Markets in Malware - Adam Hogan
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Labor specialization Financial trust
PRICE DISCRIMINATION
First challenge is a logistical one: acquire a live hostage and convey them to a place from which the ransom negotiation can be safely conducted.
EXTRA-LEGAL GOVERNANCE
IN CULTURES WHERE HOSTAGE- TAKING IS AN ESTABLISHED WAY OF RESOLVING INTER COMMUNITY CONFLICT (E.G. YEMEN) HOSTAGES TRADITIONALLY HAVE THE SOCIAL STATUS OF A GUEST!
CAN MALWARE AUTHORS BUILD A REPUTATION?
CREATING RULES • DISSEMINATING INFORMATION • EVALUATING PERFORMANCE • SPOTTING BREACHES OF PROTOCOL • ENFORCING RULES AND NORMS
THE OVERLONG CAPTIVITY OF THE CHANDLERS
COUNTER EXAMPLE
UN AND DOMESTIC LAW FORBID THE TRANSFER OF MONEY TO TERRORIST ORGANIZATIONS
LAW ENFORCEMENT?
COST / BENEFIT
THERE ARE NO GIANT KIDNAPPING ENTERPRISES
LARGE KIDNAPPING ORGANIZATIONS BECOME PROTECTION RACKETS
LARGE REBEL GROUPS BECOME GOVERNMENTS
GRIM SPIDER WIZARD SPIDER
VERTICAL INTEGRATION
HOW TO CHARGE A HIGHER RANSOM?
WHAT LIMITS THE GROWTH OF RANSOMWARE?
COMMODITY MALWARE
CONTAINERIZATION
BAD GUYS SUPPLY CHAIN IS IMPRESSIVE
Related Courses
International TradeMarginal Revolution University Supply Chain Management: A Learning Perspective
Korea Advanced Institute of Science and Technology via Coursera Supply Chain Fundamentals
Massachusetts Institute of Technology via edX Tackling Global Food Safety
Queen's University Belfast via FutureLearn Operations Management
University of Illinois at Urbana-Champaign via Coursera