Skip to main content

Remain Anonymous, Create Characters and Backup Stories: Online Tools Used in Internet Crime Narratives

  • Conference paper
Interactive Storytelling (ICIDS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8832))

Included in the following conference series:

Abstract

This research takes a closer look at online tools that anti-scam activists use when in contact with Internet scammers. These tools are used for defining one’s online character, for progressing the narrative or maintaining anonymity while uncovering the scammer’s identity. The tools are easy to use and, when combined together, they offer powerful methods to narrate stories online. This research draws mostly upon primary sources, like interviews with scambaiters or Internet forums, where scambaiters share their stories and discuss the authenticity of dubious online businesses. The discussed methods and tools are utilized while communicating with scammers. In conclusion, this paper illustrates how these tools can also used in other genres such as digital fiction, investigative journalism and advocacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Advance fee fraud coalition AFF, http://affcoalition.org/

  2. Channel 4, Secrets of the Scammers (January 2, 2014), http://youtu.be/KoTNuZmF_ws

  3. Cms, Simo, Post an Neonazis: FP-Politiker unter Verdacht, (March 8, 2011), http://derstandard.at/1297819867094/Post-an-Neonazis-FP-Politiker-unter-Verdacht

  4. Cox, J.: Mexico’s drug cartels love Social Media (November 4, 2013), http://www.vice.com/en_uk/read/mexicos-drug-cartels-are-using-the-internet-to-get-up-to-mischief

  5. Crates, J.: ATF and D.C. Police Impersonate Rap Label; Arrest 70 in Year Long Guns and Drug Sting (December 19, 2011), http://allhiphop.com/2011/12/19/atf-and-d-c-police-impersonate-rap-label-arrest-70-in-year-long-guns-and-drug-sting/

  6. Crawford, A.: Computer-generated ‘Sweetie’ catches online predators (November 5, 2013), http://www.bbc.co.uk/news/uk-24818769

  7. Deceglie, A., Robertson, K.: Taliban using Facebook to lure Aussie soldier (Sepember 9, 2012), http://www.dailytelegraph.com.au/taliban-using-facebook-to-lure-aussie-soldier/story-e6freuy9-1226468094586

  8. Fukuyama, F.: Trust: The social virtues and the creation of prosperity, pp. 61–67. Free Press, New York (1995)

    Google Scholar 

  9. Greenwald, G.: XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’. The Guardian (2013)

    Google Scholar 

  10. Hoeller, H.: Threatening fake news. Springerin (2012), http://www.springerin.at/dyn/hefttext.phptextid=2695&lang=en

  11. Maher, J.: Police create fake Facebook profiles to bust criminals ( September 6, 2012), http://archive.news10.net/news/world/208252/5/Police-using-controversial-social-media-tactic-to-bust-criminals

  12. Pearson, E.: All the World Wide Webs a stage: The performance of identity in online social networks. First Monday14(3) (March 2, 2009), http://firstmonday.org/ojs/index.php/fm/article/view/2162/2127

  13. Lambert, J.: Digital Storytelling. Capturing Lives, Creating Community. Digital Diner Press, Berkeley

    Google Scholar 

  14. Milestone, K.: Catching rats - Sporting scambaiters turntables on foreign scammers (April 3, 2007), http://articles.chicagotribune.com/2007-04-03/features/0704030230_1_scammers-con-artists-fraud-center/2

  15. Poulsen, K.: If You Used This Secure Webmail Site, the FBI Has Your Inbox (January 27, 2014), http://www.wired.com/threatlevel/2014/01/tormail/

  16. Renov, M. (ed.): Theorizing Documentary. Routledge, New York (1993)

    Google Scholar 

  17. Schneier, B.: Liars and outliers: enabling the trust that society needs to thrive. John Wiley & Sons (2012)

    Google Scholar 

  18. Stoate, R.: Internet Detectives: Performativity and Policing Authenticity on the Internet (2007), http://dichtung-digital.de/2007/Stoate/stoate.htm

  19. Kelly, H.: Police embrace social media as crime-fighting tool (August 30, 2012), http://edition.cnn.com/2012/08/30/tech/social-media/fighting-crime-social-media/

  20. Waddilove, R.: What’s the best free email service? We compare the top 6 providers (March 10, 2014), http://www.pcadvisor.co.uk/features/internet/3448241/whats-the-best-free-email-service/?pn=1

  21. Waterman, S.: Fictitious femme fatale fooled cybersecurity (July 18, 2010), http://www.washingtontimes.com/news/2010/jul/18/fictitious-femme-fatale-fooled-cybersecurity/

  22. Wilhelm, A.: Vice leaves metadata in photo of John McAfee, pin-pointing him to a location in Guatemala, Thenextweb Online Insider (December 3, 2012), http://thenextweb.com/insider/2012/12/03/vice-leaves-metadata-in-photo-of-john-mcafee-pinpointing-him-to-a-location-in-guatemala/2012/

  23. Zingerle, A.: Towards a characterization of scambaiting techniques. International Journal of Art, Culture and Design Technologies (IJACDT), IGI-Global, doi:10.4018/IJACDT

    Google Scholar 

  24. Zingerle, A.: The Art of Trickery: Methods to establish first contact in Internet scams. In: xCoAx Conference, Porto, Portugal (June 26, 2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Zingerle, A. (2014). Remain Anonymous, Create Characters and Backup Stories: Online Tools Used in Internet Crime Narratives. In: Mitchell, A., Fernández-Vara, C., Thue, D. (eds) Interactive Storytelling. ICIDS 2014. Lecture Notes in Computer Science, vol 8832. Springer, Cham. https://doi.org/10.1007/978-3-319-12337-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12337-0_8

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12336-3

  • Online ISBN: 978-3-319-12337-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics