Skip to main content

Introduction

  • Chapter
  • First Online:
Data Thieves in Action

Part of the book series: Palgrave Studies in Cybercrime and Cybersecurity ((PSCYBER))

  • 466 Accesses

Abstract

This chapter introduces the problem of stolen data markets as a consequence of the digital economy that now dominates society. Prior research studies on stolen data markets are discussed, along with their overlap with other electronic illicit markets like the Silk Road. The data for this book is described in detail. The focus is on a sample of threads from 13 forums operating around the world whose users communicate in Russian and English languages. The structure of the book is also elaborated chapter by chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Barratt, M. J. (2012). Silk Road: Ebay for drugs. Addiction, 107, 683.

    Article  PubMed  Google Scholar 

  • Bacher, P., Holz, T., Kotter, M., & Wicherski, G. (2005). Tracking Botnets: Using honeynets to learn more about Bots. The Honeynet Project and Research Alliance. Retrieved July 23, 2006 from http://www.honeynet.org/papers/bots/

  • Best, J., & Luckenbill, D. F. (1994). Organizing deviance (2nd ed.). New Jersey: Prentice Hall.

    Google Scholar 

  • Chu, B., Holt, T. J., & Ahn, G. J. (2010). Examining the creation, distribution, and function of malware on-line. Technical Report for National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018. Retrieved from http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf

  • Cunningham, S., & Kendall, T. (2010). Sex for sale: Online commerce in the world’s oldest profession. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context (pp. 114–140). Raleigh, NC: Carolina Academic Press.

    Google Scholar 

  • Dhanjani, N., & Rios, B. (2008). Bad sushi: Beating phishers at their own game. Presented at the Annual Blackhat Meetings, Las Vegas, NV.

    Google Scholar 

  • Dolliver, D. S. (2015). Evaluating drug trafficking on the tor network: Silk Road 2, the sequel. International Journal of Drug Policy, 26(11); 1113–1123.

    Google Scholar 

  • Federal Reserve. (2013). Consumers and Mobile Financial Services 2013. Washington, DC: Board of Governors of the Federal Reserve. Retrieved from http://www.federalreserve.gov/econresdata/consumers-and-mobile-financial-services-report-201303.pdf

  • Fox, S. (2013). 51 % of U.S. Adults Bank Online. Pew Research Center. Retrieved from http://www.pewinternet.org/2013/08/07/51-of-u-s-adults-bank-online/

  • Franklin, O. (2013). Unravelling the dark web. British GQ. Retrieved from http://www.gq-magazine.co.uk/comment/articles/2013-02/07/silk-road-online-drugs-guns-black-market/viewall

  • Franklin, J., Paxson, V., Perrig, A., & Savage, S. (2007). An inquiry into the nature and cause of the wealth of internet miscreants. Paper presented at CCS07, October 29–November 2, 2007, Alexandria, VA.

    Google Scholar 

  • Gibbs, S. (2013). Silk Road underground market closed-but others will replace it. The Guardian, October 3. Retrieved from http://www.theguardian.com/technology/2013/oct/03/silk-road-underground-market-closed-bitcoin

  • Herley, C., & Florencio, D. (2010). Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. In T. Moor, D. J. Pym, & C. Ioannidis (Eds.), Economics of information security and privacy (pp. 35–53). New York: Springer.

    Google Scholar 

  • Herring, S. C. (2004). Slouching toward the ordinary: Current trends in computer-mediated communication. New Media & Society, 6(1), 26–36.

    Article  Google Scholar 

  • Higgins, K. J. (2014). Target, Neiman Marcus data breaches tip of the iceberg. Dark Reading, January 13. Retrieved February 17, 2014, from http://www.darkreading.com/attacks-breaches/target-neiman-marcus-data-breaches-tip-o/240165363

  • Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.

    Article  Google Scholar 

  • Holt, T. J. (2009). Lone hacks or group cracks: Examining the social organization of computer hackers. In F. Smalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 336–355). Upper Saddle River, NJ: Pearson Prentice Hall.

    Google Scholar 

  • Holt, T. J. (2010). Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data. Journal of Criminal Justice Education, 21, 300–321.

    Article  Google Scholar 

  • Holt, T. J. (2013). Exploring the social organization and structure of stolen data markets. Global Crime, 14, 155–174.

    Article  Google Scholar 

  • Holt, T. J., & Blevins, K. R. (2007). Examining sex work from the client’s perspective: Assessing johns using online data. Deviant Behavior, 28, 333–354.

    Article  Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. New York: Routledge Press.

    Google Scholar 

  • Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets on-line: Products and market forces. Criminal Justice Studies, 23, 33–50.

    Article  Google Scholar 

  • Holt, T. J., & Smirnova, O. (2014). Examining the structure, organization, and processes of the international market for stolen data. Washington, DC: US Department of Justice. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/grants/245375.pdf

  • Holz, T., Engelberth, M., & Freiling, F. (2009). Learning more about the underground economy: A case-study of keyloggers and dropzones. In M. Backes & P. Ning (Eds.), Computer security—ESCORICS (pp. 1–18). Berlin and Heidelberg: Springer.

    Google Scholar 

  • Honeynet Research Alliance. (2003). Profile: Automated credit card fraud. Know Your Enemy Paper series. Retrieved from http://www.honeynet.org/papers/profiles/ccfraud.pdf

  • Jacobs, B. (2000). Robbing drug dealers: Violence beyond the law. New York: Aldine de Gruyter.http://www.honeynet.org/papers/profiles/ccfraud.pdf

  • James, L. (2005). Phishing exposed. Rockland, MA: Syngress.

    Google Scholar 

  • Jenkins, P. (2001). Beyond tolerance: Child pornography on the Internet. New York: New York University Press.

    Google Scholar 

  • Karami, M., & McCoy, D. (2013). Understanding the Emerging Threat of DDoS-as-a-Service. In Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats.

    Google Scholar 

  • Krebs, B. (2011). Are megabreaches out? E-thefts downsized in 2010. Krebs on Security, 2011. Retrieved June 1, 2012, from http://krebsonsecurity.com/tag/heartland--payment-systems/

  • Li, W., & Chen, H. (2014). Identifying top sellers in the underground economy using deep learning-based sentiment analysis. Intelligence and Security Informatics Conference, 64–67.

    Google Scholar 

  • Mann, D., & Sutton, M. (1998). Netcrime: More changes in the organisation of thieving. British Journal of Criminology, 38, 201–229.

    Article  Google Scholar 

  • Markham, A. N. (2011). Internet research. In D. Silverman (Ed.), Qualitative research: Issues of theory, method, and practice (3rd ed., pp. 111–127). Thousand Oaks, CA: Sage.

    Google Scholar 

  • Martin, J. (2014). Lost on the Silk Road: Online drug distribution and the cryptomarket. Criminology and Criminal Justice, 14, 351–367.

    Article  Google Scholar 

  • Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011). An analysis of underground forums. IMC’11, 71–79.

    Google Scholar 

  • Newman, G., & Clarke, R. (2003). Superhighway robbery: Preventing e-commerce crime. Cullompton: Willan Press.

    Google Scholar 

  • Peretti, K. K. (2009). Data breaches: What the underground world of “carding” reveals. Santa Clara Computer and High Technology Law Journal, 25, 375–413.

    Google Scholar 

  • Provos, A. N., Mavrommatis, P., Rajab, M. A., & Monroe, F. (2008). All your iFrames point to us. Google Technical Report. Retrieved from http://static.googleusercontent.com/media/research.google.com/en//archive/provos-2008.pdf

  • Quinn, J. F., & Forsyth, C. J. (2013). Red light districts on blue screens: A typology for understanding the evolution of deviant communities on the internet. Deviant Behavior, 34(7), 579–585.

    Article  Google Scholar 

  • Roberts, P. F. (2007). Retailer TJX reports massive data breach: Credit, debit data stolen. Extent of breach still unknown. InfoWorld, June 4. Retrieved October 1, 2007, from http://www.infoworld.com/d/security--central/retailer-tjx--reports-massive--data-breach-953

  • Robinson, M. (1984). Groups. New York: John Wiley & Sons.

    Google Scholar 

  • Sanders, T. (2008). Male sexual scripts intimacy, sexuality and pleasure in the purchase of commercial sex. Sociology, 42(3), 400–417.

    Article  Google Scholar 

  • Silverman, D. (2013). Interpreting qualitative data: Methods for analyzing talk, text, and interaction (4th ed.). Thousand Oaks, CA: Sage.

    Google Scholar 

  • Stevenson, R. J., Forsythe, L. M. V., & Weatherburn, D. (2001). The stolen goods market in New South Wales Australia: An analysis of disposal avenues and tactics. British Journal of Criminology, 41, 101–118.

    Article  Google Scholar 

  • Symantec Corporation. (2008). Symantec: Symantec Internet security threat report XII. Retrieved from http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xii_04-2008.en-us.pdf

  • Symantec Corporation. (2012). Symantec Internet security threat report, Volume 17. Retrieved from http://www.symantec.com/threatreport/

  • Target. (2014). Data breach FAQ: Answers to commonly asked questions for guests impacted by the recent data breach. Retrieved from https://corporate.target.com/about/shopping-experience/payment-card-issue-faq

  • Thomas, R., & Martin, J. (2006). The underground economy: Priceless. ;login: The Usenix Magazine, 31, 7–17.

    Google Scholar 

  • Verini, J. (2010). The great cyberheist. The New York Times, November 14. Retrieved from http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?_r=1

  • Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Cambridge: Polity Press.

    Google Scholar 

  • Wehinger, F. (2011). The Dark Net: Self-regulation dynamics of illegal online markets for identities and related services. Intelligence and Security Informatics Conference, 209–213.

    Google Scholar 

  • Wright, R. T., & Decker, S. H. (1994). Burglars on the job: Streetlife and residential break-ins. Boston, MA: Northeastern University Press.

    Google Scholar 

  • Wright, R. T., & Decker, S. H. (1997). Armed robbers in action: Stickups and street culture. Boston, MA: Northeastern University Press.

    Google Scholar 

  • Yip, M., Webber, C., & Shadbolt, N. (2013). Trust among cybercriminals? Carding forums, uncertainty, and implications for policing. Policing and Society, 23, 1–24.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Holt, T.J., Smirnova, O., Chua, YT. (2016). Introduction. In: Data Thieves in Action. Palgrave Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, New York. https://doi.org/10.1057/978-1-137-58904-0_1

Download citation

  • DOI: https://doi.org/10.1057/978-1-137-58904-0_1

  • Published:

  • Publisher Name: Palgrave Macmillan, New York

  • Print ISBN: 978-1-137-58903-3

  • Online ISBN: 978-1-137-58904-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics