HS2 Accelerates Innovation

Total Page:16

File Type:pdf, Size:1020Kb

HS2 Accelerates Innovation Home News Making digital delivery 3-9 MAY 2016 of public services standard practice DevOps advocates bust myths around enterprise agile software development HS2 accelerates innovation Interview: HS2 CIO James Findlay juggles The high-speed rail project aims to connect industry, today’s planning and the skills and the technology of the future technology of tomorrow Editor’s comment Buyer’s guide to graph databases CW@50: British innovation in the fight against cyber threats Downtime HS2/GRIMSHAW COMPUTERWEEKLY.COM COMPUTERWEEKLY.COM 3-9 MAY 2016 1 NEWS IN BRIEF Home News DDoS attacks hit three-quarters HMRC weighs up desktop of global brands in 2015 services and cloud collaboration Making digital delivery More than seven in 10 global HM Revenue & Customs (HMRC) of public services standard practice brands were hit by distributed has issued two prior information denial of service (DDoS) attacks notices worth a total of £215m. VODAFONEGROUP DevOps advocates in 2015. Few organisations were HMRC is looking for management bust myths around spared DDoS attacks, according to and support for user devices worth enterprise agile software development a survey by communications and £200m, and an integrated cloud- analysis organisation Neustar. The based collaboration system worth Interview: HS2 CIO survey of 1,000 IT professionals £15m. The larger of the two con- James Findlay juggles revealed that 73% reported DDoS tracts includes the build, deploy- today’s planning and the technology of tomorrow attacks in 2015, with 82% suffering ment, maintenance and support of repeated attacks and 57% suffering user devices such as Blackberrys Editor’s comment subsequent theft. and managed desktop services. Buyer’s guide to Lloyds Bank offshores IT roles Barnet Council audit finds graph databases to India in cost-cutting plan Capita services lacking Lloyds Banking group is reducing its Barnet Council’s audit reports show CW@50: British innovation in the fight UK IT workforce by 80 people, with failings in IT disaster recovery and against cyber threats half moving to India as part of a cull IT change management, run by of more than 600 jobs at the bank. Capita. The internal audit is the British Library puts Downtime John Morgan-Evans, regional officer first review of the services Capita Shakespeare on phone at union Unite, said the move to provides to the council since it offshore IT jobs to cut costs was signed the contract in 2013. The The British Library is enabling people to alarming. The cuts are part of a 10-year contract, worth £32m a download digital facsimiles of first edi- three-year plan announced in 2014, year, transferred IT and back-office tion Shakespeare plays to their devices when the bank said it would cut functions such as human resources using “digital wallpaper”. 9,000 jobs and close 150 branches. (HR) and payroll to Capita. ❯Catch up with the latest IT news online COMPUTERWEEKLY.COM 3-9 MAY 2016 2 NEWS IN BRIEF Home News Banks’ mainstream adoption OpenStack Foundation calls for of Blockchain 10 years away enterprise open source input Apple CEO looks to Making digital delivery Financial services firms should treat The OpenStack Foundation is call- of public services services as device standard practice blockchain as a lab project and pre- ing on enterprises to step up their pare for another decade before the involvement with the open source revenues fall DevOps advocates technology hits the mainstream, community to ensure its work Apple chief executive Tim Cook is look- bust myths around according to Forrester Research. It keeps pace with the rate of inno- ing to the company’s services division enterprise agile software development predicted a three-phase evolution vation occurring in the internet of as revenue from device sales fell for the of blockchain deployments. things and big data era. first time in 13 years. Despite warnings Interview: HS2 CIO from Apple in January 2016, shares fell James Findlay juggles IPv6 alone will not secure IoT Business fail to learn the 8% in after-hours trading in reaction to today’s planning and the technology of tomorrow Internet Protocol version 6 (IPv6) lessons of past cyber attacks quarterly revenue of $50.6bn, alone will not make internet of Organisations are failing to learn down 13% compared with the Editor’s comment things (IoT) communications the lessons of past cyber attacks, three months ending secure, warned Hanns Proenen, the latest Verizon Data Breach 26 March the year Buyer’s guide to chief information security officer Investigations Report reveals. before. Apple had graph databases (CISO) at GE Europe. Although IPv6 The analysis shows they are not forecast a decline is essential to IoT he said IPv6 is addressing basic issues and well- of between 9% CW@50: British innovation in the fight not more secure than IPv4. known attack methods. and 14%. against cyber threats Volvo tests self-driving cars Spike in outsourcing in 2016 Downtime Volvo will trial autonomous driv- Restructured deals fuelled a sharp ing in 2017, with 100 self-driving increase in IT and business process ❯ Mobilised workforces drive performance and productivity Volvo vehicles taking to the streets outsourcing in Europe, the Middle ❯ UFO broadband network sees promising pilot results of London. Participants in the Drive East and Africa during the first ❯ Government accepts data ethics council proposal Me London programme will be real three months of 2016. ISG said the ❯ Apple Pay signs up a million users a week families using their cars in their value of deals was €2.25bn, 19% usual day-to-day situations. higher than Q1 2015. n ❯Catch up with the latest IT news online COMPUTERWEEKLY.COM 3-9 MAY 2016 3 INTERVIEW Home News Accelerating government’s digital Making digital delivery of public services standard practice transformation with passion and drive DevOps advocates bust myths around The government’s minister for digital reform, Matt Hancock, talks to Lis Evenstad about creating a Digital enterprise agile software development Leadership Academy, learning valuable lessons in how to run digital services and his love for open data Interview: HS2 CIO James Findlay juggles ith a larger budget than ever before, the Government today’s planning and the technology of tomorrow Digital Service (GDS) is on a mission to transform Wgovernment services and departments from analogue Editor’s comment to digital, something Cabinet Office minister Matt Hancock is “incredibly excited about”. Buyer’s guide to Speaking to Computer Weekly at GDS’s annual event, Sprint 16, graph databases Hancock says he wants to break down the silos and change the way government operates, not just focusing on “a few transac- CW@50: British innovation in the fight tions, but using digital, technology and data to improve all of the against cyber threats services we provide”. “We’re on a journey,” he says, from a government that was behind Downtime the times to one increasingly using digital services. He hopes that by the end of this parliament, we will have a government where “digital delivery of public services is standard practice”. Matt Hancock: “There “The job of GDS is to provide thought leadership, but also to chal- are big lessons for how to run lenge and support all parts of government, so that people know digital services from the about the best technology, the best standards and techniques, and past 20 years” also so the questions are asked of where we can do better.” COMPUTERWEEKLY.COM 3-9 MAY 2016 4 INTERVIEW Home News GDS’s £450m budget over the course of this parliament will Hancock says the government is “constantly learning lessons in have to deliver efficiency savings ahead of its funding. how to do these things better”. Making digital delivery Computer Weekly revealed last year that savings of £3.5bn “There are big lessons for how to run digital services from the of public services standard practice are expected in return, with the money mainly being spent on past 20 years,” he says. “One lesson is don’t let huge, long con- common technology services (CTS), where it hopes for savings tracts and then forget about them; instead, let more smaller con- DevOps advocates of £1.1bn; government-as-a-platform (GaaP), delivering £1.3bn tracts and manage them actively. Another lesson is don’t put bust myths around in savings; and the Gov.uk Verify identity scheme, saving GDS an unnatural deadline on a project; rather keep iterating it and enterprise agile software development another £1.1bn. improving it. Another is to design something in an agile way from While the funding is welcome, Hancock understands that the the start so you can alter it when it interacts with reality in the Interview: HS2 CIO task ahead is not an easy job. With GDS aiming to turn up the delivery. Always focus on the user need.” James Findlay juggles pace and the volume of digital services, there are many hurdles Hancock calls these his four key principles, and adds that there today’s planning and the technology of tomorrow that need jumping. is no easy answer. “We try to keep a state of mind of constantly learning and improving,” he says. Editor’s comment CLOSING THE SKILLS GAP One of the biggest challenges, highlighted by a National Audit DIGITAL LEADERSHIP Buyer’s guide to Office report late last year, is that there is abig digital skills gap In fact, Hancock is working hard to tackle the skills gap. Last graph databases in government. year, he launched lunchtime coding clubs for civil servants to The NAO survey found that funding, cultural issues, career develop opportunities for “civil servants to roll up their sleeves CW@50: British innovation in the fight paths and cross-government competition “are all perceived to and get stuck into data”.
Recommended publications
  • A the Hacker
    A The Hacker Madame Curie once said “En science, nous devons nous int´eresser aux choses, non aux personnes [In science, we should be interested in things, not in people].” Things, however, have since changed, and today we have to be interested not just in the facts of computer security and crime, but in the people who perpetrate these acts. Hence this discussion of hackers. Over the centuries, the term “hacker” has referred to various activities. We are familiar with usages such as “a carpenter hacking wood with an ax” and “a butcher hacking meat with a cleaver,” but it seems that the modern, computer-related form of this term originated in the many pranks and practi- cal jokes perpetrated by students at MIT in the 1960s. As an example of the many meanings assigned to this term, see [Schneier 04] which, among much other information, explains why Galileo was a hacker but Aristotle wasn’t. A hack is a person lacking talent or ability, as in a “hack writer.” Hack as a verb is used in contexts such as “hack the media,” “hack your brain,” and “hack your reputation.” Recently, it has also come to mean either a kludge, or the opposite of a kludge, as in a clever or elegant solution to a difficult problem. A hack also means a simple but often inelegant solution or technique. The following tentative definitions are quoted from the jargon file ([jargon 04], edited by Eric S. Raymond): 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    [Show full text]
  • The Botnet Chronicles a Journey to Infamy
    The Botnet Chronicles A Journey to Infamy Trend Micro, Incorporated Rik Ferguson Senior Security Advisor A Trend Micro White Paper I November 2010 The Botnet Chronicles A Journey to Infamy CONTENTS A Prelude to Evolution ....................................................................................................................4 The Botnet Saga Begins .................................................................................................................5 The Birth of Organized Crime .........................................................................................................7 The Security War Rages On ........................................................................................................... 8 Lost in the White Noise................................................................................................................. 10 Where Do We Go from Here? .......................................................................................................... 11 References ...................................................................................................................................... 12 2 WHITE PAPER I THE BOTNET CHRONICLES: A JOURNEY TO INFAMY The Botnet Chronicles A Journey to Infamy The botnet time line below shows a rundown of the botnets discussed in this white paper. Clicking each botnet’s name in blue will bring you to the page where it is described in more detail. To go back to the time line below from each page, click the ~ at the end of the section. 3 WHITE
    [Show full text]
  • Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone
    Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone Thomas Dübendorfer, Arno Wagner, Theus Hossmann, Bernhard Plattner ETH Zurich, Switzerland [email protected] DIMVA 2005, Wien, Austria Agenda 1) Introduction 2) Flow-Level Backbone Traffic 3) Network Worm Blaster.A 4) E-Mail Worm Sobig.F 5) Conclusions and Outlook © T. Dübendorfer (2005), TIK/CSG, ETH Zurich -2- 1) Introduction Authors Prof. Dr. Bernhard Plattner Professor, ETH Zurich (since 1988) Head of the Communication Systems Group at the Computer Engineering and Networks Laboratory TIK Prorector of education at ETH Zurich (since 2005) Thomas Dübendorfer Dipl. Informatik-Ing., ETH Zurich, Switzerland (2001) ISC2 CISSP (Certified Information System Security Professional) (2003) PhD student at TIK, ETH Zurich (since 2001) Network security research in the context of the DDoSVax project at ETH Further authors: Arno Wagner, Theus Hossmann © T. Dübendorfer (2005), TIK/CSG, ETH Zurich -3- 1) Introduction Worm Analysis Why analyse Internet worms? • basis for research and development of: • worm detection methods • effective countermeasures • understand network impact of worms Wasn‘t this already done by anti-virus software vendors? • Anti-virus software works with host-centric signatures Research method used 1. Execute worm code in an Internet-like testbed and observe infections 2. Measure packet-level traffic and determine network-centric worm signatures on flow-level 3. Extensive analysis of flow-level traffic of the actual worm outbreaks captured in a Swiss backbone © T. Dübendorfer (2005), TIK/CSG, ETH Zurich -4- 1) Introduction Related Work Internet backbone worm analyses: • Many theoretical worm spreading models and simulations exist (e.g.
    [Show full text]
  • MODELING the PROPAGATION of WORMS in NETWORKS: a SURVEY 943 in Section 2, Which Set the Stage for Later Sections
    942 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 2, SECOND QUARTER 2014 Modeling the Propagation of Worms in Networks: ASurvey Yini Wang, Sheng Wen, Yang Xiang, Senior Member, IEEE, and Wanlei Zhou, Senior Member, IEEE, Abstract—There are the two common means for propagating attacks account for 1/4 of the total threats in 2009 and nearly worms: scanning vulnerable computers in the network and 1/5 of the total threats in 2010. In order to prevent worms from spreading through topological neighbors. Modeling the propa- spreading into a large scale, researchers focus on modeling gation of worms can help us understand how worms spread and devise effective defense strategies. However, most previous their propagation and then, on the basis of it, investigate the researches either focus on their proposed work or pay attention optimized countermeasures. Similar to the research of some to exploring detection and defense system. Few of them gives a nature disasters, like earthquake and tsunami, the modeling comprehensive analysis in modeling the propagation of worms can help us understand and characterize the key properties of which is helpful for developing defense mechanism against their spreading. In this field, it is mandatory to guarantee the worms’ spreading. This paper presents a survey and comparison of worms’ propagation models according to two different spread- accuracy of the modeling before the derived countermeasures ing methods of worms. We first identify worms characteristics can be considered credible. In recent years, although a variety through their spreading behavior, and then classify various of models and algorithms have been proposed for modeling target discover techniques employed by them.
    [Show full text]
  • What You Should Know About Kaspersky
    What you should know Proven. Transparent. about Kaspersky Lab Independent. Fighting for your digital freedom Your data and privacy are under attack by cybercriminals and spy agencies, so you need a partner who is not afraid of standing beside you to protect what matters to you most. For over 20 years, Kaspersky Lab has been catching all kinds of cyberthreats. No matter whether they come from script kiddies, cybercriminals or governments, or from the north, south, east or west. We believe the online world should be free from attack and state-sponsored espionage, and will continue fighting for a truly free and safe digital world. Proven Transparent Independent Kaspersky Lab routinely scores the highest We are totally transparent and are making As a private company, we are independent marks in independent ratings and surveys. it even easier to understand what we do: from short term business considerations and institutional influence. • Measured alongside more than 100 other • Independent review of the company’s well-known vendors in the industry source code, software updates and We share our expertise, knowledge • 72 first places in 86 tests in 2017 threat detection rules and technical findings with the world’s • Top 3 ranking* in 91% of all product tests • Independent review of internal security community, IT security vendors, • In 2017, Kaspersky Lab received processes international organizations, and law Platinum Status for Gartner’s Peer • Three transparency centers by 2020 enforcement agencies. Insight** Customer Choice Award 2017, • Increased bug bounty rewards with up in the Endpoint Protection Platforms to $100K per discovered vulnerability Our research team is spread across the market world and includes some of the most renowned security experts in the world.
    [Show full text]
  • Security Chapter
    Barbarians at the Gateway (and just about everywhere else): A Brief Managerial Introduction to Information Security Issues1 a gallaugher.com case provided free to faculty & students for non-commercial use © Copyright 1997-2009, John M. Gallaugher, Ph.D. – for more info see: http://www.gallaugher.com/chapters.html Draft version last modified: Dec. 7 , 2009 – comments welcome [email protected] Note: this is an earlier version of the chapter. All chapters updated Dec. 2009 are now hosted (and still free) at http://www.flatworldknowledge.com. For details see the ‘Courseware’ section of http://gallaugher.com INTRODUCTION LEARNING OBJECTIVES: After studying this section you should be able to: 1. Recognize that information security breaches are on the rise. 2. Understand the potentially damaging impact of security breaches. 3. Recognize that information security must be made a top organizational priority. Sitting in the parking lot of a Minneapolis Marshalls, a hacker armed with a laptop and a telescope‐shaped antenna infiltrated the store’s network via an insecure Wi‐Fi base station. The attack launched what would become a billion‐dollar plus nightmare scenario for TJX, the parent of retail chains that include Marshalls, Home Goods, and T.J. Maxx. Over a period of several months, the hacker and his gang stole at least 45.7 million credit and debit card numbers, and pilfered driver’s license and other private information from an additional 450,000 customers2. TJX, at the time a $17.5 billion, Fortune 500 firm, was left reeling from the incident. The attack deeply damaged the firm’s reputation.
    [Show full text]
  • NAVIGATING the CYBERSECURITY STORM
    NAVIGATING the CYBERSECURITY STORM A Guide for Directors and Officers BY PAUL A. FERRILLO EDITED BY BILL BROWN published by sponsored by sponsored by 1 © 2015 by Paul A. Ferrillo. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any other information storage or retrieval system without prior written permission. To use the information contained in this book for a greater purpose or application, contact Paul A. Ferrillo via [email protected] 2 Is your company protected from the Internet of RiskSM? With CyberEdge® cyber insurance solutions you can enjoy the Business Opportunity of Things. 20 billion objects are connected to the Internet, what everyone is calling the Internet of Things. This hyperconnectivity opens the door both to the future of things, and to greater network vulnerabilities. CyberEdge end-to-end cyber risk management solutions are designed to protect your company from this new level of risk. So that you can turn the Internet of Things into the next big business opportunity. To learn more and download the free CyberEdge Mobile App, visit www.AIG.com/CyberEdge Insurance, products and services are written or provided by subsidiaries or affiliates of American International Group, Inc. Insurance and services may not be available in all jurisdictions, and coverage is subject to actual policy language. For additional information, please visit our website at www.AIG.com. ABOUT PAUL A. FERRILLO Paul Ferrillo is counsel in Weil’s Litigation Department, where he focuses on complex securities and business litigation, and internal investigations.
    [Show full text]
  • What You Should Know About Kaspersky 3 About Kaspersky
    What You Should Know Proven. Transparent. About Kaspersky Independent. Fighting for Your Digital Freedom Your data and privacy are under attack by cybercriminals and spy agencies, so you need a partner who is not afraid of standing beside you to protect what matters to you most. For over 20 years, Kaspersky has been catching all kinds of cyberthreats. No matter whether they come from script kiddies, cybercriminals or governments, or from the north, south, east or west. We believe the online world should be free from attack and state-sponsored espionage, and will continue fighting for a truly free and safe digital world. Proven Transparent We share our expertise, knowledge and technical findings with the world’s Kaspersky routinely scores the highest We are totally transparent and are making security community, IT security vendors, marks in independent ratings and surveys. it even easier to understand what we do: international organizations and law • Measured alongside more than 100 other • Independent review of the company’s enforcement agencies. well-known vendors in the industry source code, software updates and threat Our research team is spread across the • 73 first places in 88 tests in 2018 detection rules world and includes some of the most • Independent review of internal processes • Top 3 ranking* in 91% of all product tests renowned security experts in the world. • In 2017 and 2018, Kaspersky received • Three transparency centers by 2020 We detect and neutralize all forms of Platinum Status for Gartner’s Peer • Increased bug bounty rewards with up to advanced APTs, regardless of their origin Insight** Customer Choice Award 2017, in $100K per discovered vulnerability or purpose.
    [Show full text]
  • Download Slides
    Scott Wu Point in time cleaning vs. RTP MSRT vs. Microsoft Security Essentials Threat events & impacts More on MSRT / Security Essentials MSRT Microsoft Windows Malicious Software Removal Tool Deployed to Windows Update, etc. monthly since 2005 On-demand scan on prevalent malware Microsoft Security Essentials Full AV RTP Inception in Oct 2009 RTP is the solution One-off cleaner has its role Quiikck response Workaround Baseline ecosystem cleaning Industrypy response & collaboration Threat Events Worms (some are bots) have longer lifespans Rogues move on quicker MarMar 2010 2010 Apr Apr 2010 2010 May May 2010 2010 Jun Jun 2010 2010 Jul Jul 2010 2010 Aug Aug 2010 2010 1,237,15 FrethogFrethog 979,427 979,427 Frethog Frethog 880,246880,246 Frethog Frethog465,351 TaterfTaterf 5 1,237,155Taterf Taterf 797,935797,935 TaterfTaterf 451,561451,561 TaterfTaterf 497,582 497,582 Taterf Taterf 393,729393,729 Taterf Taterf447,849 FrethogFrethog 535,627535,627 AlureonAlureon 493,150 493,150 AlureonAlureon 436,566 436,566 RimecudRimecud 371,646 371,646 Alureon Alureon 308,673308,673 Alureon Alureon 441,722 RimecudRimecud 341,778341,778 FrethogFrethog 473,996473,996 BubnixBubnix 348,120 348,120 HamweqHamweq 289,603 289,603 Rimecud Rimecud289,629 289,629 Rimecud Rimecud318,041 AlureonAlureon 292,810 292,810 BubnixBubnix 471,243 471,243 RimecudRimecud 287,942287,942 ConfickerConficker 286,091286, 091 Hamwe Hamweqq 250,286250, 286 Conficker Conficker220,475220, 475 ConfickerConficker 237237,348, 348 RimecudRimecud 280280,440, 440 VobfusVobfus 251251,335, 335
    [Show full text]
  • Computer Viruses, in Order to Detect Them
    Behaviour-based Virus Analysis and Detection PhD Thesis Sulaiman Amro Al amro This thesis is submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy Software Technology Research Laboratory Faculty of Technology De Montfort University May 2013 DEDICATION To my beloved parents This thesis is dedicated to my Father who has been my supportive, motivated, inspired guide throughout my life, and who has spent every minute of his life teaching and guiding me and my brothers and sisters how to live and be successful. To my Mother for her support and endless love, daily prayers, and for her encouragement and everything she has sacrificed for us. To my Sisters and Brothers for their support, prayers and encouragements throughout my entire life. To my beloved Family, My Wife for her support and patience throughout my PhD, and my little boy Amro who has changed my life and relieves my tiredness and stress every single day. I | P a g e ABSTRACT Every day, the growing number of viruses causes major damage to computer systems, which many antivirus products have been developed to protect. Regrettably, existing antivirus products do not provide a full solution to the problems associated with viruses. One of the main reasons for this is that these products typically use signature-based detection, so that the rapid growth in the number of viruses means that many signatures have to be added to their signature databases each day. These signatures then have to be stored in the computer system, where they consume increasing memory space. Moreover, the large database will also affect the speed of searching for signatures, and, hence, affect the performance of the system.
    [Show full text]
  • Chapter 3: Viruses, Worms, and Blended Threats
    Chapter 3 Chapter 3: Viruses, Worms, and Blended Threats.........................................................................46 Evolution of Viruses and Countermeasures...................................................................................46 The Early Days of Viruses.................................................................................................47 Beyond Annoyance: The Proliferation of Destructive Viruses .........................................48 Wiping Out Hard Drives—CIH Virus ...................................................................48 Virus Programming for the Masses 1: Macro Viruses...........................................48 Virus Programming for the Masses 2: Virus Generators.......................................50 Evolving Threats, Evolving Countermeasures ..................................................................51 Detecting Viruses...................................................................................................51 Radical Evolution—Polymorphic and Metamorphic Viruses ...............................53 Detecting Complex Viruses ...................................................................................55 State of Virus Detection.........................................................................................55 Trends in Virus Evolution..................................................................................................56 Worms and Vulnerabilities ............................................................................................................57
    [Show full text]
  • An Analysis of the Nature of Groups Engaged in Cyber Crime
    International Journal of Cyber Criminology Vol 8 Issue 1 January - June 2014 Copyright © 2014 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 January – June 2014, Vol 8 (1): 1–20. This is an Open Access paper distributed under the terms of the Creative Commons Attribution-Non- Commercial-Share Alike License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime Roderic Broadhurst,1 Peter Grabosky,2 Mamoun Alazab3 & Steve Chon4 ANU Cybercrime Observatory, Australian National University, Australia Abstract This paper explores the nature of groups engaged in cyber crime. It briefly outlines the definition and scope of cyber crime, theoretical and empirical challenges in addressing what is known about cyber offenders, and the likely role of organized crime groups. The paper gives examples of known cases that illustrate individual and group behaviour, and motivations of typical offenders, including state actors. Different types of cyber crime and different forms of criminal organization are described drawing on the typology suggested by McGuire (2012). It is apparent that a wide variety of organizational structures are involved in cyber crime. Enterprise or profit-oriented activities, and especially cyber crime committed by state actors, appear to require leadership, structure, and specialisation. By contrast, protest activity tends to be less organized, with weak (if any) chain of command. Keywords: Cybercrime, Organized Crime, Crime Groups; Internet Crime; Cyber Offenders; Online Offenders, State Crime.
    [Show full text]