Résumés
Résumé
Dans le présent article, il est question de décrire les activités marchandes des cardeurs sur les cryptomarchés au moyen d’un échantillon de 17 619 annonces de produits ou de services relatifs au carding ainsi que d’un second échantillon recensant les activités de 4 294 vendeurs. Notre démarche s’attache plus précisément à constater si l’avènement des cryptomarchés, comme lieu de convergence pour les cybercriminels, a eu un impact sur l’offre et la demande de tels produits et services. Pour mener à bien cet objectif, une typologie des différents produits et services est réalisée. Dans un premier temps, des analyses descriptives, mettant en lumière les proportions des différents types ainsi que la distribution des prix affichés par les annonces, permettent d’offrir un regard sur l’impact des technologies d’anonymat sur l’offre de produits et services. Dans un second temps, des analyses descriptives des transactions effectuées par les vendeurs sont réalisées pour examiner leur impact sur la demande de produits et services. Les principaux résultats indiquent que les cryptomarchés offrent tout le nécessaire pour commettre les trois étapes du script criminel du carding. De plus, il est aussi montré que, comme dans le cas des vendeurs de drogue en ligne, le système d’évaluation formel a permis de transcender et d’améliorer les processus générateurs de confiance.
Mots-clés :
- Carding,
- cryptomarchés,
- offre,
- demande,
- cybercriminalité
Abstract
The present study describes the market activities of carding in cryptomarkets in a sample of 17,619 products or services related to carding as well as a second sample of the activities of 4,294 sellers. We were interested particularly in whether convergence settings such as cryptomarkets have an effect on the supply and demand of carding products and services. We began by creating a typology of products and services which was then used in a descriptive analyses of market share and price distribution to shed the light on how anonymization affected offers. Descriptive analyses of sellers’ activities was then used to look at the impact of sales on the demand for carding products and services. The results suggest that cryptomarkets offer all that carders need to carry out the three steps of the criminal script in carding. We also found that, as with online drug dealers, the formal feedback system made it possible to improve processes that generate confidence in the system.
Keywords:
- Carding,
- cryptomarkets,
- supply,
- offer,
- cybercriminality
Resumen
Este artículo describe las actividades comerciales del carding por los mercados criptográficos, examinando una muestra de 17 619 anuncios de productos o de servicios relativos al carding, y una segunda muestra de las actividades de 4294 vendedores. Nuestro proceso se interesa más específicamente en constatar si el advenimiento de los mercados criptográficos, como lugar de convergencia para los cibercriminales, tuvo un impacto sobre la oferta y la demanda de tales productos y servicios. Para llevar a cabo este objetivo, una tipología de los diferentes productos y servicios fue realizada. En primer lugar, un análisis descriptivo fue realizado, poniendo a la luz las proporciones de los diferentes tipos, así como la distribución de los precios publicados en los anuncios, permite observar el impacto de las tecnologías de anonimato sobre la oferta. En segundo lugar, otros análisis descriptivos fueron efectuados sobre las transacciones realizadas por los vendedores para examinar este impacto sobre la demanda. Los resultados principales indican que los mercados criptográficos ofrecen todo lo necesario para cometer las tres etapas del guion criminal del carding. Además, también es demostrado que, de la misma forma que los vendedores de droga en línea, el sistema de evaluación formal permitió trascender y mejorar los procesos generadores de confianza.
Palabras clave:
- Carding,
- mercados criptográficos,
- oferta,
- demanda,
- criminalidad cibernética
Parties annexes
Références
- Afroz, S., Garg, V., McCoy, D. et Greenstadt, R. (2013). Honor among thieves : A common’s analysis of cybercrime economies. Dans 2013 APWG eCrime Researchers Summit. https://doi.org/10.1109/eCRS.2013.6805778
- Anderson, R., Barton, C., Böhme, R., Clayton, R., Ganán, C., Grasso, R.,… Vasek, M. (2019). Measuring the changing cost of cybercrime. Dans Proceedings of the 17th Workshop of the Economics of Information Security (WEIS). Boston, MA.
- Barratt, M. J. et Aldridge, J. (2016). Everything you always wanted to know about drug cryptomarkets*(* but were afraid to ask). International Journal of Drug Policy, 35, 1-6.
- Broséus, J., Rhumorbarbe, D., Mireault, C., Ouellette, V., Crispino, F. et Décary-Hétu, D. (2016). Studying illicit drug trafficking on darknet markets : Structure and organisation from a Canadian perspective. Forensic science international, 264, 7-14.
- Bulakh, V. et Gupta, M. (2015). Characterizing credit card black markets on the web. Dans Proceedings of the 24th International Conference on World Wide Web. Florence, Italie.
- Chakraborty, R., Lee, J., Bagchi-Sen, S., Upadhyaya, S. et Rao, H. R. (2016). Online shopping intention in the context of data breach in online retail stores : An examination of older and younger adults. Decision Support Systems, 83, 47-56.
- Christin, N. (2013). Traveling the silk road : A measurement analysis of a large anonymous online marketplace. Dans Proceedings of the 22nd international conference on World Wide Web (p. 213-224).
- Clarke, R. V. et Newman, G. R. (2003). Superhighway robbery : Preventing e-commerce crime. Cullumpton, Royaume-Uni : Willan Publishing.
- Cornish, D. B. (1994). The procedural analysis of offending and its relevance for situational prevention. Crime Prevention Studies, 3, 151-196.
- Décary-Hétu, D. et Aldridge, J. (2013). DATACRYPTO : The Dark Net Crawler and Scraper.
- Décary-Hétu, D. et Dupont, B. (2012). The social network of hackers. Global Crime, 13(3), 160-175.
- Décary-Hétu, D. et Eudes, M. (2015). Partenariats criminels au sein d’un forum de carding : alliés, rivaux ou escrocs ? Étude de l’utilisation d’identités virtuelles multiples. Revue internationale de criminologie et de police technique scientifique, 68(3), 299-314.
- Décary-Hétu, D. et Giommoni, L. (2017). Do police crackdowns disrupt drug cryptomarkets ? A longitudinal analysis of the effects of Operation Onymous. Crime, Law and Social Change, 67(1), 55-75.
- Décary-Hétu, D. et Leppänen, A. (2016). Criminals and signals : An assessment of criminal performance in the carding underworld. Security Journal, 29(3), 442-460.
- Devine, J., Egger-Sider, F. et Rojas, A. (2015). The evolving impact of the invisible web : Exploring economic and political ramifications. Journal of Web Librarianship, 9(4), 145-161
- Dolliver, D. S. (2015). Evaluating drug trafficking on the Tor network : Silk Road 2, the sequel. International Journal of Drug Policy, 26(11), 1113-1123.
- Dupont, B., Côté, A. M., Savine, C. et Décary-Hétu, D. (2016). The ecology of trust among hackers. Global Crime, 17(2), 129-151.
- Fallmann, H., Wondracek, G. et Platzer, C. (2010). Covertly probing underground economy marketplaces. Dans Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (p. 101-110). Bonn, Allemagne.
- Franklin, J., Perrig, A., Paxson, V. et Savage, S. (2007). An inquiry into the nature and causes of the wealth of internet miscreants. Dans ACM Conference on Computer and Communications Security (p. 375-388).
- Greene, C. et Stavins, J. (2017). Did the Target data breach change consumer assessments of payment card security ?. Journal of Payments Strategy & Systems, 11(2), 121-133.
- Haslebacher, A., Onaolapo, J. et Stringhini, G. (2017). All your cards are belong to us : Understanding online carding forums. Dans Electronic Crime Research (eCrime), 2017 APWG Symposium on (p. 41-51). IEEE.
- Herley, C. et Florêncio, D. (2010). Nobody sells gold for the price of silver : Dishonesty, uncertainty and the underground economy. Dans Economics of information security and privacy (p. 33-53). Boston, MA : Springer.
- Holt, T. J. (2007). Subcultural evolution ? Examining the influence of on-and off-line experiences on deviant subcultures. Deviant Behavior, 28(2), 171-198.
- Holt, T. J. (2013). Exploring the social organization and structure of stolen data markets. Global Crime, 14(2-3), 155-174.
- Holt, T. J. et Lampke, E. (2010). Exploring stolen data markets online : Products and market forces. Criminal Justice Studies, 23(1), 33-50.
- Holt, T. J., Smirnova, O., Chua, Y. T. et Copes, H. (2015). Examining the risk reduction strategies of actors in online criminal markets. Global Crime, 16(2), 81-103.
- Holz, T., Engelberth, M. et Freiling, F. (2009). Learning more about the underground economy : A case-study of keyloggers and dropzones. Dans Computer Security – European Symposium on Research in Computer Security 2009 (p. 1-18).
- Hutchings, A. et Holt, T. J. (2014). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596-614.
- James, L. (2005). Phishing exposed : Uncover secrets from the dark side. Rockland, MA : Syngress.
- Jordan, T. et Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46(4), 757-780.
- Kashmiri, S., Nicol, C. D. et Hsu, L. (2016). Birds of a feather : Intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR. Journal of the Academy of Marketing Science, 45(2), 208-228.
- Kruithof, K., Aldridge, J., Décary-Hétu, D., Sim, M., Dujso, E. et Hoorens, S. (2016). Internet-facilitated Drugs Trade : An Analysis of the Size, Scope and the Role of the Netherlands. WODC, Ministerie van Veiligheid en Justitie. Repéré au https://www.rand.org/pubs/research_reports/RR1607.html.
- Leukfeldt, E. R. (2014). Cybercrime and social ties. Trends in Organized Crime, 17(4), 231-249.
- Markham, A. N. (2011). Internet research. Dans D. Silverman (dir.), Qualitative Research : Issues of Theory, Method, and Practice (3e éd., p. 111-127). SAGE.
- Motoyama, M., McCoy, D., Levchenko, K., Savage, S. et Voelker, G. M. (2011). An analysis of underground forums. Dans Proceedings of the 2011 Internet Measurement Conference. Berlin, Allemagne.
- Olson, P. (2013). The man behind Silk Road – the internet’s biggest market for illegal drugs. The Guardian. Repéré à https://www.theguardian.com/technology/2013/nov/10/silk-road-internet-market-illegal-drugs-ross-ulbricht
- Peretti, K. K. (2009). Data breaches : What the underground world of carding reveals. Santa Clara Computer & High Tech. LJ, 25, 375.
- Sullivan, R. J. (2010). The changing nature of US card payment fraud : Industry and public policy options. Economic Review-Federal Reserve Bank of Kansas City, 95(2), 101.
- Symantec. (2017). Internet security threat report. Repéré à https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf
- Thomas, R. et Martin, J. (2006). The underground economy : Priceless. ; login : : the magazine of USENIX & SAGE, 31(6), 7-16.
- van Hardeveld, G. J., Webber, C. et O’Hara, K. (2016). Discovering credit card fraud methods in online tutorials. Dans Proceedings of the 1st International Workshop on Online Safety, Trust and Fraud Prevention. Hanovre, Allemagne.
- Vasiu, I. et Vasiu, L. (2015). Riders on the storm : An analysis of credit card fraud cases. Suffolk Journal of Trial & Appellate Advocacy, 20, 184-217.
- Wall, D. (2007). Cybercrime : The transformation of crime in the information age. Cambridge, Royaume-Uni : Polity.
- Yip, M., Shadbolt, N. et Webber, C. (2013). Why forums ? An empirical analysis into the facilitating factors of carding forums. Dans Proceedings of the 5th Annual ACM Web Science Conference. Paris, France.