Completed
LARGE REBEL GROUPS BECOME GOVERNMENTS
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Markets in Malware - Adam Hogan
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Labor specialization Financial trust
- 3 PRICE DISCRIMINATION
- 4 First challenge is a logistical one: acquire a live hostage and convey them to a place from which the ransom negotiation can be safely conducted.
- 5 EXTRA-LEGAL GOVERNANCE
- 6 IN CULTURES WHERE HOSTAGE- TAKING IS AN ESTABLISHED WAY OF RESOLVING INTER COMMUNITY CONFLICT (E.G. YEMEN) HOSTAGES TRADITIONALLY HAVE THE SOCIAL STATUS OF A GUEST!
- 7 CAN MALWARE AUTHORS BUILD A REPUTATION?
- 8 CREATING RULES • DISSEMINATING INFORMATION • EVALUATING PERFORMANCE • SPOTTING BREACHES OF PROTOCOL • ENFORCING RULES AND NORMS
- 9 THE OVERLONG CAPTIVITY OF THE CHANDLERS
- 10 COUNTER EXAMPLE
- 11 UN AND DOMESTIC LAW FORBID THE TRANSFER OF MONEY TO TERRORIST ORGANIZATIONS
- 12 LAW ENFORCEMENT?
- 13 COST / BENEFIT
- 14 THERE ARE NO GIANT KIDNAPPING ENTERPRISES
- 15 LARGE KIDNAPPING ORGANIZATIONS BECOME PROTECTION RACKETS
- 16 LARGE REBEL GROUPS BECOME GOVERNMENTS
- 17 GRIM SPIDER WIZARD SPIDER
- 18 VERTICAL INTEGRATION
- 19 HOW TO CHARGE A HIGHER RANSOM?
- 20 WHAT LIMITS THE GROWTH OF RANSOMWARE?
- 21 COMMODITY MALWARE
- 22 CONTAINERIZATION
- 23 BAD GUYS SUPPLY CHAIN IS IMPRESSIVE