SlideShare a Scribd company logo
1 of 19
Download to read offline
Cyber Crime
& IT Fraud
Speaker: Stuart Hutcheon
(Partner - StewartBrown)
Could your organisation survive 
if it lost $20,000? $50,000? Or 
$1 million overnight?
Contents and 
Outline
• Overview
• History
• Categories of Cyber Crime
• Types of Cyber Crime
• Prevention and Cyber Security
• Current Case Studies
Overview
“Cybercrime is a fast‐growing area of crime. 
More and more criminals are exploiting the 
speed, convenience and anonymity of the 
Internet to commit a diverse range of criminal 
activities that know no borders, either physical or 
virtual” – Interpol 
1.The Computer as a weapon
 Using a computer to commit real world crime
 Cyber terrorism and credit card fraud.
2.The Computer as a target
 Using a computer to attack another computer
 Forms of Hacking, DOS/DDOS attack, virus/worm attacks
The 5 most cyber attacked industries
1. Healthcare
2. Manufacturing
3. Financial Services
4. Government 
5. Transportation
History
• 1820 ‐ First recorded cybercrime
• 1978 ‐ The first spam e‐mail
• 1982 ‐ The first virus was installed on an Apple computer
Types of Cyber Crime
1. Hacking (credit card)
2. Denial of Service Attacks
3. Identity theft
4. Virus Dissemination
5. Computer Vandalism 
6. Cyber Terrorism 
7. Online Fraud
8. Software Piracy
9. Forgery 
10.Malicious Code
11.Malware
12.Phishing 
13.Spam
14.Spoofing
15.Defamation
WHY DO BREACHES OCCUR?
Prevention and Cyber
Security
• Firewalls
• Operating system is up‐to‐date
• Up‐to‐date anti‐virus and  anti‐
spyware
• Use a pop‐up advertising blocker
• Use strong passwords
• Secure wireless network
• Reputable websites and mobile 
applications
• Avoid clicking on unexpected or 
unfamiliar links
2017 Threat Study
Ransomware
Why is it so dangerous?
• Causes significant business disruption & data loss.
• A single compromised device puts a whole 
network at risk.
• Significant growth in new ransomware variants 
increases the risk of zero‐day attacks.
Prevention
• Properly monitored End‐point Anti‐virus.
• Operating system and application patch 
management to avoid exploits.
• A Multi‐layered email security system.
• A web security/ web filtering system & firewall.
• Email and web use training.
Mitigation
• Backups should be regular, comprehensive and 
stored in a secure non‐network accessible 
location. Many businesses have their backups 
encrypted too, resulting in complete data loss.
2017 Threat Study
Internal Threats
Stolen Credentials| Malicious Insider |Social 
Engineering
Why is it so dangerous?
• Staff are able to bypass most security measures 
taken.
• User accounts often have access to significant 
amounts of sensitive data.
• Requires little or no technical knowledge.
Prevention
• Implementation of Multi‐factor authentication 
• Restrict data egress channels. (USB, file transfer)
• Comprehensive exit process, performed 
immediately on employee termination.
• Clean desk policy.
• Staff training.
Mitigation & Detection
• Segregation of duties to minimise severity of data 
breaches.
• Network/file monitoring for abnormal behaviour.
What training do
staff need?
Passwords
• Prevent reuse of passwords from external 
accounts, and sharing of passwords.
• Prevent insecure password storage. (post it notes 
on computer, stored on network drive).
• What constitutes a secure password. Enforce or 
suggest increased password complexity.
Emails, files and the web
• Identifying malicious emails, attachments and 
links.
• Identifying malicious files and common file types 
for malware delivery.
• Identifying malicious websites.
• Safe & work appropriate web browsing practices.
Other
• Preventing social engineering
• Signs a device may be infected & appropriate 
responses
• When to alert IT staff.
A malicious word document.
Malicious Script hidden in a zip file
Preventing Network
Vulnerabilities
Common issues
• Vulnerable components exposed to the internet 
e.g. RDP without MFA, PPTP VPN.
• Missing OS & Application Patches
• Misconfigured Firewall
• Poor monitoring and reviewal of server, firewall 
and antivirus logs.  
• Website Vulnerabilities
• Unrestricted Physical and USB Access.
• Personal Device Connection to network
• Exploitable Wireless networks
• Poor Account Segregation
Test
• Network & web vulnerability/penetration testing, 
particularly for external facing resources
• Misconfiguration Testing
• WIFI Exploit testing
• Review Policy and procedure
(automated tools exist to reduce IT labour)
CASE STUDY A
England National Health Service 
(NHS) Ransomware Attack
Between May 12 and May 19 2017, 
NHS was hit with a ransomware 
attack affecting more than 34% of 
trusts.
Cause
• Missing patches & unsupported 
operating systems (XP).
• Poor user training & response.
• Out of date firewalls and 
Antivirus.
Result 
• Estimated 19 000 appointments 
cancelled, some urgent.
• Significant financial cost & loss of 
public image.
• Data loss, manual data re‐entry 
and work disruption.
CASE STUDY B
$90k Phishing email – fake CEO
• Finance manager received an email from the ‘CEO’ 
while the CEO was on leave holidaying in Asia 
• The email asked the FM to transfer $90k to a foreign 
bank account
• There was back and forth between the FM and the 
‘CEO’ regarding the details of payment
• FM prepared all of the relevant documentation and 
took this to the CFO for approval for payment. The 
payment was made
Issue ‐ Email – was very strange and clearly fake
Result ‐ This was a breakdown of the internal controls, 
rather than inadequate IT systems.
CASE STUDY C
Incident 1
• Customer Gmail account was hacked, invoice was sent to a 
customer for $15k with fraudulent bank details
• The customer paid the $15k to the fraudulent bank account
• Client wore the cost and police are investigating
• Customer is now transitioning to Microsoft Outlook – Being a 
more secure email provider
Incident 2
• A supplier email was hacked and the same situation as above 
occurred in reverse
• The invoice was send to our client for approx. 3K and client 
paid
• The payment was based off the bank details listed on the 
invoice (being fraudulent).
• The supplier will wear this cost and our client is not out of 
pocket
• A process of checking master supplier bank details has been 
implemented prior to paying any invoices in order to mitigate 
this risk
CASE STUDY D
$12k
• Client was processing a refund for $12k
• A hacker watched on remotely as transaction took place
• The internet banking screen was actually a layover (fake) 
screen and as such the banking details typed in by the 
finance manager never hit the internet banking site
• The hacker entered different bank details
• They paid the full 12K to an incorrect bank account 
without knowing
• While the hacker was in their internet banking, he/she 
changed the account numbers of saved accounts, 
including staff super funds and employee bank details
• The bank refunded the money, the account numbers 
were corrected and an IT review was conducted to 
identify holes in the IT system
CASE STUDY E
$230k
• Two employees within consolidated group in receipt of 
an invoice
• Subsequent to receipt of invoice a series of falsified 
emails were then sent between these two employees
• legitimate invoice previously received from a legitimate 
supplier for $230k but now with altered payment 
details
• Payment approved and processed
• Bank (fraud section) advising that payment had been 
made to an account with potentially fraudulent activity
• one word different in email address (archtiecs versus 
architects) being incorrect
• The emails contains formatting and grammatical 
errors not consistent with their usual style. They make 
claims of a suspicious nature. A query of this email 
directed to either employee of the group would likely 
have detected the fraudulent activity.
CASE STUDY F
> 1.5million pounds
• Overseas client transferring funds
• Client emails hacked
• Changed banking  instructions
• Bank did not confirm details 
verbally
• Transfer was made
• Bank responsible
Managing the 
fall out
Consideration
• Need a policy/risk plan
• Contact authorities
• Employee counselling
• Termination of employment?
• Implement/monitor control 
systems
• Education
Recommendations
• Purchase cybercrime insurance; 
• Engage a Cyber Security Professional to review the 
security of your systems; 
• Educate staff on cybercrime and encourage them 
to remain vigilant in regard to the risks around 
emails requesting payment or containing links; 
and
• Strict use of only official email addresses by all 
Directors for conducting of entity related 
business.
• Back up data

More Related Content

What's hot (20)

Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 

Similar to Acw stewart brown-cybercrime-presentation-feb-2018

"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 

Similar to Acw stewart brown-cybercrime-presentation-feb-2018 (20)

"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Computer crime
Computer crimeComputer crime
Computer crime
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
cyber crime
 cyber crime cyber crime
cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 

Recently uploaded

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Acw stewart brown-cybercrime-presentation-feb-2018