Advertisement

Introduction

Chapter
  • 366 Downloads
Part of the Palgrave Studies in Cybercrime and Cybersecurity book series (PSCYBER)

Abstract

This chapter introduces the problem of stolen data markets as a consequence of the digital economy that now dominates society. Prior research studies on stolen data markets are discussed, along with their overlap with other electronic illicit markets like the Silk Road. The data for this book is described in detail. The focus is on a sample of threads from 13 forums operating around the world whose users communicate in Russian and English languages. The structure of the book is also elaborated chapter by chapter.

Keywords

Data markets Cybercrime Identity fraud Forums 

References

  1. Barratt, M. J. (2012). Silk Road: Ebay for drugs. Addiction, 107, 683.CrossRefPubMedGoogle Scholar
  2. Bacher, P., Holz, T., Kotter, M., & Wicherski, G. (2005). Tracking Botnets: Using honeynets to learn more about Bots. The Honeynet Project and Research Alliance. Retrieved July 23, 2006 from http://www.honeynet.org/papers/bots/
  3. Best, J., & Luckenbill, D. F. (1994). Organizing deviance (2nd ed.). New Jersey: Prentice Hall.Google Scholar
  4. Chu, B., Holt, T. J., & Ahn, G. J. (2010). Examining the creation, distribution, and function of malware on-line. Technical Report for National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018. Retrieved from http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf
  5. Cunningham, S., & Kendall, T. (2010). Sex for sale: Online commerce in the world’s oldest profession. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context (pp. 114–140). Raleigh, NC: Carolina Academic Press.Google Scholar
  6. Dhanjani, N., & Rios, B. (2008). Bad sushi: Beating phishers at their own game. Presented at the Annual Blackhat Meetings, Las Vegas, NV.Google Scholar
  7. Dolliver, D. S. (2015). Evaluating drug trafficking on the tor network: Silk Road 2, the sequel. International Journal of Drug Policy, 26(11); 1113–1123.Google Scholar
  8. Federal Reserve. (2013). Consumers and Mobile Financial Services 2013. Washington, DC: Board of Governors of the Federal Reserve. Retrieved from http://www.federalreserve.gov/econresdata/consumers-and-mobile-financial-services-report-201303.pdf
  9. Fox, S. (2013). 51 % of U.S. Adults Bank Online. Pew Research Center. Retrieved from http://www.pewinternet.org/2013/08/07/51-of-u-s-adults-bank-online/
  10. Franklin, O. (2013). Unravelling the dark web. British GQ. Retrieved from http://www.gq-magazine.co.uk/comment/articles/2013-02/07/silk-road-online-drugs-guns-black-market/viewall
  11. Franklin, J., Paxson, V., Perrig, A., & Savage, S. (2007). An inquiry into the nature and cause of the wealth of internet miscreants. Paper presented at CCS07, October 29–November 2, 2007, Alexandria, VA.Google Scholar
  12. Gibbs, S. (2013). Silk Road underground market closed-but others will replace it. The Guardian, October 3. Retrieved from http://www.theguardian.com/technology/2013/oct/03/silk-road-underground-market-closed-bitcoin
  13. Herley, C., & Florencio, D. (2010). Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. In T. Moor, D. J. Pym, & C. Ioannidis (Eds.), Economics of information security and privacy (pp. 35–53). New York: Springer.Google Scholar
  14. Herring, S. C. (2004). Slouching toward the ordinary: Current trends in computer-mediated communication. New Media & Society, 6(1), 26–36.CrossRefGoogle Scholar
  15. Higgins, K. J. (2014). Target, Neiman Marcus data breaches tip of the iceberg. Dark Reading, January 13. Retrieved February 17, 2014, from http://www.darkreading.com/attacks-breaches/target-neiman-marcus-data-breaches-tip-o/240165363
  16. Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.CrossRefGoogle Scholar
  17. Holt, T. J. (2009). Lone hacks or group cracks: Examining the social organization of computer hackers. In F. Smalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 336–355). Upper Saddle River, NJ: Pearson Prentice Hall.Google Scholar
  18. Holt, T. J. (2010). Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data. Journal of Criminal Justice Education, 21, 300–321.CrossRefGoogle Scholar
  19. Holt, T. J. (2013). Exploring the social organization and structure of stolen data markets. Global Crime, 14, 155–174.CrossRefGoogle Scholar
  20. Holt, T. J., & Blevins, K. R. (2007). Examining sex work from the client’s perspective: Assessing johns using online data. Deviant Behavior, 28, 333–354.CrossRefGoogle Scholar
  21. Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. New York: Routledge Press.Google Scholar
  22. Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets on-line: Products and market forces. Criminal Justice Studies, 23, 33–50.CrossRefGoogle Scholar
  23. Holt, T. J., & Smirnova, O. (2014). Examining the structure, organization, and processes of the international market for stolen data. Washington, DC: US Department of Justice. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/grants/245375.pdf
  24. Holz, T., Engelberth, M., & Freiling, F. (2009). Learning more about the underground economy: A case-study of keyloggers and dropzones. In M. Backes & P. Ning (Eds.), Computer security—ESCORICS (pp. 1–18). Berlin and Heidelberg: Springer.Google Scholar
  25. Honeynet Research Alliance. (2003). Profile: Automated credit card fraud. Know Your Enemy Paper series. Retrieved from http://www.honeynet.org/papers/profiles/ccfraud.pdf
  26. Jacobs, B. (2000). Robbing drug dealers: Violence beyond the law. New York: Aldine de Gruyter.http://www.honeynet.org/papers/profiles/ccfraud.pdf
  27. James, L. (2005). Phishing exposed. Rockland, MA: Syngress.Google Scholar
  28. Jenkins, P. (2001). Beyond tolerance: Child pornography on the Internet. New York: New York University Press.Google Scholar
  29. Karami, M., & McCoy, D. (2013). Understanding the Emerging Threat of DDoS-as-a-Service. In Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats.Google Scholar
  30. Krebs, B. (2011). Are megabreaches out? E-thefts downsized in 2010. Krebs on Security, 2011. Retrieved June 1, 2012, from http://krebsonsecurity.com/tag/heartland--payment-systems/
  31. Li, W., & Chen, H. (2014). Identifying top sellers in the underground economy using deep learning-based sentiment analysis. Intelligence and Security Informatics Conference, 64–67.Google Scholar
  32. Mann, D., & Sutton, M. (1998). Netcrime: More changes in the organisation of thieving. British Journal of Criminology, 38, 201–229.CrossRefGoogle Scholar
  33. Markham, A. N. (2011). Internet research. In D. Silverman (Ed.), Qualitative research: Issues of theory, method, and practice (3rd ed., pp. 111–127). Thousand Oaks, CA: Sage.Google Scholar
  34. Martin, J. (2014). Lost on the Silk Road: Online drug distribution and the cryptomarket. Criminology and Criminal Justice, 14, 351–367.CrossRefGoogle Scholar
  35. Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011). An analysis of underground forums. IMC’11, 71–79.Google Scholar
  36. Newman, G., & Clarke, R. (2003). Superhighway robbery: Preventing e-commerce crime. Cullompton: Willan Press.Google Scholar
  37. Peretti, K. K. (2009). Data breaches: What the underground world of “carding” reveals. Santa Clara Computer and High Technology Law Journal, 25, 375–413.Google Scholar
  38. Provos, A. N., Mavrommatis, P., Rajab, M. A., & Monroe, F. (2008). All your iFrames point to us. Google Technical Report. Retrieved from http://static.googleusercontent.com/media/research.google.com/en//archive/provos-2008.pdf
  39. Quinn, J. F., & Forsyth, C. J. (2013). Red light districts on blue screens: A typology for understanding the evolution of deviant communities on the internet. Deviant Behavior, 34(7), 579–585.CrossRefGoogle Scholar
  40. Roberts, P. F. (2007). Retailer TJX reports massive data breach: Credit, debit data stolen. Extent of breach still unknown. InfoWorld, June 4. Retrieved October 1, 2007, from http://www.infoworld.com/d/security--central/retailer-tjx--reports-massive--data-breach-953
  41. Robinson, M. (1984). Groups. New York: John Wiley & Sons.Google Scholar
  42. Sanders, T. (2008). Male sexual scripts intimacy, sexuality and pleasure in the purchase of commercial sex. Sociology, 42(3), 400–417.CrossRefGoogle Scholar
  43. Silverman, D. (2013). Interpreting qualitative data: Methods for analyzing talk, text, and interaction (4th ed.). Thousand Oaks, CA: Sage.Google Scholar
  44. Stevenson, R. J., Forsythe, L. M. V., & Weatherburn, D. (2001). The stolen goods market in New South Wales Australia: An analysis of disposal avenues and tactics. British Journal of Criminology, 41, 101–118.CrossRefGoogle Scholar
  45. Symantec Corporation. (2008). Symantec: Symantec Internet security threat report XII. Retrieved from http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xii_04-2008.en-us.pdf
  46. Symantec Corporation. (2012). Symantec Internet security threat report, Volume 17. Retrieved from http://www.symantec.com/threatreport/
  47. Target. (2014). Data breach FAQ: Answers to commonly asked questions for guests impacted by the recent data breach. Retrieved from https://corporate.target.com/about/shopping-experience/payment-card-issue-faq
  48. Thomas, R., & Martin, J. (2006). The underground economy: Priceless. ;login: The Usenix Magazine, 31, 7–17.Google Scholar
  49. Verini, J. (2010). The great cyberheist. The New York Times, November 14. Retrieved from http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?_r=1
  50. Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Cambridge: Polity Press.Google Scholar
  51. Wehinger, F. (2011). The Dark Net: Self-regulation dynamics of illegal online markets for identities and related services. Intelligence and Security Informatics Conference, 209–213.Google Scholar
  52. Wright, R. T., & Decker, S. H. (1994). Burglars on the job: Streetlife and residential break-ins. Boston, MA: Northeastern University Press.Google Scholar
  53. Wright, R. T., & Decker, S. H. (1997). Armed robbers in action: Stickups and street culture. Boston, MA: Northeastern University Press.Google Scholar
  54. Yip, M., Webber, C., & Shadbolt, N. (2013). Trust among cybercriminals? Carding forums, uncertainty, and implications for policing. Policing and Society, 23, 1–24.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2016

Authors and Affiliations

  1. 1.Michigan State UniversityEast LansingUSA
  2. 2.East Carolina UniversityGreenvilleUSA
  3. 3.Michigan State UniversityEast LansingUSA

Personalised recommendations