scispace - formally typeset
Search or ask a question

Measuring the Cost of Cybercrime.

TL;DR: In this article, the authors present the first systematic study of the costs of cyber-crime in the UK and the world as a whole, focusing on the direct costs, indirect costs and defence costs.
Abstract: This chapter documents what we believe to be the first systematic study of the costs of cybercrime. The initial workshop paper was prepared in response to a request from the UK Ministry of Defence following scepticism that previous studies had hyped the problem. For each of the main categories of cybercrime we set out what is and is not known of the direct costs, indirect costs and defence costs – both to the UK and to the world as a whole. We distinguish carefully between traditional crimes that are now “cyber” because they are conducted online (such as tax and welfare fraud); transitional crimes whose modus operandi has changed substantially as a result of the move online (such as credit card fraud); new crimes that owe their existence to the Internet; and what we might call platform crimes such as the provision of botnets which facilitate other crimes rather than being used to extract money from victims directly. As far as direct costs are concerned, we find that traditional offences such as tax and welfare fraud cost the typical citizen in the low hundreds of pounds/euros/dollars a year; transitional frauds cost a few pounds/euros/dollars; while the new computer crimes cost in the tens of pence/cents. However, the indirect costs and defence costs are much higher for transitional and new crimes. For the former they may be roughly comparable to what the criminals earn, while for the latter they may be an order of magnitude more. As a striking example, the botnet behind a third of the spam sent in 2010 earned its owners around $2.7 million, while worldwide expenditures on spam prevention probably exceeded a billion dollars. We are extremely inefficient at fighting cybercrime; or to put it another way, cyber-crooks are like terrorists or metal thieves in that their activities impose disproportionate costs on society. Some of the reasons for this are well-known: cybercrimes are global and have strong externalities, while traditional crimes such as burglary and car theft are local, and the associated equilibria have emerged after many years of optimisation. As for the more direct question of what should be done, our figures suggest that we should spend less in anticipation of cybercrime (on antivirus, firewalls, etc.) and more in response – that is, on the prosaic business of hunting down cyber-criminals and throwing them in jail.
Citations
More filters
Journal Article
TL;DR: The Commission's report really does add enormous amounts of history to the sound bites and 30-second visuals that have pervaded politics and the world assessment of the US since that time.
Abstract: Twenty-five years ago, as an American GP living and practising in Wales, I would watch BBC sports programmes, such as darts and bowls and snooker, all unknown to me and, therefore, fascinating. I always found it odd — pairings such as Scotland (or Wales) versus The Rest of the World. It either seemed overly ambitious for Scotland or slim pickings for the rest of the world. After the recent US presidential election, it appears as if it will continue to be the US versus The Rest of the World. Three books might help you, who are of ‘the rest of the world’, begin to grapple with what is going on in the US. Written from the short, medium, and long view, each has a somewhat parochial twist. Each also, however, contains a great deal of useful history. The 9/11 Commission Report refutes the old saw that nothing good can be written by a committee. The report is a remarkable book and its recent nomination as a finalist for the National Book Award is a first for a government document, and well deserved. What is contained in this report is well known by most of us — the cast of characters has been in the news for over 3 years. And the sequence of events and many of the details that were gleaned from the ongoing hearings have been contained in news stories, long and short. However, to have published what is known until this point in a single narrative, which is at once accessible and clearly written, is a truly historical achievement. Reading the events of the day — regarding the planes that crashed in the city of New York, as the rescue squads from police and fire departments move into place and act — is both familiar and detailed in a way that helps us understand better than I would ever have imagined the why and how of all the death and destruction. So much about those days have been parsed into documentaries — long analyses of causation of issues, like why the towers fell — that one would think that everything that could be written had been. But the Commission's report really does add enormous amounts of history to the sound bites and 30-second visuals that have pervaded politics and the world assessment of the US since that time. The report deals extensively and thoughtfully with the history of Islam, both ancient and recent, and describes the history of terrorism as it evolved from highjackings of the 1970s to the use of bombs and targeted destruction of military targets in the late 1980s and 1990s. Events that occurred in the time that preceded the attacks of 9/11 are written in a way that shows the convergence of intelligence reports, a long history of threats from Bin Laden, and many alerts and warnings (‘the system was blinking red’ in the words of Tenet, CIA director). The information about the movements of the terrorists in their planning and the worldwide involvement of cells, support systems, and finances makes it clear that these events were truly the result of a network that reaches virtually everywhere. After the attacks, reading of the efforts of the fire, police, and other rescue squads in New York adds specifics that are terrible and remarkable. On 9/11, I ran up and down the stairs between patients to watch on television as it was all happening. All of us who watched that day wondered what those people who were clearly doomed were thinking, feeling, and seeing. Their actual words in this report are not fiction, they are the words, for most the last words, of people who died as we watched. Their words are the hardest part of this long, detailed report to deal with. Much of the final third of the report is devoted to what a fire captain friend of mine once called a PFE — a post-fire evaluation — which he mandated for his squad after every fire. In a PFE, the entire squad reconstructed, relived, and discussed the events to see what could be improved next time. The 9/11 Commission engaged in a world-scale PFE. Although all US politicians state that they intend to follow the recommendations of The 9/11 Commission Report, the backing and filling is already well underway. What politician, for example, is going to agree that major conurbations, and political and tactical targets should receive preference over their hometown fire departments and that homeland security money should ‘not be used as a pork barrel’? Rather than bringing a grieving country together in a way that will make such events unlikely to happen again, the reactions from the report have begun to cleave along party lines once again. The 9/11 Commission was almost unique in its thoroughness, transparency, and its ability to focus on the real issue of terror and lawlessness. However, the extent to which a violent stateless ideology has negatively affected the tolerance of differences, the sense of community, and the level of civic discourse in the US means that terrorism has affected our neighborhoods as much as it has affected our country. And fear rather than determination, despite the President's stump speech, has become the dominant emotion. Robert Byrd, from his 45-year perspective in the US Senate, understands that cheques and balances are essential to avoid tragedy, even if they, at times, impede progress. His book, Losing America, contains several ‘under-the-table’ looks at Congress and the manipulations and arrogance of the coterie of ideologues who surround George W. Bush. Byrd, from the Southern tradition of politeness and respect, which often cloaks bar-room politics, is steeped in the history of the institution of the Senate. He is personally offended by Bush's lack of interest or curiosity in the legislative process prior to 9/11, and his dishonesty and deception afterwards. Byrd's address to the Senate on the eve of the war on Iraq was widely quoted and is contained in this book. While people marching in the streets made headlines, it was an 85-year-old senator, not previously known as an outraged progressive, who took on both the Administration for its hypocrisy and many of his colleagues for their lack of courage and principle. He voted against the war and continues to point out the dishonesty of the people who guide it. The book reads with a sensibility from another age. Although his own history is certainly not without problems, Senator Byrd's belief in the true democratic process, rather than the gun-barrel approach of George W. Bush, should be given the respect that he, and it, deserve. Arthur Schlesinger Jr has been writing history since 1946 and has Pulitzer prizes to prove he does it well. His voice is considered, thoughtful, and scholarly — as one might expect from a historian and distinguished teacher. Toward the end of his book War and the American Presidency, however, Schlesinger's voice rises with outrage at those who surround and influence George W. Bush, the ‘small group of Messianic statesman whose self righteousness bids fair to wreck our age’. He writes of the imperial presidencies of the early years of the country, which repressed dissent during wartime, and how the US moved from wars based on pique to engaging international diplomacy and internationalism. Schlesinger reminds us that all presidents since Wilson, with George W. Bush being the glaring exception, believed in statesmanship, diplomacy, alliances to guard against capricious choices and, when necessary, taking on common enemies. Much of Schlesinger's book, however, also chronicles the record of the current Administration which, by being ‘judge, jury, and executioner resurrects the imperial presidency’. An imperial presidency in the age of frigates and single-shot rifles cannot be compared with one that possesses weapons of mass destruction and a wooly-headed sense of divine guidance. We used to think of Henry Kissinger as the prototype for Dr Strangelove, but I wish Kubrick were still alive to do the remake with Dick Cheney and Donald Rumsfeld in mind. Needless to say, the recent election, instead of relegating George W. Bush and his hangers-on to the historical trashbin, has pushed them to the front of the international agenda. A secretive, defensive, unreflective president will now shape the world for our grandchildren. Each of these books elaborates on the ineffectiveness of Bush dealing with the real enemy while he digs deeper into a country where he is creating more enemies by the day. One has to ask why, instead of quietly writing their memoirs, two distinguished 87-year-old statesmen are raising the alarm and shaking us by the throat — like the aging Thomas Jefferson who, in his famous letter of 1820, said of the first compromise to try to divide the country between slave and free states: ‘this momentous question, like a firebell in the night, awakened and filled me with terror’. Byrd and Schlesinger hear the firebell and are ringing it to wake us up. Another quote that might better capture Bush and his legacy would be from the Bible he uses as justification for his policies: ‘He that troubleth his own house shall inherit the wind’ (Proverbs 11, 29).

962 citations

Journal Article
TL;DR: Jonathan Zittrain's book discusses the tension between generativity, the "capacity to produce unanticipated change through unfiltered contributions from a broad and varied audience" and the security problems inherent in today's personal computers and Internet system.
Abstract: The Future of the Internet and How to Stop It Jonathan Zittrain. New Haven: Yale University Press, 2008. 342 pages. $30.00.Jonathan Zittrain's book, The Future of the Internet and How to Stop It, discusses the tension between generativity, the "capacity to produce unanticipated change through unfiltered contributions from a broad and varied audience" and the security problems inherent in today's personal computers and Internet system (70). This generativity, Zittrain argues, is the greatest strength of personal computers and the Internet and had led to great innovations, including creative software, peer-to-peer networking, blogs and content sites such as Wikipedia, and even the Internet itself. Yet this same generativity has also spawned security, legal, and social problems that may lead to the demise of personal computers and the Internet as they exist today (101). If we do not find solutions for these problems, Zittrain warns, we will be faced with government or corporate control of personal computers and the Internet, similar to current controls of cellular telephones and cable converter boxes, which will effectively shut down the innovations that personal computers and the Internet currently enable (245). Personal computers, according to Zittrain, will become nothing but appliances programmed by the manufacturer, capable only of limited tasks, and stripped of the tools and capabilities necessary for innovation.The first part of the book traces the history of personal computers, mainframes, proprietary servers, and the Internet. This section highlights how differences in technology and administration fostered generativity in personal computers and on the Internet and prohibited innovation on the mainframes and proprietary networks. Yet the innovations made possible by the generative nature of the Internet and personal computers also created its vulnerabilities: viruses, worms, malware, and spyware. Despite his obvious support of generativity, Zittrain admits that the current situation is "not sustainable" (43), but warns that the obvious solutions-such as limited functionality, governmental controls, and censorship-completely undermine the creativity made possible by personal computers and the Internet. The sec- ond part of the book defines generativity and explores its benefits and detriments. Here, Zittrain proposes that information technology functions best when generative, while admitting that we cannot ignore the problems caused by generativity (64), and warns equally of the dangers of controlled appliances: censorships, surveillance, forced legal compliance, and unannounced changes in machine functions. Chapter 6 in this section considers Wikikpedia as a self-regulating generative system that functions imperfectly but well. Part Three proposes technological, legal, and social solutions to the problems discussed earlier in the book.The Future of the Internet intertwines its analysis of current personal computer/Internet problems with current and historical examples from business, law, culture (Internet and otherwise), and technology. These examples, often worthwhile and interesting in and of themselves, underpin Zittrain's analysis rationally and support his conclusions. The examples show that the kind of sledgehammer solutions that Zittrain predicts are not merely possibilities or potentialities, but already have been and are being employed by various companies and governments. Perhaps best of all, Zittrain's use of these historical and current examples avoids the sensationalism often seen in other works that predict governmental and corporate control of options, behavior, and creativity. …

639 citations

Proceedings Article
12 Aug 2015
TL;DR: This paper presents a long-term measurement analysis of a large portion of this online anonymous marketplace ecosystem, including 16 different marketplaces, over more than two years (2013- 2015), and offers a detailed understanding of the growth of the onlineAnonymous marketplace ecosystem.
Abstract: February 2011 saw the emergence of Silk Road, the first successful online anonymous marketplace, in which buyers and sellers could transact with anonymity properties far superior to those available in alternative online or offline means of commerce. Business on Silk Road, primarily involving narcotics trafficking, rapidly boomed, and competitors emerged. At the same time, law enforcement did not sit idle, and eventually managed to shut down Silk Road in October 2013 and arrest its operator. Far from causing the demise of this novel form of commerce, the Silk Road take-down spawned an entire, dynamic, online anonymous marketplace ecosystem, which has continued to evolve to this day. This paper presents a long-term measurement analysis of a large portion of this online anonymous marketplace ecosystem, including 16 different marketplaces, over more than two years (2013- 2015). By using long-term measurements, and combining our own data collection with publicly available previous efforts, we offer a detailed understanding of the growth of the online anonymous marketplace ecosystem. We are able to document the evolution of the types of goods being sold, and assess the effect (or lack thereof) of adversarial events, such as law enforcement operations or large-scale frauds, on the overall size of the economy. We also provide insights into how vendors are diversifying and replicating across marketplaces, and how vendor security practices (e.g., PGP adoption) are evolving. These different aspects help us understand how traditional, physical-world criminal activities are developing an online presence, in the same manner traditional commerce diversified online in the 1990s.

320 citations

Journal ArticleDOI
TL;DR: This article focuses on research on assisting individuals’ privacy and security choices with soft paternalistic interventions that nudge users toward more beneficial choices and identifies key ethical, design, and research challenges.
Abstract: Advancements in information technology often task users with complex and consequential privacy and security decisions A growing body of research has investigated individuals’ choices in the presence of privacy and information security tradeoffs, the decision-making hurdles affecting those choices, and ways to mitigate such hurdles This article provides a multi-disciplinary assessment of the literature pertaining to privacy and security decision making It focuses on research on assisting individuals’ privacy and security choices with soft paternalistic interventions that nudge users toward more beneficial choices The article discusses potential benefits of those interventions, highlights their shortcomings, and identifies key ethical, design, and research challenges

301 citations

Journal ArticleDOI
16 Mar 2016
TL;DR: The ICS cybersecurity landscape is explored including the key principles and unique aspects of ICS operation, a brief history of cyberattacks on ICS, an overview of I CS security assessment, and a survey of “uniquely-ICS” testbeds that capture the interactions between the various layers of an ICS.
Abstract: Industrial control systems (ICSs) are transitioning from legacy-electromechanical-based systems to modern information and communication technology (ICT)-based systems creating a close coupling between cyber and physical components. In this paper, we explore the ICS cybersecurity landscape including: 1) the key principles and unique aspects of ICS operation; 2) a brief history of cyberattacks on ICS; 3) an overview of ICS security assessment; 4) a survey of “uniquely-ICS” testbeds that capture the interactions between the various layers of an ICS; and 5) current trends in ICS attacks and defenses.

278 citations

References
More filters
Journal Article
TL;DR: The Commission's report really does add enormous amounts of history to the sound bites and 30-second visuals that have pervaded politics and the world assessment of the US since that time.
Abstract: Twenty-five years ago, as an American GP living and practising in Wales, I would watch BBC sports programmes, such as darts and bowls and snooker, all unknown to me and, therefore, fascinating. I always found it odd — pairings such as Scotland (or Wales) versus The Rest of the World. It either seemed overly ambitious for Scotland or slim pickings for the rest of the world. After the recent US presidential election, it appears as if it will continue to be the US versus The Rest of the World. Three books might help you, who are of ‘the rest of the world’, begin to grapple with what is going on in the US. Written from the short, medium, and long view, each has a somewhat parochial twist. Each also, however, contains a great deal of useful history. The 9/11 Commission Report refutes the old saw that nothing good can be written by a committee. The report is a remarkable book and its recent nomination as a finalist for the National Book Award is a first for a government document, and well deserved. What is contained in this report is well known by most of us — the cast of characters has been in the news for over 3 years. And the sequence of events and many of the details that were gleaned from the ongoing hearings have been contained in news stories, long and short. However, to have published what is known until this point in a single narrative, which is at once accessible and clearly written, is a truly historical achievement. Reading the events of the day — regarding the planes that crashed in the city of New York, as the rescue squads from police and fire departments move into place and act — is both familiar and detailed in a way that helps us understand better than I would ever have imagined the why and how of all the death and destruction. So much about those days have been parsed into documentaries — long analyses of causation of issues, like why the towers fell — that one would think that everything that could be written had been. But the Commission's report really does add enormous amounts of history to the sound bites and 30-second visuals that have pervaded politics and the world assessment of the US since that time. The report deals extensively and thoughtfully with the history of Islam, both ancient and recent, and describes the history of terrorism as it evolved from highjackings of the 1970s to the use of bombs and targeted destruction of military targets in the late 1980s and 1990s. Events that occurred in the time that preceded the attacks of 9/11 are written in a way that shows the convergence of intelligence reports, a long history of threats from Bin Laden, and many alerts and warnings (‘the system was blinking red’ in the words of Tenet, CIA director). The information about the movements of the terrorists in their planning and the worldwide involvement of cells, support systems, and finances makes it clear that these events were truly the result of a network that reaches virtually everywhere. After the attacks, reading of the efforts of the fire, police, and other rescue squads in New York adds specifics that are terrible and remarkable. On 9/11, I ran up and down the stairs between patients to watch on television as it was all happening. All of us who watched that day wondered what those people who were clearly doomed were thinking, feeling, and seeing. Their actual words in this report are not fiction, they are the words, for most the last words, of people who died as we watched. Their words are the hardest part of this long, detailed report to deal with. Much of the final third of the report is devoted to what a fire captain friend of mine once called a PFE — a post-fire evaluation — which he mandated for his squad after every fire. In a PFE, the entire squad reconstructed, relived, and discussed the events to see what could be improved next time. The 9/11 Commission engaged in a world-scale PFE. Although all US politicians state that they intend to follow the recommendations of The 9/11 Commission Report, the backing and filling is already well underway. What politician, for example, is going to agree that major conurbations, and political and tactical targets should receive preference over their hometown fire departments and that homeland security money should ‘not be used as a pork barrel’? Rather than bringing a grieving country together in a way that will make such events unlikely to happen again, the reactions from the report have begun to cleave along party lines once again. The 9/11 Commission was almost unique in its thoroughness, transparency, and its ability to focus on the real issue of terror and lawlessness. However, the extent to which a violent stateless ideology has negatively affected the tolerance of differences, the sense of community, and the level of civic discourse in the US means that terrorism has affected our neighborhoods as much as it has affected our country. And fear rather than determination, despite the President's stump speech, has become the dominant emotion. Robert Byrd, from his 45-year perspective in the US Senate, understands that cheques and balances are essential to avoid tragedy, even if they, at times, impede progress. His book, Losing America, contains several ‘under-the-table’ looks at Congress and the manipulations and arrogance of the coterie of ideologues who surround George W. Bush. Byrd, from the Southern tradition of politeness and respect, which often cloaks bar-room politics, is steeped in the history of the institution of the Senate. He is personally offended by Bush's lack of interest or curiosity in the legislative process prior to 9/11, and his dishonesty and deception afterwards. Byrd's address to the Senate on the eve of the war on Iraq was widely quoted and is contained in this book. While people marching in the streets made headlines, it was an 85-year-old senator, not previously known as an outraged progressive, who took on both the Administration for its hypocrisy and many of his colleagues for their lack of courage and principle. He voted against the war and continues to point out the dishonesty of the people who guide it. The book reads with a sensibility from another age. Although his own history is certainly not without problems, Senator Byrd's belief in the true democratic process, rather than the gun-barrel approach of George W. Bush, should be given the respect that he, and it, deserve. Arthur Schlesinger Jr has been writing history since 1946 and has Pulitzer prizes to prove he does it well. His voice is considered, thoughtful, and scholarly — as one might expect from a historian and distinguished teacher. Toward the end of his book War and the American Presidency, however, Schlesinger's voice rises with outrage at those who surround and influence George W. Bush, the ‘small group of Messianic statesman whose self righteousness bids fair to wreck our age’. He writes of the imperial presidencies of the early years of the country, which repressed dissent during wartime, and how the US moved from wars based on pique to engaging international diplomacy and internationalism. Schlesinger reminds us that all presidents since Wilson, with George W. Bush being the glaring exception, believed in statesmanship, diplomacy, alliances to guard against capricious choices and, when necessary, taking on common enemies. Much of Schlesinger's book, however, also chronicles the record of the current Administration which, by being ‘judge, jury, and executioner resurrects the imperial presidency’. An imperial presidency in the age of frigates and single-shot rifles cannot be compared with one that possesses weapons of mass destruction and a wooly-headed sense of divine guidance. We used to think of Henry Kissinger as the prototype for Dr Strangelove, but I wish Kubrick were still alive to do the remake with Dick Cheney and Donald Rumsfeld in mind. Needless to say, the recent election, instead of relegating George W. Bush and his hangers-on to the historical trashbin, has pushed them to the front of the international agenda. A secretive, defensive, unreflective president will now shape the world for our grandchildren. Each of these books elaborates on the ineffectiveness of Bush dealing with the real enemy while he digs deeper into a country where he is creating more enemies by the day. One has to ask why, instead of quietly writing their memoirs, two distinguished 87-year-old statesmen are raising the alarm and shaking us by the throat — like the aging Thomas Jefferson who, in his famous letter of 1820, said of the first compromise to try to divide the country between slave and free states: ‘this momentous question, like a firebell in the night, awakened and filled me with terror’. Byrd and Schlesinger hear the firebell and are ringing it to wake us up. Another quote that might better capture Bush and his legacy would be from the Bible he uses as justification for his policies: ‘He that troubleth his own house shall inherit the wind’ (Proverbs 11, 29).

962 citations

Journal Article
TL;DR: Jonathan Zittrain's book discusses the tension between generativity, the "capacity to produce unanticipated change through unfiltered contributions from a broad and varied audience" and the security problems inherent in today's personal computers and Internet system.
Abstract: The Future of the Internet and How to Stop It Jonathan Zittrain. New Haven: Yale University Press, 2008. 342 pages. $30.00.Jonathan Zittrain's book, The Future of the Internet and How to Stop It, discusses the tension between generativity, the "capacity to produce unanticipated change through unfiltered contributions from a broad and varied audience" and the security problems inherent in today's personal computers and Internet system (70). This generativity, Zittrain argues, is the greatest strength of personal computers and the Internet and had led to great innovations, including creative software, peer-to-peer networking, blogs and content sites such as Wikipedia, and even the Internet itself. Yet this same generativity has also spawned security, legal, and social problems that may lead to the demise of personal computers and the Internet as they exist today (101). If we do not find solutions for these problems, Zittrain warns, we will be faced with government or corporate control of personal computers and the Internet, similar to current controls of cellular telephones and cable converter boxes, which will effectively shut down the innovations that personal computers and the Internet currently enable (245). Personal computers, according to Zittrain, will become nothing but appliances programmed by the manufacturer, capable only of limited tasks, and stripped of the tools and capabilities necessary for innovation.The first part of the book traces the history of personal computers, mainframes, proprietary servers, and the Internet. This section highlights how differences in technology and administration fostered generativity in personal computers and on the Internet and prohibited innovation on the mainframes and proprietary networks. Yet the innovations made possible by the generative nature of the Internet and personal computers also created its vulnerabilities: viruses, worms, malware, and spyware. Despite his obvious support of generativity, Zittrain admits that the current situation is "not sustainable" (43), but warns that the obvious solutions-such as limited functionality, governmental controls, and censorship-completely undermine the creativity made possible by personal computers and the Internet. The sec- ond part of the book defines generativity and explores its benefits and detriments. Here, Zittrain proposes that information technology functions best when generative, while admitting that we cannot ignore the problems caused by generativity (64), and warns equally of the dangers of controlled appliances: censorships, surveillance, forced legal compliance, and unannounced changes in machine functions. Chapter 6 in this section considers Wikikpedia as a self-regulating generative system that functions imperfectly but well. Part Three proposes technological, legal, and social solutions to the problems discussed earlier in the book.The Future of the Internet intertwines its analysis of current personal computer/Internet problems with current and historical examples from business, law, culture (Internet and otherwise), and technology. These examples, often worthwhile and interesting in and of themselves, underpin Zittrain's analysis rationally and support his conclusions. The examples show that the kind of sledgehammer solutions that Zittrain predicts are not merely possibilities or potentialities, but already have been and are being employed by various companies and governments. Perhaps best of all, Zittrain's use of these historical and current examples avoids the sensationalism often seen in other works that predict governmental and corporate control of options, behavior, and creativity. …

639 citations

Journal ArticleDOI
TL;DR: A 'signal crimes' perspective is outlined in an effort to unpack the relationships between experiences of crime and disorder, and perceptions of criminogenic risk.
Abstract: In this paper a ‘signal crimes’ perspective is outlined in an effort to unpack the relationships between experiences of crime and disorder, and perceptions of criminogenic risk. Grounded in symbolic interactionist sociology, and developing a social semiotic understanding of risk perception, it is a perspective that focuses upon processes of social reaction and the ways in which people interpret and define threats to their security. It is proposed that people interpret the occurrence of certain incidents as ‘warning signals’ about the levels of risk to which they are either actually or potentially exposed. These signals tend to take the form of signal crimes and/or signal disorders and are important in terms of how social space is symbolically constructed.

367 citations

Book
01 Jan 2008
TL;DR: Stiglitz and Bilmes as discussed by the authors show that the real cost of the Iraq war was approximately six times higher than the official figure of $50 billion, and that the money spent on the war would have been further invested in the economy, in the US and around the world, and in infrastructure building.
Abstract: The three trillion dollar war will be a devastating reckoning of the true cost of the Iraq war - quite apart from its tragic human toll - which the Bush administration has estimated at $50 billion, but which Stiglitz and Bilmes will show underestimates the real figure by approximately six times. The authors expose the gigantic expenses which have so far not been officially accounted for, including not only big ticket items like replacing military equipment (being used up at six times the peacetime rate) but also the cost of caring for thousands of wounded veterans - for the rest of their lives. Shifting to a global perspective, the authors investigate the cost in lives and damage within Iraq and the Middle East generally. With chilling precision, they calculate what the money spent on the war would have produced had it been further invested in the growth of the economy, in the US and around the world, and in infrastructure building. Stiglitz and Bilmes write in simple language, which makes the details they present, and the sums they add up, all the more disturbing. This book will change forever the way we think about the Iraq war - and about the cost of war generally.

305 citations

Proceedings Article
08 Aug 2011
TL;DR: It is found that of the world's top 20 most prevalent families of malware, 12 employ PPI services to buy infections, and the duration of malware distribution is analyzed.
Abstract: Recent years have seen extensive diversification of the "underground economy" associated with malware and the subversion of Internet-connected systems. This trend towards specialization has compelling forces driving it: miscreants readily apprehend that tackling the entire value-chain from malware creation to monetization in the presence of ever-evolving countermeasures poses a daunting task requiring highly developed skills and resources. As a result, entrepreneurial-minded miscreants have formed pay-per-install (PPI) services--specialized organizations that focus on the infection of victims' systems. In this work we perform a measurement study of the PPI market by infiltrating four PPI services. We develop infrastructure that enables us to interact with PPI services and gather and classify the resulting malware executables distributed by the services. Using our infrastructure, we harvested over a million client executables using vantage points spread across 15 countries. We find that of the world's top 20 most prevalent families of malware, 12 employ PPI services to buy infections. In addition we analyze the targeting of specific countries by PPI clients, the repacking of executables to evade detection, and the duration of malware distribution.

294 citations