skip to main content
10.1145/2464464.2464524acmconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
research-article

Why forums?: an empirical analysis into the facilitating factors of carding forums

Published:02 May 2013Publication History

ABSTRACT

Over the last decade, the nature of cybercrime has transformed from naive vandalism to profit-driven, leading to the emergence of a global underground economy. A noticeable trend which has surfaced in this economy is the repeated use of forums to operate online stolen data markets. Using interaction data from three prominent carding forums: Shadowcrew, Cardersmarket and Darkmarket, this study sets out to understand why forums are repeatedly chosen to operate online stolen data markets despite numerous successful infiltrations by law enforcement in the past. Drawing on theories from criminology, social psychology, economics and network science, this study has identified four fundamental socio-economic mechanisms offered by carding forums: (1) formal control and coordination; (2) social networking; (3) identity uncertainty mitigation; (4) quality uncertainty mitigation. Together, they give rise to a sophisticated underground market regulatory system that facilitates underground trading over the Internet and thus drives the expansion of the underground economy.

References

  1. Barabási, A.-L. and Albert, R. Emergence of Scaling in Random Networks. Science 286, 5439 (1999), 509--512.Google ScholarGoogle Scholar
  2. Burt, R. S. The Network Structure of Social Capital. Research In Organizational Behavior 22, May (2000), 345--423.Google ScholarGoogle ScholarCross RefCross Ref
  3. Clauset, A., Shalizi, C. R., and Newman, M. E. J. Power-Law Distributions in Empirical Data. SIAM Review 51, 4 (2009), 661. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dasgupta, P. Trust as a Commodity. In D. Gambetta, ed., Trust: Making and Breaking Cooperative Relations. Department of Sociology, University of Oxford, 2000, 49--72.Google ScholarGoogle Scholar
  5. D. O. J. Nineteen Individuals Indicted In Internet 'Carding' Conspiracy. 2004. http://www.justice.gov/opa/pr/2004/October/04_crm_726.htm.Google ScholarGoogle Scholar
  6. Franklin, J., Paxson, V., Perrig, A., and Savage, S. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. Proceedings of the 14th ACM conference on Computer and communications security, ACM (2007), 375--388. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Gambetta, D. Trust's Odd Ways. In J. Elster, O. Gjelsvik, A. Hylland and K. Moene, eds., Understanding Choice, Explaining Behaviour: Essays in Honour of Ole-Jørgen Skog. Unipub Forlag/Oslo Academic Press, Oslo, 2008, 81--100.Google ScholarGoogle Scholar
  8. Glenny, M. Darkmarket: Cyberthieves, Cybercops and You. The Bodley Head, London, 2011.Google ScholarGoogle Scholar
  9. Grow, B. and Bush, J. Hacker Hunters. Bloomberg BusinessWeek Magazine, 2005. http://www.businessweek.com/stories/2005-05-29/hacker-hunters.Google ScholarGoogle Scholar
  10. Herley, C. and Florêncio, D. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy. In T. Moore, D. Pym and C. Ioannidis, eds., Economics of Information Security and Privacy. Springer US, 2010, 33--53.Google ScholarGoogle Scholar
  11. Holt, T. J. Examining the Role of Technology in the Formation of Deviant Subcultures. Social Science Computer Review 28, 4 (2010), 466--481. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Holt, T. J. and Lampke, E. Exploring stolen data markets online: products and market forces. Criminal Justice Studies 23, 1 (2010), 33--50.Google ScholarGoogle ScholarCross RefCross Ref
  13. Jackson, M. O. and Rogers, B. W. Meeting Strangers and Friends of Friends: How Random Are Social Networks? American Economic Review 97, 3 (2007), 890--915.Google ScholarGoogle ScholarCross RefCross Ref
  14. Kleinberg, J. M. Navigation in a Small World. Nature 406, 6798 (2000), 845.Google ScholarGoogle Scholar
  15. Lusthaus, J. Trust in the World of Cybercrime. Global Crime 13, 2 (2012), 71--94.Google ScholarGoogle ScholarCross RefCross Ref
  16. McCarthy, B. and Hagan, J. Getting into Street Crime: The Structure and Process of Criminal Embeddedness. Social Science Research 24, 1 (1995), 63--95.Google ScholarGoogle Scholar
  17. McKnight, D. H., Cummings, L. L., and Chervany, N. L. Initial Trust Formation in New Organizational Relationships. The Academy of Management Review 23, 3 (1998), 473--490.Google ScholarGoogle ScholarCross RefCross Ref
  18. Moore, T., Clayton, R., and Anderson, R. The Economics of Online Crime. Journal of Economic Perspectives 23, 3 (2009), 3--20.Google ScholarGoogle ScholarCross RefCross Ref
  19. Motoyama, M., McCoy, D., Levchenko, K., Savage, S., and Voelker, G. M. An Analysis of Underground Forums. Proceedings of the ACM Internet Measurement Conference (IMC), (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Pennock, D. M., Flake, G. W., Lawrence, S., Glover, E. J., and Giles, C. L. Winners Don't Take All: Characterizing the Competition for Links on the Web. Proceedings of the National Academy of Sciences of the United States of America 99, 8 (2002), 5207--11.Google ScholarGoogle ScholarCross RefCross Ref
  21. Peretti, K. K. Data Breaches: What the Underground World of "Carding" Reveals. Santa Clara Computer and High Technology Journal 25, (2008), 375--414.Google ScholarGoogle Scholar
  22. Poulsen, K. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground. Crown Publishing, New York, 2011.Google ScholarGoogle Scholar
  23. Powell, W. W. Neither market nor hierarchy: network forms of organization. Research In Organizational Behavior 12, 1 (1990), 295--336.Google ScholarGoogle Scholar
  24. Tajfel, H. Social Psychology of Intergroup Relations. Annual Review of Psychology 33, 1 (1982), 1--39.Google ScholarGoogle ScholarCross RefCross Ref
  25. Thomas, R. and Martin, J. the underground economy?: priceless. The USENIX Magazine 31, 6 (2006), 7--16.Google ScholarGoogle Scholar
  26. von Lampe, K. and Johansen, P. Organized Crime and Trust: On the Conceptualization and Empirical Relevance of Trust in the Context of Criminal Networks. Global Crime 6, 2 (2004), 159--184.Google ScholarGoogle ScholarCross RefCross Ref
  27. Watts, D. J. and Strogatz, S. H. Collective Dynamics of 'Small-World' Networks. Nature 393, 6684 (1998), 440--442.Google ScholarGoogle ScholarCross RefCross Ref
  28. Webber, C. and Yip, M. Drifting on and Off-line: Humanising the Cyber Criminal. In S. Winlow and R. Atkinson, eds., New Directions in Crime and Deviancy. Routledge, Abington, 2013, 191--205.Google ScholarGoogle Scholar
  29. Williamson, O. E. Calculativeness, Trust, and Economic Organization. Journal of Law and Economics 36, 1 (1993), 453--486.Google ScholarGoogle ScholarCross RefCross Ref
  30. Yip, M. and Webber, C. Hacktivism?: a Theoretical and Empirical Exploration of China's Cyber Warriors. ACM Web Science Conference 2011, Koblenz, 14-17 June, (2011).Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Yip, M., Shadbolt, N., Tiropanis, T., and Webber, C. The Digital Underground Economy: a Social Network Approach to Understanding Cybercrime. Digital Futures 2012: The Third Annual Digital Economy All Hands Conference, Aberdeen, 23-25 October, (2012)Google ScholarGoogle Scholar

Index Terms

  1. Why forums?: an empirical analysis into the facilitating factors of carding forums

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WebSci '13: Proceedings of the 5th Annual ACM Web Science Conference
        May 2013
        481 pages
        ISBN:9781450318891
        DOI:10.1145/2464464

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 May 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate218of875submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader