The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations

While cybercrime can often be an individual activity pursued by lone hackers, it has increasingly grown into a group activity, with networks across the world. This chapter critically examines the group element of cybercrime from several perspectives. It identifies the platforms that online groups---cybercriminal and otherwise---use to interact, and considers groups as both perpetrators and victims of cybercrime. A key novelty is the discovery of new types of online groups whose collective actions border on criminality. The chapter also analyzes how online cybercrime groups form, organize, and operate. It explores issues such as trust, motives, and means, and draws on several poignant examples, from Anonymous to LulzSec, to illustrate the arguments.

[1]  Mary Fran T. Malone,et al.  Transnational Organized Crime in Latin America , 2014 .

[2]  Jennifer Jie Xu,et al.  Mining communities and their relationships in blogs: A study of online hate groups , 2007, Int. J. Hum. Comput. Stud..

[3]  Tom Carpay,et al.  WhatsApp End-to-End Encryption : Are Our Messages Private ? Research project by students of the SnE masters programme , 2019 .

[4]  Marcus K. Rogers,et al.  A two-dimensional circumplex approach to the development of a hacker taxonomy , 2006, Digit. Investig..

[5]  Todd H. Chiles,et al.  Integrating variable risk preferences, trust, and transaction cost economics – 25 years on: reflections in memory of Oliver Williamson , 2021, Journal of Institutional Economics.

[6]  C. Watkins,et al.  Health Advice from Internet Discussion Forums: How Bad Is Dangerous? , 2016, Journal of medical Internet research.

[7]  Jason R. C. Nurse,et al.  Information Quality and Trustworthiness: A Topical State−of−the−Art Review , 2011 .

[8]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[9]  E. Rutger Leukfeldt,et al.  Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis , 2017 .

[10]  James G. Hunt,et al.  The New Look in Motivation Theory for Organizational Research , 1969 .

[11]  Amanda Lenhart,et al.  Online Harassment, Digital Abuse, and Cyberstalking in America , 2016 .

[12]  Danny Bradbury,et al.  Unveiling the dark web , 2014, Netw. Secur..

[13]  Teo Keipi,et al.  Young people as victims of crime on the internet: A population-based study in Finland , 2013 .

[14]  D. Wall,et al.  Dis-Organised Crime: Towards a Distributed Model of the Organization of Cybercrime , 2015 .

[15]  Stephanie Bennett,et al.  Hate Crime Offenders: An Expanded Typology , 2002 .

[16]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[17]  S. Reicher,et al.  The Psychology of Crowd Dynamics , 2008 .

[18]  Stefan Savage,et al.  An analysis of underground forums , 2011, IMC '11.

[19]  Martin C. Libicki,et al.  Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar , 2014 .

[20]  Yao-Hua Tan,et al.  Trust in Cyber-societies: Integrating the Human and Artificial Perspectives , 2000, Lecture Notes in Computer Science.

[21]  J. Klausen Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq , 2015 .

[22]  T. Holt,et al.  Examining the risk reduction strategies of actors in online criminal markets , 2015 .

[23]  Sarah Magdy A safe space for terrorists , 2016 .

[24]  Barbara Perry,et al.  Cyberhate: the globalization of hate , 2009 .

[25]  Susan Wiedenbeck,et al.  On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..

[26]  S. Atkinson,et al.  Psychology and the hacker-Psychological Incident Handling , 2019 .

[27]  J. Wolak,et al.  Are blogs putting youth at risk for online sexual solicitation or harassment? , 2008, Child abuse & neglect.

[28]  Yong Lu,et al.  Social Network Analysis of a Criminal Hacker Community , 2010, J. Comput. Inf. Syst..

[29]  K. Williams,et al.  From I to we: Social identity and the collective self. , 2000 .

[30]  D. Wall Cybercrime: The Transformation of Crime in the Information Age , 2007 .

[31]  Adam M. Bossler,et al.  The General Theory of Crime and Computer Hacking: Low Self-control Hackers? , 2011 .

[32]  Clifford Stott,et al.  On the role of a social identity analysis in articulating structure and collective action: the 2011 riots in Tottenham and Hackney , 2017 .

[33]  Kim-Kwang Raymond Choo,et al.  Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .

[34]  Marc Silverman,et al.  Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous , 2018 .

[35]  Imran Awan Islamophobia and Twitter: A Typology of Online Hate Against Muslims on Social Media , 2014 .

[36]  Sadie Creese,et al.  Future scenarios and challenges for security and privacy , 2016, 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI).

[37]  Robin M. Kowalski,et al.  Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. , 2014, Psychological bulletin.

[38]  Marco Balduzzi,et al.  Attacks landscape in the dark side of the web , 2017, SAC.

[39]  Ian Thornton-Trump Malicious Attacks and Actors: An Examination of the Modern Cyber Criminal , 2018 .

[40]  Jason R. C. Nurse,et al.  Identifying Key-Players in Online Activist Groups on the Facebook Social Network , 2015, 2015 IEEE International Conference on Data Mining Workshop (ICDMW).

[41]  Bill McCarthy,et al.  When Crime Pays: Capital, Competence, and Criminal Success , 2001 .

[42]  Sadie Creese,et al.  Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.

[43]  Hadi Salehi,et al.  The Effectiveness of Facebook Groups on Teaching and Improving Writing: Students' Perceptions , 2012 .

[44]  Jonathan Lusthaus,et al.  Trust in the world of cybercrime , 2012 .

[45]  Peter Holtz,et al.  Analyzing Internet Forums , 2012, J. Media Psychol. Theor. Methods Appl..

[46]  Chris Anderson,et al.  Islamophobia, war and non-Muslims as victims: an analysis of online discourse on an English Defence League message board , 2018 .

[47]  P. Gerbaudo Tweets and the Streets: Social Media and Contemporary Activism , 2012 .

[48]  A. Maslow Motivation and Personality , 1954 .

[49]  Jason R. C. Nurse Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit , 2018, The Oxford Handbook of Cyberpsychology.

[50]  Nigel Shadbolt,et al.  Why forums?: an empirical analysis into the facilitating factors of carding forums , 2013, WebSci.

[51]  Thomas J. Holt,et al.  Examining the Structure, Organization, and Processes of the International Market for Stolen Data , 2014 .

[52]  Donald P. Green,et al.  Hate Crime: An Emergent Research Agenda , 2001 .

[53]  Peter Grabosky,et al.  Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime , 2014 .

[54]  Michael A. Xenos,et al.  Young people, social media and connective action: from organisational maintenance to everyday political talk , 2015 .

[55]  G. Odinot,et al.  Organised Cybercrime in the Netherlands : Empirical findings and implications for law enforcement , 2017 .

[56]  Michael Goldsmith,et al.  Towards Designing a Multipurpose Cybercrime Intelligence Framework , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).

[57]  E. Rutger Leukfeldt,et al.  A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists , 2017 .

[58]  T. Holt,et al.  Exploring stolen data markets online: products and market forces , 2010 .

[59]  Kusminder Chahal Supporting victims of hate crime: A practitioner guide , 2016 .

[60]  H. Kelley,et al.  The social psychology of groups , 1960 .

[61]  Paul M. Salmon,et al.  It's Dark in There: Using Systems Analysis to Investigate Trust and Engagement in Dark Web Forums , 2015, HCI.

[62]  Christian Fuchs,et al.  Social media, riots, and revolutions , 2012 .