Abstract
Criminals have taken advantage of the Internet’s features to create worldwide marketplaces where illegal goods and services can be instantly bought and sold anonymously. This article focuses on an online forum that served as a transactional platform for criminals involved in the illicit trade of credit and banking information. Using Gambetta’s adaptation of the signalling theory, this research develops a predictive model identifying the signs and signals that can enhance a criminal’s performance in this criminal community. Our findings indicate that criminal performance is not distributed randomly. Individuals that are the most skilled at sending and decoding signals can expect to gain higher rewards.
Similar content being viewed by others
Notes
This means that each message sent or received added one point to the outdegree metrics. If two users exchanged many messages, their outdegree would increase for each message.
References
ACC (Australian Crime Commission). (2011) Crime profile series of the Australian Crime Commission: Card fraud. http://www.crimecommission.gov.au/sites/default/files/files/FACT%20SHEETS%20JULY%202013/CARD%20FRAUD%20JULY%202013.pdf, accessed 2 July 2012.
Aiken, M. and Balan, S. (2011) An analysis of Google Translate accuracy. Translation Journal 16 (2), http://www.bokorlang.com/Journal/56google.htm, accessed 6 November 2013.
Aiken, M., Park, M., Simmons, L. and Lindblom, T. (2009) Automatic translation in multilingual electronic meetings. Translation Journal 13 (3), http://www.bokorlang.com/Journal/49meeting.htm, accessed 6 November 2013.
Bachmann, M. (2010) Deciphering the hacker underground: First quantitative insights. In: T.J. Holt and B.H. Schell (eds.) Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. Hershey, PA: Information Science Reference.
Blevins, K.R. and Holt, T.J. (2009) Examining the virtual subculture of johns. Journal of Contemporary Ethnography 38 (5): 619–648.
Boase, J. and Wellman, B. (2006) Personal relationships: On and off the internet. In: A.L. Vangelisti and D. Perlman (eds.) The Cambridge Handbook of Personal Relationships. Cambridge, UK: Cambridge University Press.
Bonacich, P. (1987) Power and centrality: A family of measures. The American Journal of Sociology 92 (5): 1170–1182.
Borgatti, S.P., Everett, M.G. and Freeman, L.C. (2002) Ucinet for Windows: Software for Social Network Analysis. Harvard, MA: Analytic Technologies.
Bouchard, M. and Nguyen, H. (2009) Is it who you know, or how many that counts? Criminal networks and cost avoidance in a sample of young offenders. Justice Quarterly 27 (1): 130–158.
Callison-Burch, C. (2009) Fast, cheap, and creative: Evaluating translation quality using Amazon's Mechanical Turk. Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing, Singapore, Malaysia.
Charest, M. (2007) Classe sociale et réussite criminelle. Masters thesis at the School of Criminology, University of Montreal.
Chen, J. and Bao, Y. (2009) Information access across languages on the web: From search engines to digital libraries. Proceedings of the American Society for Information Science and Technology 46 (1): 1–14.
Cornish, D. (1994) The procedural analysis of offending and its relevance for situational prevention. In: R.V. Clarke (ed.) Crime Prevention Studies. Vol. 3. New York: Criminal Justice Press.
Décary-Hétu, D., Morselli, C. and Leman-Langlois, S. (2012) Welcome to the scene: A study of social organization and recognition among warez hackers. Journal of Research in Crime & Delinquency 49 (3): 359–382.
Dupont, B. (2013) Nouvelles technologies et crime désorganisé: Incursion au cœur d’un réseau de pirates informatiques. Sécurité & Stratégie 11: 25–37.
Erbschloe, M. (2010) Economic consequences. In: S. Ghosh and E. Turrini (eds.) Cybercrimes: A Multidisciplinary Analysis. Berlin, Germany: Springer.
Fallmann, H., Wondracek, G. and Platzer, C. (2010) Covertly probing underground economy marketplaces. Proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Bonn, Germany.
Franklin, J. and Paxson, V. (2007) An inquiry into the nature and causes of the wealth of internet miscreants. Proceedings of the Conference on Computer and Communications Security. Alexandria, USA.
Freedman, D. (2005) Statistical Models. Theory and Practice. New York: Cambridge University Press.
Gambetta, D. (2009) Codes of the Underworld: How Criminals Communicate. New Jersey: Princeton Press University.
Geer, D. (2005) Statistical machine translation gains respect. Computer 38 (10): 18–21.
Google. (2013) About Google Translate. https://support.google.com/translate/#2534605, accessed 18 June 2013.
Goudey, H. (2004) Watch the money go round, watch the malware go round. Proceedings of the Virus Bulletin Conference. Chicago, USA.
Herley, C. and Florêncio, D. (2009) Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. http://research.microsoft.com/pubs/80034/nobodysellsgoldforthepriceofsilver.pdf, accessed 2 July 2012.
Holt, T.J. (2012) Exploring the social organisation and structure of stolen data markets. Global Crime 14 (2–3): 155–174.
Holt, T.J. (2013) Considering the social dynamics of cybercrime markets. In: S. Manacorda (ed.) Cibercriminality: Finding a Balance Between Freedom and Security. Milan, Italy: ISPAC.
Holt, T.J. and Lampke, E. (2010) Exploring stolen data markets online: Products and market forces. Criminal Justice Studies 23 (1): 33–50.
Holt, T.J., Blevins, K.R. and Kuhns, J.B. (2008) Examining the displacement practices of johns with on-line data. Journal of Criminal Justice 36 (6): 522–528.
Holz, T., Engelberth, M. and Freiling, F. (2008) Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones. Proceedings of European Symposium on Research in Computer Security (ESORICS). Saint Malo, France.
Holt, T.J., Strumsky, D., Smirnova, O. and Kilger, M. (2012) Examining the social networks of malware writers and hackers. International Journal of Cyber Criminology 6 (1): 891–903.
Kit, C. and Wong, T.M. (2008) Comparative evaluation of online machine translation systems with legal texts. Law Library Journal 100 (2): 299–321.
Kleinbaum, D.G., Kupper, L.L. and Muller, K.E. (2007) Applied Regression Analysis and Other Multivariable Methods. Belmont, CA: Duxbury Press.
Kshetri, N. (2010) The Global Cybercrime Industry: Economic, Institutional and Strategic Perspective. Berlin, Germany: Springer.
Meijerink, T.J. (2013) Carding: Crime prevention analysis. http://essay.utwente.nl/63027/1/Understanding_processes_of_carding_versie_7_31-1_word.pdf, accessed 2 July 2012.
McCarthy, B. and Hagan, J. (2001) When crime pays: Capital, competence, and criminal success. Social Forces 79 (3): 1035–1059.
Monsma, E., Buskens, V., Soudijn, M. and Nieuwbeerta, P. (2010) Partners in cybercrime. an online cybercrime forum evaluated from a social network perspective. Thesis in Sociology and Social Research, Universiteit Utrecht.
Morselli, C. (2009) Inside Criminal Networks. New York: Springer.
Morselli, C. and Tremblay, P. (2004) Criminal achievement, offender networks, and the benefits of low self-control. Criminology 42 (3): 773–804.
Morselli, C., Tremblay, P. and McCarthy, B. (2006) Mentors and criminal achievement. Criminology 44 (1): 17–43.
Motoyama, M., McCoy, D., Levchenko, K., Savage, S. and Voelker, G.M. (2011) An analysis of underground forums. Proceedings of the Conference on Internet Measurement Conference. Berlin, Germany.
Nguyen, H. and Bouchard, M. (2011) Need, connections, or competence? Criminal achievement among adolescent offenders. Justice Quarterly 30 (1): 44–83.
Peretti, K.K. (2008) Data breaches: What the underground world of ‘carding’ reveals. Santa Clara Computer & High Tech Law Journal 25 (2): 375–413.
Poulsen, K. (2011) Kingpin: How One Hacker Took Over the One-Billion-Dollar Cybercrime Underground. New York: Crown Publishing.
Prabowo, H.Y. (2011) Building our defence against credit card fraud: A strategic view. Journal of Money Laundering Control 14 (4): 371–386.
Provos, N., McNamee, D., Mavrimmatis, P., Wang, K. and Modadugu, N. (2007) The ghost in the browser: Analysis of web-based malware. Proceedings of the First Conference on Hot Topics in Understanding Botnets. Berkeley, USA.
Przepiorka, W. (2010) Book review of diego gambetta: Codes of the underworld: How criminals communicate. Rationality, Markets and Morals Journal 1: 9–11.
Shapiro, C. (1983) Premiums for high quality products as returns to reputations. The Quarterly Journal of Economics 98 (4): 659–680.
Smith, J.M., Halgin, D.S., Kidwell-Lopez, V., Labianca, G., Brass, D.J. and Borgatti, S.P. (2013) Power in politically charged networks. Social Networks, available online 10 June, doi: 10.1016/j.socnet.2013.04.007.
Sullivan, R.J. (2010) The changing nature of US card payment fraud: Issues for industry and public policy. http://weis2010.econinfosec.org/papers/panel/weis2010_sullivan.pdf, accessed 2 July 2012.
Thomas, R. and Martin, J. (2006) The underground economy: Priceless. USENIX: Login 31 (6): 7–16.
UCLA. (2007) SPSS data analysis examples: Poisson regression. http://www.ats.ucla.edu/stat/spss/dae/poissonreg.htm, accessed 2 July 2012.
UK Cards Association. (2012) Annual report 2012. http://www.buzzwordcreative.co.uk/UK-Cards-Annual-Report-2012/html/index.html, accessed 2 July 2012.
Verizon. (2010) 2010 Data breach investigations report. http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf, accessed 2 July 2012.
Verizon. (2011) 2011 Data breach investigations report. http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf, accessed 2 July 2012.
Wall, D.S. (2007) Cybercrime. The Transformation of Crime in the Information Age. Cambridge, MA: Polity Press.
Wasserman, S. and Faust, K. (1994) Social Network Analysis: Methods and Applications. Cambridge, UK: Cambridge University Press.
Yang, C.C., Ng, T.D., Wang, J., Wei, C. and Chen, H. (2007) Analyzing and Visualizing Gray Web Forum Structure. Proceedings of Pacific-Asia Workshop on Intelligence and Security Informatics. Chengdu, China.
Zhuge, J., Holz, T., Song, C., Guo, J., Han, X. and Zou, W. (2009) Studying malicious websites and the underground economy on the Chinese web. In: M.E. Johnson (ed.) Managing Information Risk and the Economics of Security. New York: Springer.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Décary-Hétu, D., Leppänen, A. Criminals and signals: An assessment of criminal performance in the carding underworld. Secur J 29, 442–460 (2016). https://doi.org/10.1057/sj.2013.39
Published:
Issue Date:
DOI: https://doi.org/10.1057/sj.2013.39