1 MB Under the Lens: the Asset and Wealth Management Sector

Total Page:16

File Type:pdf, Size:1020Kb

1 MB Under the Lens: the Asset and Wealth Management Sector Under the Lens The Asset and Wealth Management Sector Cyber Threat Operations Q2 2020 Contents Introduction 2 COVID-19 impact 3 Timeline of attacks 4 Incident themes 5 Case studies 9 Conclusion 12 Introduction The Asset and Wealth Management (AWM) sector plays a data, such as investment algorithms and models could vital role in managing the world’s financial capital, dealing in seriously undermine business operations for those in the significant transactions across many industries. It is sector. estimated that by 2025 the AWM sector will be worth approximately USD 145 trillion globally.1 With such large The COVID-19 pandemic has heavily reduced the amounts of wealth being handled by the sector, it garners operational capability of all sectors. In stark contrast, PwC much attention from threat actors of all motivations, has observed cyber activity rise, with threat actors particularly those seeking financial gain. leveraging this period of disruption for their own gain. As many organisations within the AWM sector have adapted to Over recent years, many financial institutions and regulators virtual working environments, there is a need to be more have noted the substantial surge in attacks on the financial vigilant than ever when it comes to cyber security sector as a whole - 2018 saw a 500% increase in data awareness. With so much capital at stake, in a sector that is breaches across the wider financial sector over the guided fundamentally by risk appetite, it is vital that preceding year according to the UK’s Financial Conduct organisations within the sector maintain and uphold a Authority (FCA).2 The significant funds managed by the robust, secure environment, as well as have the capability AWM sector are likely to attract threat actors seeking direct to detect and respond to attacks such that the business monetary gain, where high-value fraud attempts via impact, if any, is minimised. business email compromise (BEC) and ransomware attacks remain popular attack vectors. This report provides an overview of the most common cyber threats facing the AWM sector in order to generate The sector is becoming increasingly competitive, with rising awareness and illustrate the motivations behind such costs and new players in the market putting pressure on attacks, as well as support intelligence-led defence. individual organisations to survive. As one of the more mature sectors in terms of technological innovations, many Our analysis is informed by our own in-house intelligence state-of-the-art technologies developed by successful datasets maintained on cyber attacks and targeting from a organisations, including “Fintech”, large scale data variety of threat actors, intelligence gleaned from our modelling, and new technologies surrounding virtual incident response engagements around the world, as well currencies, are potentially of great interest to those in a as publicly-available reports on attacks in the sector. competitive scenario. Furthermore, the theft of specialised 1 PwC, ‘Asset & Wealth Management Revolution’, 2 ‘Cyber attacks on financial services sector rise fivefold in 2018’, Financial https://www.pwc.com/gx/en/industries/financial-services/asset- Times, https://www.ft.com/content/6a2d9d76-3692-11e9-bd3a- management/publications/asset-wealth-management-revolution.html 8b2a211d90d5 (24th February 2019) PwC | Under the Lens – The Asset and Wealth Management Sector | 2 COVID-19 impact The consequences of the COVID-19 situation have hit all following through on their threats, releasing the victim’s sectors to varying degrees, with the AWM sector being no confidential files onto ‘leak sites’. As of 20th May 2020, PwC exception. Alongside the economic downturn, organisations has observed over 150 organisations around the world face a juxtaposing increase in activity from threat actors of having had their data leaked in this manner by multiple all motivations. threat actors. Whether it be espionage actors operating on behalf of Whilst it is difficult to directly attribute this activity to the interested parties with economic interests at play in a time COVID-19 pandemic, the statistics support the hypothesis of turmoil, or organised crime groups looking for new that the increase in publicly known threat actor activity is a sources of income with consumer spending being down, direct result of the current economic downturn. Of the illicit cyber activity is on the rise. incidents observed by PwC, over 60% of these occurred after the World Health Organisation’s (WHO) declaration In particular, PwC analysts have seen a rise in human- that COVID-19 was a pandemic. Of these, over 80% of operated ransomware and data exfiltration attacks.3 These incidents occurred after the UK went into an official are attacks where the threat actor - usually motivated to lockdown on 24th March 2020. extort the victim of cash payments in the form of cryptocurrencies - will not only deploy ransomware on the With the AWM sector being a lucrative target before target, but will stage a lengthy reconnaissance process individual countries began instigating their national beforehand, extracting valuable and oftentimes confidential lockdown policies, the abrupt adoption of remote working information from the target. technologies alongside threat actors growing more emboldened, presents new cyber security challenges at this This information is used as leverage against the target once time. the ransomware is deployed, with threat actors now 3 PwC, ‘Why has there been an increase in cyber security incidents during COVID-19?’, https://www.pwc.co.uk/issues/crisis-and-resilience/covid-19/why-an- increase-in-cyber-incidents-during-covid-19.html PwC | Under the Lens – The Asset and Wealth Management Sector | 3 Timeline of attacks The AWM sector has seen consistent targeting over the past decade; in the timeline graphic below, we detail some of the ‘The Financial and Insurance more recent and pertinent attacks to the sector. sector has always had a target on its back due to the kinds of data it Within the AWM sector sit many confidential and high-profile collects from its customers.’ assets, all of which attract the attention of threat actors. The threat actors targeting the sector range in their motivations, Verizon DBIR Report, 2020 but also vary in sophistication - from individual, insider threat attacks that could be classed as “low resourced”, through to persistent, highly targeted state-sponsored threat actors which seek to obtain information from specific organisations. A detailed explanation on how we categorise threat actors by motivation is located in Appendix 1 of this report. PwC | Under the Lens – The Asset and Wealth Management Sector | 4 Incident themes Based on past incidents and sector trends, we assess that One of the most prominent attack methods used to target the AWM sector is primarily a target for attackers motivated investors is known as a Business Email Compromise (BEC). with criminal and espionage intent. Historically, the sector This involves a threat actor either imitating or hijacking a has been the target of espionage attacks due to the amount legitimate email account in order to defraud individuals or of non-public information that can be used by attackers to organisations through spear phishing. BEC is effective increase their own profits, often using this information to because it is often difficult to differentiate illegitimate emails manipulate the markets. In this way, the AWM sector is or fraudulent transactions from the legitimate ones: unique in that an attacker’s motivation can be somewhat interchangeable between crime and espionage. • In May 2020, a Norwegian wealth fund was targeted by a threat actor using an account in the However, with the threat of ransomware increasing across name of a Cambodian microfinance institution, all sectors, as well as the AWM sector being subject to successfully managing to extract USD 10 million in multiple Business Email Compromise (BEC) attacks over “funding” from the target;4 and, the more recent period, it is PwC’s assessment that crime • In December 2019, a social engineering intrusion poses the largest threat to AWM-based organisations. spanning over eight years was disclosed by a court in New York, whereby the attackers tricked day Criminal traders and their financial advisors into liquidating securities and wiring cash from brokerages to them With the AWM sector being responsible for significant through a BEC attack.5 capital, many organisations that sit under its umbrella make attractive targets for cyber criminals. Financial gain is a In addition to this, it is also possible for threat actors to primary motivation for criminal threat actors, however, there bypass direct interaction with the use of “credential phishing” are a multitude of means through which this can be achieved in order to obtain company credentials that could help them - whether that be financial crime, or the theft of data that can facilitate an illicit transaction. This technique has been be easily monetised. The ‘cyber’ element of such attacks observed within the AWM sector in the past, with allows them to be conducted with lower risk, higher reward organisations having their employees’ details used in order and variable modus operandi. to extract funds from their clients, under the guise of legitimate transactions.6 The shift to new technologies within the sector, such as the increased turn towards virtual currency, has created new These credentials can be obtained through multiple vectors, and innovative avenues for cyber criminals to exploit. The the most common of which are the use of spear phishing, overall rise in ransomware activity across 2020, with a credential reuse or brute forcing, as has also been observed particular spike observed during the COVID-19 pandemic, is in recent cyber intrusions within the AWM sector.7 a threat that must be considered for all sectors. Direct financial gain Exploiting the customer Many of the organisations that exist within the AWM sector As threat actors have evolved, they have also established include those that handle significant monetary transactions sophisticated methods for obtaining customer credentials, (e.g.
Recommended publications
  • Bibliography
    Bibliography [1] M Aamir Ali, B Arief, M Emms, A van Moorsel, “Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?” IEEE Security & Pri- vacy Magazine (2017) [2] M Abadi, RM Needham, “Prudent Engineering Practice for Cryptographic Protocols”, IEEE Transactions on Software Engineering v 22 no 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June 1 1994) [3] A Abbasi, HC Chen, “Visualizing Authorship for Identification”, in ISI 2006, LNCS 3975 pp 60–71 [4] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, PG Neumann, RL Rivest, JI Schiller, B Schneier, “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption”, in World Wide Web Journal v 2 no 3 (Summer 1997) pp 241–257 [5] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, M Green, PG Neumann, RL Rivest, JI Schiller, B Schneier, M Specter, D Weizmann, “Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications”, MIT CSAIL Tech Report 2015-026 (July 6, 2015); abridged version in Communications of the ACM v 58 no 10 (Oct 2015) [6] M Abrahms, “What Terrorists Really Want”,International Security v 32 no 4 (2008) pp 78–105 [7] M Abrahms, J Weiss, “Malicious Control System Cyber Security Attack Case Study – Maroochy Water Services, Australia”, ACSAC 2008 [8] A Abulafia, S Brown, S Abramovich-Bar, “A Fraudulent Case Involving Novel Ink Eradication Methods”, in Journal of Forensic Sciences v41(1996) pp 300-302 [9] DG Abraham, GM Dolan, GP Double, JV Stevens,
    [Show full text]
  • Magazine 2/2017
    B56133 The Science Magazine of the Max Planck Society 2.2017 Big Data IT SECURITY IMAGING COLLECTIVE BEHAVIOR AESTHETICS Cyber Attacks on Live View of the Why Animals The Power Free Elections Focus of Disease Swarm for Swarms of Art Dossier – The Future of Energy Find out how we can achieve CO2 neutrality and the end of dependence on fossil fuels by 2100, thus opening a new age of electricity. siemens.com/pof-future-of-energy 13057_Print-Anzeige_V01.indd 2 12.10.16 14:47 ON LOCATION Photo: Astrid Eckert/Munich Operation Darkness When, on a clear night, you gaze at twinkling stars, glimmering planets or the cloudy band of the Milky Way, you are actually seeing only half the story – or, to be more precise, a tiny fraction of it. With the telescopes available to us, using all of the possible ranges of the electromagnetic spectrum, we can observe only a mere one percent of the universe. The rest remains hidden, spread between dark energy and dark matter. The latter makes up over 20 percent of the cosmos. And it is this mysterious substance that is the focus of scien- tists involved in the CRESST Experiment. Behind this simple sounding name is a complex experiment, the “Cryogenic Rare Event Search with Superconducting Thermometers.” The site of the unusual campaign is the deep underground laboratory under the Gran Sasso mountain range in Italy’s Abruzzo region. Fully shielded by 1,400 meters of rock, the researchers here – from the Max Planck Institute for Physics, among others – have installed a special device whose job is to detect particles of dark matter.
    [Show full text]
  • Congressional Record United States Th of America PROCEEDINGS and DEBATES of the 116 CONGRESS, FIRST SESSION
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 116 CONGRESS, FIRST SESSION Vol. 165 WASHINGTON, THURSDAY, MARCH 14, 2019 No. 46 House of Representatives The House met at 9 a.m. and was Pursuant to clause 1, rule I, the Jour- Mr. HARDER of California. Mr. called to order by the Speaker pro tem- nal stands approved. Speaker, this week, the administration pore (Mr. CARBAJAL). Mr. HARDER of California. Mr. released its proposed budget, and I am f Speaker, pursuant to clause 1, rule I, I here to share what those budget cuts demand a vote on agreeing to the actually mean for the farmers in my DESIGNATION OF THE SPEAKER Speaker’s approval of the Journal. home, California’s Central Valley. PRO TEMPORE The SPEAKER pro tempore. The Imagine you are an almond farmer in The SPEAKER pro tempore laid be- question is on the Speaker’s approval the Central Valley. Maybe your farm fore the House the following commu- of the Journal. has been a part of the family for mul- nication from the Speaker: The question was taken; and the tiple generations. Over the past 5 WASHINGTON, DC, Speaker pro tempore announced that years, you have seen your net farm in- March 14, 2019. the ayes appeared to have it. come has dropped by half, the largest I hereby appoint the Honorable SALUD O. Mr. HARDER of California. Mr. drop since the Great Depression. CARBAJAL to act as Speaker pro tempore on Speaker, I object to the vote on the Then you wake up this week and hear this day.
    [Show full text]
  • 8-30-16 Transcript Bulletin
    FRONT PAGE A1 Buffaloes bowl over Cowboys in rival game See B1 TOOELETRANSCRIPT SERVING TOOELE COUNTY BULLETIN SINCE 1894 TUESDAY August 30, 2016 www.TooeleOnline.com Vol. 123 No. 26 $1.00 Local suicides declined in 2015 JESSICA HENRIE are working. STAFF WRITER “I’m anxious to see how this Numerous suicide pre- year’s numbers compare,” she Tooele County Resident Suicides 2009-2015 vention programs in Tooele said. “I don’t want to be too Source: Tooele County Health Department Vital Statistics Office 20 County may be seeing some quick to say what we’re doing 20 results. is working. And there are so The suicide rate in the many factors — some people county was down last year, might have a terminal illness 14 according to the Tooele County or are under the influence.” 15 13 Health Department’s annual Bate added, “Even one death report for 2015. is too many, so it’s going to be 10 Last year, 13 county resi- a problem we’ll focus on until 10 9 9 dents died from suicide. That’s people get the help they need. seven fewer deaths than in People can be suicidal … and 2014, said Amy Bate, public never be suicidal again if they 5 information officer for the get the help they need. They 5 department. can lead a really happy life.” FILE PHOTO However, Bate will wait Suicide by the numbers Tawnee Griffith and Daniell Ruppell release a lantern into the sky as part of until 2016’s numbers come Suicide statistics on the 0 the Tooele County Health Department’s “With Help Comes Hope” suicide in before saying for sure the 2009 2010 2011 2012 2013 2014 2015 prevention event on May 14.
    [Show full text]
  • Informe De Tendències De Ciberseguretat - La Nova Normalitat Cibernètica
    Informe de tendències de ciberseguretat - La nova normalitat cibernètica Informe de tendències de ciberseguretat 2n semestre de 2020 La nova normalitat cibernètica 1 Informe de tendències de ciberseguretat - La nova normalitat cibernètica El contingut d’aquesta guia és titularitat de l’Agència de Ciberseguretat de Catalunya i resta subjecta a la llicència de Creative Commons BY-NC-ND. L’autoria de l’obra es reconeixerà a través de la inclusió de la menció següent: Obra titularitat de l’Agència de Ciberseguretat de Catalunya. Llicenciada sota la llicència CC BY-NC-ND. Aquesta guia es publica sense cap garantia específica sobre el contingut. Aquesta llicència té les particularitats següents: Vostè és lliure de: Copiar, distribuir i comunicar públicament l’obra. Sota les condicions següents: Reconeixement: S’ha de reconèixer l’autoria de l’obra de la manera especificada per l’autor o el llicenciador (en tot cas, no de manera que suggereixi que gaudeix del suport o que dona suport a la seva obra). No comercial: No es pot emprar aquesta obra per a finalitats comercials o promocionals. Sense obres derivades: No es pot alterar, transformar o generar una obra derivada a partir d’aquesta obra. Avís: En reutilitzar o distribuir l’obra, cal que s’esmentin clarament els termes de la llicència d’aquesta obra. El text complet de la llicència es pot consultar a https://creativecommons.org/licenses/by-nc-nd/4.0/deed.ca L’informe inclou recursos gràfics, com imatges i icones, subministrades des de plataformes de continguts gratuïts de lliure difusió. Menció específica a: https://www.iconfinder.com, https://pixabay.com.
    [Show full text]
  • POL211H1F: Intelligence, Disinformation, and Deception— Challenges of Global Governance in the Digital Age
    POL211H1F: Intelligence, Disinformation, and Deception— Challenges of Global Governance in The Digital Age University of Toronto, Department of Political Science Fall 2020 Online delivery (Quercus, Zoom) Instructors: ● Professor Jon R. Lindsay, [email protected] ○ Office hour: Thursday 2p, Zoom ● Professor Janice G. Stein, [email protected] ○ Office hour: Monday 4p, Zoom Teaching assistants: ● Head TA: Jasmine Chorley Foster, [email protected] ○ Office hour: Thursday 10-11am, Zoom ● Milan Ilnyckyj, [email protected] ● Steven Loleski, [email protected] ○ Office hour: Wednesday 6-7pm, Zoom Contents Description ................................................................................................................................. 2 Course Organization .................................................................................................................. 3 Assignments .............................................................................................................................. 4 Schedule .................................................................................................................................... 7 Introduction (Week 1 - Mon. 21 Sept.) .................................................................................... 7 1. Course organization ................................................................................................. 7 Part I: Intelligence ..................................................................................................................
    [Show full text]
  • Informationssicherung MELANI
    Nationales Zentrum für Cybersicherheit NCSC Nachrichtendienst des Bundes NDB Melde- und Analysestelle Informationssicherung MELANI https://www.melani.admin.ch/ INFORMATIONSSICHERUNG LAGE IN DER SCHWEIZ UND INTERNATIONAL Halbjahresbericht 2020/I (Januar – Juni) 29. OKTOBER 2020 MELDE- UND ANALYSESTELLE INFORMATIONSSICHERUNG MELANI https://www.melani.admin.ch/ 1 Übersicht / Inhalt 1 Übersicht / Inhalt .............................................................................................. 2 2 Editorial ............................................................................................................. 4 3 Schwerpunktthema: COVID-19 ........................................................................ 6 3.1 Gelegenheit für Social Engineering ................................................................... 6 3.1.1 Verbreitung von Schadsoftware .................................................................................... 7 3.1.2 Phishing ......................................................................................................................... 8 3.1.3 Abofallen ........................................................................................................................ 9 3.2 Angriffe auf Websites und –dienste ................................................................... 9 3.3 Angriffe gegen Spitäler ..................................................................................... 10 3.4 Cyber-Spionage ................................................................................................
    [Show full text]
  • Digital Warfare Or Organized Crime
    Breakfast Seminars in Information Security Digital warfare or organized crime (Professional Master in Information Security) Dr. Anders Carlsson, ([email protected]) Anders Carlsson 25y Royal Swedish Navy ÖrlKn (Lt Cmd) Submarines < 20year in BTH teacher & researcher Phd in Cyber Security from National University of Radio Electronics Kharkiv Ukraine last years www.engensec.eu to develop a Msc in Cyber Security EU + Ukraine + Russia agenda - The last year’s changed threat against the countries, companies and organizations. - PROMIS general information - Courses - How to apply Actors then threat opponent…… Coalition Coalition Nation Nation Organization Organization Group Group Individual Individual From Hacktivism organized crime that make BIG money using Hybrid War to overtake a country I managed to take over Georgia 2008, Crimea 2014 and manipulate US-election 2016, nobody stop me Threat Report, Survey, from shows a dramatically increase in ransomware attack against: • CrowdStrike • companies • municipal • ESET • governments and • agencies • KasperskyLab • healthcare providers • EMISOFT A town in Florida has paid $500,000 (£394,000) to hackers after a ransomware attack Lake City voted to pay hackers in $??? In Bitcoin after two weeks downed computer Coastal suburb Riviera Beach recently paid hackers $600,000 following a similar incident that locked municipal staff out of important files. The cyber-attack that sent an Alaskan community back in time US-Security reports shows that during 2019 966 government agencies, educational establishments and healthcare providers at a potential cost in excess of $7.5 billion. 113 state and municipal governments and agencies. 764 healthcare providers. 89 universities, colleges A town in Florida has paid $500,000 (£394,000) to hackers after a ransomware attack Lake City voted to pay hackers in $??? In Bitcoin after two weeks downed computer Coastal suburb Riviera Beach recently paid hackers $600,000 following a similar incident that locked municipal staff out of important files.
    [Show full text]
  • Cyber Blitz 10 Juni 2020 Af
    RABU 10 JUNE 2020 Cyber Blitz ~ AFTERNOON Post PUSAT OPERASI KEAMANAN SIBER NASIONAL - BADAN SIBER DAN SANDI NEGARA CRITICAL URGENT IMPORTANT Informasi yang berkaitan Informasi yang perlu Informasi yang perlu dengan hal yang harus 0 untuk dipertimbangkan 3 menjadi perhatian / 3 segera ditindaklanjuti untuk ditindaklanjuti informasi aktual GENERAL INFORMATION HACK NEWS Facebook melabeli 'media yang dikontrol negara' Dark-Hack-For-Hire Group Menargetkan Ribuan Rusia, Cina, dan Iran Kelompok peretasan, yang disebut Dark Basin, telah keluar setelah menargetkan ribuan individu dan organisasi di seluruh dunia - Ini merupakan salah satu dari banyak upaya menjelang pemilihan termasuk kelompok advokasi dan jurnalis, pejabat pemerintah senior presiden AS tahun 2020, karena untuk menanggulangi serangan asing y dan terpilih selama tujuh tahun. Dark Basin melakukan spionase ang terlihat di tahun 2016. Beberapa hari setelah pengumuman Oktober, komersial atas nama klien mereka, terhadap lawan pelanggan yang Facebook mengatakan bahwa mereka telah menarik jaringan berita hoax terlibat dalam acara publik yang terkenal, kasus kriminal, transaksi yang terhubung ke Rusia dan Iran. https://nakedsecurity.sophos.com/2020/06/09/facebook-labels-state- keuangan, berita dan advokasi, menurut para peneliti di Citizen Lab. controlled-russian-chinese-iranian-media/ https://threatpost.com/dark-basin-hack-hire-group/156407/ Important Urgent Grup Spionase Menyerang Utilitas AS Perusahaan Hack-for-Hire Terhubung dengan Serangan APT yang dikenal sebagai TA410 telah menambahkan trojan akses Kelompok Dark Basin di belakang ribuan serangan phishing dan malware jarak jauh modular (RAT) ke gudang spionase, yang digunakan untuk kemungkinan merupakan perusahaan “ethical hacking" yang berbasis di melawan target Windows di sektor utilitas Amerika Serikat. Menurut India yang bekerja atas nama klien komersial.
    [Show full text]
  • Rowing Field Right Now and There Is No Sign of Stopping Anytime Soon
    WEEKEND CHRONICLE A MESSAGE FROM CHIEF EDUCATION OFFICER’S DESK Dear Readers, “Develop a passion for learning. If you do, you will never cease to grow.” We live today in a world that is so very different from the one we grew up in, the one we were educated in. The world today is moving at such an enhanced rate and we as educationalists need to cause and reflect on the entire system of education. On-line learning provides new age technology to widen the educational scope. It prepares students to succeed in an increasing technology driven global economy. Technology makes life much easier, most of all it saves time and energy. It is one of the fastest growing field right now and there is no sign of stopping anytime soon. It is indeed a great moment for all of us to bring forth this weekly E-Periodical “Weekend Chronicle”. We are sure this E-Periodical will help to acquire knowledge and skills, build build character and enhance employability of our young talented students to become globally competent. There is something for everyone here, right from the fields of Business, Academics, Travel and Tourism, Science and technology, Media and lot more. The variety and creativity of the articles in E-Periodical will surely add on to the knowledge of the readers. I am sure that the positive attitude, hard work, continued efforts and innovative ideas exhibited by our students will surely stir the mind of the readers and take them to the fantastic world of joy and pleasure. Dr. Mala Kharkar Chief Education Officer (Patkar-Varde College) WEEKEND CHRONICLE A MESSAGE FROM THE PRINCIPAL’S DESK Dear Readers, As we know, “An Investment in knowledge pays the best interest.” Hence in this regard the E-Periodical Weekend Chronicle is playing a vital role in providing a platform to enhance the creative minds of our students of BMS Department.
    [Show full text]
  • The Fourth Industrial Revolution and the Recolonisation of Africa; The
    The Fourth Industrial Revolution and the Recolonisation of Africa This book argues that the fourth industrial revolution, the process of accelerated automation of traditional manufacturing and industrial practices via digital technology, will serve to further marginalise Africa within the international community. In this book, the author argues that the looting of Africa that started with human capital and then natural resources, now continues unabated via data and digital resources looting. Developing on the notion of “Coloniality of Data”, the fourth industrial revolution is postulated as the final phase which will con- clude Africa’s peregrination towards (re)colonisation. Global cartels, networks of coloniality, and tech multinational corporations have turned big data into capital, which is largely unregulated or poorly regulated in Africa as the con- tinent lacks the strong institutions necessary to regulate the mining of data. Written from a decolonial perspective, this book employs three analytical pillars of coloniality of power, knowledge, and being. Highlighting the crippling continuation of asymmetrical global power relations, this book will be an important read for researchers of African studies, politics, and international political economy. Everisto Benyera is Associate Professor of African Politics at the University of South Africa. Routledge Contemporary Africa Series The Literature and Arts of the Niger Delta Edited by Tanure Ojaide and Enajite Eseoghene Ojaruega Identification and Citizenship in Africa Biometrics, the
    [Show full text]
  • Elife-58511-V1.Pdf (4.597Mb)
    RESEARCH ARTICLE Transmission of West Nile and five other temperate mosquito-borne viruses peaks at temperatures between 23˚C and 26˚C Marta S Shocket1,2*, Anna B Verwillow1, Mailo G Numazu1, Hani Slamani3, Jeremy M Cohen4,5, Fadoua El Moustaid6, Jason Rohr4,7, Leah R Johnson3,6, Erin A Mordecai1 1Department of Biology, Stanford University, Stanford, United States; 2Department of Ecology and Evolutionary Biology, University of California Los Angeles, Los Angeles, United States; 3Department of Statistics, Virginia Polytechnic Institute and State University (Virginia Tech), Blacksburg, United States; 4Department of Integrative Biology, University of South Florida, Tampa, United States; 5Department of Forest and Wildlife Ecology, University of Wisconsin, Madison, United States; 6Department of Biological Sciences, Virginia Polytechnic Institute and State University (Virginia Tech), Blacksburg, United States; 7Department of Biological Sciences, Eck Institute of Global Health, Environmental Change Initiative, University of Notre Dame, South Bend, United States Abstract The temperature-dependence of many important mosquito-borne diseases has never been quantified. These relationships are critical for understanding current distributions and predicting future shifts from climate change. We used trait-based models to characterize temperature-dependent transmission of 10 vector–pathogen pairs of mosquitoes (Culex pipiens, Cx. quinquefascsiatus, Cx. tarsalis, and others) and viruses (West Nile, Eastern and Western Equine Encephalitis, St. Louis Encephalitis, Sindbis, and Rift Valley Fever viruses), most with substantial transmission in temperate regions. Transmission is optimized at intermediate temperatures (23–26˚ *For correspondence: C) and often has wider thermal breadths (due to cooler lower thermal limits) compared to [email protected] pathogens with predominately tropical distributions (in previous studies).
    [Show full text]