skip to main content
10.1145/2915368.2915369acmotherconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
research-article

Discovering credit card fraud methods in online tutorials

Published: 22 May 2016 Publication History

Abstract

Online underground forums allow for the sharing of up-to-date knowledge on how to optimally commit an online crime. Tutorials focusing on specific online crimes are commonplace and provide members of underground communities with all the information needed to engage in illicit transactions. In this article, tutorials that focus on the online process of cashing out stolen credit card details, i.e. carding, will be analysed. A crime script analysis will reveal the most common ways in which carding is executed. We found that if these paths are meticulously followed, interceptive opportunities are limited for law enforcement. Cases of deviation from these paths are not uncommon, which renders situational crime prevention measures less effective. As a potential solution, we propose the uptake of prospect theory as an analytical tool to account for deviations from the criminal optimal norm. In future work, such a method could better account for all the various ways in which fraudulent activity is committed and contribute to thinking about new preventive measures.

References

[1]
Thomas, K., Yuxing, H., Holt, T.J., Kruegel, C., McCoy, D., Bursztein, E., Grier, C., Savage, S., and Vigna, G. 2015. Framing Dependencies Introduced by Underground Commoditization. Workshop on the Economics of Information Security. 1--24.
[2]
Afroz, S., Caliskan-Islam, A., Stolerman, A., Greenstadt, R., and McCoy, D. 2014. Doppelgänger Finder: Taking Stylometry to the Underground. In Proceedings of the 35rd Conference IEEE Symp. Secur. Priv. 212--226.
[3]
Yip, M., Webber, C. and Shadbolt., N. 2013. Trust among cybercriminals? Carding forums, uncertainty and implications for policing. Policing and Society: An International Journal of Research and Policy, 23(4). 1--39.
[4]
Ablon, L., Libicki, M and Golay, A. 2014. Markets for Cybercrime Tools and Stolen Information: Hackers' Bazaar. The Rand Corperation.Retrieved 19 March, 2016 from: http://www.rand.org/content/dam/rand/pubs/research_reports /RR600/RR610/RAND_RR610.pdf.
[5]
Moore, T., Clayton, R. and Anderson, R. 2009. The Economics of Online Crime. Journal of Economic Perspectives, 23(3). 3--20.
[6]
Cornish, D.B. The Procedural Analysis of Offending and its Relevance for Situational Crime Prevention. In R.V. Clarke, Crime Prevention Studies, Volume 3, Monsey, NY: Criminal Justice Press, 1994, 151--196.
[7]
Brayley, H., Cockbain, E. and Laycock, G. 2011. The Value of Crime Scripting. Deconstructing Internal Child Sex Trafficking. Policing: A Journal of Policy and Practice, 5(2). 132--143.
[8]
Hutchings, A. and Holt, T.J. 2014. A Crime Script Analysis of the Online Stolen Data Market. British Journal of Criminology, 55(3). 596--614.
[9]
Willison, R. 2006. Understanding the perpetration of employee computer crime in the organizational context. Information and Organization, 16(4). 304--324.
[10]
Lavorgna, A. 2013. Transit crimes in the Internet age: How new online criminal opportunities affect the organization of offline transit crimes. Ph.D. Dissertation. University of Trento, Italy.
[11]
Gilmour, N. 2014. Understanding Money Laundering --- A Crime Script Approach. The European Review of Organised Crime, 1(2). 35--56.
[12]
Lavorgna, A. 2014. Internet-mediated drug trafficking: towards a better understanding of new criminal dynamics. Trends in Organized Crime, 17(4). 250--270.
[13]
Leontiadis, N. and Hutchings, A. 2015. Scripting the crime commission process in the illicit online prescription drug trade. Journal of Cybersecurity.
[14]
Leontiadis, N. 2014. Structuring disincentives for online criminal. Ph.D. Dissertation. Carnegie Mellon University, USA.
[15]
Tompson, L. and Chainey, S. 2011. Profiling Illegal Waste Activity: Using Crime Scripts as a Data Collection and Analytical Strategy. European Journal on Criminal Policy and Research, 17. 179--201.
[16]
Chiu, Y.N., Leclerc, B. and Townsley, M. 2011. Crime Script Analysis of Drug Manufacturing in Clandestine Laboratories: Implications for Prevention. British Journal of Criminology, 51(2). 355--374.
[17]
Kahneman, D. and Tversky, A. 1979. Prospect Theory: An Analysis of Decision under Risk. Econometrica, 47(2). 263--292.
[18]
Tversky, A. and Kahneman, D. 1986. Rational Choice and the Framing of Decisions. The Journal of Business, 59(4). 251--278.
[19]
Jervis, R. 2004. The Implications of Prospect Theory for Human Nature and Values. Political Psychology, 25(2). 163--176.
[20]
Sunstein, C. 1997 Behavioural Analysis of Law. University of Chicago Law Review, 64. 1175--1197.
[21]
Clarke, R.V. Situational Crime Prevention. 1997. Successful Case Studies (2nd ed.). Albany, N.Y.: Harrow and Heston.

Cited By

View all
  • (2024)Introducing object-oriented modelling to cybercrime scripting: visualisation for improved analysisCrime Science10.1186/s40163-024-00227-513:1Online publication date: 4-Oct-2024
  • (2024)The Art of Cybercrime Community ResearchACM Computing Surveys10.1145/3639362Online publication date: 10-Jan-2024
  • (2023)Digital Drift and the Evolution of a Large Cybercrime Forum2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW59978.2023.00026(183-193)Online publication date: Jul-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
OnSt '16: Proceedings of the 1st International Workshop on Online Safety, Trust and Fraud Prevention
May 2016
12 pages
ISBN:9781450343640
DOI:10.1145/2915368
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 May 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. carding
  2. crime script analysis
  3. cybercrime
  4. prospect theory
  5. situational crime prevention
  6. tor
  7. tutorials
  8. underground markets

Qualifiers

  • Research-article

Funding Sources

Conference

WebSci '16
WebSci '16: ACM Web Science Conference
May 22 - 25, 2016
Hannover, Germany

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)28
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Introducing object-oriented modelling to cybercrime scripting: visualisation for improved analysisCrime Science10.1186/s40163-024-00227-513:1Online publication date: 4-Oct-2024
  • (2024)The Art of Cybercrime Community ResearchACM Computing Surveys10.1145/3639362Online publication date: 10-Jan-2024
  • (2023)Digital Drift and the Evolution of a Large Cybercrime Forum2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW59978.2023.00026(183-193)Online publication date: Jul-2023
  • (2023)Following the (DNM) Bible? A crime script analysis of darknet drug vendingCrime, Law and Social Change10.1007/s10611-023-10093-y80:4(419-439)Online publication date: 21-Apr-2023
  • (2022)Card-not-present fraud: using crime scripts to inform crime prevention initiativesSecurity Journal10.1057/s41284-022-00359-w36:4(693-711)Online publication date: 14-Nov-2022
  • (2021)The modus operandi of transnational computer fraud: a crime script analysis in VietnamTrends in Organized Crime10.1007/s12117-021-09422-125:2(226-247)Online publication date: 9-Jun-2021
  • (2019)Cryptomarchés et carding : impact sur l’offre et la demandeCryptomarkets and carding: Influence on supply and demandMercados criptográficos y carding: Impacto sobre la oferta y la demandaCriminologie10.7202/1065856ar52:2(63)Online publication date: 2019
  • (2019)Crime scripting: A systematic reviewEuropean Journal of Criminology10.1177/147737081985094318:4(504-525)Online publication date: 4-Jun-2019
  • (2019)Understanding eWhoring2019 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP.2019.00024(201-214)Online publication date: Jun-2019
  • (2018)Leaving on a jet plane: the trade in fraudulently obtained airline ticketsCrime, Law and Social Change10.1007/s10611-018-9777-8Online publication date: 8-May-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media