SlideShare uma empresa Scribd logo
1 de 13
“Cybercartography” – Applying Global Mapping Techniques toUnderstanding
Cybercrime
Cybercrime inall itsdimensions,includingitsrelationshipwithnation-states,enterprises,transnational
organizedcrime,andprivacyrights,hasbecome anincreasinglyseriousprobleminrecentyears.The
highpriorityof respondingeffectivelytocybercrime hasbeenreaffirmedbynumerousgovernmental,
business,andcitizenstatements. (Obama,2015)
Many soundtechniquestopreventandmitigate harmfromcybercrime have beenrecommended by
responsible organizationssuchasthe OpenWebApplicationSecurityProject(OWASP)andthe US
ComputerEmergencyResponseTeam(US-CERT),aswell assoftware companiesandopensource
organizations,andeffortstoimprove cybersecurityare ongoingthroughthe world. Yetgapsand
vulnerabilitiespersist. Concernishigh:Admiral Michael Rogers,commanderof the U.S.Cyber
Commandand National SecurityAgencydirector,toldthe House PermanentSelectCommittee on
IntelligenceonNov.202014 that the failure torespondwouldleadtoinfrastructure attacksthatare
"trulydestructive." (PermanentHouse SelectCommitteeonIntelligence,2014)Thishasresultedin
demandfornovel methods (Intelligence AdvancedResearchProjectsAgency,2015)
Cybercartography
Thispaperpresentssuggestionsforanexploratoryapproachtounderstandingcybercrime thatwe call
“cybercartography”usinga setof toolsthathave not beenfrequentlyappliedtothisdomain. We refer
to 1) fifty-plusyearsof experience byscientistsandgovernmentsinintegratingsocioeconomicand
political dataorganizedbyadministrativeboundaries withsatelliterasterandglobal griddedglobaldata
sets2) griddedglobal models3) global eventdatasets 4) centuriesof experience withthe artand
science of cartography.To make thislessabstract,considerthe broadgeneralizationthatmostcurrent
generationcyberthreatmapsinvolvelotsof blinkingdotsandnetworkgraphssuperimposedoveran
outline or“blue marble”viewof the world. Thencompare some of the cartographictechniquesthatare
oftenusedtomap otherknowledge domains—forexample, NationalGeographic-stylecartography,
high-resolutionadministrativeboundarymapsproducedusingthe UScensus,andgriddedglobal data
sets. A deeperlevel of insightintothe worldof cybercrime canbe gainedincombiningthe standard
cyberthreatnetworkanalyseswithplace-specificvariableswhichcanleadtogreaterinsightsintowho
the cybercriminalsare,whatmakesaparticularregionfertile ground forthese activities,whysome
regionsare lesssusceptible todevelopingcybercriminals,andwhere new criminalactivitiesare likelyto
spring-upandflourish. Thesedifferentapproachesare notsuperiortoone another,buttheycanbe
complementary.
Figure 1. Left to right: Real-time cyberthreat map (animated) (Norse, 2015); award-winning map of the United States (Imus,
2012); “hard to count” indicator for Census tracts in New York generated using 12 variables (Donnelly, 2010); and Gridded
Population of the World composed of 399,381 administrative boundary units;West Africa is shown (Center for International
Earth Science Information Network, CIAT, & Columbia University, 2005).
Currentmappingof cybercrime seemstobe focusedonreal-timemappingof eventsand technical
attributessuchas IP,port, andsignature. These methodsare well suitedtoseveral fundamental
attributesof the cyberrealm:1) it isa structured networkof networksthatare significantlyindependent
of physical andadministrative boundaries;2) attacksoccur in veryhigh volumesandata microsecond
tempo;3) identificationandattributionof attackersandattack vectorsischallenging;and4) the physical
locationof attackersgenerallydoesnotconstraintheirabilitytolaunchattacks. Butthese fundamentals
are notabsolutes,andcurrentmethodsare part of a systemthatneedsimprovementtomeetits
mission.
Anothersetof issuesarises fromthinkingaboutthe nature of differenttypesof data (asopposedtothe
nature of the realm). Cyberdata is present-focusedandcollectioncanbe close tocomplete, whereas
socioeconomicandpolitical dataare usuallyeitherretrospective orprospective andare usually
characterizedbymanygaps and uncertainties. Retrospective socioeconomicdataare oftensparse with
regardto time and administrative coverage andinconsistentlygathered—forexample,everynation
collectscensusdatainits ownway,oftenona differentschedule thanitspeers,withwidelyvarying
levelsof depthandsophistication. Bythe same token,prospectivedataare,simplyput,projections
whose accuracy has yetto be confirmed. Bythese standards,cyberdata manyadvantages,notleastits
availability andscalability. Yet socioeconomicandpolitical datagatheringisaimedatunderstanding
the human elementof problems, whichisjustasintegral asthe technical elementto“wickedproblems”
such as cybersecuritythatare highlycomplexandresistant tounderstandingandresolution (Buchanan,
1992; Chang,2013; Churchman,1967). Human-focuseddatacan shedlightonintentions,motivations,
and capabilitiesof attackers,illuminatedbytheirsocioeconomiccontext. Similarly,suchdatacan
provide insightintothe extent,nature,andvulnerabilityof humantargetsincontext.
Global Toolkits
We turnnow to a brief discussionof how global socioeconomicandpolitical datahave beenusedin
conjunctionwithglobal datasetsfromphysical andtechnical domains,global eventdata,andglobal
models— togetherconstitutinga“global toolkit”forunderstandingandmanaging global strategicrisks.
Keylandmarksinthe historyof global datasetsinclude programssuchas the CIA’sCORONA program,
LANDSAT,andNASA’SMissiontoPlanetEarth(the Earth ObservingSystem, orEOS),all of whichhave
yieldedimportantresultsinconjunctionwiththe USgovernment’sfundingof socioeconomicand
political datasetsdesignedtocomplementthese satellitecollections.Forexample,CORONA produceda
transformative understandingof the militarycapacitiesof foreignnations,and,wheneventually
declassifiedin1995, proveda vital resource forunderstandinghistorical landuse change and
archaeology.LANDSAThasbeencrucial tonational andinternational assessmentsof currentlanduse
change,desertification,andfoodsecurity. Mission toPlanetEarth (MTPE) has beenvital to
understandingthe pace anddegree of anthropogenicclimate change andinformingthe international
community’sresponse. Inresponse tocallstodemonstrate the social payoffof MTPE,NASA createda
SocioeconomicDataandApplicationsCenter(SEDAC) thathasmade a numberof important
contributions,suchasthe creationof global griddedpopulationdatasets. Robustinternational and
national scientificandpolicyecosystemsincludinggovernment,science,business,andnonprofit
organizationshave sprunguparoundCorona,LANDSAT,MTPE, and manyotherglobal observing
missions. Muchof the value fromthese federalinvestmentshasbeengeneratedbyintegratingglobal
physical andtechnical observationswithglobal administrativeandgriddeddatasets,global eventsdata,
and global models.
Some representative global socioeconomicdatasetsthatmay shedlightonprecursorsto andeffectsof
cybercrime are providedinTable 1and discussedinthe followingtwoparagraphs. Because of the
availabilityof global datasets,amore detailed,statisticallybasedpicture of the cybercriminal can
emerge. Areaswithpoorgovernance are abreedinggroundfortransnational criminalactivity,asare
areas thatare physicallyremote,whichcanbe visualizedathigherresolutionusingglobal mapsof
accessibility. (Keefe,2013; Uchiga & Nelson,2009)
Figure 2. From left to right: inset from remoteness map of the world using travel time cost (Uchiga & Nelson, 2009); output
from the GCAM global gridded climate assessment model showing projected land use change at 1 km grid size (West, Le Page,
Huang, Wolf, & Thomson, 2014); global model predicting areas at high cholera risk (Struck, 2011)
The World Bankand nonprofitorganizationsprovidenational-scale dataongovernance efficacy,
transparency,andcorruption. While cybercrime doesnotrequire highlevelsof skill,educationisa
significantcomponentof national cybercapability.UNESCOhasthe mostcomprehensive global data
regardingeducationandliteracy.Basicdemographicandeconomicconditionssuchasthe prevalence of
15-24 year-oldunder-employedmalescreate apool of potential offenders. (Ojedokun&Eraye,2012)
Social trustbehaviorsexhibitsignificantgeospatial variationinbothintensityandnature—compare trust
inpublicsystems(“social capital”) v.trustintribal,familyororganizedcrime networks (Collins&
Mansell,2004; Johnson& Mislin,2012; WorldValuesSurveyAssociation,2008) Data available from
online social networkscan be usedto model the identityattributesassociatedwithcurrentand
prospective cybercriminality (Fedushko&Bardyn,2013) While social networkdatahave the individual
as the fundamental unitof analysis,such datacan be aggregatedspatiallyandtemporallytothe same
resolutionassocioeconomicdatathatare basedonadministrative boundariesandgathered
periodically.
Global socioeconomicdatamay alsohelpunderstandvulnerabilitytoandimpactsof cybercrime.NASA
and the Departmentof Energy,respectively,fundedthe twomajorgriddedglobal populationdatasets,
the GriddedPopulationof the World(GPW) andLandScan,throughthe EOSSocieoconomicDataand
ApplicationsCenter(SEDAC) andOakRidge National Laboratory(ORNL). These datasetsare the most
significanttoolsavailable forprovidinggeospatially-explicitpopulationaffectedinformationonaglobal
basis. Theyhave beneficial differencesforhazardassessmentinthatGPWdistributesambient
populationtoresidencesinproportiontoadministrative boundariesatnighttime,whereasLandScan
distributespopulationalongroadwaysatnoon. Griddedpopulationdatacomplementsinfrastructure
data by enablingcalculationof affectedpopulationwithinafootprintof the targetedinfrastructure.
Addedprecisionisfeasible whenusing tract- orcounty-level dataforpopulation,socialcharacteristics,
and economicactivity;suchdataare available frommanydeveloped-nationcensusbureaus.
Many ingeniousmethods(withvaryinglevelsof reliability) have beenappliedtothe DMSPNightLights
data setas proxiesforaspectsof global economicandsocial activity (NOAA,2015). Existingdatasets
assessingvulnerabilitytomultiple natural hazards (Dilleyetal.,2005) may be importantfor
understandingthe potentiallydevastatingimpactof acyberattackthat accompaniesorfollowsanatural
disaster.Conversely,cybersecuritydatathatsupportsgeospatial inferencescanalsobe valuable;for
example,OWASP’sTop10 Risksmapsrisksto industries,andindustriescanbe locatedgeospatiallyusing
data such as the U.S. CensusBureau’sOccupational EmploymentStatistics(OES),makingitpossibleto
generate ageospatial footprintforotherwiseabstractcyberriskssuchas SQL injection. (Bureauof Labor
Statistics,2013; OpenWebApplicationSecurityProject,2013)
It isimportantto emphasize thatbothadministrativeboundaryandgridded globaldatasetsare often
created in response tomissionneeds. It can be (andusuallyis) labor-intensive tocreate administrative
data sets. The UnitedStatesgovernmentrecognizes195 independentstates (Office of the Geographer
and Global Issues,Bureauof Intelligence andResearch,&U.S.Departmentof State,2015) whichmeans
that creatinga complete newnational-scale datasetrequiresrepeatinganovel process atleast195
times,oftendealingwithinconsistentorunavailabledata. Forexample,creatingaglobal GISof
populationdataforone particularethnicityinvolvinghandinspectingprintedcensusdataforall the
countriesinthe world,a laborioustaskthatwasrequiredbecause mostcensusbureausonlymake a
subsetof theirinformationavailable online andresearch-intensive because nosinglelibraryinthe world
has a complete collectionof all publishedcensuses (ISciencesLLC,MDA Federal,&General Dynamics,
2006).
Careful attentiontoadministrativeboundarydataisimportant. Inthe contextof cybercrime every
networkdependsonphysical connectionsandeveryattackerhasa physical location,andafundamental
attribute of the worldorderis thateveryphysical location“belongs”to a nestedseriesof administrative
unitswiththe nation-state atthe top;2) political mapping techniquesare designedtobe effective at
summarizinglarge volumesof information;3) aggregate analysismayenable focusonthe evolving
structure of the problemratherthanthe arbitrary details; 4) all thingsbeingequal,administrative
control overa territory doesmake iteasiertoidentifyandneutralizeattackers.(Inaddition,it’sworth
notingthat inthe internetworld,Administrative Domainsare fixedinterconnectionsbetweendomains
that are jointlymanaged,whichhave ageographicmappingcapability.)
Creatingnewglobal griddeddatasetsisalsochallengingandlabor-intensive. Simplifyingconsiderably,
the effortusuallyrequiresdevelopingsome sortof algorithmtoallocate knownorestimatedentitiesto
gridcells;suchalgorithmsmustbe designed,iteratedandvalidated.Differentorganizationshave
differentlevelsof CapabilityMaturityModel Integration (Paulk,1993) interms of creatinggriddedglobal
data sets. For example,NASA hasarelativelymature processthatinvolvescreatinganAlgorithm
Theoretical BasisDocument(ATBD) foreveryderivedproductfromsensorssuchasMODIS. Individual
science researchprojectsare likelytooperate ata lowerCMMI.
Finally,global administrative andgriddeddatasets oftenneedtobe integrated sothatpolicymakers
can make operationallyusefuldecisions. Thisrequiresassigninggridcellstoadministrativeunits,and
generallyinvolvesalgorithmdevelopment.
Table 1. Representative global data sets and models
Name Source Comments
Gridded Population of the
World
CIESIN Distributes ambientpopulation to residences (night
time)
LandScan Oak Ridge National
Laboratory
Distributes ambientpopulation alongroads (day time)
CARMA power plants CARMA All power plants in world by lat/long
Global Education and Literacy
databases
UNESCO Most complete national coverage
Governance World Bank Synthetic indicator created from several variables
Night Lights DMSP Used as proxy for many economic and social activities
Multi-hazard mortality and
economic vulnerability
CIESIN, World Bank,
IBRD
Integrated vulnerability to natural disasters
Global ChangeAssessment
Model
University of Maryland Integrated assessmentof future climatechange
includingboth climateand economic modeling
HealthMap Boston Children’s
Hospital
Epidemic detection and monitoring
Global ethnicity data set ISciences/MDA GIS at lowest availableadministrativeunitper country
Federal
ICEWS DARPA Event detection esp. conflict
Griddedglobal datasetsare a prerequisite tomanytypesof global modelingandintegratedassessment
that work,inessence,bysimulatingflowsthroughgridcellsandevaluatingthe instantandultimate
state of those cellsasmeasuredinvariousdimensions.The minimumcommonresolutionof the data
setsinvolvedgenerallysetsalowerboundonthe precisionwithwhichglobal modelscanbe applied to
particularlocations. Forexample, global socioeconomicandpolitical data at administrative unitorgrid
cell scale maybe lowerresolutionthan physical IPlocationdataatGPS plusrange of error. However,
modelingisaboutfindinguseful levelsof abstraction fromaggregatedglobal data.Forexample,
scientistshave beenabletopredictcholeraattacksaboutsix weeksaheadof time byusingsatellite
sensorstomeasure justthree parameters:chlorophyll,seasurface temperature,andseaheight.
(Colwell,1996; Struck,2011) it maybe interestingtoinvestigate “flowsandstates”of cybercrime at
higherlevelsof aggregationthanusual. Are particulargriddedcellshighlytargetedregardlessof
particularincidentlocations? Doesattackdensity“circulate”amongasetof adjacentor network
connectedcells?Onlyexplorationcananswersuchquestions.
Global eventsclassificationservicesrunningagainstnewsandsocial mediadataare anotherimportant
tool that provide synopticawarenessof emergingglobal trends. Examplesinclude serviceslike
HealthMap(Freifeld,Mandl,Reis,&Brownstein,2008) and the DARPA IntegratedCrisisEarlyWarning
SystemICEWS (Kettler&Hoffman,2012). The companyRecordedFuture hasusedvisualizationand
analysisof eventdatato achieve earlydetectionandunderstandthe historical spreadof malware and
othercyberthreats (Truvé,2011). Global eventanalysis technologieshave beenintegratedwithglobal
data setsand modelstoilluminate issuessuchasthe effectsof climate change onconflict (Hsiang,
Meng,& Cane,2011)and the spreadand impactof infectiousdiseases (Nsoesie,2014). There may be
value inusingeventanalysistechnologiestounderstandandmonitorthe precursorsandenablersof
cybercrime.
Finally,itisworthemphasizingthe value of informationvisualizationincommunicatingwithdecision-
makers. Cartographyisa specializedformof informationvisualizationthatisan art untoitself,andthe
difference betweenmediocre andexcellentcartographycanbe enormous. (Tufte &Graves-Morris,
1983). The expectationthatmapswill be interactive isbecomingstrongerandcustomerexpectationsof
qualityhave risenatthe same time as new formsof visualizationhave proliferated. (The Economist,
2013) Investmentintop-of-the-line cartographyandinformationvisualization islikelytobe cost-
effective,especiallywhenappliedtosupportnovel approachestowickedproblems,where the barriers
to understandingare higher.
Figure 3. Charles Minard’s famous map of Napoleon’s invasion of Russia shows the numbers of troops dwindling on the way to
Moscow and back. The best cartography is both beautiful and enlightening.
Relevance ofCybercartography to National Priorities
The 2011 Departmentof DefenseStrategyforOperatinginCyberspace identifiedfive strategicpriorities:
1) treat cyberspace asan operational domaintoorganize,train,andequipsothatDoD can take full
advantage of cyberspace’spotential
2) EmploynewdefenseoperatingconceptstoprotectDoD networksandsystems
3) PartnerwithotherU.S. governmentdepartmentsandagenciesandthe private sectortoenable
a whole-of-governmentcybersecuritystrategy
4) BuildrobustrelationshipswithU.S.alliesandinternationalpartnerstostrengthencollective
cybersecurity
5) Leverage the nation’singenuitythroughanexceptional cyberworkforce andrapidtechnological
innovation.”
Cybercartographyisan opportunitytoimprove federal capabilityinall these areas.
1) Maps and cartography are fundamental tomilitarytrainingandoperations.
2) Newstrategicoperatingconceptscome new waysof visualizingandmappingthe world.
(Barnett,2005; Kennan,1947; Mackinder,1904).
3) The 2014-2016 National Spatial DataInfrastructure Planreiteratesthat“protectingthe privacy
and securityof citizens’personal data”isa guidingprinciple forall federalagencies. (Federal
GeographicData Committee,2014) Furthermore,whole-of-governmentassessmentsinthe U.S.
and elsewhere have repeatedlyfoundthatacoordinatednational geospatial strategyoffers
benefitssuchasstimulatingeconomicgrowth,savingtaxpayerdollarsandimprovingresults,
and ensuringpublicsafetyandbetterdecisionsupport. (NationalGeospatial Advisory
Committee,2012; Natural ResourcesCanada,2014; Ng SiauYong, 2011)
4) Cartographyisusuallyquite valuableinunderstandinginternational problems—thereisno
betterwayto presentasynopticview of a worldthatis dividedinto192 countries!—and
decision-makersneedanddeserve sophisticatedcartography.
5) Explorationof cybercartographyleveragesbothgovernmentandcivil humancapital and
encouragesitsdevelopment.
a. Afterfiftyyearsof pioneeringGISinvestmentsbygovernmentmostfederalagencies
have strongin-house geospatial workforce;developmentforsome portionforsome
portionof thisstaff couldinclude cybertrainingandbe directedtoaddressthe
executivebranchemphasisoncyberprediction,awareness,response andmitigation.
b. By the same token,the National Geospatial AdvisoryCommitteeobservedthat“ina
highlycompetitive global economy,the UnitedStatescurrentlyoccupiesthe leading
positioninthe geospatial sector.U.S.-basedgeospatial companies,whichgenerate
technical,high-payingjobsinthe UnitedStates,helpdrive the Americaneconomyby
providinggoodsandservicesthatare soldworldwide.A recentstudybythe Centerfor
Strategicand International Studiesestimatedthatgeospatial-relatedcompanies
generate $30 billionannually.The geospatial sectorhasgrownsteadily,withthe
commercial side growingatanacceleratedrate.” (National Geospatial Advisory
Committee,2012)
Otherofficial assessmentshave identifiedsimilarpriorities. Ina 2013 studyfor the legislative branch,
the General AccountingOffice foundfive keychallenge areas. (GovernmentAccountingOffice,2013)
1) designingandimplementingrisk-basedfederal andcritical infrastructureprograms
2) Detecting,respondingto,andmitigatingcyberattacks.
3) ImprovedR&D.
4) International cybersecurity challenges.
5) Shortfallsinpromotingeducation,awareness,andworkforce planning.
Thus the developmentof novel cybercartographycapabilitiesisresponsivetochallengesidentifiedby
boththe political branchesof governments andwill benefitbothnational securityandthe civil sectoras
theyface the potential fora newtype of disaster.Ina 2006 bookentitled SuccessfulResponseStarts
with a Map:A Blueprint forImproving GeospatialData,Tools,and Infrastructure the National Research
Council observed:“Inthe past fewyearsthe UnitedStateshasexperiencedaseriesof disasters,suchas
Hurricane Katrinain 2005, whichhave severelytaxedandinmanycasesoverwhelmedresponding
agencies.Inall aspectsof emergencymanagement,geospatial dataand toolshave the potential tohelp
save lives,limitdamage,andreduce the costsof dealingwithemergencies.” (National ResearchCouncil,
2007) The same studyalso remarkedthat“the effectivenessof anytechnologyisasmuchaboutthe
humansystemsinwhichitis embeddedasaboutthe technologyitself.” A human-driven,proactive and
dynamicprocessforcybercartographyinriskassessmentandresponse isfullyconsistentwithexpressed
national prioritiesforcybersecurity,geospatialdata,andriskassessment.
Conclusion
The precedingdiscussionisnotional. Developinguseful globaldatasetsrequiresdomainexpertise;
understandingof the state of the science andbestpractices;dataacquisition,conditioning,
harmonization,andintegration;errorchecking;informationdesign;andmore:avirtual “fusionlab”.
The importantpointisthat these techniquescanandshouldbe appliedtounderstandingthe
precursors,enablers,targets,andvulnerabilitiesassociatedwithcybercrime.
Bibliography
Barnett,T. P. M. (2005). The Pentagon’snew map:Warand peacein the twenty-firstcentury.Penguin.
Buchanan,R. (1992). Wickedproblemsindesignthinking. Design Issues,5–21.
Bureauof Labor Statistics.(2013).Occupational Employment Statistics.RetrievedJanuary24,2015, from
http://www.bls.gov/oes/tables.htm
CenterforInternational EarthScience InformationNetwork,CIAT,C.I.de A.T., & ColumbiaUniversity.
(2005). GriddedPopulationof the World,Version3(GPWv3):Centroids.Palisades,NY:NASA
SocioeconomicDataandApplicationsCenter(SEDAC).Retrievedfrom
http://dx.doi.org/10.7927/H4TT4NWQ
Chang,F. (2013). Studyingthe “WickedProblem”of CyberSecurity.RetrievedJanuary22,2015, from
http://www.securitymagazine.com/articles/84903-article-headline
Churchman,C. W. (1967). Guest editorial:Wickedproblems.JSTOR.
Collins,B.S.,& Mansell,R.(2004). Cybertrustand crime prevention:asynthesisof the state-of-the-art
science reviews.Retrievedfrom
http://www.foresight.gov.uk/Previous_Projects/Cyber_Trust_and_Crime_Prevention/index.html
Colwell,R.R.(1996). Global climate andinfectiousdisease:the choleraparadigm*. Science, 274(5295),
2025–2031.
Dilley,M.,Chen,R.S.,Deichmann,U.,Lerner-Lam, A.L., Arnold,M., & Burby,R. (2005). NaturalDisaster
Hotspots:A Global Risk AnalysisSynthesisReport.Earth Science (Vol.75,p. 132). The World Bank.
doi:10.1080/01944360902967228
Donnelly,F.(2010).Gothos » BlogArchive » MappingHardto Count AreasforCensus2010. Gothos.
RetrievedJanuary21,2015, fromhttp://gothos.info/2010/02/mapping-hard-to-count-areas-for-
census-2010/
Federal GeographicDataCommittee.(2014).National Spatial DataInfrastructure StrategicPlan,
(December2013). Retrievedfromhttps://www.fgdc.gov/nsdi-plan/nsdi-strategic-plan-2014-2016-
FINAL.pdf
Fedushko,S.,&Bardyn,N. (2013). Algorithmof the Web-PersonalityIdentificationWeb-Personality
Psychological ProfileCreation, 2(4),56–62.
Freifeld,C.C.,Mandl,K. D.,Reis,B. Y., & Brownstein,J.S.(2008). HealthMap:global infectiousdisease
monitoringthroughautomatedclassificationandvisualizationof Internetmediareports. Journalof
the American Medical InformaticsAssociation, 15(2),150–157.
GovernmentAccountingOffice.(2013).Cybersecurity:National Strategy,Roles,andResponsibilities
NeedtoBe BetterDefinedandMore EffectivelyImplemented,(February).Retrievedfrom
http://www.gao.gov/products/GAO-13-187
Hsiang,S. M., Meng,K. C.,& Cane,M. A. (2011). Civil conflictsare associatedwiththe global climate.
Nature,476(7361), 438–441.
Imus,D. (2012). The bestAmericanwall map:DavidImus’“The Essential Geographyof the UnitedStates
of America.”Slate.RetrievedJanuary21,2015, from
http://www.slate.com/articles/arts/culturebox/2012/01/the_best_american_wall_map_david_imus
_the_essential_geography_of_the_united_states_of_america_.html
IntelligenceAdvancedResearchProjectsAgency.(2015).Cyber-attackAutomatedUnconventional
SensorEnvironment(CAUSE).RetrievedJanuary21,2015, from
http://www.iarpa.gov/index.php/research-programs/cause
ISciencesLLC,MDA Federal,&General Dynamics.(2006). DiasporaProject.Arlington,Virginia.
Johnson,N.D.,& Mislin,A.(2012). Howmuch shouldwe trustthe World ValuesSurveytrustquestion?
EconomicsLetters, 116(2), 210–212.
Keefe,P.R.(2013). The Geographyof Badness :Mappingthe Hubs of the IllicitGlobal Economy, 3,97–
109.
Kennan,G.F. (1947). The sourcesof Sovietconduct.ForeignAffairs.
Kettler,B.,& Hoffman,M.(2012). LessonsLearnedinInstabilityModeling,Forecasting,andMitigation
fromthe DARPA IntegratedCrisisEarlyWarningSystem(ICEWS) Program.In 2nd International
Conferenceon Cross-CulturalDecision Making:Focus2012.
Mackinder,H. J.(1904). The geographical pivotof history. TheGeographicalJournal,23(4),421–437.
National Geospatial AdvisoryCommittee.(2012).Toward a national geospatialstrategy,(December).
Retrievedfrom https://www.fgdc.gov/ngac/meetings/december-2012/NGACGeospatialStrategy
Paper.pdf
National ResearchCouncil.(2007).Successful ResponseStartswithaMap: ImprovingGeospatialSupport
for DisasterManagementonPlanningforCatastrophe:aBlueprintfor ImprovingGeospatialData
Tools.National AcademiesPress.Retrievedfromhttp://www.nap.edu/catalog/11793/successful-
response-starts-with-a-map-improving-geospatial-support-for
Natural ResourcesCanada.(2014). The Federal GeospatialPlatform|Natural ResourcesCanada.
RetrievedJanuary21,2015, fromhttp://www.nrcan.gc.ca/earth-sciences/geomatics/canadas-
spatial-data-infrastructure/geospatial-communities/federal
Ng SiauYong.(2011). GeoSpace forSingapore’sWhole of GovernmentDataSharing. ESRIProceedings.
RetrievedJanuary21,2015, from
http://proceedings.esri.com/library/userconf/proc11/papers/3323_50.pdf
NOAA.(2015). NGDC/STP - Defense Meteorological SatelliteProgam, Boulder.RetrievedJanuary23,
2015, fromhttp://ngdc.noaa.gov/eog/pubs_new.html
Norse.(2015). Norse - IPVikingLive.RetrievedJanuary21,2015, from
http://www.iarpa.gov/index.php/research-programs/cause
Nsoesie,E.(2014).Digital Disease Detection:AnIntroduction. HealthMap.RetrievedJanuary23, 2015,
fromhttp://www.healthmap.org/site/diseasedaily/article/digital-disease-detection-introduction-
21114
Obama,P. B. (2015). State of the unionaddress.
Office of the GeographerandGlobal Issues,Bureauof Intelligence andResearch,&U.S.Departmentof
State.(2015). IndependentStatesinthe World.RetrievedJanuary26,2015, from
http://www.state.gov/s/inr/rls/4250.htm
Ojedokun,U.A.,& Eraye,M. C. (2012). Socioeconomiclifestylesof the yahoo-boys:A studyof
perceptionsof universitystudentsinNigeria. InternationalJournalof CyberCriminology,6(2),1001–
1013.
OpenWebApplicationSecurityProject.(2013).The TenMost Critical WebApplicationSecurityRisks
2013. The Ten Most Critical WebApplicationSecurityRisks.
Paulk,M. (1993). Capabilitymaturitymodelforsoftware.WileyOnline Library.
PermanentHouse SelectCommittee onIntelligence.(2014).HearingonCybersecurityThreats. CSPAN.
RetrievedJanuary24,2015, fromhttp://www.c-span.org/video/?322853-1/hearing-cybersecurity-
threats
Struck,D. (2011). Satellite DataAidsinPredictingCholeraOutbreaks - ScientificAmerican. Scientific
American.RetrievedJanuary26,2015, from http://www.scientificamerican.com/article/satellite-
data-aids-in-predicting-cholera-outbreaks/
The Economist.(2013). Infographics:Windsof change. TheEconomist.RetrievedJanuary23,2015, from
http://www.economist.com/news/books-and-arts/21580446-revolution-taking-place-how-visualise-
information-winds-change
Truvé,S. (2011). Big Data for the future:Unlockingthe predictivepowerof the Web. Recorded Future,
Cambridge,MA,Tech.Rep.
Tufte,E. R.,& Graves-Morris,P.R.(1983). The visual display of quantitativeinformation (Vol.2).
GraphicspressCheshire,CT.
Uchiga, H.,& Nelson,A.(2009).Travel time to majorcities:A global mapof Accessibility. JointResearch
Centre.RetrievedJanuary25,2015, fromhttp://bioval.jrc.ec.europa.eu/products/gam/index.htm
West,T. O., Le Page,Y., Huang,M., Wolf,J.,& Thomson,A.M. (2014). Downscalingglobal landcover
projectionsfromanintegrated assessmentmodel foruse inregional analyses:resultsand
evaluationforthe USfrom 2005 to 2095. EnvironmentalResearch Letters, 9(6),64004.
WorldValuesSurveyAssociation.(2008). World valuessurvey.AnnArbor.

Mais conteúdo relacionado

Mais procurados

Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Sara-Jayne Terp
 
Enhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerEnhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerAmit Sheth
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacyvivatechijri
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Jose Gonzalez
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on TerrorTpeisi Nesby
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of warMark Johnson
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
English presentation
English presentationEnglish presentation
English presentationGinaSoler10
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social TakeoverZeroFOX
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaREVULN
 

Mais procurados (20)

Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...
 
Enhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerEnhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft Power
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
 
204
204204
204
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of war
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
English presentation
English presentationEnglish presentation
English presentation
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 

Semelhante a Cybercrime & global mapping

Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...drboon
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET Journal
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks  REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks ESADE
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Reportprashant3535
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...adnis1
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONSTATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONIJNSA Journal
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT GroupCXT Group
 
by Warren Jin
by Warren Jin by Warren Jin
by Warren Jin butest
 

Semelhante a Cybercrime & global mapping (20)

Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks  REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Report
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONSTATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT Group
 
by Warren Jin
by Warren Jin by Warren Jin
by Warren Jin
 

Último

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

Cybercrime & global mapping

  • 1. “Cybercartography” – Applying Global Mapping Techniques toUnderstanding Cybercrime Cybercrime inall itsdimensions,includingitsrelationshipwithnation-states,enterprises,transnational organizedcrime,andprivacyrights,hasbecome anincreasinglyseriousprobleminrecentyears.The highpriorityof respondingeffectivelytocybercrime hasbeenreaffirmedbynumerousgovernmental, business,andcitizenstatements. (Obama,2015) Many soundtechniquestopreventandmitigate harmfromcybercrime have beenrecommended by responsible organizationssuchasthe OpenWebApplicationSecurityProject(OWASP)andthe US ComputerEmergencyResponseTeam(US-CERT),aswell assoftware companiesandopensource organizations,andeffortstoimprove cybersecurityare ongoingthroughthe world. Yetgapsand vulnerabilitiespersist. Concernishigh:Admiral Michael Rogers,commanderof the U.S.Cyber Commandand National SecurityAgencydirector,toldthe House PermanentSelectCommittee on IntelligenceonNov.202014 that the failure torespondwouldleadtoinfrastructure attacksthatare "trulydestructive." (PermanentHouse SelectCommitteeonIntelligence,2014)Thishasresultedin demandfornovel methods (Intelligence AdvancedResearchProjectsAgency,2015) Cybercartography Thispaperpresentssuggestionsforanexploratoryapproachtounderstandingcybercrime thatwe call “cybercartography”usinga setof toolsthathave not beenfrequentlyappliedtothisdomain. We refer to 1) fifty-plusyearsof experience byscientistsandgovernmentsinintegratingsocioeconomicand political dataorganizedbyadministrativeboundaries withsatelliterasterandglobal griddedglobaldata sets2) griddedglobal models3) global eventdatasets 4) centuriesof experience withthe artand science of cartography.To make thislessabstract,considerthe broadgeneralizationthatmostcurrent generationcyberthreatmapsinvolvelotsof blinkingdotsandnetworkgraphssuperimposedoveran outline or“blue marble”viewof the world. Thencompare some of the cartographictechniquesthatare oftenusedtomap otherknowledge domains—forexample, NationalGeographic-stylecartography, high-resolutionadministrativeboundarymapsproducedusingthe UScensus,andgriddedglobal data sets. A deeperlevel of insightintothe worldof cybercrime canbe gainedincombiningthe standard cyberthreatnetworkanalyseswithplace-specificvariableswhichcanleadtogreaterinsightsintowho the cybercriminalsare,whatmakesaparticularregionfertile ground forthese activities,whysome regionsare lesssusceptible todevelopingcybercriminals,andwhere new criminalactivitiesare likelyto spring-upandflourish. Thesedifferentapproachesare notsuperiortoone another,buttheycanbe complementary.
  • 2. Figure 1. Left to right: Real-time cyberthreat map (animated) (Norse, 2015); award-winning map of the United States (Imus, 2012); “hard to count” indicator for Census tracts in New York generated using 12 variables (Donnelly, 2010); and Gridded Population of the World composed of 399,381 administrative boundary units;West Africa is shown (Center for International Earth Science Information Network, CIAT, & Columbia University, 2005). Currentmappingof cybercrime seemstobe focusedonreal-timemappingof eventsand technical attributessuchas IP,port, andsignature. These methodsare well suitedtoseveral fundamental attributesof the cyberrealm:1) it isa structured networkof networksthatare significantlyindependent of physical andadministrative boundaries;2) attacksoccur in veryhigh volumesandata microsecond tempo;3) identificationandattributionof attackersandattack vectorsischallenging;and4) the physical locationof attackersgenerallydoesnotconstraintheirabilitytolaunchattacks. Butthese fundamentals are notabsolutes,andcurrentmethodsare part of a systemthatneedsimprovementtomeetits mission. Anothersetof issuesarises fromthinkingaboutthe nature of differenttypesof data (asopposedtothe nature of the realm). Cyberdata is present-focusedandcollectioncanbe close tocomplete, whereas socioeconomicandpolitical dataare usuallyeitherretrospective orprospective andare usually characterizedbymanygaps and uncertainties. Retrospective socioeconomicdataare oftensparse with regardto time and administrative coverage andinconsistentlygathered—forexample,everynation collectscensusdatainits ownway,oftenona differentschedule thanitspeers,withwidelyvarying levelsof depthandsophistication. Bythe same token,prospectivedataare,simplyput,projections whose accuracy has yetto be confirmed. Bythese standards,cyberdata manyadvantages,notleastits availability andscalability. Yet socioeconomicandpolitical datagatheringisaimedatunderstanding the human elementof problems, whichisjustasintegral asthe technical elementto“wickedproblems” such as cybersecuritythatare highlycomplexandresistant tounderstandingandresolution (Buchanan, 1992; Chang,2013; Churchman,1967). Human-focuseddatacan shedlightonintentions,motivations, and capabilitiesof attackers,illuminatedbytheirsocioeconomiccontext. Similarly,suchdatacan provide insightintothe extent,nature,andvulnerabilityof humantargetsincontext. Global Toolkits We turnnow to a brief discussionof how global socioeconomicandpolitical datahave beenusedin conjunctionwithglobal datasetsfromphysical andtechnical domains,global eventdata,andglobal models— togetherconstitutinga“global toolkit”forunderstandingandmanaging global strategicrisks. Keylandmarksinthe historyof global datasetsinclude programssuchas the CIA’sCORONA program, LANDSAT,andNASA’SMissiontoPlanetEarth(the Earth ObservingSystem, orEOS),all of whichhave yieldedimportantresultsinconjunctionwiththe USgovernment’sfundingof socioeconomicand
  • 3. political datasetsdesignedtocomplementthese satellitecollections.Forexample,CORONA produceda transformative understandingof the militarycapacitiesof foreignnations,and,wheneventually declassifiedin1995, proveda vital resource forunderstandinghistorical landuse change and archaeology.LANDSAThasbeencrucial tonational andinternational assessmentsof currentlanduse change,desertification,andfoodsecurity. Mission toPlanetEarth (MTPE) has beenvital to understandingthe pace anddegree of anthropogenicclimate change andinformingthe international community’sresponse. Inresponse tocallstodemonstrate the social payoffof MTPE,NASA createda SocioeconomicDataandApplicationsCenter(SEDAC) thathasmade a numberof important contributions,suchasthe creationof global griddedpopulationdatasets. Robustinternational and national scientificandpolicyecosystemsincludinggovernment,science,business,andnonprofit organizationshave sprunguparoundCorona,LANDSAT,MTPE, and manyotherglobal observing missions. Muchof the value fromthese federalinvestmentshasbeengeneratedbyintegratingglobal physical andtechnical observationswithglobal administrativeandgriddeddatasets,global eventsdata, and global models. Some representative global socioeconomicdatasetsthatmay shedlightonprecursorsto andeffectsof cybercrime are providedinTable 1and discussedinthe followingtwoparagraphs. Because of the availabilityof global datasets,amore detailed,statisticallybasedpicture of the cybercriminal can emerge. Areaswithpoorgovernance are abreedinggroundfortransnational criminalactivity,asare areas thatare physicallyremote,whichcanbe visualizedathigherresolutionusingglobal mapsof accessibility. (Keefe,2013; Uchiga & Nelson,2009) Figure 2. From left to right: inset from remoteness map of the world using travel time cost (Uchiga & Nelson, 2009); output from the GCAM global gridded climate assessment model showing projected land use change at 1 km grid size (West, Le Page, Huang, Wolf, & Thomson, 2014); global model predicting areas at high cholera risk (Struck, 2011) The World Bankand nonprofitorganizationsprovidenational-scale dataongovernance efficacy, transparency,andcorruption. While cybercrime doesnotrequire highlevelsof skill,educationisa significantcomponentof national cybercapability.UNESCOhasthe mostcomprehensive global data regardingeducationandliteracy.Basicdemographicandeconomicconditionssuchasthe prevalence of 15-24 year-oldunder-employedmalescreate apool of potential offenders. (Ojedokun&Eraye,2012) Social trustbehaviorsexhibitsignificantgeospatial variationinbothintensityandnature—compare trust inpublicsystems(“social capital”) v.trustintribal,familyororganizedcrime networks (Collins& Mansell,2004; Johnson& Mislin,2012; WorldValuesSurveyAssociation,2008) Data available from online social networkscan be usedto model the identityattributesassociatedwithcurrentand
  • 4. prospective cybercriminality (Fedushko&Bardyn,2013) While social networkdatahave the individual as the fundamental unitof analysis,such datacan be aggregatedspatiallyandtemporallytothe same resolutionassocioeconomicdatathatare basedonadministrative boundariesandgathered periodically. Global socioeconomicdatamay alsohelpunderstandvulnerabilitytoandimpactsof cybercrime.NASA and the Departmentof Energy,respectively,fundedthe twomajorgriddedglobal populationdatasets, the GriddedPopulationof the World(GPW) andLandScan,throughthe EOSSocieoconomicDataand ApplicationsCenter(SEDAC) andOakRidge National Laboratory(ORNL). These datasetsare the most significanttoolsavailable forprovidinggeospatially-explicitpopulationaffectedinformationonaglobal basis. Theyhave beneficial differencesforhazardassessmentinthatGPWdistributesambient populationtoresidencesinproportiontoadministrative boundariesatnighttime,whereasLandScan distributespopulationalongroadwaysatnoon. Griddedpopulationdatacomplementsinfrastructure data by enablingcalculationof affectedpopulationwithinafootprintof the targetedinfrastructure. Addedprecisionisfeasible whenusing tract- orcounty-level dataforpopulation,socialcharacteristics, and economicactivity;suchdataare available frommanydeveloped-nationcensusbureaus. Many ingeniousmethods(withvaryinglevelsof reliability) have beenappliedtothe DMSPNightLights data setas proxiesforaspectsof global economicandsocial activity (NOAA,2015). Existingdatasets assessingvulnerabilitytomultiple natural hazards (Dilleyetal.,2005) may be importantfor understandingthe potentiallydevastatingimpactof acyberattackthat accompaniesorfollowsanatural disaster.Conversely,cybersecuritydatathatsupportsgeospatial inferencescanalsobe valuable;for example,OWASP’sTop10 Risksmapsrisksto industries,andindustriescanbe locatedgeospatiallyusing data such as the U.S. CensusBureau’sOccupational EmploymentStatistics(OES),makingitpossibleto generate ageospatial footprintforotherwiseabstractcyberriskssuchas SQL injection. (Bureauof Labor Statistics,2013; OpenWebApplicationSecurityProject,2013) It isimportantto emphasize thatbothadministrativeboundaryandgridded globaldatasetsare often created in response tomissionneeds. It can be (andusuallyis) labor-intensive tocreate administrative data sets. The UnitedStatesgovernmentrecognizes195 independentstates (Office of the Geographer and Global Issues,Bureauof Intelligence andResearch,&U.S.Departmentof State,2015) whichmeans that creatinga complete newnational-scale datasetrequiresrepeatinganovel process atleast195 times,oftendealingwithinconsistentorunavailabledata. Forexample,creatingaglobal GISof populationdataforone particularethnicityinvolvinghandinspectingprintedcensusdataforall the countriesinthe world,a laborioustaskthatwasrequiredbecause mostcensusbureausonlymake a subsetof theirinformationavailable online andresearch-intensive because nosinglelibraryinthe world has a complete collectionof all publishedcensuses (ISciencesLLC,MDA Federal,&General Dynamics, 2006). Careful attentiontoadministrativeboundarydataisimportant. Inthe contextof cybercrime every networkdependsonphysical connectionsandeveryattackerhasa physical location,andafundamental attribute of the worldorderis thateveryphysical location“belongs”to a nestedseriesof administrative unitswiththe nation-state atthe top;2) political mapping techniquesare designedtobe effective at
  • 5. summarizinglarge volumesof information;3) aggregate analysismayenable focusonthe evolving structure of the problemratherthanthe arbitrary details; 4) all thingsbeingequal,administrative control overa territory doesmake iteasiertoidentifyandneutralizeattackers.(Inaddition,it’sworth notingthat inthe internetworld,Administrative Domainsare fixedinterconnectionsbetweendomains that are jointlymanaged,whichhave ageographicmappingcapability.) Creatingnewglobal griddeddatasetsisalsochallengingandlabor-intensive. Simplifyingconsiderably, the effortusuallyrequiresdevelopingsome sortof algorithmtoallocate knownorestimatedentitiesto gridcells;suchalgorithmsmustbe designed,iteratedandvalidated.Differentorganizationshave differentlevelsof CapabilityMaturityModel Integration (Paulk,1993) interms of creatinggriddedglobal data sets. For example,NASA hasarelativelymature processthatinvolvescreatinganAlgorithm Theoretical BasisDocument(ATBD) foreveryderivedproductfromsensorssuchasMODIS. Individual science researchprojectsare likelytooperate ata lowerCMMI. Finally,global administrative andgriddeddatasets oftenneedtobe integrated sothatpolicymakers can make operationallyusefuldecisions. Thisrequiresassigninggridcellstoadministrativeunits,and generallyinvolvesalgorithmdevelopment. Table 1. Representative global data sets and models Name Source Comments Gridded Population of the World CIESIN Distributes ambientpopulation to residences (night time) LandScan Oak Ridge National Laboratory Distributes ambientpopulation alongroads (day time) CARMA power plants CARMA All power plants in world by lat/long Global Education and Literacy databases UNESCO Most complete national coverage Governance World Bank Synthetic indicator created from several variables Night Lights DMSP Used as proxy for many economic and social activities Multi-hazard mortality and economic vulnerability CIESIN, World Bank, IBRD Integrated vulnerability to natural disasters Global ChangeAssessment Model University of Maryland Integrated assessmentof future climatechange includingboth climateand economic modeling HealthMap Boston Children’s Hospital Epidemic detection and monitoring Global ethnicity data set ISciences/MDA GIS at lowest availableadministrativeunitper country
  • 6. Federal ICEWS DARPA Event detection esp. conflict Griddedglobal datasetsare a prerequisite tomanytypesof global modelingandintegratedassessment that work,inessence,bysimulatingflowsthroughgridcellsandevaluatingthe instantandultimate state of those cellsasmeasuredinvariousdimensions.The minimumcommonresolutionof the data setsinvolvedgenerallysetsalowerboundonthe precisionwithwhichglobal modelscanbe applied to particularlocations. Forexample, global socioeconomicandpolitical data at administrative unitorgrid cell scale maybe lowerresolutionthan physical IPlocationdataatGPS plusrange of error. However, modelingisaboutfindinguseful levelsof abstraction fromaggregatedglobal data.Forexample, scientistshave beenabletopredictcholeraattacksaboutsix weeksaheadof time byusingsatellite sensorstomeasure justthree parameters:chlorophyll,seasurface temperature,andseaheight. (Colwell,1996; Struck,2011) it maybe interestingtoinvestigate “flowsandstates”of cybercrime at higherlevelsof aggregationthanusual. Are particulargriddedcellshighlytargetedregardlessof particularincidentlocations? Doesattackdensity“circulate”amongasetof adjacentor network connectedcells?Onlyexplorationcananswersuchquestions. Global eventsclassificationservicesrunningagainstnewsandsocial mediadataare anotherimportant tool that provide synopticawarenessof emergingglobal trends. Examplesinclude serviceslike HealthMap(Freifeld,Mandl,Reis,&Brownstein,2008) and the DARPA IntegratedCrisisEarlyWarning SystemICEWS (Kettler&Hoffman,2012). The companyRecordedFuture hasusedvisualizationand analysisof eventdatato achieve earlydetectionandunderstandthe historical spreadof malware and othercyberthreats (Truvé,2011). Global eventanalysis technologieshave beenintegratedwithglobal data setsand modelstoilluminate issuessuchasthe effectsof climate change onconflict (Hsiang, Meng,& Cane,2011)and the spreadand impactof infectiousdiseases (Nsoesie,2014). There may be value inusingeventanalysistechnologiestounderstandandmonitorthe precursorsandenablersof cybercrime. Finally,itisworthemphasizingthe value of informationvisualizationincommunicatingwithdecision- makers. Cartographyisa specializedformof informationvisualizationthatisan art untoitself,andthe difference betweenmediocre andexcellentcartographycanbe enormous. (Tufte &Graves-Morris, 1983). The expectationthatmapswill be interactive isbecomingstrongerandcustomerexpectationsof qualityhave risenatthe same time as new formsof visualizationhave proliferated. (The Economist, 2013) Investmentintop-of-the-line cartographyandinformationvisualization islikelytobe cost- effective,especiallywhenappliedtosupportnovel approachestowickedproblems,where the barriers to understandingare higher.
  • 7. Figure 3. Charles Minard’s famous map of Napoleon’s invasion of Russia shows the numbers of troops dwindling on the way to Moscow and back. The best cartography is both beautiful and enlightening. Relevance ofCybercartography to National Priorities The 2011 Departmentof DefenseStrategyforOperatinginCyberspace identifiedfive strategicpriorities: 1) treat cyberspace asan operational domaintoorganize,train,andequipsothatDoD can take full advantage of cyberspace’spotential 2) EmploynewdefenseoperatingconceptstoprotectDoD networksandsystems 3) PartnerwithotherU.S. governmentdepartmentsandagenciesandthe private sectortoenable a whole-of-governmentcybersecuritystrategy 4) BuildrobustrelationshipswithU.S.alliesandinternationalpartnerstostrengthencollective cybersecurity 5) Leverage the nation’singenuitythroughanexceptional cyberworkforce andrapidtechnological innovation.” Cybercartographyisan opportunitytoimprove federal capabilityinall these areas. 1) Maps and cartography are fundamental tomilitarytrainingandoperations. 2) Newstrategicoperatingconceptscome new waysof visualizingandmappingthe world. (Barnett,2005; Kennan,1947; Mackinder,1904). 3) The 2014-2016 National Spatial DataInfrastructure Planreiteratesthat“protectingthe privacy and securityof citizens’personal data”isa guidingprinciple forall federalagencies. (Federal GeographicData Committee,2014) Furthermore,whole-of-governmentassessmentsinthe U.S. and elsewhere have repeatedlyfoundthatacoordinatednational geospatial strategyoffers benefitssuchasstimulatingeconomicgrowth,savingtaxpayerdollarsandimprovingresults, and ensuringpublicsafetyandbetterdecisionsupport. (NationalGeospatial Advisory Committee,2012; Natural ResourcesCanada,2014; Ng SiauYong, 2011)
  • 8. 4) Cartographyisusuallyquite valuableinunderstandinginternational problems—thereisno betterwayto presentasynopticview of a worldthatis dividedinto192 countries!—and decision-makersneedanddeserve sophisticatedcartography. 5) Explorationof cybercartographyleveragesbothgovernmentandcivil humancapital and encouragesitsdevelopment. a. Afterfiftyyearsof pioneeringGISinvestmentsbygovernmentmostfederalagencies have strongin-house geospatial workforce;developmentforsome portionforsome portionof thisstaff couldinclude cybertrainingandbe directedtoaddressthe executivebranchemphasisoncyberprediction,awareness,response andmitigation. b. By the same token,the National Geospatial AdvisoryCommitteeobservedthat“ina highlycompetitive global economy,the UnitedStatescurrentlyoccupiesthe leading positioninthe geospatial sector.U.S.-basedgeospatial companies,whichgenerate technical,high-payingjobsinthe UnitedStates,helpdrive the Americaneconomyby providinggoodsandservicesthatare soldworldwide.A recentstudybythe Centerfor Strategicand International Studiesestimatedthatgeospatial-relatedcompanies generate $30 billionannually.The geospatial sectorhasgrownsteadily,withthe commercial side growingatanacceleratedrate.” (National Geospatial Advisory Committee,2012) Otherofficial assessmentshave identifiedsimilarpriorities. Ina 2013 studyfor the legislative branch, the General AccountingOffice foundfive keychallenge areas. (GovernmentAccountingOffice,2013) 1) designingandimplementingrisk-basedfederal andcritical infrastructureprograms 2) Detecting,respondingto,andmitigatingcyberattacks. 3) ImprovedR&D. 4) International cybersecurity challenges. 5) Shortfallsinpromotingeducation,awareness,andworkforce planning. Thus the developmentof novel cybercartographycapabilitiesisresponsivetochallengesidentifiedby boththe political branchesof governments andwill benefitbothnational securityandthe civil sectoras theyface the potential fora newtype of disaster.Ina 2006 bookentitled SuccessfulResponseStarts with a Map:A Blueprint forImproving GeospatialData,Tools,and Infrastructure the National Research Council observed:“Inthe past fewyearsthe UnitedStateshasexperiencedaseriesof disasters,suchas Hurricane Katrinain 2005, whichhave severelytaxedandinmanycasesoverwhelmedresponding agencies.Inall aspectsof emergencymanagement,geospatial dataand toolshave the potential tohelp save lives,limitdamage,andreduce the costsof dealingwithemergencies.” (National ResearchCouncil, 2007) The same studyalso remarkedthat“the effectivenessof anytechnologyisasmuchaboutthe humansystemsinwhichitis embeddedasaboutthe technologyitself.” A human-driven,proactive and dynamicprocessforcybercartographyinriskassessmentandresponse isfullyconsistentwithexpressed national prioritiesforcybersecurity,geospatialdata,andriskassessment.
  • 9. Conclusion The precedingdiscussionisnotional. Developinguseful globaldatasetsrequiresdomainexpertise; understandingof the state of the science andbestpractices;dataacquisition,conditioning, harmonization,andintegration;errorchecking;informationdesign;andmore:avirtual “fusionlab”. The importantpointisthat these techniquescanandshouldbe appliedtounderstandingthe precursors,enablers,targets,andvulnerabilitiesassociatedwithcybercrime.
  • 10. Bibliography Barnett,T. P. M. (2005). The Pentagon’snew map:Warand peacein the twenty-firstcentury.Penguin. Buchanan,R. (1992). Wickedproblemsindesignthinking. Design Issues,5–21. Bureauof Labor Statistics.(2013).Occupational Employment Statistics.RetrievedJanuary24,2015, from http://www.bls.gov/oes/tables.htm CenterforInternational EarthScience InformationNetwork,CIAT,C.I.de A.T., & ColumbiaUniversity. (2005). GriddedPopulationof the World,Version3(GPWv3):Centroids.Palisades,NY:NASA SocioeconomicDataandApplicationsCenter(SEDAC).Retrievedfrom http://dx.doi.org/10.7927/H4TT4NWQ Chang,F. (2013). Studyingthe “WickedProblem”of CyberSecurity.RetrievedJanuary22,2015, from http://www.securitymagazine.com/articles/84903-article-headline Churchman,C. W. (1967). Guest editorial:Wickedproblems.JSTOR. Collins,B.S.,& Mansell,R.(2004). Cybertrustand crime prevention:asynthesisof the state-of-the-art science reviews.Retrievedfrom http://www.foresight.gov.uk/Previous_Projects/Cyber_Trust_and_Crime_Prevention/index.html Colwell,R.R.(1996). Global climate andinfectiousdisease:the choleraparadigm*. Science, 274(5295), 2025–2031. Dilley,M.,Chen,R.S.,Deichmann,U.,Lerner-Lam, A.L., Arnold,M., & Burby,R. (2005). NaturalDisaster Hotspots:A Global Risk AnalysisSynthesisReport.Earth Science (Vol.75,p. 132). The World Bank. doi:10.1080/01944360902967228 Donnelly,F.(2010).Gothos » BlogArchive » MappingHardto Count AreasforCensus2010. Gothos. RetrievedJanuary21,2015, fromhttp://gothos.info/2010/02/mapping-hard-to-count-areas-for- census-2010/ Federal GeographicDataCommittee.(2014).National Spatial DataInfrastructure StrategicPlan, (December2013). Retrievedfromhttps://www.fgdc.gov/nsdi-plan/nsdi-strategic-plan-2014-2016- FINAL.pdf Fedushko,S.,&Bardyn,N. (2013). Algorithmof the Web-PersonalityIdentificationWeb-Personality Psychological ProfileCreation, 2(4),56–62. Freifeld,C.C.,Mandl,K. D.,Reis,B. Y., & Brownstein,J.S.(2008). HealthMap:global infectiousdisease monitoringthroughautomatedclassificationandvisualizationof Internetmediareports. Journalof the American Medical InformaticsAssociation, 15(2),150–157.
  • 11. GovernmentAccountingOffice.(2013).Cybersecurity:National Strategy,Roles,andResponsibilities NeedtoBe BetterDefinedandMore EffectivelyImplemented,(February).Retrievedfrom http://www.gao.gov/products/GAO-13-187 Hsiang,S. M., Meng,K. C.,& Cane,M. A. (2011). Civil conflictsare associatedwiththe global climate. Nature,476(7361), 438–441. Imus,D. (2012). The bestAmericanwall map:DavidImus’“The Essential Geographyof the UnitedStates of America.”Slate.RetrievedJanuary21,2015, from http://www.slate.com/articles/arts/culturebox/2012/01/the_best_american_wall_map_david_imus _the_essential_geography_of_the_united_states_of_america_.html IntelligenceAdvancedResearchProjectsAgency.(2015).Cyber-attackAutomatedUnconventional SensorEnvironment(CAUSE).RetrievedJanuary21,2015, from http://www.iarpa.gov/index.php/research-programs/cause ISciencesLLC,MDA Federal,&General Dynamics.(2006). DiasporaProject.Arlington,Virginia. Johnson,N.D.,& Mislin,A.(2012). Howmuch shouldwe trustthe World ValuesSurveytrustquestion? EconomicsLetters, 116(2), 210–212. Keefe,P.R.(2013). The Geographyof Badness :Mappingthe Hubs of the IllicitGlobal Economy, 3,97– 109. Kennan,G.F. (1947). The sourcesof Sovietconduct.ForeignAffairs. Kettler,B.,& Hoffman,M.(2012). LessonsLearnedinInstabilityModeling,Forecasting,andMitigation fromthe DARPA IntegratedCrisisEarlyWarningSystem(ICEWS) Program.In 2nd International Conferenceon Cross-CulturalDecision Making:Focus2012. Mackinder,H. J.(1904). The geographical pivotof history. TheGeographicalJournal,23(4),421–437. National Geospatial AdvisoryCommittee.(2012).Toward a national geospatialstrategy,(December). Retrievedfrom https://www.fgdc.gov/ngac/meetings/december-2012/NGACGeospatialStrategy Paper.pdf National ResearchCouncil.(2007).Successful ResponseStartswithaMap: ImprovingGeospatialSupport for DisasterManagementonPlanningforCatastrophe:aBlueprintfor ImprovingGeospatialData Tools.National AcademiesPress.Retrievedfromhttp://www.nap.edu/catalog/11793/successful- response-starts-with-a-map-improving-geospatial-support-for Natural ResourcesCanada.(2014). The Federal GeospatialPlatform|Natural ResourcesCanada. RetrievedJanuary21,2015, fromhttp://www.nrcan.gc.ca/earth-sciences/geomatics/canadas- spatial-data-infrastructure/geospatial-communities/federal
  • 12. Ng SiauYong.(2011). GeoSpace forSingapore’sWhole of GovernmentDataSharing. ESRIProceedings. RetrievedJanuary21,2015, from http://proceedings.esri.com/library/userconf/proc11/papers/3323_50.pdf NOAA.(2015). NGDC/STP - Defense Meteorological SatelliteProgam, Boulder.RetrievedJanuary23, 2015, fromhttp://ngdc.noaa.gov/eog/pubs_new.html Norse.(2015). Norse - IPVikingLive.RetrievedJanuary21,2015, from http://www.iarpa.gov/index.php/research-programs/cause Nsoesie,E.(2014).Digital Disease Detection:AnIntroduction. HealthMap.RetrievedJanuary23, 2015, fromhttp://www.healthmap.org/site/diseasedaily/article/digital-disease-detection-introduction- 21114 Obama,P. B. (2015). State of the unionaddress. Office of the GeographerandGlobal Issues,Bureauof Intelligence andResearch,&U.S.Departmentof State.(2015). IndependentStatesinthe World.RetrievedJanuary26,2015, from http://www.state.gov/s/inr/rls/4250.htm Ojedokun,U.A.,& Eraye,M. C. (2012). Socioeconomiclifestylesof the yahoo-boys:A studyof perceptionsof universitystudentsinNigeria. InternationalJournalof CyberCriminology,6(2),1001– 1013. OpenWebApplicationSecurityProject.(2013).The TenMost Critical WebApplicationSecurityRisks 2013. The Ten Most Critical WebApplicationSecurityRisks. Paulk,M. (1993). Capabilitymaturitymodelforsoftware.WileyOnline Library. PermanentHouse SelectCommittee onIntelligence.(2014).HearingonCybersecurityThreats. CSPAN. RetrievedJanuary24,2015, fromhttp://www.c-span.org/video/?322853-1/hearing-cybersecurity- threats Struck,D. (2011). Satellite DataAidsinPredictingCholeraOutbreaks - ScientificAmerican. Scientific American.RetrievedJanuary26,2015, from http://www.scientificamerican.com/article/satellite- data-aids-in-predicting-cholera-outbreaks/ The Economist.(2013). Infographics:Windsof change. TheEconomist.RetrievedJanuary23,2015, from http://www.economist.com/news/books-and-arts/21580446-revolution-taking-place-how-visualise- information-winds-change Truvé,S. (2011). Big Data for the future:Unlockingthe predictivepowerof the Web. Recorded Future, Cambridge,MA,Tech.Rep. Tufte,E. R.,& Graves-Morris,P.R.(1983). The visual display of quantitativeinformation (Vol.2). GraphicspressCheshire,CT.
  • 13. Uchiga, H.,& Nelson,A.(2009).Travel time to majorcities:A global mapof Accessibility. JointResearch Centre.RetrievedJanuary25,2015, fromhttp://bioval.jrc.ec.europa.eu/products/gam/index.htm West,T. O., Le Page,Y., Huang,M., Wolf,J.,& Thomson,A.M. (2014). Downscalingglobal landcover projectionsfromanintegrated assessmentmodel foruse inregional analyses:resultsand evaluationforthe USfrom 2005 to 2095. EnvironmentalResearch Letters, 9(6),64004. WorldValuesSurveyAssociation.(2008). World valuessurvey.AnnArbor.