Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Journal of Cybersecurity
…
14 pages
1 file
Many activities related to cybercrime operations do not require much secrecy, such as developing websites or translating texts. This research provides indications that many users of a popular public internet marketing forum have connections to cybercrime. It does so by investigating the involvement in cybercrime of a population of users interested in internet marketing, both at a micro and macro scale. The research starts with a case study of three users confirmed to be involved in cybercrime and their use of the public forum. It provides a first glimpse that some business with cybercrime connections is being conducted in the clear. The study then pans out to investigate the forum population's ties with cybercrime by finding crossover users, that is, users from the public forum who also comment on cybercrime forums. The cybercrime forums on which they discuss are analyzed and the crossover users’ strength of participation is reported. Also, to assess if they represent a sub-grou...
CrimRxiv, 2022
Many activities related to cybercrime operations do not require much secrecy, such as developing websites or translating texts. This research provides indications that many users of a popular public internet marketing forum have connections to cybercrime. It does so by investigating the involvement in cybercrime of a population of users interested in internet marketing, both at a micro and macro scale. The research starts with a case study of three users confirmed to be involved in cybercrime and their use of the public forum where users share information about online advertising. It provides a first glimpse that some business with cybercrime connection is being conducted in the clear. The study then pans out to investigate the forum population's ties with cybercrime by finding crossover users, who are users from the public forum who also comment on cybercrime forums. The cybercrime forums on which they discuss are analyzed and crossover users' strength of participation is reported. Also, to assess if they represent a subgroup of the forum population, their posting behavior on the public forum is compared with that of non-crossover users. This blend of analyses shows that (i) a minimum of 7.2% of the public forum population are crossover users that have ties with cybercrime forums; (ii) their participation in cybercrime forums is limited; and (iii) their posting behavior is relatively indistinguishable from that of non-crossover users. This is the first study to formally quantify how users of an internet marketing public forum, a space for informal exchanges, have ties to cybercrime activities. We conclude that crossover users are a substantial part of the population in the public forum, and, even though they have thus far been overlooked, their aggregated effect in the ecosystem must be considered. This study opens new research questions on cybercrime participation that should consider online spaces beyond their cybercrime branding.
Little empirical research has been done on organised cybercrime. Anecdotes, unsubstantiated assumptions and unverifiable reports from technology companies dominate views on this topic. This article goes back to basics and outlines what the expectations are according to criminological theory. These expectations can be used as a framework for empirical studies. Theory shows that at least two different types of networks are likely to exist: (1) locally rooted all-rounders and (2) international specialists. This is confirmed by a number of case studies analysed in this article. Offender convergence settings seem to play a crucial role. Therefore, perhaps the most important question for future empirical research is what role these meeting places play in the development of cybercriminal networks. Furthermore, the question is whether more types of networks exist and if they have different characteristics (structure, hierarchy, type of offenders). Systematic analyses of cybercriminal networks may provide an important insight into these matters and may help us understand how cybercriminal networks arise and develop.
Policing and Society, 2013
At the beginning of the 21 st Century, before the power of online social networking became apparent, several studies speculated about the likely structure of organised cybercrime . In the light of new data on cybercriminal organisations, this paper sets out to revisit their claims. In collaboration with the Serious Organised Crime Agency (SOCA), this paper examines the structure of organised cybercrime by analysing data from online underground markets previously in operation over the Internet. In order to understand the various structures of organised cybercrime which have manifested, theories are drawn from social psychology, organised crime and transaction cost economics (TCE). Since the focus is on how uncertainty is mitigated in trading among cybercriminals, uncertainty is treated as a cost to the transactions and is used as the unit of analysis to examine the mechanisms cybercriminals use to control two key sources of uncertainty: the quality of merchandise and the identity of the trader. The findings indicate that carding forums facilitate organised cybercrime because they offer a hybrid form of organisational structure that is able to address sources of uncertainty and minimise transaction costs to an extent that allows a competitive underground market to emerge. The findings from this study can be used to examine other online applications that could facilitate the online underground economy.
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE), 2024
The prevalence of crime committed on the Internet has become a concerning issue in recent years. Cybercrime, which involves various nefarious and complex online activities, has emerged as an integral part of the transnational threat landscape. Technological advancements have provided criminals with new tools and opportunities to engage in illegal activities. Online platforms, such as social media, online marketplaces, and encrypted messaging applications, have played a significant role in facilitating criminal behavior. These platforms offer a convenient and anonymous space for criminals to communicate, coordinate, and engage in illicit activities. Online platforms have a significant influence on criminal behavior, both in terms of facilitating communication and organizing criminal activities. From terrorist recruitment to cybercrime, the Internet offers a virtual space for individuals to connect, plan, and engage in illegal activities. Moreover, these platforms also provide access to a wide range of potential victims and customers, making it easier for criminals to target and exploit individuals (Kumar & Mittal, 2012). Furthermore, the anonymity provided by online platforms makes it difficult for law enforcement agencies to identify and apprehend offenders. The influence of online platforms on criminal behavior is evident in the increase of cybercrime and the complex nature of online illegal activities. This chapter introduces the prevalence of crime committed on the Internet (Shipley & Bowker, 2014). It utilizes studies and reports commissioned by various organizations to highlight the extent of the internet crime problem.
Land Forces Academy Review, 2020
Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further.
SSRN Electronic Journal, 2000
This working paper summarizes what is currently known about cybercrime offenders and groups. The paper briefly outlines the definition and scope of cybercrime, theoretical and empirical challenges faced when studying cyber offenders, and the likely role of organized crime groups (OCG). The paper gives examples of known cases that illustrate individual and group behaviour, profiles typical offenders, including online child exploitation perpetrators, and describes methods and techniques commonly used to identify crimeware and trace offenders.
Global Crime, 2015
Research examining offender risk reduction strategies within illicit markets focus primarily on those operating in the real world for drugs and stolen goods. Few have considered the strategies that may be used by individuals in virtual illicit markets that are hidden from public view. This study addresses this gap through a grounded theory analysis of posts from 10 Russian and three English language web forums selling stolen data to engage in identity theft and fraud. The findings indicate that buyers employ multiple strategies to reduce their risk of loss from unreliable vendors, along with resources provided by forum administrators to manage relationships between participants. The implications of this study for law enforcement and offender decision-making research are also discussed.
International Journal of Cyber Criminology, 2012
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
ACM Computing Surveys, 2024
IEEE International Conference on Intelligence and Security Informatics (ISI), Arlington, US, 11 - 14 Jun 2012, 2012
Global Crime, 2013
Pastrana, S., Thomas, D. R., Hutchings, A., & Clayton, R. (2018). CrimeBB: Enabling cybercrime research on underground forums at scale. Lyon: ACM International World Wide Web (WWW) Conference., 2018
IGI Global eBooks, 2020
2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2021
Innovative Issues and Approaches in Social Sciences, 2016
Crime, Law and Social Change
Linguistics and Culture Review
Proceedings of SMSociety 20, 2020
International Journal of Technoethics, 2012
Journal of Crime and Justice
Asian Journal of Criminology, 2008