skip to main content
10.1145/2464464.2464524acmconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
research-article

Why forums?: an empirical analysis into the facilitating factors of carding forums

Published: 02 May 2013 Publication History

Abstract

Over the last decade, the nature of cybercrime has transformed from naive vandalism to profit-driven, leading to the emergence of a global underground economy. A noticeable trend which has surfaced in this economy is the repeated use of forums to operate online stolen data markets. Using interaction data from three prominent carding forums: Shadowcrew, Cardersmarket and Darkmarket, this study sets out to understand why forums are repeatedly chosen to operate online stolen data markets despite numerous successful infiltrations by law enforcement in the past. Drawing on theories from criminology, social psychology, economics and network science, this study has identified four fundamental socio-economic mechanisms offered by carding forums: (1) formal control and coordination; (2) social networking; (3) identity uncertainty mitigation; (4) quality uncertainty mitigation. Together, they give rise to a sophisticated underground market regulatory system that facilitates underground trading over the Internet and thus drives the expansion of the underground economy.

References

[1]
Barabási, A.-L. and Albert, R. Emergence of Scaling in Random Networks. Science 286, 5439 (1999), 509--512.
[2]
Burt, R. S. The Network Structure of Social Capital. Research In Organizational Behavior 22, May (2000), 345--423.
[3]
Clauset, A., Shalizi, C. R., and Newman, M. E. J. Power-Law Distributions in Empirical Data. SIAM Review 51, 4 (2009), 661.
[4]
Dasgupta, P. Trust as a Commodity. In D. Gambetta, ed., Trust: Making and Breaking Cooperative Relations. Department of Sociology, University of Oxford, 2000, 49--72.
[5]
D. O. J. Nineteen Individuals Indicted In Internet 'Carding' Conspiracy. 2004. http://www.justice.gov/opa/pr/2004/October/04_crm_726.htm.
[6]
Franklin, J., Paxson, V., Perrig, A., and Savage, S. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. Proceedings of the 14th ACM conference on Computer and communications security, ACM (2007), 375--388.
[7]
Gambetta, D. Trust's Odd Ways. In J. Elster, O. Gjelsvik, A. Hylland and K. Moene, eds., Understanding Choice, Explaining Behaviour: Essays in Honour of Ole-Jørgen Skog. Unipub Forlag/Oslo Academic Press, Oslo, 2008, 81--100.
[8]
Glenny, M. Darkmarket: Cyberthieves, Cybercops and You. The Bodley Head, London, 2011.
[9]
Grow, B. and Bush, J. Hacker Hunters. Bloomberg BusinessWeek Magazine, 2005. http://www.businessweek.com/stories/2005-05-29/hacker-hunters.
[10]
Herley, C. and Florêncio, D. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy. In T. Moore, D. Pym and C. Ioannidis, eds., Economics of Information Security and Privacy. Springer US, 2010, 33--53.
[11]
Holt, T. J. Examining the Role of Technology in the Formation of Deviant Subcultures. Social Science Computer Review 28, 4 (2010), 466--481.
[12]
Holt, T. J. and Lampke, E. Exploring stolen data markets online: products and market forces. Criminal Justice Studies 23, 1 (2010), 33--50.
[13]
Jackson, M. O. and Rogers, B. W. Meeting Strangers and Friends of Friends: How Random Are Social Networks? American Economic Review 97, 3 (2007), 890--915.
[14]
Kleinberg, J. M. Navigation in a Small World. Nature 406, 6798 (2000), 845.
[15]
Lusthaus, J. Trust in the World of Cybercrime. Global Crime 13, 2 (2012), 71--94.
[16]
McCarthy, B. and Hagan, J. Getting into Street Crime: The Structure and Process of Criminal Embeddedness. Social Science Research 24, 1 (1995), 63--95.
[17]
McKnight, D. H., Cummings, L. L., and Chervany, N. L. Initial Trust Formation in New Organizational Relationships. The Academy of Management Review 23, 3 (1998), 473--490.
[18]
Moore, T., Clayton, R., and Anderson, R. The Economics of Online Crime. Journal of Economic Perspectives 23, 3 (2009), 3--20.
[19]
Motoyama, M., McCoy, D., Levchenko, K., Savage, S., and Voelker, G. M. An Analysis of Underground Forums. Proceedings of the ACM Internet Measurement Conference (IMC), (2011).
[20]
Pennock, D. M., Flake, G. W., Lawrence, S., Glover, E. J., and Giles, C. L. Winners Don't Take All: Characterizing the Competition for Links on the Web. Proceedings of the National Academy of Sciences of the United States of America 99, 8 (2002), 5207--11.
[21]
Peretti, K. K. Data Breaches: What the Underground World of "Carding" Reveals. Santa Clara Computer and High Technology Journal 25, (2008), 375--414.
[22]
Poulsen, K. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground. Crown Publishing, New York, 2011.
[23]
Powell, W. W. Neither market nor hierarchy: network forms of organization. Research In Organizational Behavior 12, 1 (1990), 295--336.
[24]
Tajfel, H. Social Psychology of Intergroup Relations. Annual Review of Psychology 33, 1 (1982), 1--39.
[25]
Thomas, R. and Martin, J. the underground economy?: priceless. The USENIX Magazine 31, 6 (2006), 7--16.
[26]
von Lampe, K. and Johansen, P. Organized Crime and Trust: On the Conceptualization and Empirical Relevance of Trust in the Context of Criminal Networks. Global Crime 6, 2 (2004), 159--184.
[27]
Watts, D. J. and Strogatz, S. H. Collective Dynamics of 'Small-World' Networks. Nature 393, 6684 (1998), 440--442.
[28]
Webber, C. and Yip, M. Drifting on and Off-line: Humanising the Cyber Criminal. In S. Winlow and R. Atkinson, eds., New Directions in Crime and Deviancy. Routledge, Abington, 2013, 191--205.
[29]
Williamson, O. E. Calculativeness, Trust, and Economic Organization. Journal of Law and Economics 36, 1 (1993), 453--486.
[30]
Yip, M. and Webber, C. Hacktivism?: a Theoretical and Empirical Exploration of China's Cyber Warriors. ACM Web Science Conference 2011, Koblenz, 14-17 June, (2011).
[31]
Yip, M., Shadbolt, N., Tiropanis, T., and Webber, C. The Digital Underground Economy: a Social Network Approach to Understanding Cybercrime. Digital Futures 2012: The Third Annual Digital Economy All Hands Conference, Aberdeen, 23-25 October, (2012)

Cited By

View all
  • (2025)From warnings to bans: The role of social networks in the severity of sanctionsSocial Networks10.1016/j.socnet.2025.02.00182(1-13)Online publication date: Jul-2025
  • (2024)Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users2024 APWG Symposium on Electronic Crime Research (eCrime)10.1109/eCrime66200.2024.00020(187-201)Online publication date: 24-Sep-2024
  • (2024)Missing the mark? Identifying child sexual abuse material forum structure and key-players based on public replies and private messaging networksHumanities and Social Sciences Communications10.1057/s41599-024-03954-x11:1Online publication date: 2-Nov-2024
  • Show More Cited By

Index Terms

  1. Why forums?: an empirical analysis into the facilitating factors of carding forums

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WebSci '13: Proceedings of the 5th Annual ACM Web Science Conference
      May 2013
      481 pages
      ISBN:9781450318891
      DOI:10.1145/2464464
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 May 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. carding
      2. cybercrime
      3. social computing
      4. underground economy
      5. web 2.0

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      WebSci '13
      Sponsor:
      WebSci '13: Web Science 2013
      May 2 - 4, 2013
      Paris, France

      Acceptance Rates

      Overall Acceptance Rate 245 of 933 submissions, 26%

      Upcoming Conference

      Websci '25
      17th ACM Web Science Conference
      May 20 - 24, 2025
      New Brunswick , NJ , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)18
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)From warnings to bans: The role of social networks in the severity of sanctionsSocial Networks10.1016/j.socnet.2025.02.00182(1-13)Online publication date: Jul-2025
      • (2024)Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users2024 APWG Symposium on Electronic Crime Research (eCrime)10.1109/eCrime66200.2024.00020(187-201)Online publication date: 24-Sep-2024
      • (2024)Missing the mark? Identifying child sexual abuse material forum structure and key-players based on public replies and private messaging networksHumanities and Social Sciences Communications10.1057/s41599-024-03954-x11:1Online publication date: 2-Nov-2024
      • (2023)The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces2023 IEEE International Conference on Service-Oriented System Engineering (SOSE)10.1109/SOSE58276.2023.00027(161-171)Online publication date: Jul-2023
      • (2022)Cooperation and distrust in extra-legal networks: a research note on the experimental study of marketplace disruptionGlobal Crime10.1080/17440572.2022.203115223:3(259-283)Online publication date: 23-Feb-2022
      • (2021)Business Data Sharing through Data Marketplaces: A Systematic Literature ReviewJournal of Theoretical and Applied Electronic Commerce Research10.3390/jtaer1607018016:7(3321-3339)Online publication date: 3-Dec-2021
      • (2020)Behind the Scenes of the Underworld: Hierarchical Clustering of Two Leaked Carding Forum DatabasesSocial Science Computer Review10.1177/089443932092473540:3(618-640)Online publication date: 5-Jun-2020
      • (2019)Cryptomarchés et carding : impact sur l’offre et la demandeCryptomarkets and carding: Influence on supply and demandMercados criptográficos y carding: Impacto sobre la oferta y la demandaCriminologie10.7202/1065856ar52:2(63)Online publication date: 2019
      • (2019)« Une publication pour dénoncer, sans plus »“A publication only used to denounce”“Una publicación para denunciar sin más”Criminologie10.7202/1065855ar52:2(33)Online publication date: 2019
      • (2019)Cognitive triaging of phishing attacksProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361429(1309-1326)Online publication date: 14-Aug-2019
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media