Difference between revisions of "The Underground Economy"

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Full Title of Reference== ==The Underground Economy: Priceless== Rob Thomas and Jerry Martin, ''The Underground Economy: Priceless,'' ;login:, Dec. 2006, at 7. [http://www.usenix.org...)
 
Line 1: Line 1:
 
 
==Full Title of Reference==
 
==Full Title of Reference==
  
Line 7: Line 6:
  
 
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Thomas_Martin:2006&f=wikibiblio.bib BibTeX]
 
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Thomas_Martin:2006&f=wikibiblio.bib BibTeX]
 
  
 
==Categorization==
 
==Categorization==

Revision as of 20:46, 27 May 2010

Full Title of Reference

The Underground Economy: Priceless

Rob Thomas and Jerry Martin, The Underground Economy: Priceless, ;login:, Dec. 2006, at 7. Web

BibTeX

Categorization

Issues: Economics of Cybersecurity

Key Words

underground economy, money, cash, statistics, criminal activity, crime, criminals, economics, cashiers, theft, IRC, prosecution

Synopsis

The underground economy is fertile ground for the pursuit and prosecution of the miscreants. Most of the underground economy servers are public, advertised widely, and easy to find (standard IRC ports, very descriptive DNS RRs, etc.). There is absolutely no presumption of privacy in the underground economy; the channels aren’t hidden, the channels have no keys, and the servers have no passwords. There is evidence of physical crime as well as online crime, and admissions of guilt, and all are readily available. Although the data in this article is obfuscated, these stanzas of gross fraud come with the name, address, phone number, SSN, and mother’s maiden name of the victim. That seems ready-made for a complaint. It is time to use the miscreants’ greatest asset, the underground economy, against them.

Additional Notes and Highlights