NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Cybercriminals find e-gold a convenient currency for the following reasons. First, the<br />
process is anonymous, quick and uncomplicated; anyone can set up an e-gold account in<br />
less than a minute and with a couple <strong>of</strong> clicks on the computer. No valid e-mail is<br />
requested although users are required to have a name, which is not checked. Second, e-<br />
gold transactions are irreversible, which means that transactions are final, and the<br />
company enforces this policy even in the event <strong>of</strong> mistakes and; third, the company is<br />
independent and beyond the authority <strong>of</strong> any country.<br />
Many phishing tools are also cheap and easy to use, for instance, a scam letter and<br />
scam page in your chosen language, a fresh spam list, technologies to send out 100,000<br />
mails for six hours, a hacked website for hosting the scam page for a few days, and<br />
finally a stolen but valid credit card cost about $60 (£40) in 2007. Seemingly the return<br />
on investment could easily be 300 per cent, but it could be ten times more. 208 This kind<br />
<strong>of</strong> ‘phishing trip’ has the potential to uncover at least 20 bank accounts <strong>of</strong> varying cash<br />
balances and will cost only $200 (£134). Details <strong>of</strong> the data harvested, however, will<br />
cost $2,000 (£1340) in e-gold if they are sold to another cybercriminal. 209 Nevertheless<br />
prices are far from static in underground markets. Rapid changes in prices are the result<br />
<strong>of</strong> the exponential growth in the supply stolen data. Recent research indicates that the<br />
market for stolen personal information, including credit card details, and personal<br />
information has grown to such an extent during 2008 that prices have fallen dramatically<br />
ranging for credit card details from $0.06 (4p) to $30 (£20) and full identities from<br />
$0.70 (46p) to $60 (£50). 210<br />
New technologies also make the replication <strong>of</strong> genuine documents easy and <strong>of</strong> a high<br />
enough standard to escape scrutiny. For instance, a counterfeit driving license could be<br />
used to authenticate identity and address for the purposes <strong>of</strong> store credit. Such<br />
counterfeiting sites are available on the Internet.<br />
Guillaume Lovet, (2006), Dirty Money on the Wires: The Business Models <strong>of</strong> Cyber Criminals. Virus Bulletin<br />
Conference, October 11-13, Montreal.<br />
208 Guillaume Lovet, “How cybercrime operations work – and why they make money.” http://www.out-<br />
law.com/page-7791 (accessed 29 th November 2008).<br />
209 ibid<br />
210 Prices varied according to the amount <strong>of</strong> information included with the card or identity, rarity <strong>of</strong> the<br />
information, and bulk purchase sizes. Symantec (2009) Symantec Global Internet Security Threat Report,<br />
Trends for 2008, Volume XIV, Published April 2009.<br />
Page 71