10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Traditionally, hackers have been depicted as individuals who work in isolation but in<br />

competition with each other, and who are passionate about their particular area <strong>of</strong><br />

malicious interest and prepared to devote enormous time and energy to developing their<br />

ideas and implementing them. Hackers <strong>of</strong>ten share their ideas in user communities and<br />

many such communities are characterised by an open sharing <strong>of</strong> ideas and innovations,<br />

termed ‘free revealing’. 132 Innovative users are <strong>of</strong>ten seen as a significant agent <strong>of</strong><br />

technological change although such change may not always be welcomed by society.<br />

For example, hackers may well be the leading edge <strong>of</strong> a market trend and conform to<br />

the notion <strong>of</strong> lead users. 133 However, in other cases they may act more like a subversive<br />

group whose aim is to break technical and legal boundaries. Coupled with the<br />

magnifying effect <strong>of</strong> the Internet their influence will be increased by free revealing,<br />

enabling a relatively small number <strong>of</strong> technically able individuals to have an impact on<br />

society that is disproportionate to their numbers or social and pr<strong>of</strong>essional positions.<br />

However, new evidence suggests that hackers and malware writers are moving away<br />

from working individually or in groups with common goals, to gradually enter the<br />

hierarchical structure <strong>of</strong> cybercrime organisations, where they have their own well-<br />

defined role and reward system. 134 This is further explored in the sections below.<br />

It is also likely that there are relatively few attackers, exploit and malicious code<br />

developers. Due to the technical nature <strong>of</strong> these skills, fewer individuals are adept at<br />

conducting attacks, doing security research, or developing exploit code and attack<br />

tools. 135<br />

2.1.1.2 Infection and distribution<br />

The second activity involves the distribution <strong>of</strong> detected vulnerabilities (such as<br />

malware) and the subsequent infection <strong>of</strong> computer systems. Hackers and malware<br />

132 Harh<strong>of</strong>f, D., Henkel, J., & von Hippel, E. (2003). Pr<strong>of</strong>iting from voluntary information spillovers: how users<br />

benefit by freely revealing their innovations. Research Policy. 32 (10), 1753-1769.<br />

133 Von Hippel, E., 1986. Lead Users: A Source <strong>of</strong> Novel Product Concepts, Management Science, 32 (7), July,<br />

pp791-805.<br />

134 Finjan Malicious Code Research Centre, (2008). Web Security Trends Report Q2 2008. See<br />

www.globalsecuritymag.com/Finjan-Discovers-Compromised, 20080506, 2911.<br />

135 Symantec, (2008), “Symantec Report on the Underground Economy”, July 07–June 08.<br />

Page 46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!