Bugs in the Market: Creating a Legitimate, Transparent, and Vendor-Focused Market for Software Vulnerabilities

Total Page:16

File Type:pdf, Size:1020Kb

Bugs in the Market: Creating a Legitimate, Transparent, and Vendor-Focused Market for Software Vulnerabilities BUGS IN THE MARKET: CREATING A LEGITIMATE, TRANSPARENT, AND VENDOR-FOCUSED MARKET FOR SOFTWARE VULNERABILITIES Jay P. Kesan* & Carol M. Hayes** Ukraine, December 23, 2015. Hundreds of thousands of homes lost power. Call center communications were blocked. Authorities reported that 103 cities experienced a total blackout. The alleged cause? BlackEnergy malware. With so much of our daily lives reliant on computers, is modern civilization just a stream of ones and zeroes away from disaster? Malware like BlackEnergy relies on uncorrected security flaws in computer systems. Sometimes, the system owner fails to install a patch. Other times, there is no patch because the software vendor either did not know about or did not correct a critical security flaw. Meanwhile, the victim country’s government or its allies may have knowledge of the same flaw, but kept the information secret so that it could be used against its enemies. There is an urgent need for a new legal and economic approach to cybersecurity that will curtail socially harmful behavior by security researchers and governments. Laws aimed at curbing cyberattacks typically focus on punishment, with little to no wiggle room provided for socially beneficial hacking behavior. Around the world, governments hoard zero-day vulnerabilities while permitting software vendors to sue security researchers who plan to demonstrate critical security flaws at industry conferences. There is also a growing market for buying and selling security flaws, and the buyers do not always have society’s best interests in mind. This Article delves into the world of cybersecurity and software and provides an interdisciplinary analysis of the current crisis, contributing to the limited but growing literature addressing these new threats that cannot be contained by traditional philosophies of war and weaponry. First, the Article presents an economic model to explore incentives for selling vulnerability information in * Professor and H. Ross & Helen Workman Research Scholar, University of Illinois at Urbana-Champaign. ** Research Associate, University of Illinois at Urbana-Champaign. The authors wish to thank the members of the software and security communities who helped in the shaping of the proposal, including Chris Kuethe, Eduardo A. Vela Nava, and Don Hayes. 754 ARIZONA LAW REVIEW [VOL. 58:753 different types of markets. Then, it proposes and designs a revolutionary market for vulnerabilities aimed at facilitating legitimate, transparent, and vendor- focused transactions of critical security information at a fair market price. The proposal combines insights from economics, security, and law, and draws inspiration from around the world; from commodity futures markets in New York to archaeological sites in Iraq. The Article applies the marketplace proposal to several examples, demonstrating that it is a practical and achievable approach that will support socially desirable cybersecurity practices. TABLE OF CONTENTS INTRODUCTION ..................................................................................................... 755 I. CYBER THREATS AND DEFENSES ....................................................................... 762 A. Characterizing Hackers .............................................................................. 769 B. Cybersecurity Regulation ........................................................................... 770 1. Cybersecurity Information Sharing ........................................................ 773 2. Cybersecurity and International Law ..................................................... 776 C. Technological Defensive Measures ............................................................ 778 D. Other Defensive Measures ......................................................................... 779 II. SOFTWARE VULNERABILITIES AND THE MARKET ............................................ 780 A. Computers and Software ............................................................................ 783 1. Evolving Malware Threats ..................................................................... 784 2. Software and Law ................................................................................... 786 B. Vulnerabilities ............................................................................................ 787 1. Zero-Day Vulnerabilities and Research ................................................. 789 2. Finding and Disclosing Zero Days ......................................................... 791 a. Legal issues in vulnerability research ................................................ 791 b. Zero days and the government ........................................................... 792 c. Public disclosure ................................................................................ 793 d. Different types of disclosure .............................................................. 795 e. Disclosure and the First Amendment ................................................. 796 3. Vulnerability Markets............................................................................. 799 4. Vulnerability Market Regulation ............................................................ 802 III. CYBERSECURITY AND DIFFERENT MARKET APPROACHES .............................. 805 A. Regulated Financial Markets...................................................................... 805 B. Markets for Ideas ........................................................................................ 810 C. Risk Shifting............................................................................................... 813 D. Markets for Illicit Goods ............................................................................ 815 IV. BUILDING A THRIVING VULNERABILITY MARKET .......................................... 817 A. Crowding Out the Harmful Markets—An Economic Proposal.................. 818 B. Vulnerability Derivatives ........................................................................... 821 C. Vulnerability Sales ..................................................................................... 824 D. Implementation and Possible Counterarguments ....................................... 828 CONCLUSION ........................................................................................................ 829 2016] BUGS IN THE MARKET 755 INTRODUCTION The Internet is a game changer, connecting people, businesses, and countries like never before in world history. Educational videos from the 1990s painted the Internet as a great tool to help Lisa with her homework and let Dad check the stock reports.1 In the decades since, the Internet has proven to be much more than a useful tool. It is a new road that connects businesses to consumers and governments to citizens. It has dramatically reduced transaction costs to enable outstanding economic growth.2 But new roads can be used by anyone with access to them. As former FBI Director Robert Mueller noted, the same roads that enabled the spread of Roman civilization also led invaders to Roman doorsteps.3 This also applies in the arena of cybersecurity threats. General Keith Alexander, Director of the National Security Agency (“NSA”), declared that ongoing cyber thefts “represent the greatest transfer of wealth in human history.”4 The global nature of cybercrime complicates the enforcement of laws and rights, because investigators are much more constrained by borders than criminals.5 In 2014, experts estimated that cybercrime costs the global economy more than $400 billion every year.6 The United States alone reportedly accounts for $100 billion of that total.7 Harm from cybercrime includes the destruction and theft of information, but the harm can also be reputational or even physical. One careless network user who clicks on a phishing link in an email is sometimes all it takes.8 The defender must simultaneously defend everywhere against everything, but all an attacker needs is one good day.9 1. See, e.g., Eric Mack, Revisit the Amazing Internet the Cool Kids Used in 1997, CNET (Aug. 18, 2013, 12:43 PM), http://www.cnet.com/news/revisit-the-amazing- internet-the-cool-kids-used-in-1997/. 2. See Miriam A. Cherry, Cyber Commodification, 72 MD. L. REV. 381, 407 (2013). 3. Omer Tene, A New Harm Matrix for Cybersecurity Surveillance, 12 COLO. TECH. L.J. 391, 392 (2014). 4. Keith B. Alexander, An Introduction by General Alexander, 19 NEXT WAVE, no. 4, 2012, at 2. 5. Cassandra Kirsch, The Grey Hat Hacker: Reconciling Cyberspace Reality and the Law, 41 N. KY. L. REV. 383, 383 (2014). 6. MCAFEE CENTER FOR STRATEGIC AND INTERNATIONAL STUDIES, NET LOSSES: ESTIMATING THE GLOBAL COST OF CYBERCRIME 2 (June 2014), http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf. 7. Dan Zureich & William Graebe, Cybersecurity: The Continuing Evolution of Insurance and Ethics, 82 DEF. COUNS. J. 192, 192 (2015). 8. See Taiwo A. Oriola, Bugs for Sale: Legal and Ethical Proprieties of the Market in Software Vulnerabilities, 28 J. MARSHALL J. COMPUTER & INFO. L. 451, 465 (2011) (“[T]he human link remains . a potent source of vulnerability in the computing and network systems security chain.”). 9. See Rachel Rue & Shari Lawrence Pfleeger, Making the Best Use of Cybersecurity Economic Models, IEEE SECURITY & PRIVACY, July–Aug. 2009, at 52, 53 (discussing the Clark and Konrad cybersecurity model, and stating that “the defender [against a cyberattack] must defend every front, but the attacker need be successful on only one”). 756 ARIZONA
Recommended publications
  • BUGS in the SYSTEM a Primer on the Software Vulnerability Ecosystem and Its Policy Implications
    ANDI WILSON, ROSS SCHULMAN, KEVIN BANKSTON, AND TREY HERR BUGS IN THE SYSTEM A Primer on the Software Vulnerability Ecosystem and its Policy Implications JULY 2016 About the Authors About New America New America is committed to renewing American politics, Andi Wilson is a policy analyst at New America’s Open prosperity, and purpose in the Digital Age. We generate big Technology Institute, where she researches and writes ideas, bridge the gap between technology and policy, and about the relationship between technology and policy. curate broad public conversation. We combine the best of With a specific focus on cybersecurity, Andi is currently a policy research institute, technology laboratory, public working on issues including encryption, vulnerabilities forum, media platform, and a venture capital fund for equities, surveillance, and internet freedom. ideas. We are a distinctive community of thinkers, writers, researchers, technologists, and community activists who Ross Schulman is a co-director of the Cybersecurity believe deeply in the possibility of American renewal. Initiative and senior policy counsel at New America’s Open Find out more at newamerica.org/our-story. Technology Institute, where he focuses on cybersecurity, encryption, surveillance, and Internet governance. Prior to joining OTI, Ross worked for Google in Mountain About the Cybersecurity Initiative View, California. Ross has also worked at the Computer The Internet has connected us. Yet the policies and and Communications Industry Association, the Center debates that surround the security of our networks are for Democracy and Technology, and on Capitol Hill for too often disconnected, disjointed, and stuck in an Senators Wyden and Feingold. unsuccessful status quo.
    [Show full text]
  • Xbt.Doc.248.2.Pdf
    MAY 25, 2018 United States District Court Southern District of Florida Miami Division CASE NO. 1:17-CV-60426-UU ALEKSEJ GUBAREV, XBT HOLDING S.A., AND WEBZILLA, INC., PLAINTIFFS, VS BUZZFEED, INC. AND BEN SMITH, DEFENDANTS Expert report of Anthony J. Ferrante FTI Consulting, Inc. 4827-3935-4214v.1 0100812-000009 Table of Contents Table of Contents .............................................................................................................................................. 1 Qualifications ..................................................................................................................................................... 2 Scope of Assignment ......................................................................................................................................... 3 Glossary of Important Terms ............................................................................................................................. 4 Executive Summary ........................................................................................................................................... 7 Methodology ..................................................................................................................................................... 8 Technical Investigation ................................................................................................................................ 8 Investigative Findings .......................................................................................................................................
    [Show full text]
  • Tstable of Content
    ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 North Atlantic Treaty Organization London International Model United Nations 18th Session | 2017 tsTable of Content 1 ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 Table of Contents Table of Contents WELCOME TO THE NORTH ATLANTIC TREATY ORGANIZATION .............................................................. 3 INTRODUCTION TO THE COMMITTEE .................................................................................................................. 4 TOPIC A: FORMING A NATO STRATEGY IN CYBERSPACE ............................................................................. 5 INTRODUCTION ............................................................................................................................................................... 5 HISTORY OF THE PROBLEM ............................................................................................................................................. 6 Timeline of notable attacks ....................................................................................................................................... 7 1998 – 2001 “MOONLIGHT MAZE” ....................................................................................................................... 7 2005 – 2011 TITAN RAIN & BYZANTINE HADES .................................................................................................. 8 2007 Estonia DDoS Campaigns ...............................................................................................................................
    [Show full text]
  • To Scholars and Students Interested in Hungarian, East Europe'an, and Cold War History
    to scholars and students interested in Hungarian, East Europe'an, and Cold War history. A basic knowledge of Hungarian history will be useful to gain full advantage of this work. The image of Hungary as the "first domino" in the eventual collapse of Soviet hegemony over Eastern Europe is perhaps a little too deterministic. Granville's text makes clear that she also believes that chance plays a role in decision making and history in general. Granville concludes that "multiarchival research tends to confirm the postrevisionists' theory about the Cold War: it was everyone's fault and no one's fault. It resulted from the emerging bipolar structure of the international system, a power vacuum in the center of Europe, and spiraling misconceptions." (p. 214) John C. Swanson Utica College of Syracuse University After the Collapse of Communism: Comparative Lessons of Transition. Edited by Mi- chael McFaul and Kathryn Stoner-Weiss. Cambridge and New York: Cambridge Uni- versity Press, 2004. vii, 264 pp. $60.00. This book derives from an autumn 2000 politics conference at Princeton marking one decade after the collapse of the Soviet Union. Six of seven papers focus on political de- velopments in Eastern Europe and the Former Soviet Republics (FSU). One paper deals with economics and four concentrate on Russia. The title suggests an overview of social progress a decade after the fall. The book is better understood as a collection of papers on politics each of which is a step along a re- search agenda. I recommend it to anyone concerned with democracy or with politics after the collapse.
    [Show full text]
  • The Million Dollar Dissident: NSO Group's Iphone Zero-Days Used Against a UAE Human Rights Defender
    Research Teaching News Lab Projects GLA2010 In the News About Publications Newsletter People Archives Events Opportunities Contact The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender August 24, 2016 Categories: Bill Marczak, John Scott-Railton, Reports and Briefings Authors: Bill Marczak and John Scott-Railton, Senior Researchers at the Citizen Lab, with the assistance of the research team at Lookout Security. Media coverage: The New York Times, Motherboard, Gizmodo, Wired, Washington Post, ZDNet. This report describes how a government targeted an internationally recognized human rights defender, Ahmed Mansoor, with the Trident, a chain of zero-day exploits designed to infect his iPhone with sophisticated commercial spyware. 1. Executive Summary Ahmed Mansoor is an internationally recognized human rights defender, based in the United Arab Emirates (UAE), and recipient of the Martin Ennals Award (sometimes referred to as a “Nobel Prize for human rights”). On August 10 and 11, 2016, Mansoor received SMS text messages on his iPhone promising “new secrets” about detainees tortured in UAE jails if he clicked on an included link. Instead of clicking, Mansoor sent the messages to Citizen Lab researchers. We recognized the links as belonging to an exploit infrastructure connected to NSO Group, an Israel-based “cyber war” company that sells Pegasus, a government- exclusive “lawful intercept” spyware product. NSO Group is reportedly owned by an American venture capital firm, Francisco Partners Management. The ensuing investigation, a collaboration between researchers from Citizen Lab and from Lookout Security, determined that the links led to a chain of zero-day exploits (“zero-days”) that would have remotely jailbroken Mansoor’s stock iPhone 6 and installed sophisticated spyware.
    [Show full text]
  • BUGS in the SYSTEM a Primer on the Software Vulnerability Ecosystem and Its Policy Implications
    ANDI WILSON, ROSS SCHULMAN, KEVIN BANKSTON, AND TREY HERR BUGS IN THE SYSTEM A Primer on the Software Vulnerability Ecosystem and its Policy Implications JULY 2016 About the Authors About New America New America is committed to renewing American politics, Andi Wilson is a policy analyst at New America’s Open prosperity, and purpose in the Digital Age. We generate big Technology Institute, where she researches and writes ideas, bridge the gap between technology and policy, and about the relationship between technology and policy. curate broad public conversation. We combine the best of With a specific focus on cybersecurity, Andi is currently a policy research institute, technology laboratory, public working on issues including encryption, vulnerabilities forum, media platform, and a venture capital fund for equities, surveillance, and internet freedom. ideas. We are a distinctive community of thinkers, writers, researchers, technologists, and community activists who Ross Schulman is a co-director of the Cybersecurity believe deeply in the possibility of American renewal. Initiative and senior policy counsel at New America’s Open Find out more at newamerica.org/our-story. Technology Institute, where he focuses on cybersecurity, encryption, surveillance, and Internet governance. Prior to joining OTI, Ross worked for Google in Mountain About the Cybersecurity Initiative View, California. Ross has also worked at the Computer The Internet has connected us. Yet the policies and and Communications Industry Association, the Center debates that surround the security of our networks are for Democracy and Technology, and on Capitol Hill for too often disconnected, disjointed, and stuck in an Senators Wyden and Feingold. unsuccessful status quo.
    [Show full text]
  • Security > Automotive > Blockchain > Virtual and Augmented Reality
    > Security > Automotive > Blockchain > Virtual and Augmented Reality AUGUST 2018 www.computer.org CALL FOR NOMINEES Education Awards Nominations Taylor L. Booth Education Award Computer Science and Engineering Undergraduate Teaching Award A bronze medal and US$5,000 honorarium are awarded for an outstanding record in computer science and engineering A plaque, certificate and a stipend of US$2,000 is education. The individual must meet two or more of the awarded to recognize outstanding contributions to following criteria in the computer science and engineering field: undergraduate education through both teaching and service and for helping to maintain interest, increase the • Achieving recognition as a teacher of renown. visibility of the society, and making a statement about the • Writing an influential text. importance with which we view undergraduate education. • Leading, inspiring or providing significant education content during the creation of a curriculum in the field. The award nomination requires a minimum of three • Inspiring others to a career in computer science and endorsements. engineering education. Two endorsements are required for an award nomination. See the award information at: See the award details at: www.computer.org/web/awards/booth www.computer.org/web/awards/cse-undergrad-teaching Deadline: 1 October 2018 Nomination Site: awards.computer.org r5p77.indd 77 5/9/18 3:30 PM IEEE COMPUTER SOCIETY computer.org • +1 714 821 8380 STAFF Editor Managers, Editorial Content Meghan O’Dell Brian Brannon, Carrie Clark Contributing Staff Publisher Christine Anthony, Lori Cameron, Cathy Martin, Chris Nelson, Robin Baldwin Dennis Taylor, Rebecca Torres, Bonnie Wylie Senior Advertising Coordinator Production & Design Debbie Sims Carmen Flores-Garvey Circulation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society.
    [Show full text]
  • How to Analyze the Cyber Threat from Drones
    C O R P O R A T I O N KATHARINA LEY BEST, JON SCHMID, SHANE TIERNEY, JALAL AWAN, NAHOM M. BEYENE, MAYNARD A. HOLLIDAY, RAZA KHAN, KAREN LEE How to Analyze the Cyber Threat from Drones Background, Analysis Frameworks, and Analysis Tools For more information on this publication, visit www.rand.org/t/RR2972 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0287-5 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2020 RAND Corporation R® is a registered trademark. Cover design by Rick Penn-Kraus Cover images: drone, Kadmy - stock.adobe.com; data, Getty Images. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report explores the security implications of the rapid growth in unmanned aerial systems (UAS), focusing specifically on current and future vulnerabilities.
    [Show full text]
  • The CLASP Application Security Process
    The CLASP Application Security Process Secure Software, Inc. Copyright (c) 2005, Secure Software, Inc. The CLASP Application Security Process The CLASP Application Security Process TABLE OF CONTENTS CHAPTER 1 Introduction 1 CLASP Status 4 An Activity-Centric Approach 4 The CLASP Implementation Guide 5 The Root-Cause Database 6 Supporting Material 7 CHAPTER 2 Implementation Guide 9 The CLASP Activities 11 Institute security awareness program 11 Monitor security metrics 12 Specify operational environment 13 Identify global security policy 14 Identify resources and trust boundaries 15 Identify user roles and resource capabilities 16 Document security-relevant requirements 17 Detail misuse cases 18 Identify attack surface 19 Apply security principles to design 20 Research and assess security posture of technology solutions 21 Annotate class designs with security properties 22 Specify database security configuration 23 Perform security analysis of system requirements and design (threat modeling) 24 Integrate security analysis into source management process 25 Implement interface contracts 26 Implement and elaborate resource policies and security technologies 27 Address reported security issues 28 Perform source-level security review 29 Identify, implement and perform security tests 30 The CLASP Application Security Process i Verify security attributes of resources 31 Perform code signing 32 Build operational security guide 33 Manage security issue disclosure process 34 Developing a Process Engineering Plan 35 Business objectives 35 Process
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]
  • The Charcoal Grey Market in Kenya, Uganda and South Sudan (2021)
    COMMODITY REPORT BLACK GOLD The charcoal grey market in Kenya, Uganda and South Sudan SIMONE HAYSOM I MICHAEL McLAGGAN JULIUS KAKA I LUCY MODI I KEN OPALA MARCH 2021 BLACK GOLD The charcoal grey market in Kenya, Uganda and South Sudan ww Simone Haysom I Michael McLaggan Julius Kaka I Lucy Modi I Ken Opala March 2021 ACKNOWLEDGEMENTS The authors would like to thank everyone who gave their time to be interviewed for this study. They would like to extend particular thanks to Dr Catherine Nabukalu, at the University of Pennsylvania, and Bryan Adkins, at UNEP, for playing an invaluable role in correcting our misperceptions and deepening our analysis. We would also like to thank Nhial Tiitmamer, at the Sudd Institute, for providing us with additional interviews and information from South Sudan at short notice. Finally, we thank Alex Goodwin for excel- lent editing. Interviews were conducted in South Sudan, Uganda and Kenya between February 2020 and November 2020. ABOUT THE AUTHORS Simone Haysom is a senior analyst at the Global Initiative Against Transnational Organized Crime (GI-TOC), with expertise in urban development, corruption and organized crime, and over a decade of experience conducting qualitative fieldwork in challenging environments. She is currently an associate of the Oceanic Humanities for the Global South research project based at the University of the Witwatersrand in Johannesburg. Ken Opala is the GI-TOC analyst for Kenya. He previously worked at Nation Media Group as deputy investigative editor and as editor-in-chief at the Nairobi Law Monthly. He has won several journalistic awards in his career.
    [Show full text]