Journal article: Internet Crime and Anti-Fraud Activism: A Hands-On Approach
Title: Internet Crime and Anti-Fraud Activism: A Hands-On Approach
Author(s): Andreas Zingerle, Linda Kronman
Published: Security and Privacy Management, Techniques, and Protocols
Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.
The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures.
ISBN13: 9781522555834|ISBN10: 1522555838|EISBN13: 9781522555841|DOI: 10.4018/978-1-5225-5583-4
Keywords: 419scam, Scambaiting, Anti-fraud, Workshop, Vigilante Communities, Fake News, Fake Profiles, Online Identities, Online Activism, Vigilante, Fraud, Cybercrime, Interactive Narratives, Storytelling
Scambaiting is a form of vigilantism that targets internet scammers who try to trick people into advance fee payments. In the past, victims were mainly contacted by bulk emails; now the widespread use of social networking services has made it easier for scammers to contact potential victims – those who seek various online opportunities in the form of sales and rentals, dating, booking holidays or seeking for jobs. Scambaiters are online information communities specializing in identifying; documenting and reporting activities of scammers. By following scambaiting forums it was possible to categorize different scambaiting subgroups with various strategies and tools. These were tested in hands-on sessions during creative workshops in order to gain a wider understanding of the scope of existing Internet scams as well as exploring counter strategies to prevent Internet crime. The aim of the workshops was to recognize and develop diverse forms of anti-scam activism.
[pdfjs-viewer url=”http://www.andreaszingerle.com/wp-content/uploads/2019/05/Internet-Crime-and-Anti-Fraud-Activism_-A-Hands-On-Approach.pdf” viewer_width=100% viewer_height=950px fullscreen=true download=true print=false]
Cite this article:
Zingerle, Andreas and Linda Kronman. “Internet Crime and Anti-Fraud Activism: A Hands-On Approach.” In Security and Privacy Management, Techniques, and Protocols, ed. Yassine Maleh, 322-336 (2018), accessed April 25, 2018. doi:10.4018/978-1-5225-5583-4.ch013
Atta-Asamoah, A., Understanding the West African cybercrime process. African Security Studies, 18 (4), 105–114, 2009.
Blythe, M., Petrie, H., & Clark, J. A., F for fake: four studies on how we fall for phish (pp. 3469–3478). Presented at the Proceedings of the 2011 annual conference on Human factors in computing systems. 2011.
Brunton, F., Spam: a shadow history of the Internet. MIT Press, 2012.
Rogers, M., The role of criminal profiling in the computer forensics process. Computers & Security, 22(4), 292–298. 2003.
Atkins, B., Huang, W., A Study of Social Engineering in Online Frauds. Open Journal of Social Sciences, 1, 23, 2013.
Bregant, J., Bregant, R., Cybercrime and Computer Crime. The Encyclopedia of Criminology and Criminal Justice, 2014.
Burrell, J., Invisible Users: Youth in the Internet Cafes of Urban Ghana. MIT Press, 2012.
Edwards, M., Peersman, C. and Rashid, A., Scamming the scammers: towards automatic detection of persuasion in advance fee frauds. In Proceedings of the 26th International Conference on World Wide Web Companion (pp. 1291-1299). International World Wide Web Conferences Steering Committee, 2017.
Krebs, B., The Value of a Hacked Email Account. [Online]. Available: http://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account/, 2013.
Kronman, L., Zingerle, A., Humiliating Entertainment or Social Activism? Analyzing Scambaiting Strategies Against Online Advance Fee Fraud. Cyberworlds (CW), 2013 International Conference on. IEEE. 2013.
Smallridge, J., Wagner, P., & Crowl, J. N. Understanding cyber-vigilantism: A conceptual framework. Journal of Theoretical & Philosophical Criminology, 8(1), 57. 2016
Tambe Ebot, A. C. Explaining two forms of Internet crime from two perspectives: toward stage theories for phishing and Internet scamming. Jyväskylä studies in computing 259. 2017.
Mann, I., Hacking the human: social engineering techniques and security countermeasures. Gower Publishing, Ltd. 2010.
Nakamura, L., ‘I WILL DO EVERYthing That Am Asked’: Scambaiting, Digital Show-Space, and the Racial Violence of Social Media. Journal of visual culture: 258-273. 2014.
Warner, J., Understanding cyber-crime in Ghana: A view from below. The International Journal of Cyber Criminology, 5, 736-749. 2011.
KEY TERMS AND DEFINITIONS
Scambaiting arose as a form of counter movement to the massive unsolicited bulk mailing of spam and scam mails. It is considered a form of online vigilantism and encompasses forms of online anti-fraud activism in order to waste the time and resources of the scammers, collectively gather information that will be of use to authorities and publicly expose the scammer. In this thesis I use both the terms scambaiter and anti-fraud activist. The term scambaiters refers to a very diverse group of online vigilantes, whereas anti-fraud activist refers to persons who take action motivated by a certain sense civic duty.
419-scam is a form of advance fee fraud that mainly uses telephone and email as a communication medium. The number ‘419’ refers to the section of the Nigerian Criminal Code dealing with fraud, but is not limited to fraud schemes originating from Nigeria. ‘419-scam’ or ‘Four-one-niner’ became a common term for all advance fee fraud scams that are carried out over the Internet, no matter whether they originate from Nigeria or from a different country.
is an attempt to get sensible information such as bank details, username and password combinations, insurance details or credit card numbers for malicious reasons. Phishing is typically carried out in email communication by masquerading a trustworthy company and copying their corporate identity.
Open source intelligence
Open source intelligence (osint) strategies refer to intelligence that has been derived from publicly available sources both on- and offline. It includes a wide variety of information and sources such as traditional media (radio, newspaper, tv, advertisement), web based communities (social networking sites, wikis, blogs), publicly available government reports, company advertisement, grey and white papers or observation and reporting. The term ‘open source’ is not related to ‘open source software’.
Digital storytelling describes the practice of everyday people who use digital tools such as social media, blogs, podcasts, video sharing or email messages to tell stories. These stories can include digital narratives such as web-based stories, interactive stories, hypertexts, and narrative computer games. Many people use elaborate non-traditional story forms, such as nonlinear and interactive narratives.