this pace change was reflected well in the way the summer school was run. Some of the input could have been improved with more industry input to increase the pace and knowledge of the current challenges further, but I believe that Jason is aware of this and plans to address this in future events.

The first session explored the basics of cyber-crime reflecting on what forms it can take and highlighting how insidious it can be. It addressed the aspects of this area of criminology that are rapidly expanding and exploiting the tools that are available to enhance crime via technological means. One big take-home from this introduction and discussion was how fast this is developing in criminal circles where there are few restrictions and great financial gains to be made. This is at odds with the crime fighters and honest technological industry where there are checks and balances to be met in all circumstances which often results in a slower response which the criminal can exploit.

The Cyber Protect and Prevent Officer for Kent then gave us her perspective on how cyber-crime was affecting policing and the tensions between businesses which often wanted  just to solve the issue and move on with business as usual and the desire to pursue cyber-crime as a crime with ramifications for the criminals.

The final session of the day looked at profiling cyber criminals and looking at how these criminals might be led into a perpetrator role. This is particularly relevant to my work because vulnerability leads to both perpetrator and victim activities and the two routes often share common factors.

At the end of the sessions we arranged to meet after dinner in a pub in Canterbury. Doing so was valuable as it provided a relaxed atmosphere in which to talk further with other attendees both about their work and that of others and gave a great deal of insight into the varying field that are involved with this ever-expanding and important field.

Tuesday morning looked at how cyber-crime is often underlined by psychological methodologies that criminals have learnt to use in order to perpetrate their crimes. We explored how social engineering uses a number of methods to elicit cooperation from people, utilising their vulnerabilities and often just their normal desires to help others and be nice. Again, this is an area that I focus on a great deal and feel addressing our ability to say “no” is fundamentally decreasing individuals’ vulnerability to such tactics. There is a noticeable difference in the psychological mechanisms that criminals exploit ruthlessly and the non-criminals’ tendency to trust.

The afternoon sessions addressed the cost to businesses from cyber-crime.  It was led by Edward Cartwright from De Montfort University and Anna Cartwright from Coventry University. It addressed business vulnerabilities and the attacks that businesses face daily, and the routes into the enterprise which are often indirect. The conflicts of security and running businesses were highlighted and discussed. The reality of end users often not rejecting companies following a breach and whether reputational damage is as damaging as is often thought.  In Anna’s session we looked at the financial motivation for attacks and at what level the attacks and demands became profitable for criminals.

Finally, we looked at the problems and advantages in cyber security that Small and Medium Sized Enterprises face, addressing the challenges of this sector where often there are just a few individuals trying to complete multiple roles.

This summer school was fun. Where a learning experience is fun, lively and open to discussion, I feel far more is gained than from a situation where there is just one voice with very little interaction.

It greatly benefited from a range of perspectives and allowing those to be expressed and discussed. I feel everyone learned something from the variety and range of participants at the event and very much look forward to taking part next year.

Summer School on The Human Aspects of Cyber-crime and Online Fraud

post by Neeshé Khan (2018 cohort)

This Summer School and workshop was hosted by the Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) and School of Computing at the University Kent, the Institute of Applied Economics and Social Value at De Montfort University and International Association for Research in Economic Psychology (IAREP). It took place at Canterbury between 15th to the 17th of July lead by Dr Jason RC Nurse.

As I’m working on accidental insider threat within cybersecurity to examine human factors that trigger this threat, I was keen to attend this event as it would provide an overview of the issues around social engineering and associated forms of crime in the virtual and physical world – broadly sitting within my own research interests. Recent media has highlighted many cases where fraud and cybercrime have resulted from a mixture of social engineering and human vulnerabilities to gain undesirable outcomes including encryption of data to hold at ransom on an organisational and individual level. Whilst there is literature on cyber-psychology linking to malicious insiders and cybercriminals, there is little literature available that takes an interdisciplinary approach to tackle this problem, especially examining this from a psychological, economics, and cybercrime perspective. So the aim of the summer school was to introduce these disciplines and their relevance to be able to better understand this challenge. This was particularly important to me as I believe that all the global challenges being faced by the world today require collective interdisciplinary action to resolve them.

One of the highlights of attending this school was meeting a diverse range of about 40 attendees, which included different career stages within academia, people from industry, diversity in research being pursued and interests as well as diversity in ethnicity, age and academic backgrounds. Whilst most of the projects weren’t similar, it was still cohesive in terms of disciplines and understanding of cybersecurity. This allowed a space where I shared and received ideas and insights about this issue over workshop discussions and group dinners. Presentations were a mixture of academics from various universities including the University of Bristol and the University of Cambridge as well as law enforcement. I hope my notes below are of interest to anyone from psychology, economics, and cybersecurity fields taking an interdisciplinary approach to exploring cybercriminal and victim behaviour and traits, especially those involving malicious or intentional insiders.

Discussions included how the definition of cybercrime is hard to settle on as it means many different things for researchers, businesses, and individual users. Technology evolving has meant that many of the devices aren’t seen to be within the remit of cybercrime by the general public, for example, cybercrimes that happen through mobile phones or smart wearable devices are seen to be separate from the same crimes that occur through a desktop or a laptop. A way of looking at cybercrime is by categorising attacks that are ‘computer dependent’ (DoD, ransomware, etc) and those that are ‘computer-enabled’ (online fraud, phishing, etc). This can also be categorised through Crime in Technology, Crime against Technology, and Crime through Technology.

Cybercrime is a big challenge being faced by society and whilst there are numerous different types of cybercrimes, currently, popular ones include social engineering, online harassment, identity-related, hacking, and denial of service (DoS) and/or information. Social engineering and phishing attacks are the biggest attacks that are currently taking place. Cybercriminals are getting better at replicating official documents (less spelling mistakes, logos, branding, etc) and use a mixture of techniques that include misdirection and pressurising recipients to take action. Most classifications of cybercriminals are through using early techniques developed by the FBI’s human behaviour department and include the Dark Triad and OCEAN personality traits. Techniques used to investigate crimes in real life such as ‘method of operation’ (MO) and copycats seem to transfer relevantly well to cybercrime investigations.

Law enforcement believes that in their experience there is a strong link between gender, age, and mental ability and cybercriminals. Children test out their coding skills from lessons in schools to attack websites or online gaming platforms. There also appeared to be a strong link between online gaming habits, mental disorders such as ADHD and hacking. Whilst there are more cybercrimes reported to the police than crimes in the physical world, the task force is still suited for ‘boots on the ground’ than cybercrime. All individual reports of cybercrime are done through Action Fraud and involved cybercrimes that came from someone they knew such as disgruntled ex-partners. Threats included a wide spectrum but the most popular ones included fraud, abuse, blackmail, harassment, and defamation of character.

In psychology, cybercriminals are classified in similar ways to that of criminal profiling in real-world crimes. There is also interest in exploring victim traits since individuals who are a victim to an online attack are likely to be a victim to another attack in the future. When looking at cybercriminal profiling psychological and emotional states are key factors. Various online forums are researched to create a cybercriminal’s profile mainly through the following categorization: language used, attitudes towards work (for example in the case of a malicious insider threat), family characteristics, criminal history, aggressiveness, and social skill problems including integrity and historical background. However, this is challenging as personality traits and characteristics are easier to change online especially for narcissistic personality traits. However there is never a 100% certainty of creating a psychological profile of a cybercriminal, with very little research and involves stereotypical profiles such as ‘white, male, geek, like maths, spends a lot of time alone, plays online games, anti-social traits, etc. Often personality traits associated with ‘openness’ of individuals links to individuals being susceptible online to phishing and other scams.

Most important models of profiling are ‘inductive’ and ‘deductive’ criminal profiling. Inductive is using existing data to identify patterns and deductive is starting from the evidence and building up to the profile (deductive cybercriminal profile model). Deductive method is very popular and is designed by Nykodym et al 2005 but there’s also geographical profiling (Canter and Hammond 2003) that is starting to become more popular as a result of social engineering attacks. Economists are applying ‘willingness to pay’ (WTP) and ‘willingness to accept’ (WTA) models and game theory to ransomware attacks.

Overall, the summer school provided a great platform to create a new network, reaffirmed my understanding of the current approaches being adopted, offered insights to some of the research being conducted, and provided a platform to promote my research.