• About our Guests:

    Dr. Bridget Harris

    Dr. Joshua James

    Papers or resources mentioned in this article:

    Harris, B. (2021). Technology-enabled abuse: how'safety by design' can reduce stalking and domestic violence. The Conversation.

    Harris, B., & Woodlock, D. (2021). ‘For my safety’: experiences of technology-facilitated abuse among women with intellectual disability or cognitive disability.

    The Australian eSafety Commissioner

    The eSafety Commissioner

    Safety by Design (SbD)


    I said the allegory of motor vehicles was revealing. An allegory generally considered to be a story poem or picture with a symbolic meaning such as a moral point of view. Although it didn’t make the final edit there is something to be learned from the story of automobile safety is that safety requires regulation, standards and education and it can be effective.

  • About Our Guests

    (In Order of Appearance)

    Dr. Jin Lee,

    Dr. David Buil-Gil

    Dr. Bridget Harris


    Dr. Cathy Marcum


    I will be honest with you, the mix on this episode is a little rough, forgive me for rushing it a little.

    'Bisney' isn't a word. 'Busy' is what I was aiming for there.

    This episode's track is called ONOSCOMOSOMO. They don't all get names, but this one did.

  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • About Our Guest:

    Dr Elisabeth Carter

    Papers mentioned in this Episode:

    Carter, E. (2021). Distort, extort, deceive and exploit: Exploring the inner workings of a romance fraud. The British Journal of Criminology, 61(2), 283-302.

    Carter, E. (2015). Laughing matters: A conversation analytic account the use of laughter by suspects and officers in the police interview. Essex Graduate Journal of Sociology, 7(1), 99-113.,%20Elisabeth%20Laughing%20matters.pdf

    Carter, E. (2015). The anatomy of written scam communications: An empirical analysis. Crime, Media, Culture, 11(2), 89-103.

    A Guide to Spotting Romance Fraudsters

    TinEye is a reverse image search tool. You can search with an image for other similar images.

    If you can't access that then, you can also reverse image search on google.

    About our Expert Guest:

    Dr. Joshua James

    What we learned:

    What happens where there is a difference in analysis between digital forensics investigators ?

    Like physical evidence there is little room for differences regarding the facts of a case. There might be a different in explanation of the meaning of a piece of evidence depending on the story they are presenting. The tools are an instrument of interpreting the meaning of information on a device and tools can make mistakes. Using multiple tools that extract and analyze data from devices reduces the chance of this happening.


    Thanks very much to my neighbours for assisting with the voice over for this episode. I do hope the human/furniture couples ballroom dancing and hollering team goes well in whichever competition you are preparing for. Also thanks to my audio editing software for deciding to have a meltdown and give me the opportunity to do the final mastering twice.

    This episode's track is called 'curious diamonds'. Not all of the songs for podcast episodes get a name, but it did this time.

  • About our Interview Guest:

    Dr Anita Lavorgna

    Papers and Publications Mentioned in this Episode:

    Lavorgna, A., & Holt, T. J. (Eds.). (2021). Researching cybercrimes : methodologies, ethics, and critical approaches. Palgrave Macmillan.

    This book contains the following major sections:

    Knowledge Production and Research Datafication in Cybercrime ResearchMethodologies and Strategies for Cybercrime ResearchGeographies and Cultures of Ethics in Cybercrime Research

    Lavorgna, A., & Ugwudike, P. (2021). The datafication revolution in criminal justice: An empirical exploration of frames portraying data-driven technologies for crime prevention and control. Big Data & Society, 8(2), 20539517211049670.

    About our Expert Guest:

    Dr. Joshua James

    What we learned:

    What is the difference between digital evidence and physical evidence for investigators ?

    Digital evidence always requires active interpretation because it is an abstract series of electrical symbols. Because of this, the interpretation is very important but very difficult. Unlike physical evidence, it can be tested and analyzed indefinitely because it can be copied perfectly, and the accuracy of copies can be verified with hashes.


    This episode's track is called 'surfing on white noise'. Not all of the songs for podcast episodes get a name, but it did this time.

  • About Our Guest:

    Dr. Jerry Ratcliffe

    Reducing Crime, Podcast, Blog and Book


    The introduction at the start of the episode is from the Prelinger archives at

  • About our Guest:

    Dr. Chad Whelan

    Papers mentioned in this episode:

    Dupont, B., & Whelan, C. (2021). Enhancing relationships between criminology and cybersecurity. Journal of criminology, 00048658211003925.

    Manuscript available from the University of Montreal


    About the Darkside cybercrime group:

    About the REvil cybercrime group:

    Some technical information:

    A timeline of some interesting developments related to this issue:

    2021, May 14.

    The moral underground? Ransomware operators retreat after Colonial Pipeline hack

    2021, June 7 .

    Department of Justice Seizes $2.3 Million in Cryptocurrency Paid to the Ransomware Extortionists Darkside

    2021, July 20

    Operation Orcus Task Force Established To Fight Ransomware Gangs

    2021, Aug 5

    Ransomware Gangs and the Name Game Distraction

    2021, Oct 5.

    NSA chief predicts U.S. will face ransomware ‘every single day’ for years to come ("Ransomware is a national security issue. I firmly believe that.”)

    2021, Oct 7.

    Netherlands can use intelligence or armed forces to respond to ransomware attacks

    2021, Oct 11.

    UK cyber head says Russia responsible for 'devastating' ransomware attacks

    2021, Oct 21.

    Governments turn tables on ransomware gang REvil by pushing it offline

    2021, Oct 25.

    Groove Calls for Cyberattacks on US as REvil Payback

    Other Other:

    The intro for this was drawn from a 1968 film on the role of PSYOPS in assisting developing countries in cementing their shiny new system of government installed by the US called "Psychological Operations in Support of Internal Defense and Development Assistance Programs " which is in the Public Domain and available from

  • About our Guest

    The Canadian Anti-Fraud Centre collects information on fraud and identity theft.

    The CAFC involves the Royal Canadian Mounted Police, the Competition Bureau Canada, and the Ontario Provincial Police and recently come together with the Canadian Centre for Cyber Security to fight fraud and cybercrime.

    Report Fraud

    Call the CAFC Toll free: 1-888-495-8501 Monday to Friday, from 9 am to 4:45 pm (Eastern time) and close on holidays.

    Online with the RCMP

    Mentioned in this episode:

    (KYC) Know Your Customer or Know Your Client

    Organizations that deal with large amounts of money are required to follow regulations related to the control of the proceeds of crime and terrorist financing. In Canada this is FINTRAC and you can find out more here.

    You can find out more about the KYC requirements of other countries here:


    The introduction for this episode was from the film " How to Use the Dial Phone" By AT&T in 1927 and preserve by the Prelinger Archive at

    This was our 2 year anniversary. Yay Us.

  • About Our Guest

    Kara Brisson-Boivin


    Take part in Cybersecurity Awareness Month Canada


    The audio from the start of this episode is from a famous film called "Duck and Cover" available from the Prelinger archive online at

    Kara said I could use the title for the episode. It is still hers though, you can ask her if you would like to use it somewhere.

  • About Our Guest:

    Dr Tom Cockcroft

    Papers mentioned in this Episode:

    Cockcroft, T., Shan-A-Khuda, M., Schreuders, Z. C., & Trevorrow, P. (2021). Police cybercrime training: perceptions, pedagogy, and policy. Policing: A Journal of Policy and Practice, 15(1), 15-33.

    Cockcroft T (2020) Police Occupational Culture: Research and Practice. Bristol: Policy Press.

    Cockcroft T (2012) Police culture: themes and concepts. Abingdon: Routledge.


    The intro for this episode was from a 1951 film called "This is your Police Department" about the Detroit police department that romantically traces the training and career of a police officer in that city. Its available on the Prelinger archive.

  • About Our Guest

    The Smart CyberPhysical Systems Lab

    Resources Mentioned in this Episode

    Yazdinejad, A., Zolfaghari, B., Azmoodeh, A., Dehghantanha, A., Karimipour, H., Fraser, E., ... & Duncan, E. (2021). A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures. Applied Sciences, 11(16), 7518.

    You can watch their video for farmers here:


    The book "who moved my cheese?" is a good read if you would like to consider change and how to adapt. Everything is going to be connected to the internet and the cheese is going to move.

    I wanted to add a note of clarification here, I asked if Dr Karimipour had been toughened by her experiences. I said I don't like the term and that's becuase I don't see being 'toughened up' as a positive outcome. If you are forced to change by a situation that is still change by force and if that situation is created by discrimination then that is unacceptable in an equitable society.

    I attempted to swap the phrase "a double edged sword" with "every rose has its thorns", I am not sure how well that went but perhaps it will catch one " thorns come with roses ? Something like that perhaps ?

    The audio at the start of this episode was again from the Prelinger Archives at, a wonderful resources. Not the music though, that was courtesy of an MPC one, a Korg NTS-1 and a glass of Jamesons.

  • About out Guest:

    Papers Mentioned in this Episode

    Dillon, R., Chawla, S., Hristova, D., Göbl, B., & Jovicic, S. (2020). Password Policies vs. Usability: When Do Users Go “Bananas”?. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 148-153). IEEE.

    Grassi, P. A., Fenton, J. L., Newton, E. M., Perlner, R. A., Regenscheid, A. R., Burr, W. E., ... & Theofanos, M. F. (2017). Nist special publication 800-63b. digital identity guidelines: authentication and lifecycle management. Bericht, NIST.


    Holiday from Rules? by Portafilms, part of the Prelinger archive available at

  • About our Guest:

    Dr Fawn Ngo

    Papers Mentioned in this Episode:

    Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773.

    Ngo, F. T., Piquero, A. R., LaPrade, J., & Duong, B. (2020). Victimization in Cyberspace: Is It How Long We Spend Online, What We Do Online, or What We Post Online?. Criminal Justice Review, 45(4), 430-451.


    The intro from this week was from the Prelinger archives and drew from an 1940s encyclopedia britannica film about immigration, and a Folgers coffee commercial.

  • About our Guest:

    Dr Daren Fisher

    Papers Mentioned in this Episode:

    Fisher, D., Maimon, D., & Berenblum, T. (2021). Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: a randomized experiment. Security Journal, 1-23.

    The death and life of great American cities by Jane Jacobs; Publisher: New York : Random House ©1961

    You can learn more about the Maryland Scale for Scientific Evidence in this report Mapping the standards of evidence used in UK social Policy


    There were a fair few pops and clicks in the audio on this one, unfortunately that was the best I could do using automated tools. I decided to leave it as is, the discussion was delightful and I was concerned that if we re-recorded it would come out with the same flavour. My apologies if it was too distracting, I hope you listened through until the end anyway as there was some good discussion there.

    This might be episode 42, and may as well be the answer to life the universe and everything but I still don't understand the question and perhaps I never will.

  • About our Guest:

    Papers Mentioned in this episode :

    Clevenger, S., Navarro, J. N., Marcum, C. D., & Higgins, G. E. (2018). Understanding victimology: an active-learning approach. Routledge.

    Clevenger, S. L., Navarro, J. N., & Gilliam, M. (2018). Technology and the endless “cat and mouse” game: A review of the interpersonal cybervictimization literature. Sociology Compass, 12(12), e12639.

    Clevenger, S., & Gilliam, M. (2020). Intimate Partner Violence and the Internet: Perspectives. The Palgrave Handbook of International Cybercrime and Cyberdeviance, 1333-1351.


    Frankenstein; or, the Modern Prometheus 1818 by Mary Wollstonecraft (Godwin) Shelley

    Clip at the start taken from the public domain film "Jesse James Meets Frankenstein's Daughter (1966)" online at

    Tiny clips from criminal minds used for an educative purpose.

  • About our Guest:

    Papers Mentioned in this Episode.

    Buil-Gil, D., Lord, N., & Barrett, E. (2021). The Dynamics of Business, Cybersecurity and Cyber-Victimization: Foregrounding the Internal Guardian in Prevention. Victims & Offenders, 16(3), 286-315.

    Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior , 37(3), 263–280.

    Miró Llinares, F., & Johnson, S. D. (2017). Cybercrime and place: Applying environmental criminology to crimes in cyberspace. In G. J. N.Bruinsma & S. D.Johnson (Eds.), The Oxford handbook of environmental criminology (pp. 883–906). Oxford University Press.

    Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology , 2(4), 407–427.

    Cyber Security Breaches Survey: (2020) (2019) (2018)


    The except at the start is from a 1960s film on Safety by general Motors that is part of the Prelinger Archive, a most valuable resource and can be found here:

    The track segment at the end of the episode was made with a little Korg NTS-1. What a wonderful time to be alive, when such things are obtainable and can make being stuck inside for fear of infection so much more bearable.

  • About Our Guest:

    Articles Mentioned in this Episode:

    Dearden, T. E., Parti, K., & Hawdon, J. (2021). Institutional Anomie Theory and Cybercrime—Cybercrime and the American Dream, Now Available Online. Journal of Contemporary Criminal Justice, 10439862211001590.

    Muftic, L. (2006). Advancing institutional anomie theory: A microlevel examination connecting culture, institutions, and deviance. International Journal of Offender Therapy and Comparative Criminology, 50(6), 630–653.


    You should check out this book if these ideas were interesting:

    Messner, S. F., & Rosenfeld, R. (1994). Crime and the American Dream

    There are many new editions printed.

    Learn more about Skin Cancer here:

    Seriously, if you have spent anytime outside, make sure you are aware of skin cancer. Some forms of it might be rare, but it is anything but, I know many many people both younger and older than me who have had them cut out.

    The audio at the start of this episode was from a prelinger archive public domainfilm called "The Relaxed Wife",

    Pfizer started importing Atarax or Hydroxine into the US in the late 50s and promoted it with these kinds of films advocating that people just relax and stop worrying about things so much.

  • About our Guest:

    Articles Mentioned in this Episode:

    Dupont, B., & Lusthaus, J. (2021). Countering distrust in illicit online networks: the dispute resolution strategies of cybercriminals. Social science computer review, 0894439321994623.

    "Policing in the information age: technological errors of the past in perspective" is a chapter in

    Enders, M., & Dupont, B. (Eds.). (2001). Policing the lucky country. Hawkins Press.

    Dr Dupont mentioned the work of Dr Gabriela Coleman, a book to read if you are interested is here:

    Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. Verso books.


    We mentioned Xylitol, their blog can be found here:

    Draw an iceberg and see how it will float

    The sample from the start of this episode is from Kansas City Confidential

    I was very busy when I was editing this one so the sound is not quite smooth as it usually is. We used Zoom as well, and sometime it sounds like it has made an edit when it is managing bandwidth. So, Apologies for that. Also, I had allergies when doing the interviews, but it cleared up by the time I got to doing some inserts to help with the story flow, it sounds a little odd because of that. I wouldn't tell this to just anyone, but as you have been reading these show notes for so long I feel like we have gotten to be a little closer.

  • About our Guest:

    Dr Yi Ting Chua:

    Papers Mentioned in this Episode:

    Chua, Y. T., Parkin, S., Edwards, M., Oliveira, D., Schiffner, S., Tyson, G., & Hutchings, A. (2019, November). Identifying unintended harms of cybersecurity countermeasures. In 2019 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-15). IEEE.

    Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours

    Parkin, S., & Chua, Y. T. (2021, March). Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours. Springer.


    The voice at the start of the episode is from a video on increasing precision in the manufacture of automobiles at general motors from the 1960s. It is available at the valuable as part of the Prelinger archives.

    I use Ikea FANTAST temperature probes, there are probably better ones out there, but these are cheap enough that I don't feel bad when they break.

  • About our Guest:

    Dr. Jonathan Lusthaus

    Articles Mentioned in this episode:

    Industry of Anonymity: Inside the Business of Cybercrime by Jonathan Lusthaus

    DarkMarket: Cyberthieves, Cybercops and You by Misha Glenny

    Jonathan Lusthaus (2012) Trust in the world of cybercrime, Global Crime, 13:2, 71-94, DOI: 10.1080/17440572.2012.674183

    J. Lusthaus, M. Bruce and N. Phair, "Mapping the Geography of Cybercrime: A Review of Indices of Digital Offending by Country," 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy, 2020, pp. 448-453, doi: 10.1109/EuroSPW51379.2020.00066.


    Flappy Bird.

    The voice sample is from the Prelinger archive at An important resource.

    The song this week is called "Departed on Platform 2". I write all the songs we use on the show, I just thought you might like to know why I thought this one was appropriate for this episode.

  • About our Guest:

    Papers mentioned in this episode:

    Carley, K. M. (2020). Social cybersecurity: an emerging science. Computational and Mathematical Organization Theory, 26(4), 365-381

    The Advertisement at the end was from the mid 1990s (1995) and was used to advertise the America Online (AOL) web service. Even in Australia everyone ended up with dozens of AOL CDs that were supposed to help us get online somehow.

    The Audio from the start of the episode is from the Prelinger Archive. A Movie from 1968 explaining the US perspective on the use of Psychological Operations (PsyOps) in another country to influence the feelings of the populace.