Cyberheistv3.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Cyberheistv3.Pdf The Biggest Financial Threat Facing Organizations Worldwide Stu Sjouwerman Publisher/Lead Author CYBERHEIST: The Biggest Financial Threat Facing Organizations Worldwide Stu Sjouwerman Copyright © 2011, 2016, 2020 KnowBe4. Contributing Authors All rights reserved. No part of this book may be reproduced or transmitted in Naomi Alper any form or any manner, electronic or mechanical, including photocopying, Justin Korelc recording or by any information storage and retrieval system, without Kim Lindros permission in writing from the publisher. Jeff T. Parker James Pyles Trademarks Ed Tittel Trademarked names appear throughout this book. Rather than list the names and Michelle Zaval entities that own the trademarks or insert a trademark symbol with each mention Richard G Lowe Jr of the trademarked name, the publisher states that it is using the names for Roger A. Grimes editorial purposes only and to the benefit of the trademark owner, with no intention of infringing upon that trademark. Technical Editors Richard G Lowe Jr Warning and Disclaimer Roger A. Grimes Every effort has been made to make this book as complete and as accurate as possible, but no warranty of fitness is implied. The information provided is on Developmental Editor an “as is” basis. The authors and the publisher shall have neither liability nor Kim Lindros responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book. Copyeditor Kitty Wilson This book is also published in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Technical Editor Darril Gibson KnowBe4 33 N Garden Ave, Suite 1200 Compositor and Graphic Artist Kim Eoff Clearwater, Florida 33755 Proofreader Toll Free: 855-KNOWBE4 (566-9234) Kim Lindros www.KnowBe4.com Indexer Liz Cunningham Cover Design David Brier, DBD International ISBN: 978-0-692-64431-7 Cover Art Photographer Library of Congress Control Number: 2016933543 Alan Poulson Cover and Interior Printing and Binding Published in North America by KnowBe4 Globus Printing 10 9 8 7 6 5 4 3 2 1 This book is dedicated to all the sleepless cybercrime fighters in the world. You know who you are. Thanks very much for what you do. Acknowledgments This project was a true team effort. My sincere thanks to all the people who helped bring my ideas to a tangible, cohesive book. This includes the following contributors: Naomi Alpern, Justin Korelc, Kim Lindros, Jeff T. Parker, James Pyles, Ed Tittel, Richard Lowe Jr, and Michelle Zavala. Ed Tittel also designed and reviewed the original edition’s entire contents. Roger A. Grimes updated, reviewed, and edited the 2020 edition’s entire contents. The production team included these fine people: Kitty Wilson, copy editor; Darril Gibson, technical editor; Kim Eoff, layout design, compositor, and artist; Liz Cunningham, indexer; and Kim Lindros, who wore several hats, including proofreader and project manager. David Brier, DBD International, did the cover design, and the cover art photographer was Alan Poulson. A special and sincere thank you to Roger Grimes, who is the Executive Technical Editor of this version of Cyberheist as well as Data-Driven Defense Evangelist for KnowBe4. Grimes is a cybersecurity industry veteran with over 30 years of experience in computer security and a well- known author of 12 books. His input and expertise was instrumental in incorporating the accurate technical aspects of this latest version of the book. My sincere thanks to everyone who ever worked at Sunbelt Software and who helped to make us the Inc. 500 success that we were. That was a great run! i About the Author Stu Sjouwerman (pronounced “shower-man”) has been in Information Technology for 40+ years, the last 20+ of which were in IT Security. Stu has founded several successful computer security companies, including KnowBe4, Inc. and Sunbelt Software. KnowBe4 is the world’s leading provider of security awareness training and simulated phishing, helping organizations improve their cultures to prevent social engineering and other cybersecurity incidents. KnowBe4 is valued at over $1 billion dollars and has over 30,000 customers. It has been selected as a primary leader of technology and thought leadership by dozens of industry publications. KnowBe4 has won multiple “best place to work” culture awards. As a co-founder of Inc. 500 company Sunbelt Software, he has been specializing in antispyware products since 2003. A few years later, Sunbelt developed antivirus software, integrated a firewall, and at the same time, developed antispam software for both consumers and enterprises. In 2010, Sunbelt was sold to GFI software, a portfolio company of Insight Partners, a $3 billion Boston-based hedge fund. This is Stu’s fourth book. He has co-authored three books about Windows system administration, the first being Windows NT Power Toolkit. Released in October 1999, this book reached #4 on Amazon.com’s USA bestseller list the first week of its release and #1 in the UK. In 2003, a new book about Windows XP was published. The second and third books also reached Amazon’s Top 10 List. From 1996 through 2011, Stu was the Editor-In-Chief of WServer News, an email newsletter to 100,000+ IT system administrators, which helped them to keep their systems secure. Stu also served as editor of GFI Media Services, which published four major online newsletters, including WServer News, WXP News, Win7 News, and GFI Security News. Stu is currently Editor-in-Chief of Cyberheist News, an e-zine tailored to deliver IT security news, technical updates and social engineering alerts to IT professionals. He lives in the Tampa Bay, Florida area with his wife Rebecca and their three cats. iii Table of Contents Acknowledgments __________________________________________________________________ i About the Author __________________________________________________________________ iii Table of Contents ___________________________________________________________________ v List of Tables _____________________________________________________________________ xiii List of Figures ____________________________________________________________________ xv Preface ________________________________________________________________________ xvii About This Book_________________________________________________________________________ xvii Special Elements Used in This Book _________________________________________________________ xviii Contact Us _____________________________________________________________________________ xviii Part 1 The Business of Cybercrime ________________________________________________ 1 Chapter 1 What Drives Cybercrime? __________________________________________________ 3 What Exactly Is Cybercrime? _________________________________________________________________ 4 Who’s a Target for Cybercrime? ______________________________________________________________ 5 A Million Stories for a Million Scams __________________________________________________________ 9 A Case of Criminal Culture _________________________________________________________________ 11 Cybercrime Learning and Lore ______________________________________________________________ 12 Variations on a Scamming Theme ___________________________________________________________ 13 Internet, and the Money Is Easy _____________________________________________________________ 14 Offshore Has Definite Virtues—and Vices _____________________________________________________ 14 Avoiding Exposure to Avoid Losses ___________________________________________________________ 15 Chapter 2 How and Why Scams Survive, Thrive, and Succeed______________________________ 17 The More You Try to Scam, the Better the Odds of Succeeding ____________________________________ 17 Persistence and Variety _________________________________________________________________ 18 A Successful Scam Spawns Countless Imitations ________________________________________________ 18 Old Scams Finding New Victims ___________________________________________________________ 19 Examples of Health Insurance Fraud _______________________________________________________ 21 Simple Technology Tricks Reap Major Results __________________________________________________ 21 Trust Few, Share Little __________________________________________________________________ 22 A Little Knowledge Is Indeed Very Dangerous __________________________________________________ 23 Taking Advantage of Human Nature and Gullibility ______________________________________________ 23 Common Traits of Fraud Victims __________________________________________________________ 24 Chapter 3 Types and Methods of Attacks ______________________________________________ 27 The Social Side of Attacks __________________________________________________________________ 27 Youʼve Been Engineered … Socially, That Is! ___________________________________________________ 28 Social Engineering Tools and Tricks ________________________________________________________ 28 v Anatomy of a Blatant Phishing Attack ________________________________________________________ 30 Examining the Source Code ______________________________________________________________ 31 The Technical Side of Attacks _______________________________________________________________ 33 Disguise and Conquer ___________________________________________________________________ 33 Hidden and Malicious Payloads ___________________________________________________________ 33 The Mechanics of Drive-By Downloads _____________________________________________________
Recommended publications
  • Statistical Structures: Fingerprinting Malware for Classification and Analysis
    Statistical Structures: Fingerprinting Malware for Classification and Analysis Daniel Bilar Wellesley College (Wellesley, MA) Colby College (Waterville, ME) bilar <at> alum dot dartmouth dot org Why Structural Fingerprinting? Goal: Identifying and classifying malware Problem: For any single fingerprint, balance between over-fitting (type II error) and under- fitting (type I error) hard to achieve Approach: View binaries simultaneously from different structural perspectives and perform statistical analysis on these ‘structural fingerprints’ Different Perspectives Idea: Multiple perspectives may increase likelihood of correct identification and classification Structural Description Statistical static / Perspective Fingerprint dynamic? Assembly Count different Opcode Primarily instruction instructions frequency static distribution Win 32 API Observe API calls API call vector Primarily call made dynamic System Explore graph- Graph structural Primarily Dependence modeled control and properties static Graph data dependencies Fingerprint: Opcode frequency distribution Synopsis: Statically disassemble the binary, tabulate the opcode frequencies and construct a statistical fingerprint with a subset of said opcodes. Goal: Compare opcode fingerprint across non- malicious software and malware classes for quick identification and classification purposes. Main result: ‘Rare’ opcodes explain more data variation then common ones Goodware: Opcode Distribution 1, 2 ---------.exe Procedure: -------.exe 1. Inventoried PEs (EXE, DLL, ---------.exe etc) on XP box with Advanced Disk Catalog 2. Chose random EXE samples size: 122880 with MS Excel and Index totalopcodes: 10680 3, 4 your Files compiler: MS Visual C++ 6.0 3. Ran IDA with modified class: utility (process) InstructionCounter plugin on sample PEs 0001. 002145 20.08% mov 4. Augmented IDA output files 0002. 001859 17.41% push with PEID results (compiler) 0003. 000760 7.12% call and general ‘functionality 0004.
    [Show full text]
  • Excesss Karaoke Master by Artist
    XS Master by ARTIST Artist Song Title Artist Song Title (hed) Planet Earth Bartender TOOTIMETOOTIMETOOTIM ? & The Mysterians 96 Tears E 10 Years Beautiful UGH! Wasteland 1999 Man United Squad Lift It High (All About 10,000 Maniacs Candy Everybody Wants Belief) More Than This 2 Chainz Bigger Than You (feat. Drake & Quavo) [clean] Trouble Me I'm Different 100 Proof Aged In Soul Somebody's Been Sleeping I'm Different (explicit) 10cc Donna 2 Chainz & Chris Brown Countdown Dreadlock Holiday 2 Chainz & Kendrick Fuckin' Problems I'm Mandy Fly Me Lamar I'm Not In Love 2 Chainz & Pharrell Feds Watching (explicit) Rubber Bullets 2 Chainz feat Drake No Lie (explicit) Things We Do For Love, 2 Chainz feat Kanye West Birthday Song (explicit) The 2 Evisa Oh La La La Wall Street Shuffle 2 Live Crew Do Wah Diddy Diddy 112 Dance With Me Me So Horny It's Over Now We Want Some Pussy Peaches & Cream 2 Pac California Love U Already Know Changes 112 feat Mase Puff Daddy Only You & Notorious B.I.G. Dear Mama 12 Gauge Dunkie Butt I Get Around 12 Stones We Are One Thugz Mansion 1910 Fruitgum Co. Simon Says Until The End Of Time 1975, The Chocolate 2 Pistols & Ray J You Know Me City, The 2 Pistols & T-Pain & Tay She Got It Dizm Girls (clean) 2 Unlimited No Limits If You're Too Shy (Let Me Know) 20 Fingers Short Dick Man If You're Too Shy (Let Me 21 Savage & Offset &Metro Ghostface Killers Know) Boomin & Travis Scott It's Not Living (If It's Not 21st Century Girls 21st Century Girls With You 2am Club Too Fucked Up To Call It's Not Living (If It's Not 2AM Club Not
    [Show full text]
  • Schwab's Fraud Encyclopedia
    Fraud Encyclopedia Updated June 2018 Contents Introduction . 3 Scams . 26 How to use this Fraud Encyclopedia . 3 1 . Properties . 28 2. Romance/marriage/sweetheart/catfishing . 28 Email account takeover . 4 3 . Investments/goods/services . .. 29 1 . Emotion . 7 4 . Prizes/lotteries . 29 2 . Unavailability . 7 5 . IRS . 30 3 . Fee inquiries . 8 6 . Payments . 30 4 . Attachments . 9 Other cybercrime techniques . 31 5 . International wires . 10 1 . Malware . 33 6 . Language cues . 10 2 . Wi-Fi connection interception . 34 7 . Business email compromise . 11 3 . Data breaches . 35 Client impersonation and identity theft . 12 4 . Credential replay incident (CRI) . 37 1 . Social engineering . 14 5 . Account online compromise/takeover . 37 2. Shoulder surfing . 14 6 . Distributed denial of service (DDoS) attack . 38 3. Spoofing . 15 Your fraud checklist . 39 4 . Call forwarding and porting . 16 Email scrutiny . 39 5 . New account fraud . 16 Verbally confirming client requests . 40 Identical or first-party disbursements . 17 Safe cyber practices . 41 1 . MoneyLink fraud . 19 What to do if fraud is suspected . 42 2 . Wire fraud . .. 19 Schwab Advisor Center® alerts . 43 3 . Check fraud . 20 4 . Transfer of account (TOA) fraud . 20 Phishing . 21 1 . Spear phishing . 23 2 . Whaling . .. 24 3 . Clone phishing . 24 4 . Social media phishing . 25 CONTENTS | 2 Introduction With advances in technology, we are more interconnected than ever . But we’re also more vulnerable . Criminals can exploit the connectivity of our world and use it to their advantage—acting anonymously How to use this to perpetrate fraud in a variety of ways . Fraud Encyclopedia Knowledge and awareness can help you protect your firm and clients and guard against cybercrime.
    [Show full text]
  • International Society of Barristers Quarterly
    International Society of Barristers Volume 52 Number 1 UNFINISHED BUSINESS OF THE TWENTIETH CENTURY: THE QUEST FOR THE RECOVERY OF NAZI-LOOTED ART Donald Burris WHOSE ART IS IT, ANYWAY? E. Randol Schoenberg DEMOCRACY IN THE BALANCE: THE ESSENTIAL ROLE OF DEMOCRATIC INSTITUTIONS AND NORMS Sally Yates MAGNANIMITAS: THE WONDER OF YOU AND THE POWER OF THE TEAM Bill Curry Quarterly Annual MeetIngs 2020: March 22–28, The Sanctuary at Kiawah Island, Kiawah Island, South Carolina 2021: April 25–30, The Shelbourne Hotel, Dublin, Ireland International Society of Barristers Quarterly Volume 52 2019 Number 1 CONTENTS Unfinished Business of the Twentieth Century: The Quest for the Recovery of Nazi-looted Art . 1 Donald Burris Whose Art Is It, Anyway? . 35 E. Randol Schoenberg Democracy in the Balance: The Essential Role of Democratic Institutions and Norms . 41 Sally Yates Magnanimitas: The Wonder of You and the Power of the Team . 53 Bill Curry i International Society of Barristers Quarterly Editor Donald H. Beskind Associate Editor Joan Ames Magat Editorial Advisory Board Daniel J. Kelly J. Kenneth McEwan, ex officio Editorial Office Duke University School of Law Box 90360 Durham, North Carolina 27708-0360 Telephone (919) 613-7085 Fax (919) 613-7231 E-mail: [email protected] Volume 52 Issue Number 1 2019 The INTERNATIONAL SOCIETY OF BARRISTERS QUARTERLY (USPS 0074-970) (ISSN 0020- 8752) is published quarterly by the International Society of Barristers, Duke University School of Law, Box 90360, Durham, NC, 27708-0360. Periodicals postage is paid in Durham and additional mailing offices. Subscription rate: $10 per year. Back issues and volumes through Volume 44 available from William S.
    [Show full text]
  • Fraud, Asset Tracing & Recovery
    INSOLVENCY AS A TOOL How and when to use in asset recovery BITCOIN BATTLES Tracing and seizing cryptoassets Commercial Dispute Resolution COVID-19 FRAUD CDR Recovering assets lost in the pandemic www.cdr-news.com Spring 2021 ESSENTIAL INTELLIGENCE: Fraud, Asset Tracing & Recovery Contributing Editor: Keith Oliver Peters & Peters Solicitors LLP 4 WELCOME TABLE OF CONTENTS EXPERT ANALYSIS New threats for 2021 and beyond 06 France Andrew Mizner Commercial Dispute Resolution 90 Thomas Rouhette, Nicolas Brooke, Ela Barda & Jennifer Melo Signature Litigation Insolvency used as a tool in asset recovery 10 Andrew Stafford QC & James Chapman-Booth Guernsey Kobre & Kim 100 Simon Florance, John Greenfield & David Jones Carey Olsen Cryptocurrency fraud and asset recovery 17 Syedur Rahman Rahman Ravelli Hong Kong 110 Dorothy Siron Zhong Lun Law Firm Corruption in the pandemic and the importance of 22 asset recovery India Angela Barkhouse Quantuma Advisory Limited 124 Shreyas Jayasimha & Aakash Sherwal Aarna Law Fraud and asset tracing investigations: the role of 28 Ireland corporate intelligence - part II 132 Karyn Harty & Audrey Byrne McCann FitzGerald Alexander Davies & Peter Woglom BDO Japan International civil or criminal law tools that can be 144 42 Hiroyuki Kanae, Hidetaka Miyake & Atsushi Nishitani used to aid in asset recovery Anderson Mōri & Tomotsune Olga Bischof & Theodore Elton Brown Rudnick Confiscation proceedings and civil recovery: 152 Jersey 48 proportionality and abuse of process Marcus Pallot, Richard Holden & Daniel Johnstone Colin Wells 25 Bedford Row Carey Olsen Luxembourg 160 Max Mailliet E2M – Etude Max Mailliet COUNTRY CHAPTERS Singapore 168 Lee Bik Wei & Lee May Ling Allen & Gledhill Bermuda 56 Keith Robinson & Kyle Masters Carey Olsen Spain 178 Héctor Sbert & Maria de Mulder Lawants British Virgin Islands 63 Alex Hall Taylor QC, Richard Brown, Tim Wright & Switzerland Simon Hall Carey Olsen 188 Dr.
    [Show full text]
  • Office of the Attorney -General
    OFFICE- OF THE,, ATTORNEY- - ---- -GENERAL I -- ' . Department of Law , . - I - Fi~cal ,Year 1993 Annual Report Grant Woods - -A!torney Genera_} Grant Woods Attorney General Robert B. Carey J.M. Howard First Assistant Attorney General Special Counsel Civil Division · Criminal Division H. Leslie Hall Michael C. Cudahy Chief Counsel Chief Counsel Human Services Division Management Services Cecil B. Patterson Thomas G. Augherton Chief Counsel Chief of Administration TRANSMITTAL LETTER STATE OF ARIZONA OFFICE OF THE ATTORNEY GENERAL GRANT WOODS MAIN PHONE: 542-5025 ATTORNEY GENERAL 1275 WEST WASHINGTON, PHOENIX 85007-2926 TELECOPIER : 542-4085 November 5, 1993 The Honorable J. Fife Symington Governor of Arizona State Capitol, Executive Tower 1700 W. Washington Phoenix, Arizona 85007 Dear Governor Symington: I am pleased to submit to you the annual report of the Office of the Attorney General, as required by ARS § 41-194(B). During the past fiscal . year, this administration continued its focus of protecting Arizona's citizens through aggressive enforcement of state laws and providing quality legal representation to state agencies. We have vigorously defended Arizona's environment by prosecuting those that destroy our natural resources, pursued dozens of companies and individuals who prey on unsuspecting consumers, and convicted many notorious criminals for the heinous crimes they perpetrated. We concentrated our administrative efforts into implementing cost-saving measures that allow us to prioritize our resources into retaining and compensating top-quality \egal staff. Loss of well-trained, experienced attorneys from the Attorney General's Office to higher paying private and public sector positions continues to be a problem that requires close scrutiny by the Legislature.
    [Show full text]
  • 2020 Identity Theft Statistics | Consumeraffairs
    2020 Identity Theft Statistics | ConsumerAffairs Trending Home / Finance / Identity Theft Protection / Identity theft statistics Buyers Guides Last Updated 01/16/2020 News Write a review 2020Write a review Identity theft statistics Trends and statistics about identity theft Learn about identity theft protection by Rob Douglas Identity Theft Protection Contributing Editor In 2018, the Federal Trade Commission processed 1.4 million fraud reports totaling $1.48 billion in losses. According to the FTC’s “Consumer Sentinel Network Data Book,” the most common categories for fraud complaints were imposter scams, debt collection and identity theft. Credit card fraud was most prevalent in identity theft cases — more than 167,000 people reported a fraudulent credit card account was opened with their information. Identity theft trends in 2019 In the next year, the Identity Theft Resource Center (ITRC) predicts identity theft protection services will primarily focus on data breaches, data abuse and data privacy. ITRC also predicts that https://www.consumeraffairs.com/finance/identity-theft-statistics.html 2020 Identity Theft Statistics | ConsumerAffairs consumers will become more knowledgeable about how data breaches work and expect companies to provide more information about the specific types of data breached and demand more transparency in general in data breach reports. Cyber attacks are more ambitious According to a 2019 Internet Security Threat Report by Symantec, cybercriminals are diversifying their targets and using stealthier methods to commit identity theft and fraud. Cybercrime groups like Mealybug, Gallmaker and Necurs are opting for off-the-shelf tools and operating system features such as PowerShell to attack targets. Supply chain attacks are up 78% Malicious PowerShell scripts have increased by 1,000% Microsoft Office files make up 48% of malicious email attachments Internet of Things threats on the rise Cybercriminals attack IoT devices an average of 5,233 times per month.
    [Show full text]
  • Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote
    Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote Mobile Threats Are Increasing Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses, and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published earlier this year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones.1 One example is this year’s Valentine’s Day attack, in which attackers distributed a mobile picture- sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent.2 The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up. Smartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security. Technical security measures, such as firewalls, antivirus, and encryption, are uncommon on mobile phones, and mobile phone operating systems are not updated as frequently as those on personal computers.3 Mobile social networking applications sometimes lack the detailed privacy controls of their PC counterparts. Unfortunately, many smartphone users do not recognize these security shortcomings. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers.4 Meanwhile, mobile phones are becoming more and more valuable as targets for attack.
    [Show full text]
  • Australian Antarctic Magazine — Issue 28
    AUSTRALIAN MAGAZINE ISSUE 28 2015 AUSTRALIAN ANTARCTIC ISSUE 2015 MAGAZINE 28 The Australian Antarctic Division, a Division of the Department of the Environment, leads Australia’s Antarctic program and seeks to advance Australia’s Antarctic interests CONTENTS in pursuit of its vision of having ‘Antarctica valued, protected and understood’. It does this by managing Australian government activity in Antarctica, providing transport and SCIENCE logistic support to Australia’s Antarctic research program, The good oil on krill 1 maintaining four permanent Australian research stations, and conducting scientific research programs both on land Acoustic technology provides insights into blue whale behaviour 4 and in the Southern Ocean. Sound science finds Antarctic blue whale hotspots 6 Australia’s Antarctic national interests are to: Measuring clouds from every angle 7 • Preserve our sovereignty over the Australian Antarctic Future ocean success 8 Territory, including our sovereign rights over the adjacent offshore areas. Totten Glacier melt-down 10 • Take advantage of the special opportunities Antarctica Hidden oceanic gateway beneath Totten Glacier 12 offers for scientific research. What lies beneath 13 • Protect the Antarctic environment, having regard to its Household pollutants detected around Antarctic stations 15 special qualities and effects on our region. • Maintain Antarctica’s freedom from strategic and/or Refining gravity waves in climate models 16 political confrontation. Iconic Macquarie Island cushion plant dying out 18 • Be informed about and able to influence developments Rare sub-glacial eruption at Casey 19 in a region geographically proximate to Australia. Sweating the small stuff 20 • Derive any reasonable economic benefits from living and non-living resources of the Antarctic (excluding deriving Changing Antarctica 22 such benefits from mining and oil drilling).
    [Show full text]
  • We Are All Rwandans”
    UNIVERSITY OF CALIFORNIA Los Angeles “We are all Rwandans”: Imagining the Post-Genocidal Nation Across Media A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Film and Television by Andrew Phillip Young 2016 ABSTRACT OF DISSERTATION “We are all Rwandans”: Imagining the Post-Genocidal Nation Across Media by Andrew Phillip Young Doctor of Philosophy in Film and Television University of California, Los Angeles, 2016 Professor Chon A. Noriega, Chair There is little doubt of the fundamental impact of the 1994 Rwanda genocide on the country's social structure and cultural production, but the form that these changes have taken remains ignored by contemporary media scholars. Since this time, the need to identify the the particular industrial structure, political economy, and discursive slant of Rwandan “post- genocidal” media has become vital. The Rwandan government has gone to great lengths to construct and promote reconciliatory discourse to maintain order over a country divided along ethnic lines. Such a task, though, relies on far more than the simple state control of media message systems (particularly in the current period of media deregulation). Instead, it requires a more complex engagement with issues of self-censorship, speech law, public/private industrial regulation, national/transnational production/consumption paradigms, and post-traumatic media theory. This project examines the interrelationships between radio, television, newspapers, the ii Internet, and film in the contemporary Rwandan mediascape (which all merge through their relationships with governmental, regulatory, and funding agencies, such as the Rwanda Media High Council - RMHC) to investigate how they endorse national reconciliatory discourse.
    [Show full text]
  • Sok: Fraud in Telephony Networks
    SoK: Fraud in Telephony Networks Merve Sahin∗y, Aurelien´ Francillon∗, Payas Guptaz, Mustaque Ahamadx ∗Eurecom, Sophia Antipolis, France fmerve.sahin, [email protected] yMonaco Digital Security Agency zPindrop, Atlanta, USA [email protected] xGeorgia Institute of Technology, USA [email protected] Abstract—Telephone networks first appeared more than a future research, increase cooperation between researchers hundred years ago, long before transistors were invented. They, and industry and finally help in fighting such fraud. therefore, form the oldest large scale network that has grown Although, we focus on telephony fraud, our work has to touch over 7 billion people. Telephony is now merging broader implications. For example, a recent work shows many complex technologies and because numerous services how telephony fraud can negatively impact secure creation enabled by these technologies can be monetized, telephony of online accounts [1]. Also, online account takeovers by attracts a lot of fraud. In 2015, a telecom fraud association making a phone call to a call center agent have been reported study estimated that the loss of revenue due to global telecom in the past [2], [3]. Telephony is considered as a trusted fraud was worth 38 billion US dollars per year. Because of the medium, but it is not always. A better understanding of convergence of telephony with the Internet, fraud in telephony telephony vulnerabilities and fraud will therefore help us networks can also have a negative impact on security of online understand potential Internet attacks as well. services. However, there is little academic work on this topic, in part because of the complexity of such networks and their 1.1.
    [Show full text]
  • Common Threats to Cyber Security Part 1 of 2
    Common Threats to Cyber Security Part 1 of 2 Table of Contents Malware .......................................................................................................................................... 2 Viruses ............................................................................................................................................. 3 Worms ............................................................................................................................................. 4 Downloaders ................................................................................................................................... 6 Attack Scripts .................................................................................................................................. 8 Botnet ........................................................................................................................................... 10 IRCBotnet Example ....................................................................................................................... 12 Trojans (Backdoor) ........................................................................................................................ 14 Denial of Service ........................................................................................................................... 18 Rootkits ......................................................................................................................................... 20 Notices .........................................................................................................................................
    [Show full text]