Apr. 22, 2013 ? A Michigan State University criminologist dug into the seamy underbelly of online credit card theft and uncovered a surprisingly sophisticated network of crooks that is unique in the cybercrime domain.
The thieves, Thomas Holt found, run an online marketplace for stolen credit data similar to eBay or Amazon where reputations drive sales. Thieves sell data and money laundering services, advertised via web forums, and send and receive payments electronically or through an intermediary. They even provide feedback on transactions to help weed out sellers who cannot be trusted to deliver the illegal goods.
Holt's study, funded by the National Institute of Justice, is published in the research journal Global Crime.
"These aren't just 15-year-olds stealing credit card info online and using it to buy pornography," said Holt, associate professor of criminal justice. "These are thieves who come to trust one another. There's a layer of sophistication here that can't be understated, that's very different than what we think about with other forms of crime."
First, credit card information is stolen from an individual or group. Tactics can include hacking into the database of a bank, retailer or other service provider; sending emails to consumers masquerading as a bank to acquire sensitive details such as usernames and passwords (called phishing); and skimming. Examples of skimming include attaching a hard-to-spot device on an ATM machine or a crooked waiter who wears an electronic belt that can capture a card's details.
The thief then advertises his haul in an online forum, with details such as card type, country of origin and asking price. Holt said a Visa Classic card, for example, might go for $5 to $20 per card, with a price discount for buying large amounts of data.
The winning buyer finalizes the deal online and sends the money through an electronic payment service. If the seller isn't known or trusted, a middleman, called a guarantor, is used to assure the data is good before payment is sent -- minus a fee.
For the buyers, there is any number of illicit service providers to then help them make purchases in a way that doesn't raise suspicion or to pull money directly from the accounts -- minus a fee.
All of this is done in a rather democratic fashion -- unlike, say, the hierarchical structure of the mafia, said Holt, who monitored two English-language and two Russian-language forums for the study.
Some policymakers have called for flooding the online forums with bogus comments in an attempt to build mistrust and bring them down. But Holt said this strategy won't necessarily work for organized forums with managers who can monitor and remove comments as in the forums he sampled.
A better strategy, he said, might be for law enforcement authorities to infiltrate the sophisticated networks with a long-term undercover operation. It's a challenge, but one that might be more effective than other strategies called for by researchers.
Share this story on Facebook, Twitter, and Google:
Other social bookmarking and sharing tools:
Story Source:
The above story is reprinted from materials provided by Michigan State University.
Note: Materials may be edited for content and length. For further information, please contact the source cited above.
Journal Reference:
- Thomas J. Holt. Exploring the social organisation and structure of stolen data markets. Global Crime, 2013; : 1 DOI: 10.1080/17440572.2013.787925
Note: If no author is given, the source is cited instead.
Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of ScienceDaily or its staff.
Source: http://feeds.sciencedaily.com/~r/sciencedaily/strange_science/~3/5O3UUeCXaoM/130422111244.htm
reese witherspoon earth day Java Boston Police Scanner Jeff Bauman abc news cbs news
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.