10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

conceal this. Third, the device contains a memory stick, which records all this<br />

information for fraudsters to recover and start using these stolen cards. 144 There is a low<br />

level <strong>of</strong> technical knowledge necessary to operate the cloning kits. According to a fraud<br />

investigation director <strong>of</strong> a large bank, Romanian gangs seem to monopolise this<br />

activity. 145 The information is used to generate fake cards and withdraw money from<br />

ATMs or make purchases. To turn these cards into cash, criminal gangs generally<br />

develop a network <strong>of</strong> ‘runners’, who extract money from cash points for a commission.<br />

Other forms <strong>of</strong> exploitation do not require any technical skills. Many buyers <strong>of</strong> stolen<br />

data also use the services <strong>of</strong> experienced individuals who will convert the stolen goods,<br />

such as bank account credentials, into online currency accounts or money transfers. 146<br />

These people are called cashiers. Drop services provide criminals who have purchased<br />

items online with stolen credit cards with a convenient and reliable address to which<br />

they can mail stolen goods. In exchange for these services, cashiers and drop services<br />

charge a fee, which is usually a percentage <strong>of</strong> the cash involved in the transaction. 147<br />

2.1.2 Linkages between cybercriminals<br />

Cybercriminals link mostly over Internet Relay Chats and illicit web forums,<br />

which serve as meeting points and marketplaces for fraudsters.<br />

Value chain analysis also highlights the relevance <strong>of</strong> understanding dynamic linkages<br />

between the activities along the chain. Links between productive activities go beyond<br />

particular sectors and firms. By concentrating on the nature <strong>of</strong> the connection among all<br />

actors, value chain analysis allows us to uncover the flow <strong>of</strong> economic, organisational<br />

and coercive activities between producers within different sectors on a global scale. 148<br />

In the cybercrime value chain we could consider two types <strong>of</strong> link. First are those within<br />

each criminal organisation and between hackers and cybercriminal networks. There has<br />

144 192.com Business Services, (2008), The Fraudster’s Modus Operandi. London, p.8.<br />

145 Interview with the Director <strong>of</strong> a fraud investigation unit <strong>of</strong> a leading financial institution, 26 th November<br />

2008.<br />

146 Symantec, (2008), “Symantec Report on the Underground Economy”, July 07–June 08.<br />

147 Jaikumar Vijayan, 20 th October 2007, 'A Hacker's Holiday Shopping List, Computerworld.<br />

148 Kaplinsky R, and Morris M., (2001), A Handbook for Value Chain Research. International Development<br />

Research Centre: Ottawa.<br />

Page 49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!