Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s...

15
Advanced Sciences and Technologies for Security Applications Babak Akhgar Ben Brewster Editors Combatting Cybercrime and Cyberterrorism Challenges, Trends and Priorities

Transcript of Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s...

Page 1: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

Advanced Sciences and Technologies for Security Applications

Babak AkhgarBen Brewster Editors

Combatting Cybercrime and CyberterrorismChallenges, Trends and Priorities

Page 2: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

Advanced Sciences and Technologiesfor Security Applications

Series editor

Anthony J. Masys, Centre for Security Science, Ottawa, ON, Canada

Advisory Board

Gisela Bichler, California State University, San Bernardino, CA, USAThirimachos Bourlai, Statler College of Engineering and Mineral Resources,Morgantown, WV, USAChris Johnson, University of Glasgow, UKPanagiotis Karampelas, Hellenic Air Force Academy, Attica, GreeceChristian Leuprecht, Royal Military College of Canada, Kingston, ON, CanadaEdward C. Morse, University of California, Berkeley, CA, USADavid Skillicorn, Queen’s University, Kingston, ON, CanadaYoshiki Yamagata, National Institute for Environmental Studies, Tsukuba, Japan

Page 3: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

The series Advanced Sciences and Technologies for Security Applications focuseson research monographs in the areas of

– Recognition and identification (including optical imaging, biometrics, authen-tication, verification, and smart surveillance systems)

– Biological and chemical threat detection (including biosensors, aerosols,mate-rials detection and forensics),

and– Secure information systems (including encryption, and optical and photonic

systems).

The series is intended to give an overview at the highest research level at thefrontier of research in the physical sciences.

The editors encourage prospective authors to correspond with them in advance ofsubmitting a manuscript. Submission of manuscripts should be made to the Editor-in-Chief or one of the Editors.

More information about this series at http://www.springer.com/series/5540

Page 4: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

Babak Akhgar • Ben BrewsterEditors

Combatting Cybercrimeand CyberterrorismChallenges, Trends and Priorities

123

Page 5: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

EditorsBabak AkhgarCENTRIC (Centre of Excellence inTerrorism, Resilience, Intelligenceand Organised Crime Research)

Sheffield Hallam UniversitySheffieldUK

Ben BrewsterCENTRIC (Centre of Excellence inTerrorism, Resilience, Intelligenceand Organised Crime Research)

Sheffield Hallam UniversitySheffieldUK

ISSN 1613-5113 ISSN 2363-9466 (electronic)Advanced Sciences and Technologies for Security ApplicationsISBN 978-3-319-38929-5 ISBN 978-3-319-38930-1 (eBook)DOI 10.1007/978-3-319-38930-1

Library of Congress Control Number: 2016941287

© Springer International Publishing Switzerland 2016This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or partof the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmissionor information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilarmethodology now known or hereafter developed.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exempt fromthe relevant protective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in thisbook are believed to be true and accurate at the date of publication. Neither the publisher nor theauthors or the editors give a warranty, express or implied, with respect to the material contained herein orfor any errors or omissions that may have been made.

Printed on acid-free paper

This Springer imprint is published by Springer NatureThe registered company is Springer International Publishing AG Switzerland

Page 6: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

Preface

It is with great privilege that we welcome you to the volume CombattingCybercrime and Cyberterrorism: Challenges, Trends and Priorities. In this col-lection we provide an authoritative and accessible guide highlighting a broad rangeof challenges and complexities faced by modern society in relation to cybercrimeand cyberterrorism.

At this point, we would like to take the opportunity to recognize the work of thecontributors for allowing us to draw upon their expertise in order to shape thecontent of this book, a process that has enabled us to highlight many of the pressingcyber-related needs and requirements of society within its chapters. This interdis-ciplinary approach has helped us to bring together a wide range of organizationsfrom large and small-to-medium enterprise, law enforcement and academia topresent the reader with an analysis of current and relevant issues pertinent tocybercrime and cyberterrorism.

The growth in significance of cyberspace across society has opened up vectorsfor, and extended the scope of, many existing forms of criminality. As well asacting as an enabler for the globalization of business, cyberspace has created a trulyglobal landscape for crime as individuals from across the globe are now able toutilize this environment to attack critical national infrastructure, governments andprivate business by stealing, compromising the integrity of, and destroying data. Ithas created new market places for the sale and exchange of illegal weapons anddrugs, other illicit materials and even the trafficking and exploitation of humanbeings and provides a platform for the creation and exchange of materials associ-ated with the solicitation and sexual exploitation of children.

However, cyberspace is not only a tool for business and criminal enterprise;citizens increasingly depend on it as a social mechanism, publicly exposing largeamounts of information about themselves and those they interact with. For thesereasons, it has become vitally important that we address and overcome these newchallenges as a society, restoring the confidence we have in the networks andinfrastructure that form the backbone of not just European, but global society.Ensuring the future of our economic welfare, privacy and collective security is a

v

Page 7: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

primary concern not limited to the idea of cybercrime. These threats extend beyondextending the reach and scope of traditional criminal motivations through to theemerging threats of cyberterrorism and cyberwarfare. In this context, the verynature of terrorism is evolving because of cyberspace, providing a mechanism forthe propagation of ideology and extremist rhetoric, the recruitment, coercion andtraining of individuals, and a platform to plan and execute attacks against gov-ernments, business and critical infrastructure. It is particularly attractive to criminalsand terrorists alike due to the potential for anonymity, making the job of investi-gators and prosecutors to prevent and respond to these activities increasinglydifficult.

In response to the growing role cyberspace has across society, both in its abilityfacilitate new opportunities as well as opening up new threats, this volume covers awide spectrum of challenges, from analyzing the legal and ethical issues associatedwith conducting research, to details regarding specific challenge areas such aspublic/private cooperation, attack attribution and standardization. These subjectareas are enriched with contextual information and findings from the researchprojects contributing to it, providing the theoretical and practical frame for futureresearch, practice and policy aimed at enhancing societal resilience to cyber-threatsand contributing towards the overriding objective of supporting initiatives at bothnational and EU levels. Authored and edited by a multi-disciplinary team ofpractitioners, researchers and experts from academia, law enforcement and privateindustry, this new volume provides a welcome introduction to contemporarychallenges we face in respect of cybercrime and cyberterrorism, providing a wel-come point of reference to aid researchers, practitioners and policy makers in thedevelopment of their respective cyber security strategies.

Babak AkhgarBen Brewster

vi Preface

Page 8: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

Acknowledgement

The editors would like to take this opportunity to thank the multidisciplinary teamof contributors who dedicated their time, knowledge and experiences in preparingthe chapters contained in this edited volume. In particular, we would like torecognise the dedication of Dr. Raluca-Elena Lefticaru, Constantinos Orphanides,Alison Lyle and the wider team at CENTRIC (Centre of Excellence in Terrorism,Resilience, Intelligence and Organised Crime Research, Sheffield HallamUniversity) without whom this edited volume would not have been possible.

We also extend our thanks to the consortium partners of the COURAGE (cy-bercrime and Terrorism European Research Agenda), CAMINO (ComprehensiveApproach to Cyber Roadmap Coordination and Development) and CyberROAD(Development of the Cybercrime and Cyberterrorism Research Roadmap) FP7Projects for their support of this book:

COURAGE

• Engineering ingegneria informatica• CENTRIC (Centre of Excellence in Terrorism, Resilience, Intelligence and

Organised Crime Research), Sheffield Hallam University• European Organisation for Security• UNICRI (United Nations Interregional Crime and Justice Research Institute)• Cybercrime Research Institute• TNO, Netherlands Organisation for applied Scientific Research• FOI, Swedish Defence Research Agency• Office of the Police and Crime Commissioner for West Yorkshire• Aconite Internet Solutions• EstEnter Polska• Conceptivity SARL• Institut Jožef Stefan• Selex Sistemi Integrati

vii

Page 9: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

• Tilburg University• fraunhofer Gesellschaft• International Cyber Investigation Training Academy

CAMINO

• ITTI Sp. Z. o. o.• CBRNE Ltd• Consiglio Nazionale delle Ricerche• DFRC AG• Epsion Ltd• Everis Aeroespacial y Defensa S.L.• Universite Montpellier I• Wyższa Szkoła Policji w Szczytnie• S21sec Information Security Labs S.L.• Sec-Control Finland Ltd

CyberROAD

• University of Cagliari, PRA Lab• Technical University of Darmstadt• INDRA• Poste Italiane• SecurityMatters• Vitrociset• FORTH, Foundation for Research and Technology• INOV – Insec Inovação• Demokritos National Center for Scientific Research• SBA Research Austria• Proprs Ltd.• NASK, Research and Academic Computer Network• Polícia Judiciária Portugal• CEFRIEL Center of Excellence for Research, Innovation, Education and

industrial Labs Partnerships• SUPSI University of Applied Sciences and Arts• CyberDefcon• Royal Holloway, University of London• Greek Ministry of National Defence• McAfee UK• MELANI, Reporting and Analysis Unit for Information Assurance

viii Acknowledgement

Page 10: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

These projects received funding from the European Union’s Seventh FrameworkProgramme for research, technological development and demonstration (FP7-SEC-2013) under grant agreement no’s 607406 (CAMINO), 607642(CyberROAD) and 607949 (COURAGE).

Acknowledgement ix

Page 11: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

Contents

Part I: Approaching Cybercrime and Cyberterrorism Research

Megatrends and Grand Challenges of Cybercrimeand Cyberterrorism Policy and Research . . . . . . . . . . . . . . . . . . . . . . . 3Bert-Jaap Koops

Towards a Systematic View on Cybersecurity Ecology . . . . . . . . . . . . . 17Wojciech Mazurczyk, Szymon Drobniak and Sean Moore

Challenges Priorities and Policies: Mapping the ResearchRequirements of Cybercrime and Cyberterrorism Stakeholders . . . . . . 39Douglas Wells, Ben Brewster and Babak Akhgar

A (Cyber)ROAD to the Future: A Methodology for BuildingCybersecurity Research Roadmaps . . . . . . . . . . . . . . . . . . . . . . . . . . . 53Davide Ariu, Luca Didaci, Giorgio Fumera, Giorgio Giacinto, Fabio Roli,Enrico Frumento and Federica Freschi

Part II: Legal, Ethical and Privacy Considerations

Data Protection Law Compliance for Cybercrime and CyberterrorismResearch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81Arnold Roosendaal, Mari Kert, Alison Lyle and Ulrich Gasper

Non-discrimination and Protection of Fundamental Rightsin Cybercrime and Cyberterrorism Research . . . . . . . . . . . . . . . . . . . . 97Francesca Bosco, Elise Vermeersch, Vittoria Luda, Giuseppe Vaciago,Ulrich Gasper and Alison Lyle

Risks Related to Illegal Content in Cybercrimeand Cyberterrorism Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117Alison Lyle, Benn Kemp, Albena Spasova and Ulrich Gasper

xi

Page 12: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

Part III: Technologies, Scenarios and Best Practices

Cybercrime Economic Costs: No Measure No Solution . . . . . . . . . . . . . 135Jart Armin, Bryn Thompson and Piotr Kijewski

Towards the Development of a Research Agenda for Cybercrimeand Cyberterrorism – Identifying the Technical Challengesand Missing Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Borka Jerman-Blažič and Tomaž Klobučar

The Never-Ending Game of Cyberattack Attribution: Exploringthe Threats, Defenses and Research Gaps . . . . . . . . . . . . . . . . . . . . . . 175Piotr Kijewski, Przemyslaw Jaroszewski, Janusz A. Urbanowiczand Jart Armin

Emerging Cyber Security: Bio-inspired Techniques and MITMDetection in IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193Michał Choraś, Rafał Kozik and Iwona Maciejewska

Cyber Situational Awareness Testing . . . . . . . . . . . . . . . . . . . . . . . . . . 209Joel Brynielsson, Ulrik Franke and Stefan Varga

Part IV: Policy Development and Roadmaps for Cybercrimeand Cyberterrorism Research

How the Evolution of Workforces Influences Cybercrime Strategies:The Example of Healthcare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237Enrico Frumento and Federica Freschi

European Public-Private Partnerships on Cybersecurity -An Instrument to Support the Fight Against Cybercrimeand Cyberterrorism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259Nina Olesen

Are We Doing All the Right Things to Counter Cybercrime? . . . . . . . . 279Michal Choraś, Rafal Kozik, Andrew Churchill and Artsiom Yautsiukhin

Consolidated Taxonomy and Research Roadmap for Cybercrimeand Cyberterrorism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295Babak Akhgar, Michał Choraś, Ben Brewster, Francesca Bosco,Elise Vermeersch, Vittoria Luda, Damian Puchalski and Douglas Wells

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323

xii Contents

Page 13: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

Part I:Approaching Cybercrime and

Cyberterrorism Research

Page 14: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

Megatrends and Grand Challengesof Cybercrime and Cyberterrorism

Policy and Research

Bert-Jaap Koops(B)

TILT Tilburg Institute for Law, Technology, and Society,Tilburg University, Tilburg, The Netherlands

[email protected]

Abstract. What are grand challenges of cybercrime and cyberterrorismpolicy and research for the coming one or two decades? To answer thisquestion, we first need to grasp some major trends that influence thefuture of cybercrime and cyberterrorism, and the combatting thereof,in fundamental ways. This chapter therefore starts with sketching sevenmegatrends in technology and society: Internet as the infrastructure ofeverything, autonomic technologies, datafication, the onlife world, thetransformation of crime, the fourth generation of cybercrime as attackson the Internet of Things and People, and the gradual erosion of pri-vacy. Against this background, seven grand challenges for keeping soci-eties secure and inclusive against the threats of CC/CT are presented:underground marketplaces, hiding technologies, ubiquitous data, smartregulation, smart organisation, designing technology, and preserving thehuman rights framework in a volatile context.

1 Introduction

Cybercrime and cyberterrorism (CC/CT) pose significant challenges to societychallenges that are unlikely to decrease in the coming decades. Although muchis being done, in policy and practice, to address these challenges, adequate mea-sures remain difficult to conceive and implement, as the field is dynamic, com-plex, and global. Research is needed to help determine which measures are morelikely to be adequate, i.e., both effective and legitimate, not only in the shortterm but also in the longer run. Policy-makers can, in turn, assist researchers bypointing out which research topics are most urgent and valuable for policy andpractice. Thus, policy and research can both benefit from a research agenda thatincludes those issues that are most pressing to be addressed in public policy tocombat CC and CT and that would most profit from high-level research.

Developing policies and research programmes to address the challenges ofCC and CT requires insight into the major issues that need to be investigatedand addressed. To fulfill this need, the chapters in this book offer an overview

c© Springer International Publishing Switzerland 2016B. Akhgar and B. Brewster (eds.), Combatting Cybercrime and Cyberterrorism,Advanced Sciences and Technologies for Security Applications,DOI 10.1007/978-3-319-38930-1 1

Page 15: Babak Akhgar Ben Brewster Editors Combatting Cybercrime ... · David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental

4 B.-J. Koops

of significant, topical, and concrete issues and challenges that policy-makers andresearchers can or should address. An overview of key issues and topical chal-lenges is not enough, however. In order to be able to prioritise policy measuresand research topics, and, perhaps more importantly, to be able to see the largerpicture and develop policy and research programmes that are capable of address-ing CC/CT challenges also in the longer run. A broader, high-level overview isneeded, that shows how the many topics relate to each other and fit the broaderlandscape of CC/CT policy and research. In that light, this chapter aims tosketch the broader picture that puts the various topics discussed in this book ina wider and longer-term perspective. It is based on experience in CC researchand many discussions with researchers, practitioners, and policy-makers over thepast two decades, and it is therefore essayistic in character.

What, then, are the grand challenges of CC and CT policy and research forthe coming one or two decades? To grasp what the grand challenges are, we canbuild on known and current challenges in the combating of CC and CT, which arelikely to persist in the near future. But we also need some-thing more: a vision ofthe main trends that are affecting the landscape at large, and which bring alongnew, or shifted, challenges for policy and research. Major trends that have thepotential to change society in fundamental ways are called megatrends, and it isan important exercise to have a timely vision on what today’s megatrends are,in order to prepare for the future [13]. Therefore, before listing what is perceivedas grand challenges of keeping societies secure and inclusive against the threatsof CC/CT, megatrends are mapped that influence the future of CC and CT, andthe combating thereof, in fundamental ways.

2 Megatrends

Identified are seven megatrends that have the potential to change the ways inwhich CC and CT can occur and can be combated. These are perhaps notradically moving away from the current situation, since megatrends take placeover a longer period and we are already seeing the first effects of these trends, butthey strengthen certain current developments and may require novel responsesto the way CC/CT is currently approached in policy, practice and research.

The megatrends can roughly be clustered in two groups. First, we have mega-trends taking place at the different layers of the Internet: its infrastructure, itsapplications, and its content. Second, as a consequence of the trends in the firstcluster, we have megatrends associated with changes in society at large, withchanges in how crime and terrorism occur in society, and with changes in CC,CT, and how these are combated in particular.

2.1 Megatrend 1: Internet as the Infrastructure of Everything

The Internet is rapidly becoming, or perhaps has in some countries alreadybecome, the backbone of everything in society. Not only do communications,media, and entertainment classic functions of the Internet in its earlier days rely