Skip to main content

2016 | Buch

Data Thieves in Action

Examining the International Market for Stolen Personal Information

insite
SUCHEN

Über dieses Buch

This book examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breaches, to engage in cybercrime and fraud. Using data from multiple English and Russian language web forums, the authors identify the range of products sold in these active on-line marketplaces and the prospective profits earned by these actors.
The social organization of these markets is analysed using sociological theory to understand the sophistication of the markets. Social network analyses of the relational networks of participants are also utilised to examine their sophistication and structure. In doing so, this work will contribute to the development of cybercrime studies, and will appeal to both social and computer scientists alike with an interest in the human aspects of cybercrime.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction
Abstract
This chapter introduces the problem of stolen data markets as a consequence of the digital economy that now dominates society. Prior research studies on stolen data markets are discussed, along with their overlap with other electronic illicit markets like the Silk Road. The data for this book is described in detail. The focus is on a sample of threads from 13 forums operating around the world whose users communicate in Russian and English languages. The structure of the book is also elaborated chapter by chapter.
Thomas J. Holt, Olga Smirnova, Yi-Ting Chua
Chapter 2. The Marketing and Sales of Stolen Data
Abstract
This chapter outlines the general practices and products offered by vendors within the 13 forums sampled that constitute markets for stolen data. The most common products sold were dumps, or credit/debit card numbers, followed by CVV data, which includes credit card numbers and the three- or four-digit pin number located on the back of the card. There were a range of prices observed for these products, and differences in the nature of products sold based on the language used within the forum and the number of complaints received against disreputable vendors. The chapter concludes with a discussion of the difference in price observed by country for multiple products offered within the markets.
Thomas J. Holt, Olga Smirnova, Yi-Ting Chua
Chapter 3. The Economic Impact of Stolen Data Markets
Abstract
This chapter provides an in-depth analysis of the factors that may affect the price and profits received by data buyers and vendors within the market for stolen data. First, the issue of “lemon markets” is discussed, where the lack of information on the quality of data may lead to lower-priced data of low value dominating the market. Using linear regression models, we find that the price for dumps and eBay accounts are directly affected by social factors including the language of participants which may be a proxy for trust. Additionally, we discuss the challenges inherent in modeling the profit margins of data buyers and sellers. The prospective earnings of vendors are explored, suggesting they may make thousands of dollars depending on the product, while buyers could earn millions but face greater risk of economic loss.
Thomas J. Holt, Olga Smirnova, Yi-Ting Chua
Chapter 4. The Social Organization of Actors in Stolen Data Markets
Abstract
This chapter discusses social organization frameworks, and applies Best and Luckenbill’s framework model to the study of stolen data market participants. The framework recognizes five different types of social organizations (loners, colleagues, peers, teams, and formal organizations) based on characteristics such as mutual association, mutual participation, elaborate division of labor, and extended organization. Based on these characteristics of organizational complexity, stolen data forums operate concurrently at different levels of complexity. While some forums have longer duration of operations, others provide evidence for the sophisticated division of labor via specialized roles for members. Hence, the differentiation depends on the nature of the transaction more than on the nature of the forum.
Thomas J. Holt, Olga Smirnova, Yi-Ting Chua
Chapter 5. Visualizing the Networks of Economic Transactions and Ads in Stolen Data Markets
Abstract
This chapter explores how social network analysis can enlighten our understanding of the deviant exchanges between data market participants at the global (network overall) and local (key players) levels. It starts with the network visualizations and global network measures. The correlations between user centrality (measure derived from the network) and the number of posts a user has made (measure collected from the forums) do not differentiate between ripping and non-ripping forums, but indicate a high variation among forums. On most forums, the sellers are central users, indicating their importance to the existence of the market, while the buyers create the most discussion. The chapter ends with Monte Carlo simulations of the networks attempting to identify their hidden structure.
Thomas J. Holt, Olga Smirnova, Yi-Ting Chua
Chapter 6. Implications and Conclusions
Abstract
This chapter provides a summary of all findings along with the implications for our understanding of illicit markets operating on- and off-line. The stolen data markets examined here are similar in many respects to the other markets, such as those for stolen goods or drugs. There is one key difference that the nature of market precludes the buyers from inspecting the products and/or punishing sellers for non-working data. The policies to address the stolen data markets include collaboration between various law enforcement entities across jurisdictional lines, improved awareness of identity theft risks, and improvements in the reporting mechanisms for this form of criminality. Finally, there are certain limitations to this study, including that this is a snapshot of a selected number of forums at a given point in time. Future research will need to expand our understanding of how the stolen data markets evolve over time.
Thomas J. Holt, Olga Smirnova, Yi-Ting Chua
Backmatter
Metadaten
Titel
Data Thieves in Action
verfasst von
Thomas J. Holt
Olga Smirnova
Yi-Ting Chua
Copyright-Jahr
2016
Electronic ISBN
978-1-137-58904-0
Print ISBN
978-1-137-58903-3
DOI
https://doi.org/10.1057/978-1-137-58904-0

Premium Partner