Afleveringen

  • About our Guests:

    Dr Sunil Chaudhary

    https://www.ntnu.edu/employees/sunil.chaudhary

    Vanessa Henri

    https://www.linkedin.com/in/vanessahenri

    Papers or resources mentioned in this episode:

    Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the effectiveness of cybersecurity awareness program. Journal of Cybersecurity , https://doi.org/10.1093/cybsec/tyac006

    Other:

    https://cybersec4europe.eu/

  • About our Guests:

    Dr Masarah Paquet-Clouston

    https://crim.umontreal.ca/en/repertoire-departement/professeurs/professeur/in/in33261/sg/Masarah%20Paquet-Clouston/

    https://www.linkedin.com/in/masarah-paquet-clouston-54b29587/

    Vanessa Henri

    https://www.linkedin.com/in/vanessahenri

    Papers or resources mentioned in this episode:

    Paquet-Clouston, M., Paquette, S. O., Garcia, S., & Erquiaga, M. J. (2022). Entanglement: cybercrime connections of a public forum population. Journal of Cybersecurity, 8(1), tyac010.

    https://academic.oup.com/cybersecurity/article/8/1/tyac010/6644916

    Paquet-Clouston, M., & Bouchard, M. (2022). A Robust Measure to Uncover Community Brokerage in Illicit Networks. Journal of Quantitative Criminology, 1-29.

    https://www.crimrxiv.com/pub/nhorzdki

    Paquet-Clouston, M. C. (2021). The Role of Informal Workers in Online Economic Crime (Doctoral dissertation, Arts & Social Sciences: School of Criminology).

    https://summit.sfu.ca/_flysystem/fedora/2022-08/input_data/21455/etd21636.pdf

    Other:

    This interview was done in person, I haven't done one of those for a long time and think my microphone technique is a little rusty, not only that I forgot to record some room tone.

  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • About our Guests:

    Dr. Periwinkle Doerfler

    https://scholar.google.com/citations?user=beizXWkAAAAJ&hl=en

    Vanessa Henri

    https://www.linkedin.com/in/vanessahenri

    Papers or resources mentioned in this episode:

    Doerfler, P., Forte, A., De Cristofaro, E., Stringhini, G., Blackburn, J., & McCoy, D. (2021). " I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW2), 1-32.

    https://arxiv.org/pdf/2104.11145.pdf

    Other:

    Burke, Katie L. ( 2017, Sep) Harassment in Science, American Scientist, from:

    https://www.americanscientist.org/article/harassment-in-science

    Nogrady, Bianca (2021, 13 Oct) ‘I hope you die’: how the COVID pandemic unleashed attacks on scientists, Retreived from Nature.com:

    https://www.nature.com/articles/d41586-021-02741-x

    O'Grady, Cathleen (2022, 24 Mar) In the Line of Fire:Scientists have been harassed for years. But a Science survey shows the pandemic has made things far worse for some

    https://www.science.org/content/article/overwhelmed-hate-covid-19-scientists-face-avalanche-abuse-survey-shows

    Advice for researchers experiencing harassment by the Science Media Centre

    https://www.sciencemediacentre.org/wp-content/uploads/2019/10/Advice-for-Researchers-Experiencing-Harrasment-2019.pdf

  • About our Guests:

    Dr David Lyon

    https://www.sscqueens.org/people/david-lyon

    Vanessa Henri

    https://www.linkedin.com/in/vanessahenri

    Papers or resources mentioned in this episode:

    Beyond Big Data Surveillance: Freedom and Fairness

    https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released

    David Lyon (1994) Electronic Eye: The Rise of Surveillance Society

    https://www.goodreads.com/book/show/237851.Electronic_Eye

    David Lyon (2001) Surveillance Society: Monitoring Everyday Life

    https://www.goodreads.com/book/show/237855.Surveillance_Society

    David Lyon (2018) The Culture of Surveillance: Watching as a Way of Life

    https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance

    David Lyon (2022) Pandemic Surveillance

    https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302

    Michel Foucault (1975) Discipline and Punish: The Birth of the Prison

    https://www.goodreads.com/book/show/80369.Discipline_and_Punish

    Smith, Richard Angus (2015) Spying and Surveillance in Shakespeare’s Dramatic Courts (Ph.D Thesis)

    https://ses.library.usyd.edu.au/handle/2123/11591

    Other:

    History of Henry V

    Act 2, Scene 2

    DUKE OF BEDFORD:

    The king hath note of all that they intend,

    By interception which they dream not of.

    https://www.opensourceshakespeare.org/views/plays/play_view.php?WorkID=henry5&Act=2&Scene=2&Scope=scene

    The Tragedy of Hamlet, Prince of Denmark

    Act 3, Scene 1

    KING CLAUDIUS:

    Her father and myself, lawful espials,
    Will so bestow ourselves that, seeing, unseen,
    We may of their encounter frankly judge,
    And gather by him, as he is behaved,
    If 't be the affliction of his love or no
    That thus he suffers for.

    http://shakespeare.mit.edu/hamlet/hamlet.3.1.html

  • About our Guests:

    Dr David Lyon

    https://www.sscqueens.org/people/david-lyon

    Vanessa Henri

    https://www.linkedin.com/in/vanessahenri

    Papers or resources mentioned in this episode:

    Beyond Big Data Surveillance: Freedom and Fairness

    https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released

    David Lyon (1994) Electronic Eye: The Rise of Surveillance Society

    https://www.goodreads.com/book/show/237851.Electronic_Eye

    David Lyon (2001) Surveillance Society: Monitoring Everyday Life

    https://www.goodreads.com/book/show/237855.Surveillance_Society

    David Lyon (2018) The Culture of Surveillance: Watching as a Way of Life

    https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance

    David Lyon (2022) Pandemic Surveillance

    https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302

    Michel Foucault (1975) Discipline and Punish: The Birth of the Prison

    https://www.goodreads.com/book/show/80369.Discipline_and_Punish

    Smith, Richard Angus (2015) Spying and Surveillance in Shakespeare’s Dramatic Courts (Ph.D Thesis)

    https://ses.library.usyd.edu.au/handle/2123/11591

    Other:

    History of Henry V

    Act 2, Scene 2

    DUKE OF BEDFORD:

    The king hath note of all that they intend,

    By interception which they dream not of.

    https://www.opensourceshakespeare.org/views/plays/play_view.php?WorkID=henry5&Act=2&Scene=2&Scope=scene

    The Tragedy of Hamlet, Prince of Denmark

    Act 3, Scene 1

    KING CLAUDIUS:

    Her father and myself, lawful espials,
    Will so bestow ourselves that, seeing, unseen,
    We may of their encounter frankly judge,
    And gather by him, as he is behaved,
    If 't be the affliction of his love or no
    That thus he suffers for.

    http://shakespeare.mit.edu/hamlet/hamlet.3.1.html

  • About our Guests:

    Holly Ann Garnett

    https://www.rmc-cmr.ca/en/political-science-and-economics/holly-ann-garnett

    https://www.queensu.ca/iigr/holly-ann-garnett

    Michael Pal

    https://commonlaw.uottawa.ca/en/people/pal-michael

    Vanessa Henri

    https://www.linkedin.com/in/vanessahenri

    Papers or resources mentioned in this episode:

    Garnett HA, Pal M (2022) Cyber-Threats to Canadian Democracy,.

    https://www.mqup.ca/cyber-threats-to-canadian-democracy-products-9780228011477.php

    https://books.google.ca/books/about/Cyber_Threats_to_Canadian_Democracy.html?id=_qOwzgEACAAJ&

    Other:

    There was a lot of noise happening outside my apartment as I was recording part of this episode and it was very distracting. Apologies if I sound a little weird :)

  • About our Guest:

    Sinead Tuite

    Innovation, Science and Economic Development (ISED) Canada

    https://www.ic.gc.ca/eic/site/icgc.nsf/eng/home

    Papers or resources mention in this episode:

    Safeguarding your Research

    This website provides information on how to safeguard your research and innovation.

    https://science.gc.ca/eic/site/063.nsf/eng/h_97955.html

    The Government of Canada's National Security Guidelines for Research Partnerships

    https://science.gc.ca/eic/site/063.nsf/eng/h_98257.html

    The US Government's Executive Order on Improving the Nation’s Cybersecurity

    https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/

    The UK Centre for the Protection of National Infrastructure (CPNI) Trusted Research Guidance for Academia

    https://www.cpni.gov.uk/trusted-research-academia

    Australia's Cybersecurity Strategy 2020 (Section 40, Page 23)

    https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf

  • About our Guest:

    Dr Victoria Lemieux

    https://ischool.ubc.ca/profile/victoria-lemieux/

    Dominic Vogel

    https://ca.linkedin.com/in/domvogel

    cyber.sc

    Papers or resources mention in this episode:

    Lemieux, V. L. (2022). Searching for Trust: Blockchain Technology in an Age of Disinformation. Cambridge University Press.

    https://www.cambridge.org/core/books/searching-for-trust/B2F64551393899EBC6306EB42FCBE856

    Lemieux, V. L., & Feng, C. (2021). Building Decentralized Trust. Springer International Publishing. https://doi. org/10.1007/978-3-030-54414-0.

    https://www.researchgate.net/profile/Victoria-Lemieux/publication/350180597_Multidisciplinary_Blockchain_Research_and_Design_A_Case_Study_in_Moving_from_Theory_to_Pedagogy_to_Practice/links/60a542afa6fdcc3f30b5cbb4/Multidisciplinary-Blockchain-Research-and-Design-A-Case-Study-in-Moving-from-Theory-to-Pedagogy-to-Practice.pdf

    Other:

    Here is the oldest surviving record of the 60% of hacked SMBs go bankrupt claim,

    https://docs.house.gov/meetings/SM/SM00/20150422/103276/HHRG-114-SM00-20150422-SD003-U4.pdf

    National Cyber Security Alliance (NCSA) Statement Regarding Incorrect Small Business Statistic

    https://staysafeonline.org/press-release/national-cyber-security-alliance-statement-regarding-incorrect-small-business-statistic/

    60% of Hacked Small Businesses Fail. How Reliable Is That Stat?

    https://www.bankinfosecurity.com/blogs/60-hacked-small-businesses-fail-how-reliable-that-stat-p-2464

    The fact that we can't find who is responsible for these numbers is kind of the point of having record keeping.

    Just to put this claim in context in 2015 the US had 28.8 million Small businesses (https://www.sba.gov/sites/default/files/advocacy/United_States.pdf)

    If half of those businesses were hacked, as claimed that would be 14.4million Breaches. If 60% of those went out of business, that would be 8.64 million businesses folding, which you might expect would be noticed economically. In particular, it would mean that around half of the US population lost their job. I suspect that we might have noticed that.

  • About our Guests

    Dr Asier Moneva

    https://asiermoneva.com/

    Dominic Vogel

    https://ca.linkedin.com/in/domvogel

    cyber.sc

    Papers or resources mention in this episode:

    Moneva, A., Leukfeldt, E.R. & Klijnsoon, W. Alerting consciences to reduce cybercrime: a quasi-experimental design using warning banners. J Exp Criminol (2022). https://doi.org/10.1007/s11292-022-09504-2

    https://link.springer.com/article/10.1007/s11292-022-09504-2

    Moneva, A., Leukfeldt, E. R., Van De Weijer, S. G., & Miró-Llinares, F. (2022). Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective. Computers in Human Behavior, 126, 106984.

    https://www.sciencedirect.com/science/article/pii/S0747563221003071

    Miró-Llinares, F., & Moneva, A. (2020). Environmental criminology and cybercrime: Shifting focus from the wine to the bottles. The Palgrave handbook of international cybercrime and cyberdeviance, 491-511.

    https://link.springer.com/content/pdf/10.1007/978-3-319-78440-3_30.pdf

    Other

    Hacker Mobility in Cyberspace and the Least Effort Principle: Examining Efficiency in the Journey to Cybercrime

    https://osf.io/ufdp8

    Bhuiyan, Johana (2022, 4 Apr) How can US law enforcement agencies access your data? Let’s count the ways, The Guardian, https://www.theguardian.com/technology/2022/apr/04/us-law-enforcement-agencies-access-your-data-apple-meta

    Carcamo, Cindy (2022, 10 May) Immigration officials created network that can spy on majority of Americans, report says, Los Angeles Times, https://www.latimes.com/california/story/2022-05-10/report-immigration-officials-spying-on-majority-of-americans

  • About our guest:

    You can find out more about the design team for Northsec at https://nsec.io/team/

    Papers or resources mentioned in this episode:

    Challenges from previous northsec competitions can be found here:

    https://nsec.io/competition-write-ups/

    In particular, we referred to this challenge:

    https://github.com/JaneBdemented/NSEC2019_DEFEC8ED_Walkthroughs

    Other:

    If you want to have a try at CTF challenges, you can try this site from Carnegie Mellon University

    https://picoctf.org/

    You can also try this website for getting started with hacking techniques

    https://www.hackthissite.org/

    Jax was actually feeling ill during this interview but did it anyway, what a champion.

  • About our guests:

    Dr Susanne van’t Hoff de Goede

    https://www.thehagueuniversity.com/research/centre-of-expertise/details/centre-of-expertise-cyber-security#team

    https://www.linkedin.com/in/susanne-van-t-hoff-de-goede-8057a98/

    https://victimologie.nl/netwerkleden/susanne-van-t-hoff-de-goede/

    Dominic Vogel

    https://ca.linkedin.com/in/domvogel

    cyber.sc

    Papers or resources mentioned in this episode:

    Van ’t Hoff-de Goede, S., Leukfeldt, R., Van der Kleij, R., & Van de Weijer, S. (2020). The online behaviour and victimization study: The development of an experimental research instrument for measuring and explaining online behaviour and cybercrime victimization. In M. Weulen Kranenbarg & R. Leukfeldt (Eds.), Cybercrime in Context. The human factor in victimization, offending and policing. Springer.

    Van der Kleij, R., Van ’t Hoff-de Goede, S., Van de Weijer, S., & Leukfeldt, R. (2021). How safely do we behave online? An explanatory study into the cybersecurity behaviors of Dutch citizens. In M. Zallio, C. Raymundo Ibañez, & J.H. Hernandez (Eds), Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity. AHFE 2021. Lecture Notes in Networks and Systems, vol 268. Springer, Cham. https://doi.org/10.1007/978-3-030-79997-7_30

    Other:

    We weren't able to include all of the discussion in the podcast, but there is an interesting discussion to be had around the relationship between theory and research method. Often this kind of discussion is around how a theory might shape the research methods that are chosen, in this case Dr van’t Hoff de Goede raised the issue of methods and theory reinforcing each other as the method provides proof of the theory and the theory provides valid application of the method. I am not a great discussant for this particular debate, but I would say that it provides an argument for a greater range of research methods being a component of strong science.

  • About our Guests:

    Dr Tommy Van Steen

    https://www.universiteitleiden.nl/en/staffmembers/tommy-van-steen#tab-1

    Dominic Vogel

    https://ca.linkedin.com/in/domvogel

    cyber.sc

    Papers or resources mentioned in this episode:

    Van Steen, T., Norris, E., Atha, K., & Joinson, A. (2020). What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use?. Journal of Cybersecurity, 6 (1)

    https://academic.oup.com/cybersecurity/article-abstract/6/1/tyaa019/6032830

    Michie S, Richardson M, Johnston M, Abraham C, Francis J, Hardeman W, Eccles MP, Cane J, Wood CE. The behavior change technique taxonomy (v1) of 93 hierarchically clustered techniques: building an international consensus for the reporting of behavior change interventions. Ann Behav Med. 2013 Aug;46(1):81-95. doi: 10.1007/s12160-013-9486-6. PMID: 23512568.

    https://pubmed.ncbi.nlm.nih.gov/23512568/

    Canada Revenue Agency, Be Scam Smart – Tax Refund

    https://www.youtube.com/watch?v=lGNb7JCElzY&list=PLWsWrJHQSlisHkd5uCkyfaO3x2h4P2rsq&index=2

    Other:

    The Behaviour Change Wheel organizes the taxonomy into a way that allows it to be used as a tool during the design and implementation of tools. You can find a presentation from Dr Susan Mitchie, presenting that approach in this video https://www.youtube.com/watch?v=2-KvaIsb0fM

    Thanks to Domenic Vogel’s son for providing some background ambience during the interview. Its always amazing how the sound of a child playing helps adults to remember to play too.

  • About Our Guests:

    Dr. David Maimon

    https://news.gsu.edu/expert/david-maimon/

    Dr. Joshua James

    https://dfir.science/

    Papers or resources mentioned in this article:

    Maimon, D., Howell, C. J., Perkins, R. C., Muniz, C. N., & Berenblum, T. (2021). A Routine Activities Approach to Evidence-Based Risk Assessment: Findings From Two Simulated Phishing Attacks. Social Science Computer Review. https://doi.org/10.1177/08944393211046339

    Maimon, D., Howell, C. J., & Burruss, G. W. (2021). Restrictive deterrence and the scope of hackers’ reoffending: Findings from two randomized field trials. Computers in Human Behavior https://www.sciencedirect.com/science/article/abs/pii/S0747563221002661

    Other:

    Dr Maimon mentions sending a link with a EULA or End User License Agreement. A EULA is a contract between a software producer and the eventual user of the product, specifying the terms and conditions of use.

    The music for this episode is called “G0n3 Ph1sh1ng”. I do like a good metaphor.

    One thou is 25 micrometres. Metric is more precise. In practice, I use both. Such is the joy of Canada.

    You might get 40 rods to the hog’s head and like it that way; I respect that.

  • About our guests:

    Dr. Marleen Weulen Kranenbarg

    https://research.vu.nl/en/persons/marleen-weulen-kranenbarg

    Dr. Joshua James

    https://dfir.science/

    Papers or resources mentioned in this article:

    Weulen Kranenbarg, M., & Leukfeldt, R. (2021). Cybercrime in Context . Springer International Publishing.

    https://link.springer.com/book/10.1007/978-3-030-60527-8

    Weulen Kranenbarg, M., Ruiter, S., & Van Gelder, J. L. (2021). Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders. European Journal of Criminology, 18(3), 386-406.

    Weulen Kranenbarg, M., van der Toolen, Y., & Weerman, F. (2022). Understanding cybercriminal behaviour among young people.

    Weulen Kranenbarg, M., Ruiter, S., Van Gelder, J. L., & Bernasco, W. (2018). Cyber-offending and traditional offending over the life-course: An empirical comparison. Journal of developmental and life-course criminology, 4(3), 343-364.

    Other:

    The episode with Dr. David Decary-Hetu is episode 55, you can go back a couple of episodes to find that or look here: https://cybercrimeology.com/episodes/dark-data-scraping-studying-on-the-dark-web-publishing-on-the-open-web

    I edited this episode a little more aggressively to get it down to 30 minutes, it may have lost a little of its smoothness, but it is concentrated goodness ;).

  • About our Guests

    Dr Maria Grazia Porcedda

    https://www.tcd.ie/research/profiles/?profile=mariagrp

    Dr. Joshua James

    https://dfir.science/

    Papers or resources mentioned in this article:

    Porcedda, M. G., & Wall, D. S. (2021, September). Modelling the Cybercrime Cascade Effect in Data Crime. In 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 161-177). IEEE.

    http://www.tara.tcd.ie/bitstream/handle/2262/97548/2021_Modelling_the_Cybercrime_Cascade_Effect_in_Data_Crime.pdf

    The Cambridge Computer Crime Database (Maintained by Alice Hutchings )

    https://www.cl.cam.ac.uk/~ah793/cccd.html

    The Computer Evidence Database of Computer Misuse Act cases (Maintained by Michael Turner)

    https://www.computerevidence.co.uk/Cases/CMA.htm

    Other:

    During the outro I managed to say "Mater data" instead of "Meta data". I don't think that mater data exists as a term but perhaps we will need it or something like it to describe the data that gave birth to other data. If we keep having to chase data back to its point of origin and it is being transformed and transferred by automatic processes we might well one day have deliberate conversations about mater data. That hasn't happened yet and in this case it was just another of my many mangled mispronunciations.

  • About our Guests:

    Dr David Décary-Hetu

    https://ddhetu.pubpub.org/

    Dr. Joshua James

    https://dfir.science/

    Papers or resources mentioned in this article:

    The Crim Archive.

    https://www.crimrxiv.com/

    Human Cyber-Centric Cybersecurity Partnership

    https://www.hc2p.ca/

    Ouellet, Marie; Décary-Hétu, David; and Bergeron, Andréanne, "Cryptomarkets and the Returns to Criminal Experience" (2022). CSLF Articles. 3. https://scholarworks.gsu.edu/ays_cslf_articles/3

    David Décary-Hétu & Benoit Dupont (2012) The social network of hackers, Global Crime, 13:3, 160-175, DOI: 10.1080/17440572.2012.702523

    Flamand, C., & Décary-Hétu, D. (2019). The Open and Dark Web. The Human Factor of Cybercrime, 34-50.

    Other:

    My husky voice is as a result of testing how much my lung capacity has degraded as a result of covid-19 with a short work through metre deep snow. Turns out it has degraded a lot. If you have wondered if show shoes are worth the hassle, they absolutely are.

  • About our Guests:

    Dr. Bridget Harris

    https://www.qut.edu.au/about/our-people/academic-profiles/bridget.harris

    Dr. Joshua James

    https://dfir.science/

    Papers or resources mentioned in this article:

    Harris, B. (2021). Technology-enabled abuse: how'safety by design' can reduce stalking and domestic violence. The Conversation.

    https://theconversation.com/technology-enabled-abuse-how-safety-by-design-can-reduce-stalking-and-domestic-violence-170636

    Harris, B., & Woodlock, D. (2021). ‘For my safety’: experiences of technology-facilitated abuse among women with intellectual disability or cognitive disability.

    https://apo.org.au/sites/default/files/resource-files/2021-09/apo-nid314044.pdf

    The Australian eSafety Commissioner

    https://www.esafety.gov.au/

    https://www.esafety.gov.au/industry/safety-by-design

    The eSafety Commissioner

    Safety by Design (SbD)

    https://www.esafety.gov.au/about-us/who-we-are/our-legislative-functions

    Other:

    I said the allegory of motor vehicles was revealing. An allegory generally considered to be a story poem or picture with a symbolic meaning such as a moral point of view. Although it didn’t make the final edit there is something to be learned from the story of automobile safety is that safety requires regulation, standards and education and it can be effective.

  • About Our Guests

    (In Order of Appearance)

    Dr. Jin Lee,

    https://cls.gmu.edu/people/jlee331

    Dr. David Buil-Gil

    https://www.research.manchester.ac.uk/portal/david.builgil.html

    Dr. Bridget Harris

    https://www.qut.edu.au/about/our-people/academic-profiles/bridget.harris

    and

    Dr. Cathy Marcum

    https://gjs.appstate.edu/directory/dr-cathy-marcum

    Other:

    I will be honest with you, the mix on this episode is a little rough, forgive me for rushing it a little.

    'Bisney' isn't a word. 'Busy' is what I was aiming for there.

    This episode's track is called ONOSCOMOSOMO. They don't all get names, but this one did.

  • About Our Guest:

    Dr Elisabeth Carter

    https://www.linkedin.com/in/elisabeth-carter-8b372444

    Papers mentioned in this Episode:

    Carter, E. (2021). Distort, extort, deceive and exploit: Exploring the inner workings of a romance fraud. The British Journal of Criminology, 61(2), 283-302.

    https://doi.org/10.1093/bjc/azaa072

    Carter, E. (2015). Laughing matters: A conversation analytic account the use of laughter by suspects and officers in the police interview. Essex Graduate Journal of Sociology, 7(1), 99-113.

    https://bucks.repository.guildhe.ac.uk/id/eprint/9401/1/Carter,%20Elisabeth%20Laughing%20matters.pdf

    Carter, E. (2015). The anatomy of written scam communications: An empirical analysis. Crime, Media, Culture, 11(2), 89-103.

    https://journals.sagepub.com/doi/pdf/10.1177/1741659015572310

    A Guide to Spotting Romance Fraudsters

    https://www.thamesvalley.police.uk/police-forces/thames-valley-police/areas/c/2020/a-guide-to-spotting-romance-fraudsters

    TinEye is a reverse image search tool. You can search with an image for other similar images.

    https://tineye.com/

    If you can't access that then, you can also reverse image search on google.

    https://www.google.com/imghp?hl=en

    About our Expert Guest:

    Dr. Joshua James

    https://dfir.science/

    https://www.youtube.com/DFIRScience

    What we learned:

    What happens where there is a difference in analysis between digital forensics investigators ?

    Like physical evidence there is little room for differences regarding the facts of a case. There might be a different in explanation of the meaning of a piece of evidence depending on the story they are presenting. The tools are an instrument of interpreting the meaning of information on a device and tools can make mistakes. Using multiple tools that extract and analyze data from devices reduces the chance of this happening.

    Other:

    Thanks very much to my neighbours for assisting with the voice over for this episode. I do hope the human/furniture couples ballroom dancing and hollering team goes well in whichever competition you are preparing for. Also thanks to my audio editing software for deciding to have a meltdown and give me the opportunity to do the final mastering twice.

    This episode's track is called 'curious diamonds'. Not all of the songs for podcast episodes get a name, but it did this time.

  • About our Interview Guest:

    Dr Anita Lavorgna

    https://www.southampton.ac.uk/sociology/about/staff/ai11n14.page

    Papers and Publications Mentioned in this Episode:

    Lavorgna, A., & Holt, T. J. (Eds.). (2021). Researching cybercrimes : methodologies, ethics, and critical approaches. Palgrave Macmillan. https://doi.org/10.1007/978-3-030-74837-1

    This book contains the following major sections:

    Knowledge Production and Research Datafication in Cybercrime ResearchMethodologies and Strategies for Cybercrime ResearchGeographies and Cultures of Ethics in Cybercrime Research

    Lavorgna, A., & Ugwudike, P. (2021). The datafication revolution in criminal justice: An empirical exploration of frames portraying data-driven technologies for crime prevention and control. Big Data & Society, 8(2), 20539517211049670.

    https://journals.sagepub.com/doi/pdf/10.1177/20539517211049670

    About our Expert Guest:

    Dr. Joshua James

    https://dfir.science/

    https://www.youtube.com/DFIRScience

    What we learned:

    What is the difference between digital evidence and physical evidence for investigators ?

    Digital evidence always requires active interpretation because it is an abstract series of electrical symbols. Because of this, the interpretation is very important but very difficult. Unlike physical evidence, it can be tested and analyzed indefinitely because it can be copied perfectly, and the accuracy of copies can be verified with hashes.

    Other:

    This episode's track is called 'surfing on white noise'. Not all of the songs for podcast episodes get a name, but it did this time.