2020 ICC Speakers

Dr. Tamar Berenblum

Abstract:  Not Available

Bio:  Not Available


Dr. Adam Bossler

Deterring Cybercrime

Abstract:  Deterrence research has received less attention in the field of cybercrime than many traditional criminological theories.  This study examines the capability of anticipated formal and informal sanctions in deterring digital piracy, computer hacking, and online harassment while controlling for computer skill level, online behaviors, peer deviance, and demographics.  The findings have implications for our understanding of these forms of cybercrime and the role of deterrence in cyberspace.

Bio:  Dr. Adam M. Bossler is Professor and Chair of the Department of Criminal Justice and Criminology at Georgia Southern University. He received his PhD from the University of Missouri - St. Louis.  His research interests focus on the applicability of criminological theories to cybercrime offending and victimization and the law enforcement response to cybercrime. His research has been funded by the Department of Justice, National Science Foundation, and United Kingdom Home Office. He has co-authored three books (Cybercrime and Digital Forensics: an Introduction, 2nd edition; Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses; and Policing Cybercrime and Cyberterror) and written extensively in peer-reviewed journals, including Criminology and Public Policy, Policing, International Journal of Offender Therapy and Comparative Criminology, Journal of Criminal Justice, and Deviant Behavior. He is also a board member on the American Society of Criminology's Division of Cybercrime, the International Interdisciplinary Research Consortium on Cybercrime (IIRCC), and the European Society of Criminology’s Working Group on Cybercrime.


Dr. George Burruss

Profiling Bad Cyber Hygiene

Abstract:  Research into the correlates of cybercrime victimization continues to explore the individual characteristics of those who are prone to have been victims of cybercrime, whether through exposure or poor online security  practices. In this study, Dr. Burruss looks at variation in cybercrime victimization and attempts to develop a profile of those most at risk.

Bio:  George W. Burruss is an Associate Professor in and Associate Department Chair of the Department of Criminology at the University of South Florida. He is also affiliated with Cyber Florida, the Center for Cybersecurity at the University of South Florida.  He also serves as editor-in-chief for the Journal of Crime & Justice. His main research interests focus on criminal justice organizations and cybercrime. He received his doctorate in criminology and criminal justice from the University of Missouri St. Louis.


Dr. Mark A. Cosgrove

Abstract:  Not Available

Bio:  Not Available


Dr. Diana Dolliver

Darknet and Cryptocurrency Trends: A Law Enforcement Perspective

Abstract:  Darknets continue to shape the landscape of criminal opportunities in the cyber domain, requiring law enforcement agencies in the United States to adapt to this unique digital environment. However, local police agencies in particular face challenges including but not limited to jurisdiction, available resources, and training that impact investigative capabilities.

Bio:  Dr. Diana S. Dolliver is a cyber criminologist and policing scholar in the Department of Criminology and Criminal Justice at the University of Alabama. She also serves as the Academic Director for the region's Joint Electronic Crimes Task Force (JECTF).  Dr. Dolliver’s areas of expertise include Tor-based criminality, law enforcement, and digital forensics. Her current research projects involve studying digital forensic artifacts of cryptocurrency wallets on iOS and Android devices, in addition to longitudinal studies of changes in various criminal markets on the Tor Network.


Dr. Richard Frank

Ransomware Attacks: Psychological persuasion, and responses from businesses

Abstract:  Incidents of ransomware have doubled over the past two years alone and are estimated to cost over $75 billion a year (Dobran, 2019). Apart from the financial burden, there is the loss of owner and employee productivity, which can be difficult to quantify. This paper reports on preliminary research results from a province-wide online survey of businesses in British Columbia, Canada, with respect to their experiences with ransomware attacks. The study focuses on locking ransomware, which encrypts the non-system files on the victim’s computer and offers to decrypt them in return for a payment (Al-rimy, Maarof & Shaid, 2018). Unlike many other studies, this study attempts to uncover the experiences of small businesses with 10 or fewer employees, which represent 98% of all B.C. businesses, and account for over half of all private-sector employment. These small businesses, often overlooked in large-scale cyber-victimization surveys, are thought to be more vulnerable to ransomware attacks than larger businesses, and less likely to report their victimization to the police. As the study has been developed in collaboration with the technological crime unit of the Royal Canadian Mounted Police, it also investigates how B.C. businesses respond to ransomware attacks, whether or not they report such attacks to the police, their reasons for not reporting to the police, their experiences when they do report to the police, and their overall degree of cyber-preparedness.

Bio:  Richard Frank is Assistant Professor in the School of Criminology at Simon Fraser University (SFU), Canada and Director of the International CyberCrime Research Centre (ICCRC). Dr. Frank completed a PhD in Computing Science (2010) and another PhD in Criminology (2013) at SFU. His main research interest is Cybercrime. Specifically, he's interested in hackers and security issues, such as online terrorism and warfare.


UC Donna Gregory

Abstract:  Not Available

Bio:  Donna Gregory is the Unit Chief at the Internet Crime Complaint Center (IC3) under the FBI Cyber Division, Cyber Operations V Section and leads a Unit of approximately 35 Cyber and Criminal Division staff. UC Gregory has served with the FBI for 25 years, entering on duty July 1994. Her primary focus is working with both the private and public sector to develop effective alliances, define growing trends, and ensure IC3 filed information is processed for investigative and intelligence purposes for law enforcement and public awareness. She has been with the IC3 since its development in 2000.


Mr. Mark Haase

Abstract:  Not Available

Bio:  Not Available


Dr. Erin Harbinson

Abstract:  Not Available

Bio:  Not Available


Dr. Thomas Hyslip

Abstract:  Not Available

Bio:  Dr. Thomas Hyslip is currently the Resident Agent in Charge of the Department of Defense, Defense Criminal Investigative Service (DCIS), Cyber Field Office, Eastern Resident Agency. Prior to joining the DCIS in 2007, Dr. Hyslip was a Special Agent with the US Environmental Protection Agency, Criminal Investigation Division, and the US Secret Service. Throughout his 19 years of federal law enforcement, Dr. Hyslip has specialized in cybercrime investigations and computer forensics. Dr. Hyslip has testified as an expert witness on computer forensics and network intrusions at numerous federal, state, and local courts. Dr. Hyslip is also an adjunct Professor at Norwich University. Dr. Hyslip received his Doctor of Science degree in Information Assurance from Capitol College in 2014.


Dr. Rutger Leukfeldt

Abstract:  Not Available

Bio:  Not Available


Dr. Asaf Lubin

Abstract:  Not Available

Bio:  Not Available


Dr. Jonathan Lusthaus

Cooperation and Distrust in the Cybercrime Industry

Abstract:  This talk examines how cybercriminals cooperate successfully when they face the challenge of dealing with anonymous criminal partners. It then engages with an analysis of how this cooperation might be disrupted within cybercriminal networks.

Bio:  Dr Jonathan Lusthaus is Director of The Human Cybercriminal Project in the Department of Sociology and a Research Fellow at Nuffield College, University of Oxford. He is also an Adjunct Associate Professor at UNSW Canberra Cyber. Jonathan’s research focusses on the "human" side of profit-driven cybercrime: who cybercriminals are and how they are organised. A regular speaker at major conferences, including Black Hat and Enigma, Jonathan has written widely across academic, policy and media publications. He recently completed a seven-year global study on the organization of cybercrime published by Harvard University Press as Industry of Anonymity: Inside the Business of Cybercrime.


Mr. Mark Majewski

The Human Firewall : Building a Secure Culture in your Organization

Abstract:  Organizations often have many Information Security professionals focused on the latest security risks and technological solutions to prevent or detect cyber intrusions.  However, many organizations spend little effort on addressing the biggest security weakness in their organizations, their employees.  This presentation will provide insight into some best practices for developing a security awareness program that results in a systemic security culture and develops their employees as … the human firewall.

Bio:  Mark Majewski is the Information Security Evangelist at Quicken Loans, the nation’s largest mortgage lender, which is based in Detroit, Michigan.  Mark has a Masters and Bachelors degree in Information Systems from Lawrence Technological University and Walsh College, respectively.  He has more than 20 years of experience leading IT and Information Security programs in the Utility and FinTech industries.  He is a member of the International Association of Security Awareness Professionals (IASAP) where he learns and share security awareness best practices. When he is not on-line and working, you can find Mark relaxing on Lake Saint Clair as the captain of his boat “Off Line”.  You can read more about Mark and his interests on LinkedIn at https://www.linkedin.com/in/mark-majewski/


Mr. Tim Mielak

Abstract:  Not Available

Bio:  Not Available


Dr. Marie Ouellet

Network Disruption Strategies in Online Stolen Data Markets

Abstract:  Computers and computer-networks have enabled new forms of offending that challenge how researchers and policymakers traditionally approach and respond to crime. One of the main challenges is how to effectively respond and disrupt emerging illicit markets for online stolen data. Despite the increased scale and scope of online stolen data markets, little is known about the actors involved in these operations or how these markets operate. The current project proposes to fill critical knowledge gaps by examining the networks of vendors across online stolen data markets, and their resilience to disruption.

Bio:  Marie Ouellet is an Assistant Professor in the Department of Criminal Justice & Criminology. Her research aims to understand how criminal groups emerge and evolve, with a focus on the role of networks in shaping these processes.


Mr. Seth Sattler

Abstract:  Not Available

Bio:  Seth Sattleris a Certified Anti-Money Laundering Specialist, who currently works for DigitalMint, a bitcoin point of sale company. Mr. Sattler has been responsible for the design and implementation of DigitalMint’s complex anti-money laundering program and helpedto establish industry compliance standards for the bitcoin kiosk industry. Prior to joining DigitalMint, he worked numerous years for Huntington National Bank's (HNB) AML/BSA department designing and tuning money laundering typologies. Prior to his professional career, Mr. Sattler graduated from Michigan State University with a Bachelor of Arts degree in Criminal Justice.


Dr. Kathryn Seigfried-Spellar

Identifying High-Priority Child Sex Offenders Through Text

Abstract:  Online child sexual exploitation is a problem that continues to grow exponentially each year. It is estimated that 1/3 of online child solicitors are contact-driven (motivated to have sex with the minor in the real world). To assist law enforcement with identifying high-priority contact child sex offenders, we developed the Chat Analysis Triage Tool (CATT) – a digital forensics tool that analyzes chats using natural language processing and biometrics.

Bio:  Dr. Kathryn Seigfried-Spellar is an Associate Professor in the Department of Computer and Information Technology (CIT) at Purdue University. She studies the personality characteristics and socio-legal factors associated with cyberdeviance, such as Internet child pornography use, hacking, cyberbullying, trolling, and cyber threats via social media. In addition, Dr. Seigfried-Spellar has published in the area of digital forensics, specifically the psychological wellbeing of digital forensic examiners and the ability to conduct a behavioral analysis of digital forensic evidence. Dr. Seigfried-Spellar is a Fellow of the Digital and Multimedia Sciences section of the American Academy of Forensic Sciences (AAFS), and a deputized member of the Tippecanoe High Tech Crime Unit (HTCU).


Dr. Kevin Steinmetz

Perpetuating Information Security Fraud: The Case of Social Engineering

Abstract:  The current study draws from interviews with social engineers to examine to address the question “what is the social process by which social engineering frauds are designed and implemented?” This analysis explores twelve themes addressing how participants prepare and execute their frauds while accounting for social context, assumptions about human nature, the complexities of social networks, the role of social conventions, and the limitations of human processing and reasoning.

Bio:  Kevin F. Steinmetz is an associate professor of sociology at Kansas State University. His areas of expertise include hacker culture, social engineering, race and criminal justice, and criminal justice and popular culture issues. His recent books include Cybercrime & Society (3rd ed, co-authored with Majid Yar) and Hacked: A Radical Approach to Hacker Culture and Crime. His articles have appeared in multiple peer-reviewed journals including the British Journal of Criminology, Theoretical Criminology, and Critical Criminology, to name a few.