Bridging Information Security and Environmental Criminology to Better Mitigate Cybercrime

Reading time: 19 minute
...

📝 Original Paper Info

- Title: Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime
- ArXiv ID: 1910.06380
- Date: 2022-07-18
- Authors: Colin C. Ife, Toby Davies, Steven J. Murdoch, and Gianluca Stringhini

📝 Abstract

Cybercrime is a complex phenomenon that spans both technical and human aspects. As such, two disjoint areas have been studying the problem from separate angles: the information security community and the environmental criminology one. Despite the large body of work produced by these communities in the past years, the two research efforts have largely remained disjoint, with researchers on one side not benefitting from the advancements proposed by the other. In this paper, we argue that it would be beneficial for the information security community to look at the theories and systematic frameworks developed in environmental criminology to develop better mitigations against cybercrime. To this end, we provide an overview of the research from environmental criminology and how it has been applied to cybercrime. We then survey some of the research proposed in the information security domain, drawing explicit parallels between the proposed mitigations and environmental criminology theories, and presenting some examples of new mitigations against cybercrime. Finally, we discuss the concept of cyberplaces and propose a framework in order to define them. We discuss this as a potential research direction, taking into account both fields of research, in the hope of broadening interdisciplinary efforts in cybercrime research.

💡 Summary & Analysis

This paper explores how research in information security and environmental criminology can be integrated to develop more effective countermeasures against cybercrime. The two fields have traditionally worked independently, leading to a lack of cross-pollination between advancements made by each community. By examining the theories and systematic frameworks developed within environmental criminology, the paper aims to bridge these gaps, providing an overview of how these theories can be applied in the context of cybercrime.

The study highlights that both information security experts and criminologists have been developing mitigation strategies for various aspects of cybercrime. However, by merging insights from both fields, new methodologies and frameworks can emerge to better understand and mitigate cyber threats. The paper presents a concept called “cyberplaces,” which defines the immediate environments where cybercrimes occur, thus offering a structured approach to analyze these crimes.

The significance lies in demonstrating that interdisciplinary collaboration between information security and environmental criminology can yield innovative solutions for preventing and managing cybercrime more effectively. This work encourages researchers to build upon this concept of “cyberplaces” to create systematic frameworks that guide practitioners in applying a wide range of preventive techniques.

📄 Full Paper Content (ArXiv Source)

We would like to thank all those who reviewed this work. Colin C. Ife is supported by the Dawes Centre for Future Crimes, and EPSRC under grant EP/M507970/1. Steven J. Murdoch is supported by The Royal Society under grant UF160505.

The Cybercrime Landscape and Information Security Mitigations

The field of environmental criminology has been, for the most part, primarily focused on crimes perpetrated in the physical world. On the other hand, the information security community has been studying the different facets of cybercrime for decades. Surprisingly, the parallel between the mitigations proposed by the information security communities and environmental criminology research was never made explicit. The purposes of this section are threefold: (i) to give a general overview of the cybercrime landscape and current mitigations; (ii) to draw parallels between the mitigations proposed by the information security community and the theoretical models of environmental criminology; and, finally, (iii) to present some examples of new, potential mitigations by applying environmental criminology (Tables [table:new_mitigations] and [table:new_malware_mitigations]), which are at the end of this section.

Anonymous Marketplaces

With the ongoing rise in malware distribution, widespread data breaches, and the unethical collection and use of personal data by various corporations and governments, there has been widespread attention and development towards privacy-enhancing technologies and regulations. One such technology that has become prominent is the Tor anonymous communication network. This encrypted network is resistant to common Internet tracking methods and enables users (who utilise it correctly) to effectively remain anonymous from all but the most technically capable adversaries. There are legitimate purposes for such a technology: users reading about sensitive topics, those with suppressed rights to freedom of expression, journalism, whistleblowing, or those who object to targeted advertising. Unfortunately, however, this anonymity has also been exploited to hide criminal activities, such as the trafficking of drugs, child sexual abuse images, violent pornography, and weapons. Even worse, underground forums and anonymous marketplaces (Silk Road) have arisen, enabling the convenient trade of such illicit products and services. Researchers have also observed the rise of ‘crimeware-as-a-service’ (CaaS) models  along with these “underground markets”. These criminal business models help to make cybercriminal operations (spam delivery, malware distribution, drug trafficking, money laundering) much more organised, automated, and accessible, especially for criminals with limited technical skills . Such business models have been made possible because cybercriminals can network with each other on these underground services and exploit various outsourcing opportunities.

Mitigations: The primary methods of intervention towards illegal anonymous markets are server takedowns and arresting its operators. These approaches were seen in law enforcement’s takedown of the infamous Silk Road marketplace in 2013, which, at the time, was nearly a monopoly. However, researchers have found that many more and diverse anonymous marketplaces have come to prominence since the takedown of Silk Road, with some (Silk Road 2.0) arising in less than a month. There is evidence of adaptation by these new marketplaces and their patrons, such as the increased use of encryption  and decentralised escrow services , and the diversification or specialisation in the types of products and services offered . These changes mirror the well-known criminological mechanisms of crime displacement (the net movement of crime elsewhere as a result of an intervention) and crime adaption (cybercriminals altering their operations in order to bypass an intervention), which are potential, undesirable side effects of some interventions.

Cryptocurrencies

Decentralised cryptocurrencies have gained significant traction over the past decade, with Bitcoin being the first and most widely used cryptocurrency. Bitcoin offers pseudonymity to its users, where accounts are not necessarily linked to real-world identities, but transaction details are publicly available in the distributed ledger. Other cryptocurrencies, such as Zcash, are designed for full anonymity . Such properties are attractive to cybercriminals , making cryptocurrencies popular for illegal activities, like purchasing illicit goods and services , and enabling ransomware extortion , digital theft , and cryptocurrency laundering . Kamps and Kleinberg  identified that cybercriminals take advantage of the unregulated nature of some cryptocurrencies to engage in “pump-and-dump” schemes. This scheme is a type of fraud that involves three stages: accumulating a specific cryptocurrency coin, increasing its perceived value through misinformation (pumping), then selling it off to unsuspecting buyers at a premium price (dumping).

Mitigations: Researchers such as Meiklejohn   and Harlev   have devised techniques that can, to some extent, de-anonymise the operators of Bitcoin transactions. Such techniques are especially useful for crime investigation and are similar to geographic profiling , which involves connecting locations in a series of crimes by an offender in order to locate their “anchor point” (their home). These are also practical implementations of the ‘reducing anonymity’ situational crime prevention (SCP) technique, which increases the risks for cybercriminals by exposing their identities. With regards to pump-and-dump schemes, Kamps and Kleinberg  devise an anomaly detection technique in order to identify these schemes within time-series data of the trading prices and volumes of different cryptocurrencies. However, with an ever-increasing number of cryptocurrencies coming to the fore, and some that enable greater anonymity, it is clear that new approaches are needed to detect and discourage these sorts of criminal activities.

Cyberbullying and Online Abuse

With the advent of computer and networked technologies, the rapid adoption of the Internet has enhanced the abilities of end-users to perform their daily interactions – communicating, purchasing and selling products, exchanging information, working, and engaging in leisurely activities – without the limiting restrictions of time and space. Likewise, there has also been an increase in criminal opportunity through such technologies, thus enabling and (potentially) multiplying crimes that traditionally relied on physical, human-to-human interaction.

Studies have followed the physical-digital transition of such interpersonal crimes and antisocial behaviour, like cyberbullying , cyberstalking and cyberharassment , online hate speech , and online child sexual exploitation and sexual harassment . These are only a few types of the crimes that have gained traction from such shifts in technology and society.

Mitigations: The default mechanisms for dealing with online abuse (in its many forms) typically involve reporting abusive or offensive content (and their authors) to the relevant service moderators (or utilising place managers from an SCP perspective). In extreme cases, such as the commission of violent threats, online sexual harassment, or child sexual abuse images, one may report such behaviours to the police. Although such actions can be useful, they are inherently reactive and often vulnerable to reporter biases (opinions of inappropriacy, cultural differences) or false reporting, and are probably less effective in preventing future occurrences . Researchers such as Ioannou  , advocate the need for a proactive and multidisciplinary approach to dealing with online abuse. Even automated filters, which ought to blacklist hate speech and offensive language, are limited, as in they rely on predefined dictionaries of words. Such dictionaries are also inherently reactive and are inflexible towards misspellings and evolving language . Consequently, researchers have developed some proactive techniques for mitigating these crimes.

Mariconti   develop a supervised machine learning approach to automatically determine whether a YouTube video is likely to be “raided”, to receive sudden bursts of hateful comments. Serra   propose a text classification algorithm using class-based prediction errors in order to more effectively detect evolving and misspelt hate speech. Chatzakou   develop a system that automatically detects bullying and aggressive behaviour on Twitter, using text, user, and network-based attributes. Founta   present a holistic approach to automated abuse detection by supplying deep learning architectures with text and metadata-based inputs. Yiallourou   devise a methodological approach that can be used to support the automated detection of images containing child-pornographic material. The successes of such surveillance strengthening techniques, which are indeed subsets of risk-increasing SCP techniques, are likely to increase the risk of getting caught for offenders and are just some of the multidisciplinary ways to deal with such problems. Of course, other forms of countermeasures exist. For example, the impersonation of minors by law enforcement has been shown to be effective in apprehending offenders, while automated chatbots are being developed to profile potential offenders . There is also the arrest and prosecution of the worst offenders . Educating minors and Internet users to avoid online abuse victimisation is also an important, long-term initiative .

Cyber Fraud

Fiancial crime and fraud have also made a paradigm shift into the cyber world. The phenomenon of advance-fee fraud, or “419” scams (cybercriminals reaching out to potential victims with grandiose promises of wealth in exchange for advanced payments from them) have been well-documented by researchers . Recent works have found such scams are more of a universal issue than once thought , rather than being one that only involves less economically developed countries. Cybercriminals have also been known to target other services for fraudulent activities, depending on their demographics of interest. For example, “419” scams are likely to be delivered en masse through spam e-mail communications, where gullible recipients would self-identify themselves by responding to these e-mails . Romance scammers are likely to operate on dating websites in order to manipulate emotionally vulnerable users . Consumer fraudsters are likely to target large online marketplaces to commit buyer or seller fraud . Various forms of identity fraud, facilitated through Internet-enabled theft of personally identifiably information (PII) (names, addresses, e-mail addresses) or account credentials for common services (e-mail, banking, social media) are also problems that the information security community closely monitor. Researchers have recognised that phishing e-mails and malware are common precursors to identity fraud , and they have monitored the illegal activities that subsequently ensue with such credentials .

Mitigations: The effective prosecution of scammers is necessary but often difficult due to the transnational nature of these operations and the relatively small amounts of money involved per fraud. Some engineering countermeasures are in use, such as the use of spam or phishing filters to prevent malicious messages reaching recipients, or blacklists that raise alerts or block known phishing websites. However, the maintenance of such measures is a continual arms race, as cybercriminals are always adapting these spam messages or compromising new websites to avoid these blockers. It is possible for services to automatically detect scammer profiles, such as by their reuse of profile descriptions or profile photos . On the other hand, perpetrators could also adapt to such countermeasures with ease. Arguably, the most effective countermeasures could be to reduce the profitability, or increase the required effort, for such crimes. An economic strategy, such as increasing the transaction fees or the necessary background checks for money transfer services, could be a set of mitigations that attack the profitability of such crimes. Awareness campaigns could also help to reduce the opportunity for victimisation, but perhaps more so if these campaigns are directed towards the most vulnerable, as identified by their personality types and victimisation statistics . With regards to environmental criminology, these are recognised as market disrupting and target removing SCP techniques, which involve reducing the rewards of crime by denying criminals the ability to steal, sell, or access a target.

Malware and Botnet Operations

One area of focus in the information security community is the study of malicious software – malware. The issue of malware came into prominence in the 1980s, but in recent times, it has become a massive underground economy. In short, financial motivations (above others) have become a cornerstone to the design and proliferation of modern malware. Researchers have identified that modern strains typically carry a myriad of functions, no doubt for the purposes of monetisation. Malware families, such as Zeus , for example, can steal banking and financial credentials on compromised machines, log keystrokes and extract documents, or to encrypt victim computers to be held for ransom. Even worse, some malware families are designed to retain control of compromised devices in order to assimilate them into larger networks of infected machines, or botnets. These botnets may be used (or rented as-a-service) to facilitate distributed denial-of-service (DDoS) attacks against a target, to send spam e-mails , or to mine cryptocurrencies.

Malware distribution has been refined to infect as many viable victims as possible. Initially, there was a heavy reliance on human activity and manipulation, such as the need for victims to open spam e-mail messages  or to be social engineered into activating a malicious file . Nowadays, cybercriminals have developed distribution mechanisms to completely cut out the need for human interaction, such as delivering malware directly through automated browser-based attacks (or drive-by download attacks) via compromised websites or malvertisements . To ease the lives of malware operators, the cybercrime ecosystem proceeded to come up with exploit kits – software packages that deliver a wide variety of exploits for different computer configurations . This innovation, ultimately, increases the probability of a victim’s system becoming compromised. In a further attempt to streamline malware delivery and lower the entry bar for cybercriminals, pay-per-install (PPI) schemes have also arisen in the cybercrime ecosystem . These services are specialised botnets of infected devices that enable the distribution and download of new malware onto these already compromised machines. PPIs are set up and managed by a service provider, whom customers pay in order to infect machines with their own proprietary malware.

The disruption of the malware distribution economy is an ongoing challenge. Cybercriminals increasingly implement new and numerous techniques in order to prevent their malware and botnets from being detected and disabled. Researchers have found that malware often obfuscates their outgoing communications, undergo polymorphism to “change their appearances”, remain “silent” whenever they detect a possible malware analysis environment, copy themselves to multiple locations on a compromised machine, or distribute themselves over multiple devices on a network . Botnet operators have also been found to employ various tactics to avoid detection and takedown attempts of their infrastructures, such as implementing fast-flux techniques (the rapid rotation of IP addresses) , or domain generation algorithm techniques (the constant changing of domain names) , to hide the locations of their command and control servers.

Mitigations: The challenges of malware and botnet infrastructures are as complex as their operations. First, there is the issue of preventing malware infection and spread. Signature-based antivirus programs have long been the major defence in detecting and removing malware, along with intrusion detection systems and content filters. However, they struggle with the extensive manner of forms that malware now appears (polymorphic, metamorphic, compressed, encrypted, ). Antivirus programs that use heuristic methods for malware removal are now much more common (detection is based on abnormal program behaviours). Notwithstanding, malware removal is still a reactive strategy, so proactive measures have also been developed. One such is the use of antimalware tools, which attempt to prevent malware attacks in the first instance through methods such as malware sandboxing, raising browser alerts on suspicious websites, and preventing the spread of malware if a device is infected. Another proactive approach is vulnerability assessment and management, which deals with providing regular system updates in order to remove known vulnerabilities. Such updates would reduce the success of drive-by download attacks, for example, thus minimising one’s attack surface for malicious actors to exploit. Both of these techniques are akin to target hardening that is applied in SCP and CPTE/UD frameworks, which aim to increase the difficulty of an attacker gaining access to their target. Although malware delivery is not completely dependent on human error, this role is still substantial. Educating users to keep their systems up-to-date and on how to avoid social engineering attacks are some non-technical approaches that are also applied, such as with Action Fraud and their #UrbanFraudMyths1.

Second, there is the issue of disrupting botnet operations. One important technique involves the infiltration of botnets by security researchers . Such techniques allow researchers to collect intelligence on cybercriminal operations, and identify weak points in their communication protocols for disruption, or locating their C&C servers for ISP takedowns. They may also be used to identify the owners of these botnets, such that law enforcement may arrest and prosecute them. However, with the estimates of Kaspersky Lab  indicating there could be hundreds of thousands of botnets in the wild, it is difficult to see the scalability of these techniques. Alternatively, service providers may provide some mitigations. For example, e-mail programs and social networking sites usually employ spam filters, which may consequently deter spam operations. However, these filters are often signature-based, so minor adjustments in the spam messages may cause them to go undetected. ISPs may use DNS sink-holing techniques and blacklists to prevent their customers from accessing sites known to be malicious. However, such techniques also come under the “arms race” issue of keeping up with the cybercriminals. Other economic measures are possible, such as pressuring ISP services to dissociate from “bulletproof ISPs”, which resist law enforcement and typically harbour these criminal activities, or pressuring financial institutions to dissociate from rogue banks, which liaise with cybercriminals, in order to effectively shut down their operations. Environmental criminology recognises these as market disrupting techniques (SCP), which aim to reduce the economic benefits of such operations until they are no longer viable.

Using the SCP framework, a proof-of-concept matrix of potential mitigations for disrupting malware operations is provided in Table [table:new_malware_mitigations].

A Synergistic Approach

Though there are already clear parallels between the theoretical models of environmental criminology and the mitigative techniques proposed by information security, security researchers are yet to fully explore the structured analytical and actionable processes that environmental criminology has to offer. Firstly, past and current mitigations devised by security researchers only seem to represent or consider a subset of the full range of techniques that could be utilised, while lacking a systematic approach to establish these. Secondly, little attention seems to be directed towards the consideration, monitoring, and evaluation of the actual effects of interventions by security researchers, both with regards to the victims/targets and the malicious actors, and how they respond. Ultimately, without considering the fulness of the crime prevention process, mitigations are more likely to fail (to different degrees) in the goal of controlling crime in both the short- and long-term, as cybercriminals may quickly identify alternative targets, crime types, or modus operandi.

Conclusion

In this paper, we conducted a literature review of cybercrime research from the perspectives of information security and environmental criminology. We presented an overview of how these two fields understand and (could) deal with cybercrime, identifying connections between their apparently disparate approaches. Upon review of a wide array of literature and cybercrime contexts, we provide motivating evidence as to why a new, complementary research approach should be pursued involving these two fields. We initiate this process in earnest, first, by showing how frameworks from environmental criminology could be used to devise new cybercrime countermeasures; second, by proposing a conceptualisation of the immediate environmental contexts (or cyberplaces) where cybercrimes occur; and third, by providing some motivating examples of how the concept of cyberplaces, together with environmental criminology, could be used to better analyse and mitigate cybercrime. We hope that this work will encourage the wider research community to build upon this cyberplace concept and its implementation in the transfer of crime prevention theories and frameworks between environmental criminology and information security. Above all, we hope that such collaborations will yield new and better approaches to cybercrime prevention and provide systematic frameworks that inform practitioners on the full range of techniques available.

Cybercrime is a complex phenomenon that spans both technical and human aspects. As such, two disjoint areas have been studying the problem from separate angles: the information security community and the environmental criminology one. Despite the large body of work produced by these communities in the past years, the two research efforts have largely remained disjoint, with researchers on one side not benefitting from the advancements proposed by the other. In this paper, we argue that it would be beneficial for the information security community to look at the theories and systematic frameworks developed in environmental criminology to develop better mitigations against cybercrime. To this end, we provide an overview of the research from environmental criminology and how it has been applied to cybercrime. We then survey some of the research proposed in the information security domain, drawing explicit parallels between the proposed mitigations and environmental criminology theories, and presenting some examples of new mitigations against cybercrime. Finally, we discuss the concept of cyberplaces and propose a framework in order to define them. We discuss this as a potential research direction, taking into account both fields of research, in the hope of broadening interdisciplinary efforts in cybercrime research.


📊 논문 시각자료 (Figures)

Figure 1



Figure 2



Figure 3



Figure 4



Figure 5



Figure 6



Figure 7



Figure 8



Figure 9



Figure 10



Figure 11



Figure 12



Figure 13



Figure 14



Figure 15



Figure 16



Figure 17



Figure 18



Figure 19



A Note of Gratitude

The copyright of this content belongs to the respective researchers. We deeply appreciate their hard work and contribution to the advancement of human civilization.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut