University of Bradford Ethesis

Total Page:16

File Type:pdf, Size:1020Kb

University of Bradford Ethesis University of Bradford eThesis This thesis is hosted in Bradford Scholars – The University of Bradford Open Access repository. Visit the repository for full metadata or to contact the repository team © University of Bradford. This work is licenced for reuse under a Creative Commons Licence. SOCIAL DATA MINING FOR CRIME INTELLIGENCE H. ISAH PHD 2017 Social Data Mining for Crime Intelligence: Contributions to Data Quality Assessment and Prediction Methods Haruna ISAH Submitted for the Degree of Doctor of Philosophy Department of Computer Science University of Bradford 2017 Abstract Haruna Isah Social Data Mining for Crime Intelligence: Contributions to Social Data Quality Assessment and Prediction Methods Keywords: Social networks analysis, data mining, social network data quality, digital crime intelligence With the advancement of the Internet and related technologies, many traditional crimes have made the leap to digital environments. The successes of data mining in a wide variety of disciplines have given birth to crime analysis. Traditional crime analysis is mainly focused on understanding crime patterns, however, it is unsuitable for identifying and monitoring emerging crimes. The true nature of crime remains buried in unstructured content that represents the hidden story behind the data. User feedback leaves valuable traces that can be utilised to measure the quality of various aspects of products or services and can also be used to detect, infer, or predict crimes. Like any application of data mining, the data must be of a high quality standard in order to avoid erroneous conclusions. This thesis presents a methodology and practical experiments towards discovering whether (i) user feedback can be harnessed and processed for crime intelligence, (ii) criminal associations, structures, and roles can be inferred among entities involved in a crime, and (iii) methods and standards can be developed for measuring, predicting, and comparing the quality level of social data instances and samples. It contributes to the theory, design and development of a novel framework for crime intelligence and algorithm for the estimation of social data quality by innovatively adapting the methods of monitoring water contaminants. Several experiments were conducted and the results obtained revealed the significance of this study in mining social data for crime intelligence and in developing social data quality filters and decision support systems. i Declaration The candidate confirms that the work submitted is his own and that appropriate credit has been given where reference has been made to the work of others. Haruna Isah ii Acknowledgements To God be all the glory. I couldn’t have achieved such a great feat without the support of many people. First and foremost, I am forever indebted to my wife, my two kids, my parents, family and friends. They are my root and have made countless sacrifices to provide the optimal starting conditions and motivations for me to flourish. I wouldn’t be in a position of enrolling and completing a PhD thesis without their endless support and love. They have been a welcome distraction. I wish to express my unreserved heartfelt gratitude to my supervisory team which includes my principal supervisor Professor Daniel Neagu and my associate supervisor Dr Paul Trundle for their valuable support before my enrolment into the PhD programme, during funding applications and throughout the entire PhD journey. I couldn’t have endured in completing this thesis without their support and understanding. Special thanks to the panel of examiners (Dr Ian Knopke, Dr Dhaval Thakker, and Professor Crina Oltean-Dumbrava) for their comments and feedback which has greatly enhanced the quality of this thesis. Special thanks to the Commonwealth Scholarship Commission for providing me with the required studentship and grants. Am also indebted to the Federal University of Technology (FUT) Minna for supporting me throughout my studies. Same goes to the staff of the School of Electrical Engineering and Computer Science, other staff of the University of Bradford (especially Sue Baker, the International Student Adviser), Churches Together in Britain and Ireland (CBTI), WAW 2015 School organisers, and many other individuals and organisations who assisted me in achieving my dreams. Finally, I would like to extend my thanks to the entire Tangale and my Church communities (especially my Pastors, Dr and Mrs Akpo Onduku, Dr and Mrs Amos Fatokun, Col and Mrs Solomon Inuwa), researchers, my guardians (Prof. Nebath N. Tanglang and Prof. Solomon L. Lamai), all my guarantors, and organisations that have provided me with different kind of grants, feedback on my research, publication reviews, and datasets used in my experiments. iii Table of Contents Abstract ................................................................................................................ i Acknowledgements ............................................................................................ iii Table of Contents ............................................................................................... iv List of Figures ................................................................................................... vii List of Tables...................................................................................................... ix Glossary .............................................................................................................. x Chapter One: Introduction ................................................................................... 1 1.1. Research Motivation ................................................................................. 8 1.2. Thesis Statement ................................................................................... 10 1.3. Scope ..................................................................................................... 11 1.4. Research Questions ............................................................................... 11 1.5. Methodology ........................................................................................... 12 1.6. Contributions and Publications ............................................................... 13 1.7. Outline .................................................................................................... 15 Chapter Two: Social Data Content Mining for Crime Intelligence ..................... 17 2.1. Introduction ............................................................................................. 17 2.2. Literature Review ................................................................................... 19 2.3. Social Data Definition and Representation ............................................. 22 2.3.1. Representation of Rating Data ......................................................... 23 2.3.2. Representation of Text Data ............................................................ 26 2.4. Rating Aggregation ................................................................................. 32 2.5. Topic Mining ........................................................................................... 37 2.6. Sentiment Analysis ................................................................................. 41 2.7. Product Safety Framework ..................................................................... 43 2.8. Experimental Work ................................................................................. 49 2.8.1. Datasets ........................................................................................... 49 2.8.2. Exploration and Aggregation of Rating Data .................................... 51 2.8.3. Textual Feedback Processing .......................................................... 55 2.8.4. Mining Topics from User Feedback ................................................. 62 iv 2.8.5. Mining Sentiments from User Feedback .......................................... 66 2.9. Issues in Social Data Content Mining ..................................................... 72 2.10. Conclusions .......................................................................................... 74 Chapter Three: Social Network Mining for Crime Intelligence ........................... 76 3.1. Introduction ............................................................................................. 76 3.2. Literature Review ................................................................................... 78 3.3. Network Analysis Fundamentals ............................................................ 83 3.3.1. Network Representation .................................................................. 84 3.3.2. Network Structures and Properties .................................................. 87 3.3.3. Network Communities ...................................................................... 93 3.4. Inferring Hidden Ties in Crime Data ....................................................... 98 3.4.1. Network of Items Co-occurrences .................................................... 98 3.4.2. Bipartite Network Projection ........................................................... 100 3.5. Experimental Work ............................................................................... 102 3.5.1. Datasets ......................................................................................... 102 3.5.2. Rogue Manufacturer-Manufacturer Network .................................. 102 3.5.3. Darknet Vendor-Vendor Network ..................................................
Recommended publications
  • 2011-2012 CJFE's Review of Free Expression in Canada
    2011-2012 CJFE’s Review of Free Expression in Canada LETTER FROM THE EDITORS OH, HOW THE MIGHTY FALL. ONCE A LEADER IN ACCESS TO INFORMATION, PEACEKEEPING, HUMAN RIGHTS AND MORE, CANADA’S GLOBAL STOCK HAS PLUMMETED IN RECENT YEARS. This Review begins, as always, with a Report Card that grades key issues, institutions and governmental departments in terms of how their actions have affected freedom of expres- sion and access to information between May 2011 and May 2012. This year we’ve assessed Canadian scientists’ freedom of expression, federal protection of digital rights and Internet JOIN CJFE access, federal access to information, the Supreme Court, media ownership and ourselves—the Canadian public. Being involved with CJFE is When we began talking about this Review, we knew we wanted to highlight a major issue with a series of articles. There were plenty of options to choose from, but we ultimately settled not restricted to journalists; on the one topic that is both urgent and has an impact on your daily life: the Internet. Think about it: When was the last time you went a whole day without accessing the membership is open to all Internet? No email, no Skype, no gaming, no online shopping, no Facebook, Twitter or Instagram, no news websites or blogs, no checking the weather with that app. Can you even who believe in the right to recall the last time you went totally Net-free? Our series on free expression and the Internet (beginning on p. 18) examines the complex free expression. relationship between the Internet, its users and free expression, access to information, legislation and court decisions.
    [Show full text]
  • On the Privacy Implications of Real Time Bidding
    On the Privacy Implications of Real Time Bidding A Dissertation Presented by Muhammad Ahmad Bashir to The Khoury College of Computer Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science Northeastern University Boston, Massachusetts August 2019 To my parents, Javed Hanif and Najia Javed for their unconditional support, love, and prayers. i Contents List of Figures v List of Tables viii Acknowledgmentsx Abstract of the Dissertation xi 1 Introduction1 1.1 Problem Statement..................................3 1.1.1 Information Sharing Through Cookie Matching...............3 1.1.2 Information Sharing Through Ad Exchanges During RTB Auctions....5 1.2 Contributions.....................................5 1.2.1 A Generic Methodology For Detecting Information Sharing Among A&A companies..................................6 1.2.2 Transparency & Compliance: An Analysis of the ads.txt Standard...7 1.2.3 Modeling User’s Digital Privacy Footprint..................9 1.3 Roadmap....................................... 10 2 Background and Definitions 11 2.1 Online Display Advertising.............................. 11 2.2 Targeted Advertising................................. 13 2.2.1 Online Tracking............................... 14 2.2.2 Retargeted Ads................................ 14 2.3 Real Time Bidding.................................. 14 2.3.1 Overview................................... 15 2.3.2 Cookie Matching............................... 16 2.3.3 Advertisement Served via RTB.......................
    [Show full text]
  • Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM)
    Chair of Network Architectures and Services Department of Informatics Technical University of Munich Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM) Summer Semester 2018 26. 2. 2017 – 19. 8. 2018 Munich, Germany Editors Georg Carle, Daniel Raumer, Stephan Gunther,¨ Benedikt Jaeger Publisher Chair of Network Architectures and Services Network Architectures and Services NET 2018-11-1 Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München Proceedings zu den Seminaren Future Internet (FI) und Innovative Internet-Technologien und Mobilkommunikation (IITM) Sommersemester 2018 München, 26. 2. 2017 – 19. 8. 2018 Editoren: Georg Carle, Daniel Raumer, Stephan Günther, Benedikt Jaeger Network Architectures and Services NET 2018-11-1 Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM) Summer Semester 2018 Editors: Georg Carle Lehrstuhl für Netzarchitekturen und Netzdienste (I8) Technische Universität München 85748 Garching b. München, Germany E-mail: [email protected] Internet: https://net.in.tum.de/~carle/ Daniel Raumer Lehrstuhl für Netzarchitekturen und Netzdienste (I8) E-mail: [email protected] Internet: https://net.in.tum.de/~raumer/ Stephan Günther Lehrstuhl für Netzarchitekturen und Netzdienste (I8) E-mail: [email protected] Internet: https://net.in.tum.de/~guenther/ Benedikt Jaeger Lehrstuhl für Netzarchitekturen und Netzdienste (I8) E-mail: [email protected] Internet: https://net.in.tum.de/~jaeger/ Cataloging-in-Publication Data Seminars FI & IITM SS 18 Proceedings zu den Seminaren „Future Internet“ (FI) und „Innovative Internet-Technologien und Mobilkom- munikation“ (IITM) München, Germany, 26. 2. 2017 – 19. 8.
    [Show full text]
  • New Telebots Backdoor: First Evidence Linking Industroyer to Notpetya
    10/14/2018 New TeleBots backdoor links Industroyer to NotPetya for first time (https://www.welivesecurity.com/) New TeleBots backdoor: First evidence linking Industroyer to NotPetya ESET’s analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven Among the most significant malware-induced cybersecurity incidents in recent years were the attacks against the Ukrainian power grid (https://www.welivesecurity.com/2017/06/12/industroyer-biggest- threat-industrial-control-systems-since-stuxnet/) – which resulted in unprecedented blackouts two years in a row – and the devastating NotPetya ransomware outbreak (https://www.welivesecurity.com/2017/06/27/new-ransomware- attack-hits-ukraine/). Let’s take a look at the links between these major incidents. The first ever malware-enabled blackout in history, which happened in December 2015, was facilitated by the BlackEnergy malware toolkit (https://www.welivesecurity.com/2016/01/04/blackenergy-trojan- strikes-again-attacks-ukrainian-electric-power-industry/). ESET researchers have been following the activity (https://www.welivesecurity.com/2014/10/14/cve-2014-4114-details- august-blackenergy-powerpoint-campaigns/) of the APT group https://www.welivesecurity.com/2018/10/11/new-telebots-backdoor-linking-industroyer-notpetya/ 1/19 10/14/2018 New TeleBots backdoor links Industroyer to NotPetya for first time utilizing BlackEnergy both before and after this milestone event. After th(het t2p0s:1/5/w bwlawc.kwoeulivte, stehcuer igtyr.ocoump/ s) eemed to have ceased actively using BlackEnergy, and evolved into what we call TeleBots (https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing- disruptive-killdisk-attacks/).
    [Show full text]
  • Trend Micro About Trendlabs Security Intelligence Blog Home » Exploits
    Trend Micro About TrendLabs Security Intelligence Blog Search:Home Categories Home » Exploits » Tropic Trooper’s New Strategy Featured Stories Tropic Trooper’s New Strategy 0 systemd Vulnerability Leads Posted on: March 14, 2018 at 7:01 am Posted in: Exploits, Malware, Targeted Attacks to Denial of Service on Author: Trend Micro Linux qkG Filecoder: Self- Replicating, Document- Encrypting Ransomware Mitigating CVE-2017-5689, an Intel Management Engine Vulnerability A Closer Look at North Korea’s Internet From Cybercrime to Cyberpropaganda by Jaromir Horejsi, Joey Chen, and Joseph C. Chen Tropic Trooper (also known as KeyBoy) levels its campaigns against Taiwanese, Philippine, and Security Predictions for 2018 Hong Kong targets, focusing on their government, healthcare, transportation, and high-tech industries. Its operators are believed to be very organized and develop their own cyberespionage tools that they fine-tuned in their recent campaigns. Many of the tools they use now feature new behaviors, including a change in the way they maintain a foothold in the targeted network. Attack Chain Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security. Read our security predictions for 2018. Business Process Compromise Figure 1. Attack chain of Tropic Trooper’s operations Here’s a summary of the attack chain of Tropic Trooper’s recent campaigns: 1. Execute a command through exploits for CVE-2017-11882 or CVE-2018-0802, security flaws in Microsoft Office’s Equation Editor (EQNEDT32.EXE).
    [Show full text]
  • Digital Identity Management
    Digital Identity Management An AIT White Paper These days people wish to move both freely and safely; to cross borders swiftly with secure access controls without hindrances; to make transactions payments or access governmental services through quick and convenient proof of identity. We are addressing here the major issues the security discipline and processes. All the above come with new regulations initiated by the European Commission as the new GDPR (General Data Protection Rules). Introduction Identity Management (IDM) is the organisational key process for identifying, authenticating and authorising individuals or groups of people to access applications, systems or networks by associating user’s rights and restrictions with established identities. The managed identities can also refer to software processes that need access to organisational systems. Authentication It is widely agreed that the first step of action for verifying the identity of a user or process is through the control access and proof of identity (authentication). To establish this process three main categories (factors) are used: Figure 1. Three different authentication factors, source: AIT Something you know Knowledge factors are the most commonly used form of authentication. The user is required to prove knowledge of a secret to authenticate him. A “password” is a secret word or string of characters that is used for user authentication. Variations include both longer ones formed from multiple words (a passphrase) and the shorter, purely numeric, Personal Identification Number (PIN) commonly used for ATM access. Traditionally, passwords/PINs are expected to be memorised. Something you have Possession factors ("something only the user has") have been used for authentication for centuries, in the form of a key to a lock.
    [Show full text]
  • Cybersecurity & Privacy
    THE LEVICK E-BOOK SERIES VOLUME 5 Cybersecurity & Privacy Table of Contents 01 Foreword by Ian Lipner ...................................................................................................................................................................................................... 7 02 The Other Russian Hacking Scandal: Don’t Palpitate — Prepare! ......................................................................................................................... 9 Control the Narrative Before It Controls You, by Paul Ferrillo, Partner and Cyber Specialist, McDermott Will & Emery The Importance of Threat Intelligence in Cybersecurity, by Adam Vincent, Chief Executive Officer, ThreatConnect 03 No Easy Solutions: Facebook’s Response to Russian Hacking May Determine Tech’s Regulatory Future .............................................. 13 Need for Principle-Based Data Regulation Standards, by Bill Ide, Partner, Akerman, and co-chair of the Conference Board ESG Advisory Board “BEC” Is Huge Cyber Threat, by Christina Gagnier, Shareholder, Carlton Fields Los Angeles 04 Averting IP Debacles: A “Lessons Learned” Checklist for Smart Companies .................................................................................................. 17 Unmasking Identities of Cyber Adversaries, by Amyn Gilani, VP of Product, 4iQ Preparing for the (California) CCPA’s Private Right of Action, by Jon Frankel, Shareholder and Cyber Specialist, ZwillGen 05 Keeping Board Members Apprised of Risks of Cyberbreaches & “Disrupted” Communications
    [Show full text]
  • Eternalblue Exploit More Popular Now Than During Wannacryptor Outbreak
    One year later: EternalBlue exploit more popular now than during WannaCryptor outbreak The infamous outbreak may no longer be causing mayhem worldwide but the threat that enabled it is still very much alive and posing a major threat to unpatched and unprotected systems It’s been a year since the WannaCryptor.D ransomware (https://www.welivesecurity.com/2017/05/13/wanna-cryptor- ransomware-outbreak/) (aka WannaCry and WCrypt) caused one of the largest cyber-disruptions the world has ever seen. And while the threat itself is no longer wreaking havoc around the world, the exploit that enabled the outbreak, known as EternalBlue, is still threatening unpatched and unprotected systems. And as ESET’s telemetry data shows, its popularity has been growing over the past few months and a recent spike even surpassed the greatest peaks from 2017. (https://www.welivesecurity.com/wp- content/uploads/2018/05/EternalBlue2017-May2018-2.png) The EternalBlue exploit targets a vulnerability (addressed in Microsoft Security Bulletin MS17-010) in an obsolete version of Microsoft’s implementation of the Server Message Block (SMB) protocol, via port 445. In an attack, black hats scan the internet for exposed SMB ports, and if found, launch the exploit code. If it is vulnerable, the attacker will then run a payload of the attacker’s choice on the target. This was the mechanism behind the effective distribution of WannaCryptor.D ransomware across networks. Interestingly, according to ESET’s telemetry, EternalBlue had a calmer period immediately after the 2017 WannaCryptor campaign: over the following months, attempts to use the EternalBlue exploit dropped to “only” hundreds of detections daily.
    [Show full text]
  • Cyberextortion, a Growing Industry 22/02/2016
    CyberThreats_ Telefónica Cyberextortion, a Growing Industry 22/02/2016 Cyberextortion, a Growing Industry. 22/02/2016 Major findings There is an increasing tendency towards aggression in numerous cyber-attacks, notably those using some method of extortion in particular. In this sense, the conclusions on the methods carried out which are having the greatest impact are as follows: . Extortion via DDoS attacks is being firmly established. The modus operandi of the DD4BC group could give rise to more attackers impersonating them without the need for a great infrastructure and extensive technical knowledge. On the other hand, possible money outflows with the aim of laundering returned to the source of the extortion are the online gaming and trading platforms. Security breaches are assuming a way of extortion based on the sensitivity of filtered information. Currently, two ways are being opted to monetise the attacks, either to sell the database or to extort it directly to users. The payment method required is usually Bitcoin. A growing trend is sexual extortion, also known as sextortion. The sharing of files using peer-to-peer networks remains the main platform for access to child abuse material and for its distribution in a non-commercial manner. In the same way, other anonymous networks and platforms such as Tor are considered as a threat in this area. However, what worries Security Authorities and Bodies the most is the live streaming of child abuse due to the difficulty to detect and investigate it since criminals tend not to store a copy of the material. Since 2015, the threat of ransomware has increased by 165%.
    [Show full text]
  • Recent Workplace Enhancements Move Law Firms Closer to Other Professions
    Vol. 39 • No. 12 • December 2020 In This Issue Are law firm cultures changing? Getting better? Deteriorating? Top management consultants weigh in. ................................................................................................................................................Page 1 Of Counsel’s annual year-end wrap-up. And what a year it’s been, in case you haven’t noticed! ...............Page 3 Eric Seeger offers a performance report on midsize firms during the pandemic—and a most encouraging report it is! .........................................................................................................................Page 5 Ian Lipner looks at Russian hacking and the myriad other cybersecurity threats plaguing the professional services and their clients. .................................................................................................. Page 10 Matt Addison is helping McDonald Carano emerge as one of Nevada’s legal powerhouses, and a real symbol of that state’s dynamic future. ....................................................................................Back Page Cultural Changes … Recent Workplace Enhancements Move Law Firms Closer to Other Professions Some 20 years ago Altman Weil law firm run into problems. “If you can’t do that,” he consultant Tom Clay was riding on a train says, “all that fancy crap you do involving from Washington to Philadelphia and found the numbers is irrelevant because you can’t himself in an engaging conversation with a have a robust new organization with counter
    [Show full text]
  • Colorado Department of Transportation Launches Open Data Site
    Second-quarter newsletter for the Denver Regional No images? Click here Data Consortium. The data consortium consists of Denver Regional Council of Governments members and regional partners with an interest in geospatial data and collaboration. The data consortium newsletter improves communication among local geographic information systems professionals and features updates from all levels of government as they relate to data and geospatial initiatives in our region. This newsletter is published quarterly. Colorado Department of Transportation launches open data site Article submitted by Shelley Broadway, geographic information systems analyst at CDOT. Shelley can be reached at 303-757-9285 or [email protected]. The Colorado Department of Transportation has launched a public open data website that gives users the ability to explore and download CDOT’s authoritative geospatial data. Open data encourages information sharing, promotes transparency, and enhances engagement with the public. To check out the site, visit data-cdot.opendata.arcgis.com. From the Online Transportation Information System click the "Open Data" tile. Navigating from the main page, visitors can use the search bar to find data by keyword, use the predefined categories to browse data, or click "Data Catalog" in the top right to see all available datasets. Once a user has selected a dataset, they can see a brief description, preview the data on a map, and see associated attributes and tabular data. The search bar in the map window allows visitors to filter records by value, analyze by field, or zoom to a current location. One of the most powerful features of the site is that it provides users a self-service tool to download data in various formats.
    [Show full text]
  • Iranian Hackers Targeted US Officials in Elabor
    2016/7/7 Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation | SecurityWeek.Com SECURITYWEEK NETWORK: Information Security News Infosec Island Suits and Spooks Security Experts: WRITE FOR US Subscribe (Free) CISO Forum 2016 ICS Cyber Security Conference Contact Us Malware & Threats Vulnerabilities Email Security Virus & Malware White Papers Endpoint Security Cybercrime Cyberwarfare Fraud & Identity Theft Phishing Malware Tracking & Law Enforcement Whitepapers Mobile & Wireless Mobile Security Wireless Security Risk & Compliance Risk Management Compliance Privacy Whitepapers Security Architecture Cloud Security Identity & Access Data Protection White Papers Network Security Application Security Management & Strategy http://www.securityweek.com/iranian-hackers-targeted-us-officials-elaborate-social-media-attack-operation 1/9 2016/7/7 Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation | SecurityWeek.Com Risk Management Security Architecture Disaster Recovery Training & Certification Incident Response SCADA / ICS Home › Cyberwarfare Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation By Mike Lennon on May 29, 2014 Share 80 1 Tweet Recommend 41 Iranian threat actors, using more than a dozen fake personas on popular social networking sites, have been running a wide‐spanning cyber espionage operation since 2011, according to cyber intelligence firm iSIGHT Partners. The recently uncovered activity, which iSIGHT Partners calls NEWSCASTER, was a “brazen, complex multi‐year cyber‐espionage that used a low‐tech approach to avoid traditional security defenses –exploiting social media and people who are often the ‘weakest link’ in the security chain.” Using the fake personas, including at least two (falsified) legitimate identities from leading news organizations, and young, attractive women, the attackers were supported by a fictitious news organization called NewsOnAir.org (Do Not Visit) and were successful in connecting or victimizing over 2,000 individuals.
    [Show full text]