Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013, Proceedings of the 5th Annual ACM Web Science Conference
Over the last decade, the nature of cybercrime has transformed from naive vandalism to profit-driven, leading to the emergence of a global underground economy. A noticeable trend which has surfaced in this economy is the repeated use of forums to operate online stolen data markets. Using interaction data from three prominent carding forums: Shadowcrew, Cardersmarket and Darkmarket, this study sets out to understand why forums are repeatedly chosen to operate online stolen data markets despite numerous successful infiltrations by law enforcement in the past. Drawing on theories from criminology, social psychology, economics and network science, this study has identified four fundamental socioeconomic mechanisms offered by carding forums: (1) formal control and coordination; (2) social networking; (3) identity uncertainty mitigation; (4) quality uncertainty mitigation. Together, they give rise to a sophisticated underground market regulatory system that facilitates underground trading over the Internet and thus drives the expansion of the underground economy.
Over the last decade, the nature of cybercrime has transformed from naive vandalism to profit-driven, leading to the emergence of a global underground economy. A noticeable trend which has surfaced in this economy is the repeated use of forums to operate online stolen data markets. Using interaction data from three prominent carding forums: Shadowcrew, Cardersmarket and Darkmarket, this study sets out to understand why forums are repeatedly chosen to operate online stolen data markets despite numerous successful infiltrations by law enforcement in the past. Drawing on theories from criminology, social psychology, economics and network science, this study has identified four fundamental socio-economic mechanisms offered by carding forums: (1) formal control and coordination; (2) social networking; (3) identity uncertainty mitigation; (4) quality uncertainty mitigation. Together, they give rise to a sophisticated underground market regulatory system that facilitates underground trading over the Internet and thus drives the expansion of the underground economy.
Policing and Society, 2013
At the beginning of the 21 st Century, before the power of online social networking became apparent, several studies speculated about the likely structure of organised cybercrime . In the light of new data on cybercriminal organisations, this paper sets out to revisit their claims. In collaboration with the Serious Organised Crime Agency (SOCA), this paper examines the structure of organised cybercrime by analysing data from online underground markets previously in operation over the Internet. In order to understand the various structures of organised cybercrime which have manifested, theories are drawn from social psychology, organised crime and transaction cost economics (TCE). Since the focus is on how uncertainty is mitigated in trading among cybercriminals, uncertainty is treated as a cost to the transactions and is used as the unit of analysis to examine the mechanisms cybercriminals use to control two key sources of uncertainty: the quality of merchandise and the identity of the trader. The findings indicate that carding forums facilitate organised cybercrime because they offer a hybrid form of organisational structure that is able to address sources of uncertainty and minimise transaction costs to an extent that allows a competitive underground market to emerge. The findings from this study can be used to examine other online applications that could facilitate the online underground economy.
CrimRxiv, 2022
Many activities related to cybercrime operations do not require much secrecy, such as developing websites or translating texts. This research provides indications that many users of a popular public internet marketing forum have connections to cybercrime. It does so by investigating the involvement in cybercrime of a population of users interested in internet marketing, both at a micro and macro scale. The research starts with a case study of three users confirmed to be involved in cybercrime and their use of the public forum where users share information about online advertising. It provides a first glimpse that some business with cybercrime connection is being conducted in the clear. The study then pans out to investigate the forum population's ties with cybercrime by finding crossover users, who are users from the public forum who also comment on cybercrime forums. The cybercrime forums on which they discuss are analyzed and crossover users' strength of participation is reported. Also, to assess if they represent a subgroup of the forum population, their posting behavior on the public forum is compared with that of non-crossover users. This blend of analyses shows that (i) a minimum of 7.2% of the public forum population are crossover users that have ties with cybercrime forums; (ii) their participation in cybercrime forums is limited; and (iii) their posting behavior is relatively indistinguishable from that of non-crossover users. This is the first study to formally quantify how users of an internet marketing public forum, a space for informal exchanges, have ties to cybercrime activities. We conclude that crossover users are a substantial part of the population in the public forum, and, even though they have thus far been overlooked, their aggregated effect in the ecosystem must be considered. This study opens new research questions on cybercrime participation that should consider online spaces beyond their cybercrime branding.
The current narrative in criminology is that drawing behavioural parallels between groups observed in virtual markets and groups within illicit markets is hampered by the lack of legal frameworks to outline and describe criminal activities. Without a legal framework it is a struggle to distinguish normative behaviour from deviant behaviour. However, this paper argues that rather than lacking legal frameworks, virtual worlds have an extensive set of formal and informal social controls that approximate the legal and social regulations placed on illicit markets in the real world. Both the virtual market and illicit markets are punctuated by their use of violence as a tool to resolve disputes, protect markets and enforce financial transactions in the ongoing absence of legal regulation. Therefore, that if the criminological narrative can be adapted to recognise the parallels between the two markets, then the opportunity exists to study the behavior of individuals and groups in a controlled and well observed setting contained in virtual markets. This will provide insights into the structures and relationships between illicit market groups in the real world.
Sociological Research Online
Illicit market exchanges in cybercriminal markets are plagued by problems of verifiability and enforceability: trust is one way to ensure reliable exchange. It is fragile and hard to establish. One way to do that is to use the administrative structure of the digital market to control transactions. This is common among a specific type of market – darknet cryptomarkets. These are sites for the sale of illicit goods and services, hosted anonymously using the Tor darknet. However, reliance by users on the technology and the market administrators exposes users to excessive risk. We examine a case of a market that rejects several key technological features now common in cryptomarkets but that is nonetheless reliable and robust. We apply a techno-social approach that looks at the way participants use and combine technologies with trust relationships. The study was designed to capture the interactional context of the illicit market. We aimed to examine both person-to-person interaction and ...
International Journal of Drug Policy, 2019
Introduction: This article analyses the factors of trust, logistics, and conflict on darknet markets (DNMs) and forums that are dedicated to selling illicit drugs. The analysis is conducted by utilising Elias (1978) theoretical concept of 'figuration,' which refers to the communicative constellations that eventuate between actors. Methods: A qualitative content analysis was applied to a sample collected from darknet forums related to darknet markets, independent forums with trade sections, and separate vendor shops. The main categories trust, logistics, and conflict are analysed, and certain subcategories are also explored, including operational security (opsec), vouching, and shilling. These terms are commonly used to describe the trading of drugs on the darknet. Results: Users of DNMs and forums discuss vendors, their products, and security-related features. Vouching and shilling are attempts to strengthen trust, logistics are used to secure the trade, while conflicts reflected in forum discussion threads often arise when logistics fail. Logistics may fail due to different reasons and actors involved in the associated figurations. The (anticipated) presence of actors in disguise is crucial for all of the main categories. Conclusion: Notions of trust, logistics, and conflict express attempts to cope with or circumvent risks imposed on users of DNMs by other users (e.g., scamming) or law enforcement (e.g., the interception of packages). Due to the illicit nature of the trade, these notions have to be constantly negotiated through digital communication.
Journal of Cybersecurity
Many activities related to cybercrime operations do not require much secrecy, such as developing websites or translating texts. This research provides indications that many users of a popular public internet marketing forum have connections to cybercrime. It does so by investigating the involvement in cybercrime of a population of users interested in internet marketing, both at a micro and macro scale. The research starts with a case study of three users confirmed to be involved in cybercrime and their use of the public forum. It provides a first glimpse that some business with cybercrime connections is being conducted in the clear. The study then pans out to investigate the forum population's ties with cybercrime by finding crossover users, that is, users from the public forum who also comment on cybercrime forums. The cybercrime forums on which they discuss are analyzed and the crossover users’ strength of participation is reported. Also, to assess if they represent a sub-grou...
AoIR Selected Papers of Internet Research – 2024, 2025
Global Crime, 2015
Research examining offender risk reduction strategies within illicit markets focus primarily on those operating in the real world for drugs and stolen goods. Few have considered the strategies that may be used by individuals in virtual illicit markets that are hidden from public view. This study addresses this gap through a grounded theory analysis of posts from 10 Russian and three English language web forums selling stolen data to engage in identity theft and fraud. The findings indicate that buyers employ multiple strategies to reduce their risk of loss from unreliable vendors, along with resources provided by forum administrators to manage relationships between participants. The implications of this study for law enforcement and offender decision-making research are also discussed.
Proceedings of SMSociety 20, 2020
This study aims to understand communicative activities of an illicit cyber-trade community on an anonymous social platform, Reddit. Based on the communication-as-constitutive of organization (CCO) perspective, the study identifies participants with different levels of engagement, and examines how their discursive engagement collectively reflects the ways in which illicit market users co-orient themselves to respond to a crisis event (i.e., market shutdown). The empirical case for this study is a subreddit channel dedicated to what was once the largest dark web market: r/AlphabayMarket. We examine two month period's posting activities until market was permanently shut down in July 2017. Our analysis comprises three parts. First, a social network analysis was conducted to identify key and non-key players in the community. Second, a structural topic modeling was computed to inductively infer topic clusters. Third, posts were manually reviewed to articulate the process of co-orientation manifest in the results of topic modeling. CCS CONCEPTS • Security and privacy → Human and societal aspects of security and privacy.
This paper presents the results of a qualitative study on discussions about two major law enforcement interventions against Dark Net Market (DNM) users extracted from relevant Reddit forums. We assess the impact of Operation Hyperion and Operation Bayonet (combined with the closure of the site Hansa) by analyzing posts and comments made by users of two Reddit forums created for the discussion of Dark Net Markets. The operations are compared in terms of the size of the discussions, the consequences recorded, and the opinions shared by forum users. We find that Operation Bayonet generated a higher number of discussions on Reddit, and from the qualitative analysis of such discussions it appears that this operation also had a greater impact on the DNM ecosystem.
Social Science Computer Review, 2020
Cybercriminals operate in obscurity to avoid detection of their illegal deeds. This fact makes studying them more difficult. Many cybercriminals meet in illicit online market places such as carding forums. The forums are often visible, but the actual transactions are carried out in private messages beyond view. However, there is no honor among thieves, and sometimes a carding forum server database will be hacked and leaked to the public. Existing research has been conducted on such leaked databases, but much of it is quantitative, rather than offering any qualitative interpretation into the nature of the forum user base. This research sought to analyze two such leaked carding forum databases by applying hierarchical clustering of 10,714 registered user accounts, grouping users based on 19 variables consisting of comment history style, site engagement activity, and explicit status markers. The results yielded 16 categories of users from four different domains composed of general consumers, location-based consumers, producers, and an "other" category. Following categorization, qualitative analyses were conducted to further shed insight into the nature of the two forums.
Drug and Alcohol Review, 2015
Journal of Economic Perspectives, 2009
This paper will focus on online crime, which has taken off as a serious industry since about 2004. Until then, much of the online nuisance came from amateur hackers who defaced websites and wrote malicious software in pursuit of bragging rights. But now criminal networks have emerged—online black markets in which the bad guys trade with each other, with criminals taking on specialized roles. Just as in Adam Smith's pin factory, specialization has led to impressive productivity gains, even though the subject is now bank card PINs rather than metal ones. Someone who can collect bank card and PIN data, electronic banking passwords, and the information needed to apply for credit in someone else's name can sell these data online to anonymous brokers. The brokers in turn sell the credentials to specialist cashiers who steal and then launder the money. We will examine the data on online crime; discuss the collective-action aspects of the problem; demonstrate how agile attackers shi...
American Journal of Sociology, 2021
How do illegal markets grow and develop? Using unique transactionlevel data on 7,205 market actors and 16,847 illegal drug exchanges on a "darknet" drug market, the authors evaluate the network processes that shape online illegal drug trade and promote the growth of online illegal drug markets. Contrary to past research on online markets, the authors argue that the high-risk context of illegal trade enhances market actors' reliance on social relationships that emerge endogenously from transaction networks. The findings reveal a highly structured trade network characterized by dense clustering and frequent recurrent drug exchange. Dynamic network models reveal that both embeddedness and closure in exchange structure increase the hazard rate of illegal drug trade, with effect sizes comparable to formal reputations. These effects are pronounced in the early stages of market development but wane once the market reaches maturity. These findings demonstrate the powerful, temporally contingent, influence of transaction networks on illegal trade in online markets and reveal how endogenous networks of economic relations can promote risky exchange under conditions of relative anonymity and illegality. Governments play a key role in market development. States define the type of products for sale as well as the rules governing exchange. Markets also rely on
Socio-Economic Review, 2021
Although economic sociology emphasizes the role of social networks for shaping economic action, little research has examined how network governance structures affect prices in the unregulated and high-risk social context of online criminal trade. We consider how overembeddedness-a state of excessive interconnectedness among market actors-arises from endogenous trade relations to shape prices in illegal online markets with aggregate consequences for short-term gross illegal revenue. Drawing on transaction-level data on 16 847 illegal drug transactions over 14 months of trade in a 'darknet' drug market, we assess how repeated exchanges and closure in buyervendor trade networks nonlinearly influence prices and short-term gross revenue from illegal drug trade. Using a series of panel models, we find that increases in closure and repeated exchange raise prices until a threshold is reached upon which prices and gross monthly revenue begin to decline as networks become overembedded. Findings provide insight into the network determinants of prices and gross monthly revenue in illegal online drug trade and illustrate how network structure shapes prices in criminal markets, even in anonymous trade environments.
OVER THE PAST FEW YEARS, RESEARCHERS HAVE DESCRIBED THE CONSTANT growth of a complex virtual criminal underworld in which personal and financial data is bought and sold (Holt and Lampke 2010; Franklin et al. 2007; Thomas and Martin 2006). Hundreds if not thousands of vendors compete at any point in time to sell Visa, MasterCard and American Express numbers, very often at a low rate. Yet, the economic impact of these markets can be measured in billions of dollars (Anderson et al. 2013). This chapter discusses how law enforcement agencies have targeted and investigated this criminal underground. While a traditional investigate-then-arrest methodology has been the method of choice of these agencies, researchers (Mell 2012; Motoyama et al. 2011) have argued that law enforcement agencies should move to a disruption model in order to increase their efficiency and increase the impact of the operations. This study seeks to understand the formation of trust of ties and business ties to enhance our ability to launch disruption attack on the criminal underground. We find that even small disruption operations may have an important impact on the activity of the offenders involved in the theft and resale of stolen financial information.
This study examines the signals of trust in stolen data advertisements by analysing the structural and situational factors that influence the type of feedback sellers receive. Specifically, this article explores the factors associated with positive and negative buyer feedback from the purchase of stolen credit card data in a series of advertisements from a sample of Russian and English language forums where individuals buy and sell personal information. The results of zero-inflated Poisson regression models suggest that the sellers may influence their likelihood of receiving feedback by specifying the type of payment mechanism, choosing the advertisement language and selecting the type of market they operate within. The implications of this study for our understanding of online illicit markets, criminological theory and policy-making will be explored in depth.
Pastrana, S., Thomas, D. R., Hutchings, A., & Clayton, R. (2018). CrimeBB: Enabling cybercrime research on underground forums at scale. Lyon: ACM International World Wide Web (WWW) Conference., 2018
Underground forums allow criminals to interact, exchange knowledge, and trade in products and services. They also provide a pathway into cybercrime, tempting the curious to join those already motivated to obtain easy money. Analysing these forums enables us to better understand the behaviours of offenders and pathways into crime. Prior research has been valuable, but limited by a reliance on datasets that are incomplete or outdated. More complete data, going back many years, allows for comprehensive research into the evolution of forums and their users. We describe CrimeBot, a crawler designed around the particular challenges of capturing data from underground forums. CrimeBot is used to update and maintain CrimeBB, a dataset of more than 48m posts made from 1m accounts in 4 different operational forums over a decade. This dataset presents a new opportunity for large-scale and longitudinal analysis using up-to-date information. We illustrate the potential by presenting a case study using CrimeBB, which analyses which activities lead new actors into engagement with cybercrime. CrimeBB is available to other academic researchers under a legal agreement, designed to prevent misuse and provide safeguards for ethical research.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.