In the debate about smart cities, an alternative to a dominant top-down, tech-driven solutionist approach has arisen in examples of ‘civic hacking’. Hacking here refers to the playful, exploratory, collaborative and sometimes transgressive modes of operation found in various hacker cultures, this time constructively applied in the context of civics. It suggests a novel logic to organise urban society through social and digital media platforms, moving away from centralised urban planning towards a more inclusive process of city-making, creating new types of public spaces. This book takes this urban imaginary of a hackable city seriously, using hacking as a lens to explore examples of collaborative city-making enabled by digital media technologies. Five different perspectives are discussed. Hacking can be understood as (1) an ethos, a particular articulation of citizenship in the network era; (2) as a set of iterative and collaborative city-making practices, bringing out new roles and relations between citizens, (design) professionals and institutional actors; (3) a set of affordances of institutional structures that allow or discourage their appropriation; (4) a critical lens to bring in notions of democratic governance, power struggles and conflict of interests into the debate on collaborative city-making; and (5) a point of departure for action research. After a discussion of these themes, the various chapters in the book are briefly introduced. Taken together they contribute to a wider debate about practices of technology-enabled collaborative city-making, and the question how city hacking may mature from the tactical level of smart and often playful interventions to a strategic level of enduring impact.
DOCUMENT
Longitudinal criminological studies greatly improved our understanding of the longitudinal patterns of criminality. These studies, however, focused almost exclusively on traditional types of offending and it is therefore unclear whether results are generalizable to online types of offending. This study attempted to identify the developmental trajectories of active hackers who perform web defacements. The data for this study consisted of 2,745,311 attacks performed by 66,553 hackers and reported to Zone-H between January 2010 and March 2017. Semi-parametric group-based trajectory models were used to distinguish six different groups of hackers based on the timing and frequency of their defacements. The results demonstrated some common relationships to traditional types of crime, as a small population of defacers accounted for the majority of defacements against websites. Additionally, the methods and targeting practices of defacers differed based on the frequency with which they performed defacements generally.
DOCUMENT
This article examines the network structure, criminal cooperation, and external interactions of cybercriminal networks. Its contribution is empirical and inductive. The core of this study involved carrying out 10 case analyses on closed cybercrime investigations – all with financial motivations on the part of the offenders - in the UK and beyond. Each analysis involved investigator interview and access to unpublished law enforcement files. The comparison of these cases resulted in a wide range of findings on these cybercriminal networks, including: a common division between the scam/attack components and the money components; the presence of offline/local elements; a broad, and sometimes blurred, spectrum of cybercriminal behaviour and organisation. An overarching theme across the cases that we observe is that cybercriminal business models are relatively stable.
DOCUMENT