10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Cybercriminals find e-gold a convenient currency for the following reasons. First, the<br />

process is anonymous, quick and uncomplicated; anyone can set up an e-gold account in<br />

less than a minute and with a couple <strong>of</strong> clicks on the computer. No valid e-mail is<br />

requested although users are required to have a name, which is not checked. Second, e-<br />

gold transactions are irreversible, which means that transactions are final, and the<br />

company enforces this policy even in the event <strong>of</strong> mistakes and; third, the company is<br />

independent and beyond the authority <strong>of</strong> any country.<br />

Many phishing tools are also cheap and easy to use, for instance, a scam letter and<br />

scam page in your chosen language, a fresh spam list, technologies to send out 100,000<br />

mails for six hours, a hacked website for hosting the scam page for a few days, and<br />

finally a stolen but valid credit card cost about $60 (£40) in 2007. Seemingly the return<br />

on investment could easily be 300 per cent, but it could be ten times more. 208 This kind<br />

<strong>of</strong> ‘phishing trip’ has the potential to uncover at least 20 bank accounts <strong>of</strong> varying cash<br />

balances and will cost only $200 (£134). Details <strong>of</strong> the data harvested, however, will<br />

cost $2,000 (£1340) in e-gold if they are sold to another cybercriminal. 209 Nevertheless<br />

prices are far from static in underground markets. Rapid changes in prices are the result<br />

<strong>of</strong> the exponential growth in the supply stolen data. Recent research indicates that the<br />

market for stolen personal information, including credit card details, and personal<br />

information has grown to such an extent during 2008 that prices have fallen dramatically<br />

ranging for credit card details from $0.06 (4p) to $30 (£20) and full identities from<br />

$0.70 (46p) to $60 (£50). 210<br />

New technologies also make the replication <strong>of</strong> genuine documents easy and <strong>of</strong> a high<br />

enough standard to escape scrutiny. For instance, a counterfeit driving license could be<br />

used to authenticate identity and address for the purposes <strong>of</strong> store credit. Such<br />

counterfeiting sites are available on the Internet.<br />

Guillaume Lovet, (2006), Dirty Money on the Wires: The Business Models <strong>of</strong> Cyber Criminals. Virus Bulletin<br />

Conference, October 11-13, Montreal.<br />

208 Guillaume Lovet, “How cybercrime operations work – and why they make money.” http://www.out-<br />

law.com/page-7791 (accessed 29 th November 2008).<br />

209 ibid<br />

210 Prices varied according to the amount <strong>of</strong> information included with the card or identity, rarity <strong>of</strong> the<br />

information, and bulk purchase sizes. Symantec (2009) Symantec Global Internet Security Threat Report,<br />

Trends for 2008, Volume XIV, Published April 2009.<br />

Page 71

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!