ABSTRACT
Over the last decade, the nature of cybercrime has transformed from naive vandalism to profit-driven, leading to the emergence of a global underground economy. A noticeable trend which has surfaced in this economy is the repeated use of forums to operate online stolen data markets. Using interaction data from three prominent carding forums: Shadowcrew, Cardersmarket and Darkmarket, this study sets out to understand why forums are repeatedly chosen to operate online stolen data markets despite numerous successful infiltrations by law enforcement in the past. Drawing on theories from criminology, social psychology, economics and network science, this study has identified four fundamental socio-economic mechanisms offered by carding forums: (1) formal control and coordination; (2) social networking; (3) identity uncertainty mitigation; (4) quality uncertainty mitigation. Together, they give rise to a sophisticated underground market regulatory system that facilitates underground trading over the Internet and thus drives the expansion of the underground economy.
- Barabási, A.-L. and Albert, R. Emergence of Scaling in Random Networks. Science 286, 5439 (1999), 509--512.Google Scholar
- Burt, R. S. The Network Structure of Social Capital. Research In Organizational Behavior 22, May (2000), 345--423.Google ScholarCross Ref
- Clauset, A., Shalizi, C. R., and Newman, M. E. J. Power-Law Distributions in Empirical Data. SIAM Review 51, 4 (2009), 661. Google ScholarDigital Library
- Dasgupta, P. Trust as a Commodity. In D. Gambetta, ed., Trust: Making and Breaking Cooperative Relations. Department of Sociology, University of Oxford, 2000, 49--72.Google Scholar
- D. O. J. Nineteen Individuals Indicted In Internet 'Carding' Conspiracy. 2004. http://www.justice.gov/opa/pr/2004/October/04_crm_726.htm.Google Scholar
- Franklin, J., Paxson, V., Perrig, A., and Savage, S. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. Proceedings of the 14th ACM conference on Computer and communications security, ACM (2007), 375--388. Google ScholarDigital Library
- Gambetta, D. Trust's Odd Ways. In J. Elster, O. Gjelsvik, A. Hylland and K. Moene, eds., Understanding Choice, Explaining Behaviour: Essays in Honour of Ole-Jørgen Skog. Unipub Forlag/Oslo Academic Press, Oslo, 2008, 81--100.Google Scholar
- Glenny, M. Darkmarket: Cyberthieves, Cybercops and You. The Bodley Head, London, 2011.Google Scholar
- Grow, B. and Bush, J. Hacker Hunters. Bloomberg BusinessWeek Magazine, 2005. http://www.businessweek.com/stories/2005-05-29/hacker-hunters.Google Scholar
- Herley, C. and Florêncio, D. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy. In T. Moore, D. Pym and C. Ioannidis, eds., Economics of Information Security and Privacy. Springer US, 2010, 33--53.Google Scholar
- Holt, T. J. Examining the Role of Technology in the Formation of Deviant Subcultures. Social Science Computer Review 28, 4 (2010), 466--481. Google ScholarDigital Library
- Holt, T. J. and Lampke, E. Exploring stolen data markets online: products and market forces. Criminal Justice Studies 23, 1 (2010), 33--50.Google ScholarCross Ref
- Jackson, M. O. and Rogers, B. W. Meeting Strangers and Friends of Friends: How Random Are Social Networks? American Economic Review 97, 3 (2007), 890--915.Google ScholarCross Ref
- Kleinberg, J. M. Navigation in a Small World. Nature 406, 6798 (2000), 845.Google Scholar
- Lusthaus, J. Trust in the World of Cybercrime. Global Crime 13, 2 (2012), 71--94.Google ScholarCross Ref
- McCarthy, B. and Hagan, J. Getting into Street Crime: The Structure and Process of Criminal Embeddedness. Social Science Research 24, 1 (1995), 63--95.Google Scholar
- McKnight, D. H., Cummings, L. L., and Chervany, N. L. Initial Trust Formation in New Organizational Relationships. The Academy of Management Review 23, 3 (1998), 473--490.Google ScholarCross Ref
- Moore, T., Clayton, R., and Anderson, R. The Economics of Online Crime. Journal of Economic Perspectives 23, 3 (2009), 3--20.Google ScholarCross Ref
- Motoyama, M., McCoy, D., Levchenko, K., Savage, S., and Voelker, G. M. An Analysis of Underground Forums. Proceedings of the ACM Internet Measurement Conference (IMC), (2011). Google ScholarDigital Library
- Pennock, D. M., Flake, G. W., Lawrence, S., Glover, E. J., and Giles, C. L. Winners Don't Take All: Characterizing the Competition for Links on the Web. Proceedings of the National Academy of Sciences of the United States of America 99, 8 (2002), 5207--11.Google ScholarCross Ref
- Peretti, K. K. Data Breaches: What the Underground World of "Carding" Reveals. Santa Clara Computer and High Technology Journal 25, (2008), 375--414.Google Scholar
- Poulsen, K. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground. Crown Publishing, New York, 2011.Google Scholar
- Powell, W. W. Neither market nor hierarchy: network forms of organization. Research In Organizational Behavior 12, 1 (1990), 295--336.Google Scholar
- Tajfel, H. Social Psychology of Intergroup Relations. Annual Review of Psychology 33, 1 (1982), 1--39.Google ScholarCross Ref
- Thomas, R. and Martin, J. the underground economy?: priceless. The USENIX Magazine 31, 6 (2006), 7--16.Google Scholar
- von Lampe, K. and Johansen, P. Organized Crime and Trust: On the Conceptualization and Empirical Relevance of Trust in the Context of Criminal Networks. Global Crime 6, 2 (2004), 159--184.Google ScholarCross Ref
- Watts, D. J. and Strogatz, S. H. Collective Dynamics of 'Small-World' Networks. Nature 393, 6684 (1998), 440--442.Google ScholarCross Ref
- Webber, C. and Yip, M. Drifting on and Off-line: Humanising the Cyber Criminal. In S. Winlow and R. Atkinson, eds., New Directions in Crime and Deviancy. Routledge, Abington, 2013, 191--205.Google Scholar
- Williamson, O. E. Calculativeness, Trust, and Economic Organization. Journal of Law and Economics 36, 1 (1993), 453--486.Google ScholarCross Ref
- Yip, M. and Webber, C. Hacktivism?: a Theoretical and Empirical Exploration of China's Cyber Warriors. ACM Web Science Conference 2011, Koblenz, 14-17 June, (2011).Google ScholarDigital Library
- Yip, M., Shadbolt, N., Tiropanis, T., and Webber, C. The Digital Underground Economy: a Social Network Approach to Understanding Cybercrime. Digital Futures 2012: The Third Annual Digital Economy All Hands Conference, Aberdeen, 23-25 October, (2012)Google Scholar
Index Terms
- Why forums?: an empirical analysis into the facilitating factors of carding forums
Recommendations
Discovering credit card fraud methods in online tutorials
OnSt '16: Proceedings of the 1st International Workshop on Online Safety, Trust and Fraud PreventionOnline underground forums allow for the sharing of up-to-date knowledge on how to optimally commit an online crime. Tutorials focusing on specific online crimes are commonplace and provide members of underground communities with all the information ...
Payment card forensic analysis
While one would not even consider them alike, payment cards are one of the most valuable and widely used embedded systems. Payment card systems are probably the most attacked and counterfeited. In fact, even though the use of smart cards have introduced ...
Financial control in preventing and combating money laundering
AIKED'11: Proceedings of the 10th WSEAS international conference on Artificial intelligence, knowledge engineering and data basesMoney laundering is a complex activity both in terms of law, but especially for the economy, being the main source of financing terrorist activity worldwide.
The economic condition prior to the phenomenon of money laundering is the existence of an ...
Comments