Episódios

  • Notes:

    Dr Chang's background in law and sociology led him to specialize in criminology, particularly cybercrime, after observing its emerging relevance.He chose to pursue his PhD in Australia due to scholarship opportunities and the chance to work with a leading cybercrime researcher.Dr Chang discusses virtual kidnapping, a scam where victims are manipulated into isolating themselves, enabling scammers to demand ransom from their families.He highlights the challenges of combating cybercrime, including jurisdictional issues and the need for international police collaboration.Dr Chang emphasizes the importance of public awareness and education to prevent scams, as well as better victim support systems.The interview also touches on the role of financial institutions in preventing scams and the potential future threats posed by technologies like AI and ChatGPT in cybercrime.

    About our guests:

    Dr Lennon Chang

    https://www.deakin.edu.au/about-deakin/people/lennon-chang

    Papers or resources mentioned in this episode:

    Chang, L. Y.-C., Zhong, L.-Y., & Grabosky, P. (2020). Virtual Kidnapping: Online Scams with ‘Asian Characteristics’ During the Pandemic. In Crime and Justice in Digital Society (pp. 112-113). ResearchGate. Note: APA format typically requires publisher information, which is not provided in this excerpt.

    Other:

    The intro an outro was drafted using generative AI. I think it gave a different flavour.

  • Notes:

    The software developed by Bryce Westlake, Russell Brewer and colleagues aims to assist law enforcement agencies in identifying perpetrators of child sexual abuse material (CSAM) offences by using multiple biometric markers.The unique function of the software is its capability to synthesize, triage, and systematically review all evidence holdings that law enforcement might seize, thereby automating the process and speeding up investigations.The software can ingest a variety of media files, extract multiple biometric features from those files, and identify subjects contained within, matching them across data sets, reducing investigator exposure to CSAM and speeding up the investigative process.One of the key aspects addressed by the software is the ability to identify new content, overcoming the limitations of current reactive methods used in combating CSAM (i.e. matching file hashes).The software is leverages social networking analysis and other techniques to assist investigators to identify links between offenders, victims, places and objects, potentially opening new avenues or focusing detective work.The project aims to connect law enforcement agencies nationally and globally, enabling them to share information and collaborate on cases, despite the challenges posed by different laws and data transmission regulations.The software's ability to systematically catalog and review all available data provides a more comprehensive and unbiased investigative process as choices about which media is reviewed, reducing the impact of investigator intuition and fragmented intelligence.The software has received funding for research and development, leading to the creation of a functional prototype for law enforcement in Australia and they are now looking at having it implemented by police more widely. The development of AI technology has a positive impact on the technology, as new matching tools are "plug and play".One of the challenges faced in implementing the software is convincing law enforcement to adopt new technologies and methods, as they may be hesitant to change from established routines, despite the potential benefits of the new system.

    About our guests:

    Russell Brewer

    https://researchers.adelaide.edu.au/profile/russell.brewer#professional-activities

    Bryce Westlake

    https://www.brycewestlake.com

    https://www.sjsu.edu/justicestudies/about-us/directory/westlake-bryce.php

    Papers or resources mentioned in this episode:

    Brewer R et al. 2023. Advancing child sexual abuse investigations using biometrics and social network analysis. Trends & issues in crime and criminal justice no. 668. Canberra: Australian Institute of Criminology. https://doi.org/10.52922/ti78948

    Westlake B et al. 2022. Developing automated methods to detect and match face and voice biometrics in child sexual abuse videos. Trends & issues in crime and criminal justice no. 648. Canberra: Australian Institute of Criminology. https://doi.org/10.52922/ti78566

    DEVELOPING AUTOMATED SOFTWARE TOOLS: To Detect Child Sexual Abuse Material Online.

    https://adelaidecybercrime.org/software

    Other:

    This interview

  • Estão a faltar episódios?

    Clique aqui para atualizar o feed.

  • About our guests:

    Russell Brewer

    https://researchers.adelaide.edu.au/profile/russell.brewer

    Lennon Chang

    https://www.deakin.edu.au/about-deakin/people/lennon-chang

    Benoit Dupont

    https://www.benoitdupont.net/en/

    Steven Kemp

    https://www.udg.edu/ca/directori/pagina-personal?ID=2003705

    Rutger Leukfedt

    https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1

    Katalin Parti,

    https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/katalin-parti.html

    Bryce Westlake.

    https://www.brycewestlake.com

    Papers or resources mentioned in this episode:

    Harari, Y. N. (2015). Sapiens. Harper.

    https://www.ynharari.com/book/sapiens-2/

    Other:

    I edited this one on the road, apologies if the quality is not quite what you are used to.

    The next episode will be at the start of next month.

  • Summary:

    The main points of this episode are:

    Celebrating the 100th episode of cybercrimeology and reflecting on the podcast's journey over the past three years.Discussing the use of new technologies, such as AI, for analyzing and understanding the podcast's content.Analyzing the podcast's content using natural language processing and summarization techniques to identify recurring themes and research topics.Identifying common themes in the podcast, including abuse in relationships, privacy invasion, law enforcement in cybercrime, social engineering, and age-related factors in cybercrime.Discussing various research methodologies covered in the podcast, such as technographs, online experiments, and survey research.Highlighting the dedication of guests who share their time and research without any financial incentives.Answering questions about the process of creating each episode, including research, interviews, editing, and production.Discussing the volume of work represented by 99 episodes totaling over 5 hours of content and involving 96 guests.Reflecting on the impact of the podcast and its growth over the past three years, including achieving 100,000 downloads.Looking forward to the future of the podcast and the potential for new technologies to enhance its content and reach.

    About our guests:

    Alloy:

    https://platform.openai.com/docs/guides/text-to-speech

    voicing generations from

    ChatGPT

    https://openai.com/blog/chatgpt

    Papers or resources mentioned in this episode:

    The BART model:

    https://huggingface.co/docs/transformers/model_doc/bart

    The DistilBERT model:

    https://huggingface.co/docs/transformers/model_doc/distilbert

    Results:

    Which terms were spoken about the most and what was the sentiment around those ?

    NounOccurrencesFilesOccurredInSentimentScoreSumpeople25299492.60830581188202time11338379.5210649research13968079.49750900268553way10057473.79837167263031things12387372.45885318517685lot11177170.87118428945543data9034644.24124717712402kind6674443.9891608crime8854342.725725710392005cyber8054139.68457114696503cybercrime4813836.90566980838775thing3933635.59294366836548security5273130.89444762468338information4672928.87013864517212

    Was there a change in the sentiment of the podcast after the end of pandemic conditions, assuming that the pandemic ended at the end of Q3 2021?

    The model is given by:

    yi∼Normal(μi,σ)yi​∼Normal(μi​,σ)

    where

    μi=β0+βafter_event⋅xiμi​=β0​+βafter_event​⋅xi​

    Here, the parameters are defined as follows:

    β0β0​: Intercept, with a Student's t-distribution prior with 3 degrees of freedom, a location parameter of 0.8, and a scale parameter of 2.5.βafter_eventβafter_event​: Coefficient for the predictor variable (after_event), with a flat prior.σσ: Standard deviation of the response variable, with a Student's t-distribution prior with 3 degrees of freedom, a location parameter of 0, and a scale parameter of 2.5.

    This provided the results as follows:

    Population-Level Effects:

    Estimate Est.Error l-95% CI u-95% CI Rhat Bulk_ESS Tail_ESS

    Intercept 0.37 0.06 0.26 0.48 1.00 3884 2917

    after_event 0.39 0.08 0.23 0.54 1.00 3561 2976

    Family Specific Parameters:

    Estimate Est.Error l-95% CI u-95% CI Rhat Bulk_ESS Tail_ESS

    sigma 0.38 0.03 0.33 0.44 1.00 3608 2817

    Other:

    The model overlooked Mike Levi's contribution to the History series. That is a bit unfair.

    Where there were multiple guests, I did not include them all in the database, hence "no specific guest listed"

  • Notes:

    - Rutger Leukfeldt discusses his background and how he became involved in cybersecurity research. - The importance of cybersecurity education and the new cybersecurity bachelor program at Leiden University.

    - The need for a multidisciplinary approach to cybersecurity, which includes not only technical skills but also social and legal aspects.

    - Hack_Right is a program designed for juvenile offenders in the Netherlands who have committed cyber-dependent crimes. The program aims to provide education and support to help young offenders turn away from cybercrime and develop positive skills and behaviors. Dr Leukfeldt emphasizes that the program is not about Russian hackers or fraudsters who make millions, but rather about those kids who are experimenting and need help. He also mentions that the program was evaluated through a research study conducted by the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), which found that the program was effective in reducing recidivism among young offenders who participated in the program.

    - Regarding interdisciplinary research, Dr Leukfeldt explains that it can be difficult because different disciplines have different traditions and expectations when it comes to research. For example, one discipline may prioritize publishing in academic journals, while another may prioritize presenting at conferences. This can create practical issues for a team that is trying to work together, as different members may have different timelines and goals. Additionally, traditional reviewers may not be familiar with other fields, which can make it challenging to defend interdisciplinary research against criticism. Rutger notes that these challenges can be overcome through effective communication and collaboration, but they do require effort and a willingness to work across disciplines.

    - Rutger emphasizes the importance of being constructive and thoughtful in providing feedback. He suggests that reviewers should not only point out flaws in a paper but also offer suggestions for improvement. Additionally, he notes that good reviewers should try to approach a paper with an open mind and be willing to learn from it, even if they are not experts in the field. By doing so, reviewers can help to ensure that research is rigorous, relevant, and impactful. Rutger encourages everyone to strive to be that kind of reviewer who provides constructive feedback and helps to improve the quality of research.

    About our Guest:

    https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1

    https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/

    https://www.linkedin.com/in/rutgerleukfeldt

    Papers or resources mentioned in this episode:

    J. A. M. Schiks, Susanne van ’t Hoff-de Goede & Rutger E. Leukfeldt (2023) An alternative intervention for juvenile hackers? A qualitative evaluation of the Hack_Right intervention, Journal of Crime and Justice, DOI: 10.1080/0735648X.2023.2252394

    Loggen, J., Moneva, A., & Leukfeldt, R. (2024). A systematic narrative review of pathways into, desistance from, and risk factors of financial-economic cyber-enabled crime. Computer Law & Security Review, 52, 105858.

    https://doi.org/10.1016/j.clsr.2023.105858

    Other:

    Dutch police send young hackers to intern at IT companies

    https://nltimes.nl/2018/12/18/dutch-police-send-young-hackers-intern-companies

    20 Companies Pledge Support for the Hack_Right Program

    https://www.bleepingcomputer.com/news/security/20-companies-pledge-support-for-the-hack-right-program/

  • Notes:

    - Dr. Benoît Dupont has written a book on the ecology of cybercrime, which was born from his frustration with the segmentation of research on cybercrime within criminology and between disciplines.

    - The book argues that all research on cybercrime should be connected because we all live in the same digital ecosystem. - There are many hurdles and obstacles in the way of making positive change in the fight against cybercrime, but Dr. Dupont is optimistic about our chances.

    - Residual cybercrime will always subsist, but it can also help identify vulnerabilities in technologies that the industry hasn't identified, which can help improve security.

    - It's important to address the needs of victims of cybercrime, which is often forgotten.

    - The government has the data or the tools to generate the data but needs to work with the private sector and academia to make sense of the data and agree on a roadmap for anti-cybercrime and anti-cybercrime control and prevention.

    About our Guest:

    Dr. Benoît Dupont

    https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15263/sg/Benoît Dupont/

    https://www.linkedin.com/in/benoit-dupont-9369702/

    Papers or resources mentioned in this episode:

    Dupont, B., Grabosky, P., & Shearing, C. (2003). The Governance of Security in Weak and Failing States. Criminal Justice, 3(4), 331-349. https://doi.org/10.1177/146680250334001

    Berg, J., Nakueira, S. & Shearing, C. 2014. Global Non- State Auspices of Security Governance. In: Bersot, H. & Ariigo, B. Eds. The Routledge Handbook of International Crime and Justice Studies. Routledge, 77-97

    Other:

    “Much time and energy have been devoted by taxonomists to isolating morphological patterns of species and subspecies and determining the geographic ranges of each. This is only a stepping stone to further progress in many lines- units around which accumulations of knowledge could be formed for comparison with one another. Until such units are stabilized so that they can be recognized, specific knowledge cannot accumulate - it will of necessity be generalized because, without such standardization, one worker cannot add to the specific knowledge of others.” pp.3.

    Woodbury, A. M. (1952). Ecological taxonomy. Science, 115(2992), 3-3.

  • Notes:

    Dr. Kemp initially moved to Spain and worked as an English teacher before deciding to go back to university to study a social science. He ended up choosing criminology due to the available classes in the morning.While in university, Dr. Kemp became interested in corporate crime and white-collar crime, but later specialized in cybercrime due to its potential for funding and career opportunities.Dr. Kemp discussed the challenges of studying in a different country and in a non-native language. He initially had limited Spanish proficiency but learned the language to a level where he could pursue a degree taught mainly in Spanish.Cybercrime is still significantly underreported, with organizations often weighing the incentives and reasons not to report, such as reputational damage and potential increases in insurance premiums.Small and medium-sized enterprises (SMEs) face difficulties in reporting cybercrimes due to the technical abilities and resources required. The reporting systems are not conducive to SMEs, and there is a need for assistance and support from states to streamline the reporting process for smaller organizations.Dr. Kemp emphasized the importance of distinguishing between reporting cybercrimes to police and criminal justice authorities versus reporting to cybersecurity providers. He noted that there seems to be more interest in private organizations reporting to other private organizations, possibly due to concerns about reputational damage.Dr. Kemp highlighted the limited access to data in Spain and Latin American countries, which hinders research in those regions. He mentioned the lack of a culture of evaluation and the absence of centralized data repositories. This limitation is problematic due to the questionable generalizability of research findings from other countries to Spain and Latin America.Dr. Kemp expressed the need for more longitudinal surveys to better understand the effectiveness of cybersecurity controls and tools. Cross-sectional surveys have limitations in establishing causal relationships and unraveling the timing of control implementation and incidents.Dr. Kemp discussed his upcoming book on cyber fraud, which aims to bring international literature on the topic of cybercrime to the Spanish-speaking world. He acknowledged the challenge of applying research findings from other countries to Spanish-speaking contexts, particularly concerning offender characteristics and prevention measures.Dr. Kemp mentioned his recent work on online victimization and older people, focusing on the impact of fear of crime and the digital divide. He emphasized the need to address older adults' concerns and promote their full participation in the digital society.

    About our guest:

    Dr Steven Kemp

    https://www.udg.edu/ca/directori/pagina-personal?ID=2003705

    https://www.linkedin.com/in/steven-kemp-ed/

    Papers or resources mentioned in this episode:

    Kemp, S., Buil-Gil, D., Miró-Llinares, F., & Lord, N. (2023). When do businesses report cybercrime? Findings from a UK study. Criminology & Criminal Justice, 23(3), 468-489. https://doi.org/10.1177/17488958211062359

    Kemp, S. (2023). Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. Computers & Security, 127, 103089.

    https://doi.org/10.1016/j.cose.2022.103089

    Kemp, S. (2022). Fraud reporting in Catalonia in the Internet era: Determinants and motives. European Journal of Criminology, 19(5), 994-1015. https://doi.org/10.1177/1477370820941405

    Other:

    I am pretty sure I mis-pronounced ‘Girona’, my apologies to the good people from that part of the world.

  • About our guests:

    Dr. Katalin Parti

    https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/katalin-parti.html

    https://www.linkedin.com/in/partikat

    Papers or resources mentioned in this episode:

    PROS: Performances to Reduce Online Scams

    https://liberalarts.vt.edu/research-centers/center-for-gerontology/pros--performances-to-reduce-online-scams.html

    Parti, Katalin, and Faika Tahir. 2023. "“If We Don’t Listen to Them, We Make Them Lose More than Money:” Exploring Reasons for Underreporting and the Needs of Older Scam Victims" Social Sciences 12, no. 5: 264. https://doi.org/10.3390/socsci12050264

    Parti, K. (2022). “Elder Scam” Risk Profiles: Individual and Situational Factors of Younger and Older Age Groups’ Fraud Victimization.

    https://vtechworks.lib.vt.edu/bitstream/handle/10919/112369/Parti_IJCIC_2022.pdf?sequence=2&isAllowed=y

    Boal, A. (2000). Theater of the Oppressed. United Kingdom: Pluto.

    Freire, P. (1970). Pedagogy of the Oppressed. United States: Herder and Herder.

    https://envs.ucsc.edu/internships/internship-readings/freire-pedagogy-of-the-oppressed.pdf

    Other:

    https://en.wikipedia.org/wiki/Pedagogy_of_the_Oppressed

    https://en.wikipedia.org/wiki/Theatre_of_the_Oppressed

    My laptop died a few hours before completing this episode. At this point I am guessing it was some kind of issue with the latest update. It is currently a brick. Good thing I spend a lot of time thinking about resilience otherwise this episode would not have happened.

  • About our guests:

    Kenrick Bagnall

    https://www.linkedin.com/in/kenrickbagnall/

    Papers or resources mentioned in this episode:

    KonCyber the Podcast

    https://koncyberthepodcast.podbean.com

    Other:

    If I took anything from Kenrick's story, besides of course all of the policing and technical stuff, it was that you are not too old to seek or take advice nor are you too old to start again.

  • About our Guest:

    Dr Teresa Scassa

    https://techlaw.uottawa.ca/people/scassa-teresa

    https://www.teresascassa.ca

    Papers or resources mentioned in this episode:

    Robinson, P., & Scassa, T. (2022). The Future of Open Data.

    https://ruor.uottawa.ca/bitstream/10393/43648/1/9780776629759_WEB.pdf

    Scassa, T. (2020). Designing data governance for data sharing: lessons from sidewalk Toronto.

    Scassa, T., Robinson, P., & Mosoff, R. (2022). The Datafication of Wastewater:: Legal, Ethical and Civic Considerations. Technology and Regulation, 2022, 23-35

    Scassa, T. (2022). The surveillant university: Remote proctoring, AI, and human rights. Can. J. Comp. & Contemp. L., 8, 271.

    Scassa, T. (2023). Regulating AI in Canada: A critical look at the proposed artificial intelligence and data act. The Canadian Bar Review, 101(1)

    Other:

    This episode was edited using an 'AI' tool for part of the workflow and part of the intro was written by AI. The intro was then rewritten and some of the work of the other AI tool had to be redone manually. We are at the 'click a button and it is done' stage yet.

  • About our guests:

    Dr. Richard Frank

    https://www.sfu.ca/criminology/about/faculty/criminology-faculty/richard-frank.html

    Noelle Warkentin

    https://www.sfu.ca/iccrc/members/memberprofiles/Noelle-Warkentin.html

    Papers or resources mentioned in this episode:

    Noelle Warkentin, Richard Frank, Yuxuan (Cicilia) Zhang & Naomi Zakimi (2022) Potential cyber-threats against Canada’s critical infrastructure: an investigation of online discussion forums,Criminal Justice Studies, 35:3, 322-345, DOI: 10.1080/1478601X.2022.2081568

    Frank, R., & Mikhaylov, A. (2020). Beyond the ‘Silk Road’: Assessing illicit drug marketplaces on the public web. Open Source Intelligence and Cyber Crime: Social Media Analytics, 89-111.

    https://link.springer.com/chapter/10.1007/978-3-030-41251-7_4

    A. T. Zulkarnine, R. Frank, B. Monk, J. Mitchell and G. Davies, "Surfacing collaborated networks in dark web to find illicit and criminal content," 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA, 2016, pp. 109-114, doi: 10.1109/ISI.2016.7745452.

    https://ieeexplore.ieee.org/abstract/document/7745452

    Other:

  • About our guests:

    Allysa Czerwinsky

    https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/

    Diana Benitez

    Kwasi Boakye-Boateng

    https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/

    https://www.unb.ca/cic/membership/researchers.html

    Rachel Bleiman

    https://liberalarts.temple.edu/content/rachel-bleiman

    Shabnam Saderi

    https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK

    https://www.unb.ca/cic/membership/researchers.html

    Vicky Desjardins

    https://www.linkedin.com/in/💫vicky-desjardins-208134221/

  • About our guests:

    Allysa Czerwinsky

    https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/

    Diana Benitez

    Kwasi Boakye-Boateng

    https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/

    https://www.unb.ca/cic/membership/researchers.html

    Rachel Bleiman

    https://liberalarts.temple.edu/content/rachel-bleiman

    Shabnam Saderi

    https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK

    https://www.unb.ca/cic/membership/researchers.html

    Vicky Desjardins

    https://www.linkedin.com/in/💫vicky-desjardins-208134221/

  • Episode Notes

    About our guests:

    Allysa Czerwinsky

    https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/

    Diana Benitez

    Kwasi Boakye-Boateng

    https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/

    https://www.unb.ca/cic/membership/researchers.html

    Rachel Bleiman

    https://liberalarts.temple.edu/content/rachel-bleiman

    Shabnam Saderi

    https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK

    https://www.unb.ca/cic/membership/researchers.html

    Vicky Desjardins

    https://www.linkedin.com/in/💫vicky-desjardins-208134221/

  • About our guests:

    Rachel Bleiman

    https://liberalarts.temple.edu/content/rachel-bleiman

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Papers or resources mentioned in this episode:

    Rege, A., & Bleiman, R. (2021, December). Collegiate Social Engineering Capture the Flag Competition. In 2021 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-11). IEEE.

    Rege, A., Nguyen, T., & Bleiman, R. (2020, August). A social engineering awareness and training workshop for STEM students and practitioners. In 2020 IEEE Integrated STEM Education Conference (ISEC) (pp. 1-6). IEEE.

    Rege, A., & Bleiman, R. (2023, March). A Free and Community-Driven Critical Infrastructure Ransomware Dataset. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20–21 June; Wales (pp. 25-37). Singapore: Springer Nature Singapore.

    Other:

    The CARE Lab

    https://sites.temple.edu/care/social-engineering/course-projects/

    The Critical Infrastructure Ransomware Attacks (CIRA) Dataset

    https://sites.temple.edu/care/cira/

    The Summer Social Engineering School

    https://sites.temple.edu/socialengineering/

    This episode was edited in part using a text based editing tool that uses machine learning. I think the results were a bit mixed on this episode, particularly in terms of workflow. The tools offer promise though.

  • About our guests:

    Allysa Czerwinsky

    https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Papers or resources mentioned in this episode:

    Julia R. DeCook & Megan Kelly (2022) Interrogating the “incel menace”: assessing the threat of male supremacy in terrorism studies, Critical Studies on Terrorism, 15:3, 706-726, DOI: 10.1080/17539153.2021.2005099

    Kelly, M., DiBranco, A., & DeCook, J. R. (2022). Misogynist incels and male supremacist violence. In Male supremacism in the United States (pp. 164-180). Routledge.

    DeCook, Julia (19 March, 2021) The Issue Isn’t Incels. It’s Racist Misogyny, Global Network on Extremism & Technology**,** https://gnet-research.org/2021/03/19/the-issue-isnt-incels-its-racist-misogyny/

    Other:

    Research by Tim Squirrell et al

    https://www.isdglobal.org/isd-publications/?fwp_publication_category=hate-and-polarisation

    News articles regarding the Toronto Van attack:

    https://www.cp24.com/news/victims-families-dignitaries-mark-fifth-anniversary-of-deadly-toronto-van-attack-1.6367465

    https://www.vice.com/en/article/bvx4kq/incel-toronto-van-killer-found-guilty-of-murdering-10-people

    The interview with Allysa was created as part of the secrev.org conference.

    This episode was edited in part using text first audio edition that uses machine learning. It's not bad but I think there are some improvements.

  • About our guests:

    Dr Kevin Steinmetz

    https://www.k-state.edu/sasw/faculty/steinmetz.html

    https://scholar.google.com/citations?user=mEgRonIAAAAJ&hl=en

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Papers or resources mentioned in this episode:

    Steinmetz, K. F., & Henderson, H. (2012). Hip-Hop and Procedural Justice: Hip-Hop Artists’ Perceptions of Criminal Justice. Race and Justice, 2(3), 155–178. https://doi.org/10.1177/2153368712443969

    Kevin F. Steinmetz (2023) Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis,Journal of Applied Security Research, 18:2, 246-266, DOI: 10.1080/19361610.2021.2002119

    Steinmetz, K. F., & Holt, T. J. (2023). Falling for Social Engineering: A Qualitative Analysis of Social Engineering Policy Recommendations. Social Science Computer Review, 41(2), 592–607. https://doi.org/10.1177/08944393221117501

    Goffman, E. (2002). The presentation of self in everyday life. 1959. Garden City, NY, 259.

    Agnew, R. (2006). Pressured into crime: An overview of general strain theory.

    Other:

    This episode was in part edited using a text based audio editing which is an interesting application of machine learning technology to software.

  • About our guests:

    Dr Jennifer L. Schally

    https://cjrc.la.psu.edu/people/jennifer-l-schally/

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Papers or resources mentioned in this episode:

    Derrickson, K. (2023). Advance-Fee Pet Scams Through the Lens of Narrative Victimology.

    https://etda.libraries.psu.edu/catalog/25084ksd5317

    Whittaker, J. M., & Button, M. (2020). Understanding pet scams: A case study of advance fee and non-delivery fraud using victims’ accounts. Australian & New Zealand Journal of Criminology, 53(4), 497-514.

    Button, M., & Whittaker, J. (2021). Exploring the voluntary response to cyber-fraud: From vigilantism to responsibilisation. International Journal of Law, Crime and Justice, 66, 10048

    Pemberton, A., Mulder, E., & Aarten, P. G. (2019). Stories of injustice: Towards a narrative victimology. European Journal of Criminology, 16(4), 391-412.

    https://journals.sagepub.com/doi/pdf/10.1177/1477370818770843

    Other:

    The American Kennel Club on “How to Spot a Puppy Scam Online”

    https://www.akc.org/expert-advice/puppy-information/spot-puppy-scam/

    Brent, Y.(Nov 30, 2022) Beware kitten and puppy scams, as pandemic leads to spike in pet ripoffs, CBC News Canada.

    https://www.cbc.ca/news/canada/kitten-pet-puppy-scam-spike-pandemic-canada-us-bbb-fraud-1.6667008

  • About our guests:

    Jordan Howell

    https://cina.gmu.edu/people/c-jordan-howell/

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Papers or resources mentioned in this episode:

    Marie Ouellet, David Maimon, Jordan C Howell, Yubao Wu, The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces, The British Journal of Criminology, Volume 62, Issue 6, November 2022, Pages 1518–1536, https://doi.org/10.1093/bjc/azab116

    Howell, C. J., Fisher, T., Muniz, C. N., Maimon, D., & Rotzinger, Y. (2023). A Depiction and Classification of the Stolen Data Market Ecosystem and Comprising Darknet Markets: A Multidisciplinary Approach. Journal of Contemporary Criminal Justice, 10439862231158005.

    https://journals.sagepub.com/doi/pdf/10.1177/10439862231158005

    Other:

    An assessment of ransomware distribution on darknet markets

    https://cybersecurity.att.com/blogs/security-essentials/an-assessment-of-ransomware-distribution-on-darknet-markets

    The episode with Dr. Eden Kamar talking about using chatbots for research

    https://cybercrimeology.com/episodes/my-parents-are-home-it-would-be-weird-chatbots-grooming-guardians

  • About our guests:

    Dr Kyung-shick Choi

    https://www.bu.edu/met/profile/kyung-shick-choi/

    https://centercicboston.org

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Other:

    Regarding the Canadian cybercrime laws mentioned:

    https://www.rcmp-grc.gc.ca/en/cybercrime-defined