{"id":8406,"date":"2019-05-24T08:45:28","date_gmt":"2019-05-24T08:45:28","guid":{"rendered":"http:\/\/www.firstlinepractitioners.com\/the-cascade-effect-in-big-data-cybercrime\/"},"modified":"2025-01-08T08:21:40","modified_gmt":"2025-01-08T08:21:40","slug":"the-cascade-effect-in-big-data-cybercrime","status":"publish","type":"post","link":"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/","title":{"rendered":"The Cascade Effect in Big Data Cybercrime"},"content":{"rendered":"<p>The big data phenomenon is driving \u2018upstream\u2019 data related cyber-dependent crimes such as data breaches. These crimes are essential components in a cybercrime chain that cascades \u2018downstream\u2019 to give rise to further crimes such as fraud and extortion, when the data is subsequently monetized in a way that impacts massively upon victims. These upstream and downstream crimes are often committed by entirely different offending actors against different victim groups, which complicates and frustrates the reporting, recording, investigative and prosecution processes. Taken together the crime stream\u2019s \u2018cascade\u2019 effect creates unprecedented societal challenges that need addressing in the face of the booming data economy stimulated by advances in Artificial Intelligence and the Internet of Things. We explore this phenomenon by unpacking the TalkTalk case study to help conceptualize how big data and cloud computing are creating cascading effects of disorganized, distributed and escalating data crime. The case study also reveals important information about the levels of interdependency within the modern cybercrime ecosystem and, where relevant, the division of labour within the offender group.<\/p>\n<p>In October 2015, news outlets extensively covered a data breach from TalkTalk, a UK internet service provider. The scale of the breach was serious enough to launch a Parliamentary inquiry into cybersecurity and the protection of personal data online. Hackers used an open source SQL Map penetration testing tool \u201cthat automates the process of detecting and exploiting SQL injection flaws and taking over of database servers\u201d to probe webpages. Vulnerabilities were found in three legacy webpages owned by TalkTalk and posted on TalkTalk\u2019s website. Exploiting this vulnerability, another hacker took some data and his colleague asked TalkTalk for a ransom for its return or deletion. Multiple hacker collectives independently and erroneously claimed responsibility for the hack; the BBC even claimed that one was a \u201cRussian Islamist group\u201d. At the same time a third party promised to post the stolen data on the now defunct deep web black market AlphaBay. Although there might have been up to 10 attackers in total, the police arrested six individuals and all but one were convicted &#8211; another individual also convicted at the time was alleged to be involved in the sale of the data. The case study shows how complicated and distributed a data breach is, illustrating a clear disconnect between the very high media profile of the case, the police investigation and the subsequent prosecutions.<\/p>\n<p>Our analysis of the TalkTalk case study suggests that tipping points occur at each stage of the cascade model, for example, the disclosure of a <em>vulnerability<\/em>, its <em>exploitation<\/em>, followed by its <em>monetization<\/em> (selling data). Then other offender groups <em>buy data<\/em>, either to use for further offending or to refine for future crime, while <em>third party offenders<\/em> use the pretext of the original attack to deceive victims. The case study not only illustrates how cybercrime cascades from upstream to downstream, but it also enables us to make a number of observations. The first is that it shows the complex nature of online crime groups and their diverse and distributed (even disorganized) nature when compared with contemporary organised crime. Not only had the offenders not met in the flesh (only two knew each other in person), but they also appear to have been in competition with one another when it came to monetizing the data. The second is the relative youth of the offenders compared to the seriousness of their offending. Their profiles showed them not to be the burly street criminals that the criminal justice is designed for, strengthening the argument for sentencing alternatives. Our third observation is that the motivations of those caught \u2013 who appear to be driven more by the prospect of increasing their status within the reputational hierarchy of their group rather than by financial gain &#8211; may have made themselves more easily identifiable to law enforcement and to become \u2018low hanging fruit\u2019. Our fourth observation is that the case study sends some blunt messages to (business) organisations to keep their computers and their data secure during a time when new attack vectors are often exceeding existing protection measures. Our fifth and final observation relates to how hard it is to find out information about cybercrime events in order to research cybercrime offending. There is no single reliable data source of information, there is no single database for arrests, prosecutions and outcomes, although it becomes evident that there are historical, legal, bureaucratic and professional reasons why this is the case. In one way it suggests that there is \u2018myth of data\u2019 and that research methodologies will have to adapt.<\/p>\n<p>Authors:<\/p>\n<p>Maria Grazia Porcedda and David S. Wall, Cybercrime Group, Centre for Criminal Justice Studies, University of Leeds<\/p>\n<p><em>Excerpt from<\/em> Porcedda, M.G. and Wall, D.S. (2019) \u2018Cascade and Chain Effects in Big Data Cybercrime: Lessons from the TalkTalk hack\u2019, <em>proceedings of WACCO 2019: 1st Workshop on Attackers and Cyber-Crime Operations<\/em>, IEEE Euro S&amp;P 2019, Stockholm, Sweden (N.B. references excluded). Funded by EPSRC EP\/M020576\/1 &amp; EP\/P011772\/1<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The big data phenomenon is driving \u2018upstream\u2019 data related cyber-dependent crimes such as data breaches. These crimes are essential components in a cybercrime chain that cascades \u2018downstream\u2019 to give rise to further crimes such as fraud and extortion, when the data is subsequently monetized in a way that impacts massively upon victims. <\/p>\n","protected":false},"author":9,"featured_media":7147,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[198,153],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Cascade Effect in Big Data Cybercrime - FIRST-LINE PRACTITIONERS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Cascade Effect in Big Data Cybercrime - FIRST-LINE PRACTITIONERS\" \/>\n<meta property=\"og:description\" content=\"The big data phenomenon is driving \u2018upstream\u2019 data related cyber-dependent crimes such as data breaches. These crimes are essential components in a cybercrime chain that cascades \u2018downstream\u2019 to give rise to further crimes such as fraud and extortion, when the data is subsequently monetized in a way that impacts massively upon victims.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"FIRST-LINE PRACTITIONERS\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-24T08:45:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-08T08:21:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.firstlinepractitioners.com\/wp-content\/uploads\/2018\/02\/takedown18-e1523531912564.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Florian\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Florian\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/\",\"url\":\"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/\",\"name\":\"The Cascade Effect in Big Data Cybercrime - FIRST-LINE PRACTITIONERS\",\"isPartOf\":{\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#website\"},\"datePublished\":\"2019-05-24T08:45:28+00:00\",\"dateModified\":\"2025-01-08T08:21:40+00:00\",\"author\":{\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/b34843a12defd8503efa62cbb39edbd3\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firstlinepractitioners.com\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Cascade Effect in Big Data Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#website\",\"url\":\"https:\/\/www.firstlinepractitioners.com\/el\/\",\"name\":\"FIRST-LINE PRACTITIONERS\",\"description\":\"Curricula - Knowledge - Navigation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firstlinepractitioners.com\/el\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/b34843a12defd8503efa62cbb39edbd3\",\"name\":\"Florian\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5193b32cfd0b1df3bedd57dc497af30e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5193b32cfd0b1df3bedd57dc497af30e?s=96&d=mm&r=g\",\"caption\":\"Florian\"},\"url\":\"https:\/\/www.firstlinepractitioners.com\/it\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Cascade Effect in Big Data Cybercrime - FIRST-LINE PRACTITIONERS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/","og_locale":"it_IT","og_type":"article","og_title":"The Cascade Effect in Big Data Cybercrime - FIRST-LINE PRACTITIONERS","og_description":"The big data phenomenon is driving \u2018upstream\u2019 data related cyber-dependent crimes such as data breaches. These crimes are essential components in a cybercrime chain that cascades \u2018downstream\u2019 to give rise to further crimes such as fraud and extortion, when the data is subsequently monetized in a way that impacts massively upon victims.","og_url":"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/","og_site_name":"FIRST-LINE PRACTITIONERS","article_published_time":"2019-05-24T08:45:28+00:00","article_modified_time":"2025-01-08T08:21:40+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/www.firstlinepractitioners.com\/wp-content\/uploads\/2018\/02\/takedown18-e1523531912564.jpg","type":"image\/jpeg"}],"author":"Florian","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Florian","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/","url":"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/","name":"The Cascade Effect in Big Data Cybercrime - FIRST-LINE PRACTITIONERS","isPartOf":{"@id":"https:\/\/www.firstlinepractitioners.com\/el\/#website"},"datePublished":"2019-05-24T08:45:28+00:00","dateModified":"2025-01-08T08:21:40+00:00","author":{"@id":"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/b34843a12defd8503efa62cbb39edbd3"},"breadcrumb":{"@id":"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstlinepractitioners.com\/it\/the-cascade-effect-in-big-data-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firstlinepractitioners.com\/it\/"},{"@type":"ListItem","position":2,"name":"The Cascade Effect in Big Data Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/www.firstlinepractitioners.com\/el\/#website","url":"https:\/\/www.firstlinepractitioners.com\/el\/","name":"FIRST-LINE PRACTITIONERS","description":"Curricula - Knowledge - Navigation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstlinepractitioners.com\/el\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/b34843a12defd8503efa62cbb39edbd3","name":"Florian","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5193b32cfd0b1df3bedd57dc497af30e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5193b32cfd0b1df3bedd57dc497af30e?s=96&d=mm&r=g","caption":"Florian"},"url":"https:\/\/www.firstlinepractitioners.com\/it\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/posts\/8406"}],"collection":[{"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/comments?post=8406"}],"version-history":[{"count":1,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/posts\/8406\/revisions"}],"predecessor-version":[{"id":8416,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/posts\/8406\/revisions\/8416"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/media\/7147"}],"wp:attachment":[{"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/media?parent=8406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/categories?post=8406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/tags?post=8406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}