Inside the SCAM Jungle:
|
|
- Janel Clarke
- 5 years ago
- Views:
Transcription
1 Inside the SCAM Jungle: A Closer Look at 419 Scam Operations Jelena Isacenkova Olivier Thonard Andrei Costin Aurelien Francillon Davide Balzarotti
2 Nigerian Scam Trap 2
3 Nigerian Scam Trap 3
4 Spam vs. 419 Scam 419 SCAM SPAM High-volume Highly dynamic infrastructure Automated sending Trap victims through engineering Low-volume Hide behind webmail accounts Manual sending Trap with social engineering techniques effort Contact with victims over URLs Contact with victims via s and/or phone numbers 4
5 Why we study campaigns The goal: identify and characterize 419 scam campaigns find predictive scam features Our assumptions: Scam is likely sent in campaigns, like Spam s and phone numbers are personal scammer assets (Costin et al., PST'13) => linking features 5
6 Outline Dataset Methodology Experimental results Conclusions 6
7 Dataset 7
8 Dataset Public data from 419scam.org From January 2009 till August ,761 scam messages 12 countries (Europe, Africa and Asia) 34,723 unique addresses 11,738 unique phone numbers 8
9 Scam origins by phone numbers 9
10 Scam origins by phone numbers Nigeria 30% Benin 14% South Africa 5% 10
11 Scam origins by phone numbers Nigeria 30% UK Personal Numbering Services (PNS) Benin 14% South Africa 5% 11
12 Scam origins by phone numbers Nigeria 30% UK Personal Numbering Services (PNS) Benin 14% Spain 4% Netherlands 3% South Africa 5% 12
13 Data categories 13
14 Methodology 14
15 TRIAGE Security data mining framework (Thonnard et al. at RAID'10, CEAS'11, RAID'12) Multi-dimentional clustering Links common elements together forming clusters/campaigns 15
16 TRIAGE, part 2 16
17 Experimental results 17
18 Campaigns 1,040 campaigns identified, with at least 5 messages each Top 250 campaigns on average: Long and scarce: last for one year and have only 28 active days Small (38 s): keep low-volume, could be unorganized Use 2 phone numbers Use 6 Reply-To addresses Use 14 From addresses 18
19 Re-use of s and phones 19
20 Re-use of s and phones Being re-used on average 2,5 months Being re-used on average 6 months 20
21 Examples 21
22 22
23 Main traits: Single phone number Two campaign topics Long lived 83 s 23
24 Fake lottery 1 year 24
25 Eskom generates approximately 95% of the electricity used in South Africa and approximately 45% of the electricity used in Africa., - Escom
26 Different topics over time Main traits: Topics change Monthly package of s Single phone number 58 s
27 Different topics over time Main traits: Topics change December January Monthly package of s Single phone number 58 s November February March
28 iphone campaign Main traits: One topic Two phone numbers Big re-used package 190 s
29 Macro-clusters Link strongly connected clusters into loosely connected Linked through s and/or phone numbers 62 macro-clusters, 195 inter-connected clusters 29
30 Top macro-clusters Some are organized groups operating on international scale Fake lottery scam is primarily run by scammers located in Europe that are connected with African scammer groups 30
31 Clusters by countries Majority of unclustered data present isolated African actors => unorganized Macro-clusters cover African and many European actors => bigger organized groups covering Western markets 31
32 Clusters by countries Unclustered: stealthy or isolated scammers Majority of unclustered data present isolated African actors => unorganized Macro-clusters cover African and many European actors => bigger organized groups covering Western markets 32
33 Clusters by countries Unclustered: stealthy or isolated scammers Majority of unclustered data present isolated African actors => unorganized Macro-clusters cover African and many European actors => bigger organized groups Organized covering Western markets 33
34
35 Conclusions s and phone numbers play a crucial role in Nigerian scam Campaigns are long and scarce Scammers hide behind webmail and forwarded phones Scam campaigns differ in their infrastructure, orchestration and modus operandi Different scammers probably compete for trendy topics, thus changing topics over time 35
36 36
Inside the SCAM Jungle: A Closer Look at 419 Scam Operations
2013 IEEE Security and Privacy Workshops Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Davide Balzarotti, Aurelien Francillon Eurecom,
More informationThe State of Spam A Monthly Report June Generated by Symantec Messaging and Web Security
The State of Spam A Monthly Report June 2007 Generated by Symantec Messaging and Web Security Monthly Spam Landscape Spam activity in May 2007 was overall consistent with trends observed in previous months.
More informationTRUECALLER INSIGHTS SPECIAL REPORT: THE TOP 20 COUNTRIES AFFECTED BY SPAM CALLS
TRUECALLER INSIGHTS TRUECALLER INSIGHTS SPECIAL REPORT: THE TOP 20 COUNTRIES AFFECTED BY SPAM CALLS 2017-07-13 LINDSEY LAMONT Isn t it the best feeling when Truecaller blocks a spam call or SMS? It s like
More informationThe role of phone numbers in understanding cyber-crime
The role of phone numbers in understanding cyber-crime A. J. Isachenkova M. Balduzzi + A. Francillon D. Balzarotti Eurecom, Sophia Antipolis, France + Trend Micro Research, EMEA July 11, 2013 1/34 Introduction
More informationContents. International collaboration and networking. 1. Example 2. Formal networks 3. Informal networks
International collaboration and networking Name E-waste training workshop Date, Location, Country Contents 1. Example 2. Formal networks 3. Informal networks 2 1 Case: Mixture of expired chemicals 29 containers
More informationFraude dans la Telephonie
Fraude dans la Telephonie Aurélien Francillon Merve Sahin With Monaco Telecom Also with cooperations: NYU Abu Dhabi Georgia Tech Telecom Paris Tech (Marc Relieu) Telephony Fraud A long-standing problem
More informationGLOBAL MOBILE PAYMENT METHODS: FIRST HALF 2016
PUBLICATION DATE: OCTOBER 2016 PAGE 2 GENERAL INFORMATION I PAGE 3 KEY FINDINGS I PAGE 4-8 TABLE OF CONTENTS I PAGE 9 REPORT-SPECIFIC SAMPLE CHARTS I PAGE 10 METHODOLOGY I PAGE 11 RELATED REPORTS I PAGE
More informationDomain Name Industry Drivers
Domain Name Industry Drivers Scott Schnell Senior Vice President of Marketing and Channels March 13th, 2018 Globally, Internet Users Expected to Grow Over the Next 3 Years Expected new internet users next
More informationMining Social Media Users Interest
Mining Social Media Users Interest Presenters: Heng Wang,Man Yuan April, 4 th, 2016 Agenda Introduction to Text Mining Tool & Dataset Data Pre-processing Text Mining on Twitter Summary & Future Improvement
More informationStatement by Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism
Statement by Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism Meeting of the United Nations Security Council Counter-Terrorism Committee Mr. Chairman, Excellencies,
More informationE-Strategies in Africa
E-Strategies in Africa Makane Faye mfaye@uneca.org United Nations Economic Commission for Africa Contents National E-strategies Lessons learned The WayForward from Global Vision to National Implementation
More informationThe European peering scene
Netnod Spring Meeting The European peering scene serge radovcic Euro-ix Netnod Spring Meeting - Stockholm - MArch 2011 What is Euro-IX? European Internet Exchange Association Formed in May 2001 The association
More informationState of Mobile Commerce. Q
State of Mobile Commerce. Q4 2014. JANUARY 2015 Executive Summary. Mobile commerce adoption is far ahead of expectations. Globally, mobile now accounts for 30% of ecommerce transactions. It is expected
More informationInstructions for Using Online Plan of Work Timeline Builder
Instructions for Using Online Plan of Work Timeline Builder Access the online PTB system at which is available through either of the following links: http://pars.dasnr.okstate.edu then choose the PTB 2018
More informationIn the Balkans, UNODC is part of the consortium with GIZ and the Center for International Legal Cooperation of the Netherlands who will implement the
The Organized and Serious Crime Programme (GPTOC) focuses on assisting states with the implementation of the core elements of the Organized Crime convention. This includes judicial and law enforcement
More informationTellabs End of Profit study executive summary
Tellabs End of Profit study executive summary Executive summary Between November 2010 and January 2011, Tellabs created a study that analysed revenue and cost trends for carriers in Western Europe, North
More informationKernel Wt. 104,577, ,563, ,141, ,212, ,145, ,357, Crop Year
Almond Industry Position Report 2015-2016 Crop Year Salable Forecast Million Lbs. 2015-2016 Kernel Wt. SEPTEMBER 2015 2014-2015 Kernel Wt. % Change 1. Carryin August 1, 2015 2. Crop Receipts to Date 3.
More informationKernel Wt. 155,076, ,646, ,723, ,951, ,015, ,966, Crop Year
Almond Industry Position Report 2015-2016 Crop Year Salable Forecast Million Lbs. 2015-2016 Kernel Wt. 2014-2015 Kernel Wt. OCTOBER 2015 % Change 1. Carryin August 1, 2015 2. Crop Receipts to Date 3. [2%
More informationThe State of Spam A Monthly Report August Generated by Symantec Messaging and Web Security
The State of Spam A Monthly Report August 2007 Generated by Symantec Messaging and Web Security Monthly Spam Landscape While overall spam activity remained steady in July 2007, the tactics being used are
More informationDetection of Missing Values from Big Data of Self Adaptive Energy Systems
Detection of Missing Values from Big Data of Self Adaptive Energy Systems MVD tool detect missing values in timeseries energy data Muhammad Nabeel Computer Science Department, SST University of Management
More informationPhishing Activity Trends Report August, 2005
Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial
More informationAdMob Mobile Metrics Report
AdMob Mobile Metrics Report AdMob serves ads for more than 4500 mobile web sites. This monthly report offers a snapshot of the data in our network to provide insight into trends in the mobile ecosystem.
More informationMOBILE MONITORING REPORT
Project no. 13.03/12854 Public version MOBILE MONITORING REPORT November 2011 to January 2012 Date: 20 March 2012 2 Purpose The Commission issued the Mobile Termination Access Services (MTAS) Standard
More informationSeptember 11, Dear Industry Members,
September 11, 2014 Dear Industry Members, Please note that the Beginning Inventory/Carry-in figure for 8/1/2014 reflects the actual Loss & Exempt (L&E) figure for the 2013/2014 crop year. The actual L&E
More informationWORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe
WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the
More informationThe UCSD Network Telescope
The UCSD Network Telescope Colleen Shannon cshannon @ caida.org NSF CIED Site Visit November 22, 2004 UCSD CSE Motivation Blocking technologies for automated exploits is nascent and not widely deployed
More informationIATF Stakeholder Conference
IATF Stakeholder Conference 13 September 2017 Oberursel, Germany Rüdiger Funke (BMW Group) Number of certified sites against ISO/TS 16949 (and IATF 16949) 70,000 60,000 50,000 40,000 30,000 30,156 50,071
More informationBusiness Identity Fraud. Bart De Bie i-force
Business Identity Fraud Bart De Bie i-force www.identityfraud.be What have we seen in the past? A plaque coming from France 2016 ** 2 www.identityfraud.be 3 Fake or falsified (international) transfers
More informationHitachi-GE Nuclear Energy, Ltd. UK ABWR GENERIC DESIGN ASSESSMENT Resolution Plan for RO-ABWR-0027 Hardwired Back Up System
Hitachi-GE Nuclear Energy, Ltd. UK ABWR GENERIC DESIGN ASSESSMENT Resolution Plan for RO-ABWR-0027 Hardwired Back Up System RO TITLE: Hardwired Back Up System REVISION : 5 Overall RO Closure Date (Planned):
More informationNetwork Science. Frank Takes. January 9, LIACS, Leiden University, The Netherlands. Scientific Meeting UL/EPO January 9, / 19
Network Science Frank Takes LIACS, Leiden University, The Netherlands January 9, 2015 Scientific Meeting UL/EPO January 9, 2015 1 / 19 Data Network Science Data Data Analysis Data Mining Data Science Big
More informationMAPPING THE WORLD OF WOMEN S INFORMATION SERVICES
MAPPING THE WORLD OF WOMEN S INFORMATION SERVICES : an online database of women s information centers and libraries worldwide Tilly Vriend. International Information Centre and Archives for the Women s
More informationDo not open attachments on s that you are not sure of.
Avoid free online offers of programs to rid your hard drive of viruses and shred your history completely. It will probably install spyware or infect your hard drive. Do not open attachments on emails that
More informationLiveSTATS.XSP User Guide for ISP Clients
LiveSTATS.XSP User Guide for ISP Clients LiveSTATS.XSP delivers your web site statistics through a full suite of rich and interactive reports. This guide was created specifically for users who access their
More informationIPv6 Migration Framework Case of Institutions in Ethiopia
IPv6 Migration Framework Case of Institutions in Ethiopia Kidist Mekonnen Zemen Bank, Addis Ababa, Ethiopia kidistmt@yahoo.com Taye Abdulkadir HiLCoE School of Computer Science and Technology, Addis Ababa,
More informationDriving Profitability Through. Mobile Payments
Driving Profitability Through Mobile Payments About us etranzact was founded in Nigeria, in 2003 and is a PCI-DSS certified multi-application and multi-channel electronic transaction switching and payment
More informationTCPN-WW-CV-0102 Frank Fabricius
Frank Fabricius Cluster Research Catalog 30 December 2003 Public Network Infrastructure Worldwide Cluster Research Archive The Cluster Research Archive is a listing of deliverables for the Public Network
More informationINTERGOVERNMENTAL OCEANOGRAPHIC COMMISSION (of UNESCO)
Limited Distribution Paris, 28 August 2000 Original: English INTERGOVERNMENTAL OCEANOGRAPHIC COMMISSION (of UNESCO) Sixteenth Session of the IOC Committee on International Oceanographic Data and Information
More informationDescription of the European Big Data Hackathon 2019
EUROPEAN COMMISSION EUROSTAT Ref. Ares(2018)6073319-27/11/2018 Deputy Director-General Task Force Big Data Description of the European Big Data Hackathon 2019 Description of the European Big Data Hackathon
More informationOverview of recent changes in the International IP interconnection ecosystem
Presentation for ITU Overview of recent changes in the International IP interconnection ecosystem 23 January 2012 Michael Kende Introduction 2 The Internet is characterized by two underlying trends in
More informationWELCOME. to the 1 st online DG CONNECT NIPS Study workshop. July 25, 2013
WELCOME to the 1 st online DG CONNECT NIPS Study workshop July 25, 2013 2 DG CONNECT NIPS Study online workshop Agenda topics Timing Facilitator Introduction and practicalities of the workshop 5 min Dan
More informationTransboundary data interoperability for Maritime Spatial Planning. Yuji KATO
Transboundary data interoperability for Maritime Spatial Planning Yuji KATO CONTEXT THE MARITIME SPATIAL PLANNING DIRECTIVE DIRECTIVE 2014/89/EU establishing a framework for Maritime Spatial Planning (MSP)
More informationDigital EAGLEs. Outlook and perspectives
2016 Digital EAGLEs Outlook and perspectives Fixed and Mobile broadband adoption rates in the next decade Changes in Fixed-Broadband penetration 2014-25 Changes in Mobile-Broadband penetration 2014-25
More informationAriba Network. T-Mobile Configuration Guide
Ariba Network T-Mobile Configuration Guide Content Account configuration Basic Profile Email Notifications Electronic Order Routing Electronic Invoice Routing Remittances Accelerated payments Test Account
More informationMOBILE MARKETING ASSOCIATION CONSUMER INTEREST IN MOBILE BANKING: GERMANY FEBRUARY 2010
MOBILE MARKETING ASSOCIATION CONSUMER INTEREST IN MOBILE BANKING: GERMANY FEBRUARY 2010 MMA CONSUMER BRIEFING: GERMANY Mobile Marketing Association, 2010. ABOUT MMA S LIGHTSPEED GERMANY CONSUMER BRIEFINGS:
More informationPreemptive PREventivE Methodology and Tools to protect utilities
Preemptive PREventivE Methodology and Tools to protect utilities 2014 2017 With the financial support of FP7 Seventh Framework Programme Grant agreement no: 607093 1 Preemptive description Project objectives
More informationBSRIA Air Conditioning Worldwide Market Intelligence
2013 BSRIA Air Conditioning Worldwide Market Intelligence Over 25 years experience researching key markets worldwide market intelligence in 94 Countries integrated technical and market expertise management
More informationBetween two stools: Broadband development in South Africa
Between two stools: Broadband development in South Africa Alison Gillwald Acorn-Redecom, Mexico, 5 September 2009 This report is presented as received by IDRC from project recipient(s). It has not been
More informationExample. Section: PS 709 Examples of Calculations of Reduced Hours of Work Last Revised: February 2017 Last Reviewed: February 2017 Next Review:
Following are three examples of calculations for MCP employees (undefined hours of work) and three examples for MCP office employees. Examples use the data from the table below. For your calculations use
More informationIMPROVING CUSTOMER GENERATION BY INCREASING WEBSITE PERFORMANCE AND INTEGRATING IT SYSTEMS
IMPROVING CUSTOMER GENERATION BY INCREASING WEBSITE PERFORMANCE AND INTEGRATING IT SYSTEMS S Ramlall*, DA Sanders**, H Powell* and D Ndzi ** * Motiontouch Ltd, Dunsfold Park, Cranleigh, Surrey GU6 8TB
More informationMore information from: https://www.wiseguyreports.com/reports/ dry-cleaning-and-laundry-services-global-marketreport-2018-including
Report Information More information from: https://www.wiseguyreports.com/reports/2947663-dry-cleaning-and-laundry-services-global-marketreport-2018-including Dry-Cleaning And Laundry Services Global Market
More informationPhishing Activity Trends Report August, 2006
Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account
More informationThe 6DEPLOY Project for IPv6 Training and Support for Deployments
ITU Workshop on IPv6 Geneva, Switzerland, 4 5 September 2008 The 6DEPLOY Project for IPv6 Training and Support for Deployments Martin Potts, Martel GmbH Switzerland Geneva, Switzerland, 4-5 September 2008
More informationLaptops and Netbooks: Mobile Broadband Traffic Across Regions
Laptops and Netbooks: Mobile Broadband Traffic Across Regions 2009- Coda Research Consultancy Ltd, 2009 All rights reserved. No part of this work may be reproduced or transmitted in any form or by any
More informationWho are we? Jonas Zaddach. Andrei Costin. Davide Balzarotti EURECOM. Aurélien Francillon EURECOM 2/54
Who are we? Andrei Costin Jonas Zaddach Aurélien Francillon EURECOM Davide Balzarotti EURECOM 2/54 Embedded Devices Are Everywhere by Wilgengebroed on Flickr [CC-BY-2.0] 3/54 Embedded Devices Smarter and
More informationAugust 2009 Report #32
August 2009 Report #32 While overall spam volumes averaged 89 percent of all email messages in July 2009, spam volumes continue to fluctuate. During July 2009, image spam continued to have an impact reaching
More informationWORKSHOP ON ALL WEEE FLOWS 14/02/17 Alberto Canni Ferrari ERP Italy Country General Manager
WORKSHOP ON ALL WEEE FLOWS 14/02/17 Alberto Canni Ferrari ERP Italy Country General Manager ENGINEERING CIRCULAR ECONOMY www.landbell-group.com WORKSHOP ON ALL WEEE FLOWS ERP ITALY & THE LANDBELL GROUP
More informationMarketing Opportunities
Email Marketing Opportunities Write the important dates and special events for your organization in the spaces below. You can use these entries to plan out your email marketing for the year. January February
More informationKey activities of the Global Gas Flaring Reduction Partnership
Key activities of the Global Gas Flaring Reduction Partnership Methane to Markets Ministerial Meeting, November 15-17, 2004 Dr. Sascha T. Djumena 1 Background of Global Flaring Global venting and flaring
More informationSouth Central Power Stop Scams
Don t get tricked. People around the country have been receiving emails and phone calls from scammers. South Central Power wants to help you keep your money and prevent scams. Review the helpful tips below.
More informationMadrid. Madrid s Position in the Global Telecommunications Landscape. White Paper. Where networks meet. France. Marseille. Barcelona. Spain.
France Marseille Madrid Barcelona Portugal Spain Lisbon Valencia Gibraltar Morocco Algeria sales@de-cix.net www.de-cix.net Historically bypassed by exchanging traffic in the traditional hubs of London
More informationCalendar Excel Template User Guide
Calendar Excel Template User Guide Excel-based simple Calendar Template Version 3 This Excel-based template provides a calendar template for each month of a year. It also incorporates an hourly schedule
More informationTowards Evidence-based Policy in Africa: ICT Access and Usage in 17 African countries.
Towards Evidence-based Policy in Africa: ICT Access and Usage in 17 African countries. Alison Gillwald Research ICT Africa@The Edge Institute Presentation at EuroCPR, Seville March 31st 2009 Research ICT
More information11 PEW RESEARCH CENTER. Topline Results. Pew Research Center Spring 2014 survey April 15, 2015 Release
11 Topline Results Pew Research Center Spring 2014 survey April 15, 2015 Release Methodological notes: Survey results are based on national samples. For further details on sample designs, see Survey Methods
More informationConnecting Global Insight
Connecting Global Insight with CTG Monthly News Hamburg Summit "China Meets Europe" CTG CEO Deng Xiaofeng attended the 7th Hamburg Summit "China Meets Europe" in Germany in late November, and was invited
More informationMcAfee Labs Threat Report
McAfee Labs Threat Report December 217 THREATS STATISTICS Malware Incidents Web and Network Threats 1 McAfee Labs Threat Report, December 217 The McAfee Labs count of new malware in Q3 reached an all-time
More information1 INTRODUCTION OBJECTIVES OF THE STUDY MARKET DEFINITION MARKET SCOPE... 15
TABLE OF CONTENTS 1 INTRODUCTION... 14 1.1 OBJECTIVES OF THE STUDY... 14 1.2 MARKET DEFINITION... 14 1.3 MARKET SCOPE... 15 1.3.1 MARKETS COVERED... 15 1.4 YEARS CONSIDERED FOR THE STUDY... 17 1.5 CURRENCY...
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT October 14, 2016 Problems with Classful IP Addresses Problem 3. Inflexible. Assume a company requires 2,000 addresses Class A and B addresses
More informationLatAm to add 24 million SVOD subscriptions
LatAm to add 24 million SVOD subscriptions Latin American SVOD subscriptions are forecast to reach 51.10 million by 2024; almost double the 27.12 million recorded at end-2018. The top six regional platforms
More informationURL ATTACKS: Classification of URLs via Analysis and Learning
International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 3, June 2016, pp. 980 ~ 985 ISSN: 2088-8708, DOI: 10.11591/ijece.v6i3.7208 980 URL ATTACKS: Classification of URLs via Analysis
More informationIEA Energy in Buildings and Communities
IEA EBC Annex 58 Reliable building energy performance characterisation based on full scale dynamic measurements Operating Agent: Staf Roels, KU Leuven Belgium staf.roels@bwk.kuleuven.be IEA Energy in Buildings
More informationMobile Fronthaul Market Research Report- Global Forecast to 2023
Report Information More information from: https://www.marketresearchfuture.com/reports/1191 Mobile Fronthaul Market Research Report- Global Forecast to 2023 Report / Search Code: MRFR/ICT/0685-HCRR Publish
More informationVTC CO-OP GOOGLE QUALIFICATIONS PARAMETERS & REIMBURSEMENT DOCUMENTATION HOW-TO
VTC CO-OP GOOGLE QUALIFICATIONS PARAMETERS & REIMBURSEMENT DOCUMENTATION HOW-TO 1 CO-OP QUALIFICATIONS 2 GOOGLE QUALIFICATIONS The Google qualification parameters are as follows: Application submitted
More informationProposals for the 2018 JHAQ data collection
EUROPEAN COMMISSION EUROSTAT Directorate F: Social statistics Unit F-5: Education, health and social protection DOC 2017-PH-02.2 Proposals for the 2018 JHAQ data collection Item 2.2 of the Agenda Meeting
More informationEstablishment of the African Road Safety Observatory
International Cooperation Committee (A0010) Establishment of the African Road Safety Observatory George Yannis, Stergios Mavromatis National Technical University of Athens Antonino Tripodi, Luca Persia
More informationCOPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status
1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA technology and deployment status The first Third Generation Partnership Project (3GPP) Wideband Code Division Multiple Access (WCDMA) networks were
More informationHow to Become a CMA (Certified Management Accountant) May 10, 2017
How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements
More informationCharacterization and Modeling of Deleted Questions on Stack Overflow
Characterization and Modeling of Deleted Questions on Stack Overflow Denzil Correa, Ashish Sureka http://correa.in/ February 16, 2014 Denzil Correa, Ashish Sureka (http://correa.in/) ACM WWW-2014 February
More informationVTC FY19 CO-OP GOOGLE QUALIFICATIONS PARAMETERS & REIMBURSEMENT DOCUMENTATION HOW-TO
VTC FY19 CO-OP GOOGLE QUALIFICATIONS PARAMETERS & REIMBURSEMENT DOCUMENTATION HOW-TO 1 TABLE OF CONTENTS 01 CO-OP QUALIFICATIONS 02 REQUIRED DOCUMENTATION 03 REPORTING HOW-TO 04 REIMBURSEMENT PROCESS 2
More informationSmartphones Wearables Smart home
Smartphones Wearables Smart home GfK s latest insights into the digital world 360 AI GfK Point of Sales Tracking, GfK Forecasting 1 The smartphone market 2 Sales for Digital World* products amounted to
More informationPhishing Read Behind The Lines
Phishing Read Behind The Lines Veljko Pejović veljko@cs.ucsb.edu What is Phishing? "Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and
More informationAddressing Geoff Huston APNIC
Addressing 2015 Geoff Huston APNIC The Addressing View Addressing V4 Exhaustion We have been predicting that the exhaustion of the free pool of IPv4 addresses would eventually happen for the past 25 years!
More informationStat 428 Autumn 2006 Homework 2 Solutions
Section 6.3 (5, 8) 6.3.5 Here is the Minitab output for the service time data set. Descriptive Statistics: Service Times Service Times 0 69.35 1.24 67.88 17.59 28.00 61.00 66.00 Variable Q3 Maximum Service
More informationUNECE work on SDG monitoring and data integration
United Nations Economic Commission for Europe Statistical Division UNECE work on SDG monitoring and data integration March 2017 Lidia Bratanova, Director, Statistical Division Slide 2 Measuring Sustainable
More informationAdMob Mobile Metrics Report
AdMob Mobile Metrics Report AdMob serves ads for more than 7,000 mobile Web sites and 1,600 applications around the world. AdMob stores and analyzes the data from every ad request, impression, and click
More informationManually Create Phishing Page For Facebook 2014
Manually Create Phishing Page For Facebook 2014 While you are creating phishing page manually you have to do a lot of work Web Templates -- For importing premade template for Gmail, Facebook from SET.
More informationFuture of Broadband in Africa Christoph Stork, Enrico Calandro, Ranmalee Gamage
Future of Broadband in Africa Christoph Stork, Enrico Calandro, Ranmalee Gamage Approach Nationally representative household and individual surveys in 12 African countries (Census Sample Frame) Basket
More informationONLINE MARKETING INTELLIGENCE. Insights on how to navigate in the ever changing world of Google
ONLINE MARKETING INTELLIGENCE Insights on how to navigate in the ever changing world of Google GROWING MARKET Search media constitutes an increasing part of the online marketing budget for most companies
More informationAdMob Mobile Metrics Report
AdMob Mobile Metrics Report AdMob serves ads for more than 9,000 mobile Web sites and 3,000 applications around the world. AdMob stores and analyzes the data from every ad request, impression, and click
More information``System Maintenance: Please verify your details''
Loughborough University Institutional Repository ``System Maintenance: Please verify your details'' This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation:
More informationCritical Infrastructure Protection in the European Union
20 January, 2015 The European GNSS Programmes 1 ICG9, Prague 9-14 November 2014 Critical Infrastructure Protection in the European Union 20 January, 2015 The European GNSS Programmes 2 Each EU Member State
More informationBusiness Result for the Second Quarter ended September 30, 2017 Regional Market Environments and Projections
Business Result for the Second Quarter ended September 3, 217 Regional Market Environments and Projections October 2, 217 Hitachi Construction Machinery Co., Ltd. Executive Vice President and Executive
More informationFORGING A TRUE GLOBAL CONNECTION - BROADBAND PASSES 500 MILLION SUBSCRIBERS
FORGING A TRUE GLOBAL CONNECTION - BROADBAND PASSES 500 MILLION SUBSCRIBERS Laurie Adams Gonzalez Marketing Director Broadband Forum September 20, 2010 It has only taken 11 years to get to half a billion
More informationRoyal Mail International Update February 2018
Royal Mail International Update February 2018 This update, about incidents which have affected international mail services throughout February, was issued by Royal Mail Customer Services on Thursday 15
More informationNEPAD ICT Broadband Infrastructure Programme: Interconnection via Umojanet
NEPAD ICT Broadband Infrastructure Programme: Interconnection via Umojanet Presentation to the African Peering and Interconnection Forum Nairobi, August 11-12, 2010 By Dr. Edmund Katiti, Policy & Regulatory
More informationWorld Broadband Statistics: A Short Report from Global Broadband Statistics
World Broadband Statistics: A Short Report from Global Broadband Statistics Q1 2012 June 2012 Point Topic Ltd 73 Farringdon Road London EC1M 3JQ, UK Tel. +44 (0) 20 3301 3305 Email bbus@point-topic.com
More informationAdMob Mobile Metrics. Metrics Highlights. May 2010
AdMob Mobile Metrics Metrics Highlights May 2010 Metrics Highlights Summary While mobile Internet requests are growing rapidly worldwide, there are regional differences in the devices used 92 countries
More informationSystem Maintenance: Please verify your details
System Maintenance: Please verify your details Or bloody scammers, they re at it again 1 System Maintenance: Please verify your details From: J.Bloggs@some-uni.ac.uk Reply-to: dodgy@bigfreemailer.com Date:
More informationJoint Research Centre
Joint Research Centre the European Commission's in-house science service Serving society Stimulating innovation Supporting legislation Innovation in Support to Policies: Setting the Stage - the Role of
More informationFinancial Statements for 2000 & Business and Strategy Overview
Financial Statements for 2000 & Business and Strategy Overview February 12, 2001 Q4 Report February 12, 2001 / 1 Contents Financial Overview Kim Ignatius Business and Strategy Overview Kaj-Erik Relander
More informationAdMob Mobile Metrics Report
AdMob Mobile Metrics Report AdMob serves ads for more than 15,000 mobile Web sites and applications around the world. AdMob stores and analyzes the data from every ad request, impression, and click and
More information