Internet business models Cyber Crime
First of all, it is important to define what we exactly mean with the term “cybercrime”. Cybercrime is mainly related to the following, illegal activities, mainly carried out through the Internet media:
- DDoS attacks
- Child pornography
- Generic Porn
- On-line games
Often, IP classes used by cybercriminals (i.e. RBN), share their illegal services on various IP address, as we can see from the following screenshot, related to a research carried on by David Bizeul
Now, once realised which are the services that cybercriminals must sell out, it is pretty easy to figure out their needs in order to be able to supply all the above and the requests from other cybercriminals and cybergangs:
- Hosting services
- Good bandwidth
Obviously, criminal organisations just cannot call up a given ISP asking them for a hundred hosting contracts, since “we must host child porn and some fake bank Web Front-End”….. This means that cybercriminals need other “add-ons” such as:
- Laxism in closing websites
- Lack of cybercrime laws
- (possibly) interaction with other cybercriminals
Well….RBN was the answer. Even if most of the security researchers guess RBN it is dead, my personal opinion is that the original RBN’s “team” have just been “unpacked” into tens of smaller cybercrime groups, making even harder for Law Enforcement to track them down. IMU is just another example of a “cybercrime ISP”, including its own “dark links” with third-party companies.
RBN acted for some years as The Internet Service Provider for Cybercrime actions, delivering all kind of black-services to the whole world. The scheme shown below, grabbed from David Bizeul’s excellent research paper, shows the modus operandi proper of RBN.
Global E-Security: 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008, Proceedings (Communications in Computer and Information Science)
- ISBN13: 9783540694021
- Condition: USED - Very Good
- Notes: 100% Satisfaction Guarantee. Tracking provided on most orders. Buy with Confidence! Millions of books sold!
How About Propaganda?
The propaganda model revisited
by Edward S. Herman
In Manufacturing Consent: The Political Economy of the Mass Media (Pantheon, 1988) Noam Chomsky and I put forward a 'propaganda model' as a framework for analyzing and understanding how the mainstream U.S. media work and why they perform as they do. We had long been impressed with the regularity with which the media operate within restricted assumptions, depend heavily and uncritically on elite information sources, and participate in propaganda campaigns helpful to elite interests. In trying to explain why they do this we looked for structural factors as the only possible root of systematic behavior and performance patterns
Chomsky on the World Social Forum
Preparatory to Porto Alegre
Compiled from diverse email and radio interviews in the week before the World Social Forum in Porto Alegre
Why have you decided to participate in the WSF? What do you think of it?
Two meetings are taking place pretty much at same time. One is the Davos meeting of 'the masters of the universe,' to borrow the term used by the world's leading business journal, the London Financial Times, when they met a year ago. The term was presumably used with a touch of irony, but it is rather accurate. The second is the World Social Forum (WSF) meeting in Porto Alegre, bringing together representatives of popular organizations throughout the world whose conception of what the world needs is rather different from that of the masters.
Neither group, of course, is popularly elected -- a charge constantly leveled by the masters and their acolytes ag…
You might also like
Social Media Marketing Strategies by Xflavor Internet ...
Revenue Model for online business 1
Gary Gregory & My Online Business Strategy
China expects special courts on intellectual property — Global Times
Many of these cases were extremely complicated of foreign entities, cutting-edge technical issues, new business models on the Internet, or world renowned brands, said Jin Kesheng, deputy chief judge of the IPR tribunal of the Supreme Court.
Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies