Skip to main content

LATEST UPDATES: Election 2020: Live Results | Tracking COVID-19 | Racial Justice

UC San Diego Wins Grant To Study How Mind Of Cybercriminal Works

UC San Diego has won part of a grant that will help researchers understand how the mind of a cybercriminal works by taking apart computer scams bit by bit.

Computer viruses that steal your bank account information. Emails pretending to be from retailers like Amazon that collect your password. Messages from friends over social networks like Facebook and Twitter that get you to click on corrupted links.

These are all workings of cybercriminals, and will be the focus of research funded by a $10 million grant from the National Science Foundation.

Computer scientists at UC San Diego, the International Computer Science Institute at Berkeley and George Mason University will share the five-year grant to do multiple studies on cybersecurity.

Stefan Savage, a computer science professor at UC San Diego, was one of the grant recipients. He said the money will help them understand how the mind of a cybercriminal works by taking apart computer scams bit by bit.

“You probably get spam in your email box asking you to buy Viagra or what have you,” he said. “And that’s probably where you’re thinking it stops, it’s annoying you delete, you move forward.”

But it typically doesn't end there. Savage said they use a simple example like that one and work backward.

“Well if they were going to make money on this, what are all the various pieces that would need to be put together,” he said. “That email would have to be sent, and when you click on it, it takes you to a site, and that site would need to accept your credit card and that credit card needs to be processed, and they need to ship stuff to you, and all these different components need to work together.”

Most computer scams and viruses are ways of extracting money, so Savage and his colleagues will “follow the money” to track cybercriminals.

“We’re trying to map out who is responsible for which components, and who makes how much money, and so on,” he said.

To do that, Savage said they use a number of methods, including making purchases online and following the money, trying to be scammed, collecting as much spam email as they can and allowing their online information to be stolen.

Researchers also monitor underground forums where cybercriminals communicate.

“When you gather enough of that data, you start to be able to map out the social networks of these people,” he said. “Who has influence, who doesn’t, how do ideas spread, how do they establish trust when no one has actually met each other physically.”

By tracking what cybercriminals are talking about, researchers can then link it back to activity they have observed.

The cybersecurity researchers will also work with UC San Diego professor James Fowler, who specializes in studying social networks.

Savage said people are generally more trusting of links and messages they receive over social networks, leaving them more open to scams pretending to be sent by friends.

“People have attached probably an unreasonable level of trust to information that they get from their purported friends,” he said.

FEATURED PODCAST

San Diego News Matters podcast branding

KPBS' daily news podcast covering local politics, education, health, environment, the border and more. New episodes are ready weekday mornings so you can listen on your morning commute.

  • Need help keeping up with the news that matters most? Get the day's top news — ranging from local to international — straight to your inbox each weekday morning.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Photo of Claire Trageser

Claire Trageser
Investigative Reporter

opening quote marksclosing quote marksAs a member of the KPBS investigative team, my job is to hold the powerful in San Diego County accountable. I've done in-depth investigations on political campaigns, police officer misconduct and neighborhood quality of life issues.

Want more KPBS news?
Find us on Twitter and Facebook, or sign up for our newsletters.

To view PDF documents, Download Acrobat Reader.