The National Science Foundation awarded a grant to Georgia State University (GSU) to come up with innovative ways to thwart the supply chains for counterfeiting, loan- and unemployment fraud.

The National Science Foundation has awarded a $250,000 grant to Georgia State University (GSU) to study how best to disrupt – and ultimately take down – the supply chains that allow cybercriminals to thrive.

David Maimon, associate professor and director of the Evidence-Based Cybersecurity Research Group at GSU, says his team will focus on the supply chains that support counterfeiting cash money and PII such as credit card data, social security numbers, and names and addresses, as well as fraud around Small Business Administration loans and unemployment claims.

Maimon says by using an evidence-based approach, the team at GSU will use rigorous social science research, observations, and surveys to find out which law enforcement techniques actually work in the field. 

“The goal is to take down these supply chains,” Maimon says. “Cyber researchers and law enforcement agencies chasing cybercriminals tend to focus on taking down servers to disrupt cybercrime. While these activities are effective, they often have short-term impact, as the cybercriminals can reconfigure servers very quickly and stay in operation.”

Ed Cabrera, chief cybersecurity officer at Trend Micro, says there’s a definite need for research that looks at the nature of the supply chain versus the technical cyber-side of the equation. 

“We tend to look at the symptoms and not the disease, which is the ecosystems that enable these criminal activities,” Cabrera says. “As security researchers in the industry, we’ll look at the malware bought and sold, the macro picture. But there’s a need for more innovative ways to go after these groups.”

Anatomy of the Supply Chain

Maimon says the GSU team will study how the four junctions of the supply chain interact with one another and look for creative ways to disrupt them. This includes enablers, offenders, victims, and guardians.

According to GSU, enablers are individuals and organizations that deliver services to those who wish to carry out cyberattacks. Enablers include the coders or programmers of malicious software; distributors and vendors who trade and sell hacking tools and stolen data; teachers who exchange information regarding cybercrime techniques and tools; and moderators and administrators of online marketplaces who maintain the criminal infrastructure, vouch for the goods, and enforce social norms in these criminal marketplaces.

Online offenders and enablers of cybercrime tend to meet in both offline or online environments.

The victims of cybercrimes are private individuals or companies that experience attacks on their computers, networks, and IoT devices. For a variety of reasons, they are often reticent to report that they’ve been the victim of a cybercrime to law enforcement.

Finally, the list of relevant cybercrime guardians that monitor these activities includes law enforcement agencies such as the FBI and state and local police agencies, governmental intelligence agencies such as the National Security Agency, and systems administrators at Internet service providers, corporations, and industries.

Maimon says GSU’s research group especially seeks to find more creative ways to interact with the offenders and enablers so they can protect victims and come up with new tools and techniques for law enforcement. For example, instead of just monitoring traffic on servers, they may look to spread gossip on the Dark Web to see if they can disrupt the market and get the offenders or enablers to make a mistake.

The GSU has two years to report its findings and issue recommendations to law enforcement, government security agencies, and the private sector.

 

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md. View Full Bio

 

Recommended Reading:

More Insights



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here