Abstract
This chapter introduces the problem of stolen data markets as a consequence of the digital economy that now dominates society. Prior research studies on stolen data markets are discussed, along with their overlap with other electronic illicit markets like the Silk Road. The data for this book is described in detail. The focus is on a sample of threads from 13 forums operating around the world whose users communicate in Russian and English languages. The structure of the book is also elaborated chapter by chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Barratt, M. J. (2012). Silk Road: Ebay for drugs. Addiction, 107, 683.
Bacher, P., Holz, T., Kotter, M., & Wicherski, G. (2005). Tracking Botnets: Using honeynets to learn more about Bots. The Honeynet Project and Research Alliance. Retrieved July 23, 2006 from http://www.honeynet.org/papers/bots/
Best, J., & Luckenbill, D. F. (1994). Organizing deviance (2nd ed.). New Jersey: Prentice Hall.
Chu, B., Holt, T. J., & Ahn, G. J. (2010). Examining the creation, distribution, and function of malware on-line. Technical Report for National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018. Retrieved from http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf
Cunningham, S., & Kendall, T. (2010). Sex for sale: Online commerce in the world’s oldest profession. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context (pp. 114–140). Raleigh, NC: Carolina Academic Press.
Dhanjani, N., & Rios, B. (2008). Bad sushi: Beating phishers at their own game. Presented at the Annual Blackhat Meetings, Las Vegas, NV.
Dolliver, D. S. (2015). Evaluating drug trafficking on the tor network: Silk Road 2, the sequel. International Journal of Drug Policy, 26(11); 1113–1123.
Federal Reserve. (2013). Consumers and Mobile Financial Services 2013. Washington, DC: Board of Governors of the Federal Reserve. Retrieved from http://www.federalreserve.gov/econresdata/consumers-and-mobile-financial-services-report-201303.pdf
Fox, S. (2013). 51 % of U.S. Adults Bank Online. Pew Research Center. Retrieved from http://www.pewinternet.org/2013/08/07/51-of-u-s-adults-bank-online/
Franklin, O. (2013). Unravelling the dark web. British GQ. Retrieved from http://www.gq-magazine.co.uk/comment/articles/2013-02/07/silk-road-online-drugs-guns-black-market/viewall
Franklin, J., Paxson, V., Perrig, A., & Savage, S. (2007). An inquiry into the nature and cause of the wealth of internet miscreants. Paper presented at CCS07, October 29–November 2, 2007, Alexandria, VA.
Gibbs, S. (2013). Silk Road underground market closed-but others will replace it. The Guardian, October 3. Retrieved from http://www.theguardian.com/technology/2013/oct/03/silk-road-underground-market-closed-bitcoin
Herley, C., & Florencio, D. (2010). Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. In T. Moor, D. J. Pym, & C. Ioannidis (Eds.), Economics of information security and privacy (pp. 35–53). New York: Springer.
Herring, S. C. (2004). Slouching toward the ordinary: Current trends in computer-mediated communication. New Media & Society, 6(1), 26–36.
Higgins, K. J. (2014). Target, Neiman Marcus data breaches tip of the iceberg. Dark Reading, January 13. Retrieved February 17, 2014, from http://www.darkreading.com/attacks-breaches/target-neiman-marcus-data-breaches-tip-o/240165363
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.
Holt, T. J. (2009). Lone hacks or group cracks: Examining the social organization of computer hackers. In F. Smalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 336–355). Upper Saddle River, NJ: Pearson Prentice Hall.
Holt, T. J. (2010). Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data. Journal of Criminal Justice Education, 21, 300–321.
Holt, T. J. (2013). Exploring the social organization and structure of stolen data markets. Global Crime, 14, 155–174.
Holt, T. J., & Blevins, K. R. (2007). Examining sex work from the client’s perspective: Assessing johns using online data. Deviant Behavior, 28, 333–354.
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. New York: Routledge Press.
Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets on-line: Products and market forces. Criminal Justice Studies, 23, 33–50.
Holt, T. J., & Smirnova, O. (2014). Examining the structure, organization, and processes of the international market for stolen data. Washington, DC: US Department of Justice. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/grants/245375.pdf
Holz, T., Engelberth, M., & Freiling, F. (2009). Learning more about the underground economy: A case-study of keyloggers and dropzones. In M. Backes & P. Ning (Eds.), Computer security—ESCORICS (pp. 1–18). Berlin and Heidelberg: Springer.
Honeynet Research Alliance. (2003). Profile: Automated credit card fraud. Know Your Enemy Paper series. Retrieved from http://www.honeynet.org/papers/profiles/ccfraud.pdf
Jacobs, B. (2000). Robbing drug dealers: Violence beyond the law. New York: Aldine de Gruyter.http://www.honeynet.org/papers/profiles/ccfraud.pdf
James, L. (2005). Phishing exposed. Rockland, MA: Syngress.
Jenkins, P. (2001). Beyond tolerance: Child pornography on the Internet. New York: New York University Press.
Karami, M., & McCoy, D. (2013). Understanding the Emerging Threat of DDoS-as-a-Service. In Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats.
Krebs, B. (2011). Are megabreaches out? E-thefts downsized in 2010. Krebs on Security, 2011. Retrieved June 1, 2012, from http://krebsonsecurity.com/tag/heartland--payment-systems/
Li, W., & Chen, H. (2014). Identifying top sellers in the underground economy using deep learning-based sentiment analysis. Intelligence and Security Informatics Conference, 64–67.
Mann, D., & Sutton, M. (1998). Netcrime: More changes in the organisation of thieving. British Journal of Criminology, 38, 201–229.
Markham, A. N. (2011). Internet research. In D. Silverman (Ed.), Qualitative research: Issues of theory, method, and practice (3rd ed., pp. 111–127). Thousand Oaks, CA: Sage.
Martin, J. (2014). Lost on the Silk Road: Online drug distribution and the cryptomarket. Criminology and Criminal Justice, 14, 351–367.
Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011). An analysis of underground forums. IMC’11, 71–79.
Newman, G., & Clarke, R. (2003). Superhighway robbery: Preventing e-commerce crime. Cullompton: Willan Press.
Peretti, K. K. (2009). Data breaches: What the underground world of “carding” reveals. Santa Clara Computer and High Technology Law Journal, 25, 375–413.
Provos, A. N., Mavrommatis, P., Rajab, M. A., & Monroe, F. (2008). All your iFrames point to us. Google Technical Report. Retrieved from http://static.googleusercontent.com/media/research.google.com/en//archive/provos-2008.pdf
Quinn, J. F., & Forsyth, C. J. (2013). Red light districts on blue screens: A typology for understanding the evolution of deviant communities on the internet. Deviant Behavior, 34(7), 579–585.
Roberts, P. F. (2007). Retailer TJX reports massive data breach: Credit, debit data stolen. Extent of breach still unknown. InfoWorld, June 4. Retrieved October 1, 2007, from http://www.infoworld.com/d/security--central/retailer-tjx--reports-massive--data-breach-953
Robinson, M. (1984). Groups. New York: John Wiley & Sons.
Sanders, T. (2008). Male sexual scripts intimacy, sexuality and pleasure in the purchase of commercial sex. Sociology, 42(3), 400–417.
Silverman, D. (2013). Interpreting qualitative data: Methods for analyzing talk, text, and interaction (4th ed.). Thousand Oaks, CA: Sage.
Stevenson, R. J., Forsythe, L. M. V., & Weatherburn, D. (2001). The stolen goods market in New South Wales Australia: An analysis of disposal avenues and tactics. British Journal of Criminology, 41, 101–118.
Symantec Corporation. (2008). Symantec: Symantec Internet security threat report XII. Retrieved from http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xii_04-2008.en-us.pdf
Symantec Corporation. (2012). Symantec Internet security threat report, Volume 17. Retrieved from http://www.symantec.com/threatreport/
Target. (2014). Data breach FAQ: Answers to commonly asked questions for guests impacted by the recent data breach. Retrieved from https://corporate.target.com/about/shopping-experience/payment-card-issue-faq
Thomas, R., & Martin, J. (2006). The underground economy: Priceless. ;login: The Usenix Magazine, 31, 7–17.
Verini, J. (2010). The great cyberheist. The New York Times, November 14. Retrieved from http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?_r=1
Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Cambridge: Polity Press.
Wehinger, F. (2011). The Dark Net: Self-regulation dynamics of illegal online markets for identities and related services. Intelligence and Security Informatics Conference, 209–213.
Wright, R. T., & Decker, S. H. (1994). Burglars on the job: Streetlife and residential break-ins. Boston, MA: Northeastern University Press.
Wright, R. T., & Decker, S. H. (1997). Armed robbers in action: Stickups and street culture. Boston, MA: Northeastern University Press.
Yip, M., Webber, C., & Shadbolt, N. (2013). Trust among cybercriminals? Carding forums, uncertainty, and implications for policing. Policing and Society, 23, 1–24.
Author information
Authors and Affiliations
Copyright information
© 2016 The Author(s)
About this chapter
Cite this chapter
Holt, T.J., Smirnova, O., Chua, YT. (2016). Introduction. In: Data Thieves in Action. Palgrave Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, New York. https://doi.org/10.1057/978-1-137-58904-0_1
Download citation
DOI: https://doi.org/10.1057/978-1-137-58904-0_1
Published:
Publisher Name: Palgrave Macmillan, New York
Print ISBN: 978-1-137-58903-3
Online ISBN: 978-1-137-58904-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)