Cyber-Enabled Financial Abuse of Older Americans: A

Total Page:16

File Type:pdf, Size:1020Kb

Cyber-Enabled Financial Abuse of Older Americans: A Cyber-Enabled Financial Abuse of Older Americans: A Public Policy Problem An interpretative framework investigating the social, economic, and policy characteristics of cyber-enabled older American financial abuse Christine Lyons A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Public Administration College of Public Affairs University of Baltimore Baltimore, Maryland December, 2019 This dissertation is dedicated to those who bravely shared their story with me in confidence. I am truly honored to be entrusted by you with the details of your financial and emotional trauma stemming from a time in your life so vividly painful. ACKNOWLEDGMENTS No one writes a dissertation without significant help from others and this is so very true with this endeavor. I would like to give a special thanks to three strong, admiralty intelligent, and hard-working women, my committee: Dr. Heather Wyatt- Nichol (chair), Dr. Lorenda Naylor, and Dr. Shelly Bumphus. Thank you for not giving up on me and encouraging me to continue to research a much under-studied public administration topic. Without your support, this dissertation would not be finished. I wish to express my thanks to Ms. Nina Helwig; the Adult Protective Services of Montgomery County, MD; and the Fraud Department of the Montgomery County, MD Police. I am also thankful for the time and assistance from Dr. Richard Mestas, as well as two of the best research librarians – Ms. Elizabeth Ventura and Mr. Andrew Wheeler, I am unable to adequately express my gratitude for the unwavering and unconditional support from my life partner of almost forty years, Clint Lyons; our son Clinton, his wife Annie, and our grandchildren CJ, Gabby, Natalie, and Alex; and our daughter Mary-Michael. I love you all beyond words. iv ABSTRACT Cyber-Enabled Financial Abuse of Older Americans: A Public Policy Problem Christine Lyons Global cybercrime and cyber-enabled crime costs more than $400 billion annually with an estimated cost to the US of over $120 billion dollars annually. With the spread of cyber-enabled crime, a troubling trend has evolved in which the victim is unknowingly complicit in the offence. These incidents have arisen as an evolving public policy challenge at all levels of government, including municipal, county, state, federal, and global. This dissertation examines the social, economic, and policy characteristics of cyber-enabled elder financial abuse. Elder financial abuse perpetrated over the Internet straddles two challenging areas of public policy: cybercrime and elder abuse. In the context of cyber-enabled crime, this study first explains the mechanisms whereby individuals fall prey to abuse and second; conducts an older American cyber-safety needs assessment, which collects information to identify the extent to which regulatory policies either mitigate or contribute to the financial abuse of older citizens. v TABLE OF CONTENTS LIST OF TABLES ............................................................................................................ xii LIST OF FIGURES ......................................................................................................... xiii Introduction ......................................................................................................................... 1 Exposed Consumer Data Leads to Consumer Losses ................................................... 9 Applicability to Public Administration ........................................................................ 11 Statement of the Problem ............................................................................................ 14 Why Study Cyber-Enabled Abuse of Older Americans? ............................................ 15 Finances in Retirement ................................................................................................ 16 Active Use of Technology by Older Americans ......................................................... 18 Background of Cyber-Enabled Financial Abuse ......................................................... 19 Unwitting Self-Victimization ................................................................................ 19 Public Service Delivery and Information Communication Technology ............... 20 Cyberattack-Gleaned Data ..................................................................................... 21 Organizational Responses to Data Theft ............................................................... 21 Privacy and Data Brokers ...................................................................................... 22 Big Data ................................................................................................................. 24 Data Brokers’ Use of Consumers’ Data ................................................................ 26 Legal Consequences .............................................................................................. 29 Behavioral Economics ........................................................................................... 31 vi Reanonymizing Data ............................................................................................. 35 Purpose of the Study .................................................................................................... 36 Conceptual Framework of Cyber-Enabled Elder Financial Abuse Theory ................. 36 Theoretical Framework ................................................................................................ 38 Grooming of the Victim .............................................................................................. 40 Review of the Literature .................................................................................................... 44 Information and Communication Technologies .......................................................... 45 The Perpetrator ............................................................................................................ 56 Classifications of Cybercrime and Cybercriminals ............................................... 56 Limitations of Law Enforcement ........................................................................... 77 The Victim ................................................................................................................... 80 Persuasion and Trustworthiness ............................................................................ 84 Older Americans as a Cohort ............................................................................... 101 Financial Exploitation .......................................................................................... 103 Cognitive Function and Grooming ...................................................................... 106 Victim Services .................................................................................................... 112 The Internet and Law ................................................... Error! Bookmark not defined. The Historical Framework ......................................................................................... 118 Statement of the Research Problem and Significance of the Research ..................... 125 Methodology .................................................................................................................... 126 The Survey: Justification for Narratives and Case Studies ....................................... 127 Law and Document Analysis ..................................................................................... 130 Process Tracing .......................................................................................................... 130 vii Conceptual Framework .............................................................................................. 135 Types of Data ............................................................................................................. 137 Data Collection .......................................................................................................... 138 Data Sources ........................................................................................................ 139 Data Collection Methods ..................................................................................... 139 Data Analysis ............................................................................................................. 140 Assumptions and Strengths and Limitations of the Study ......................................... 140 Assumptions ........................................................................................................ 140 Strengths and Limitations .................................................................................... 141 Results ............................................................................................................................. 142 Internet Crime Complaint Center Results ................................................................. 143 Survey Results ........................................................................................................... 147 Characteristics of Respondents ............................................................................ 148 Sentiment from the Survey .................................................................................. 158 Interviews and Case Study Analyses ......................................................................... 158 Characteristics of the Victims .............................................................................
Recommended publications
  • Effect of Pyramid Schemes to the Economy of the Country - Case of Tanzania
    International Journal of Humanities and Management Sciences (IJHMS) Volume 5, Issue 1 (2017) ISSN 2320–4044 (Online) Effect of pyramid schemes to the Economy of the Country - Case of Tanzania Theobald Francis Kipilimba come up with appropriate laws and mechanisms that will stop Abstract— Pyramid scheme, in their various forms, are not a those unscrupulous people praying on unsuspecting new thing in the world, however, they have reared their ugly individuals. Help supervisory institutions formulate menacing heads‘ in the Tanzanians society only recently. Before the appropriate policies that will require all investment plans to Development entrepreneurship Community Initiative (DECI) debacle be documented, filed and thoroughly scrutinized and come up other schemes such as Women Empowering, woman had already with the ways to recover assets of the culprits and use them to racked havoc in the society.This study intended to evaluate the extent compensate the victims of get rich quick schemes. to which Tanzanians knew about the pyramid schemes operating in the world, their participation in these schemes and their general feelings towards the scammers, our judicial system and the course II. BASIC VIEW OF PYRAMID SCHEME action they are likely to take in the event they are scammed. Results Pyramid scheme is a fraudulent moneymaking scheme in show that most Tanzanians are very naïve when it comes to pyramid which people are recruited to make payments to others above schemes, with very scant knowledge about these schemes. Many do them in a hierocracy while expecting to receive payments not know if they have participated in these schemes but in those instances that they had, they suffered huge financial losses.
    [Show full text]
  • Office of the Attorney -General
    OFFICE- OF THE,, ATTORNEY- - ---- -GENERAL I -- ' . Department of Law , . - I - Fi~cal ,Year 1993 Annual Report Grant Woods - -A!torney Genera_} Grant Woods Attorney General Robert B. Carey J.M. Howard First Assistant Attorney General Special Counsel Civil Division · Criminal Division H. Leslie Hall Michael C. Cudahy Chief Counsel Chief Counsel Human Services Division Management Services Cecil B. Patterson Thomas G. Augherton Chief Counsel Chief of Administration TRANSMITTAL LETTER STATE OF ARIZONA OFFICE OF THE ATTORNEY GENERAL GRANT WOODS MAIN PHONE: 542-5025 ATTORNEY GENERAL 1275 WEST WASHINGTON, PHOENIX 85007-2926 TELECOPIER : 542-4085 November 5, 1993 The Honorable J. Fife Symington Governor of Arizona State Capitol, Executive Tower 1700 W. Washington Phoenix, Arizona 85007 Dear Governor Symington: I am pleased to submit to you the annual report of the Office of the Attorney General, as required by ARS § 41-194(B). During the past fiscal . year, this administration continued its focus of protecting Arizona's citizens through aggressive enforcement of state laws and providing quality legal representation to state agencies. We have vigorously defended Arizona's environment by prosecuting those that destroy our natural resources, pursued dozens of companies and individuals who prey on unsuspecting consumers, and convicted many notorious criminals for the heinous crimes they perpetrated. We concentrated our administrative efforts into implementing cost-saving measures that allow us to prioritize our resources into retaining and compensating top-quality \egal staff. Loss of well-trained, experienced attorneys from the Attorney General's Office to higher paying private and public sector positions continues to be a problem that requires close scrutiny by the Legislature.
    [Show full text]
  • Holiday Scams November 2020.Pptx
    Holiday SCAMS COMING TO YOU! MONTGOMERY COUNTY OFFICE OF CONSUMER PROTECTION CONSUMER@MONTGOMERYCOUNTYM D.GOV WHAT WE DO • Handle disputes between merchants and consumers • Provide consumer specialists by phone or in-person • Enforce the County’s consumer protec<on laws • Educaon and Outreach to the Community • License and Regulate certain businesses GENERAL STATISTICS • In 2019, es<mate 50% of all calls to cell phones are from robo- dialers. • In 2019, econsumer.gov had 40,432 reports of internaonal scams, with reported losses exceeding $151 million. •Also in 2019, the Consumer Sen<nel database revealed that 91,560 people reported losing more than $276.5 million to scams based outside the U.S. COVID SCAM STATISTICS • In June 2020, Hetherington Group reported that in NY and NJ alone, ~100 seniors paid over $1M for the grandparent scam (emergency funds to pay for a hospital bill or bail to avoid jail infested with COVID-19). • Per Checkphish, 180k fake IRS websites created to steal your smulus money. • FTC has issued over 200 warning leaers for bogus preven<on and cures. • KY reported fake drive-up COVID tes<ng for insurance data. • MD issued a warning on fake charity scams. • FTC issued warnings about popup websites selling PPE but never shipping. • WSSC issued alert about unnecessary water filters WHO’S TARGETED? Seniors have historically been targeted because: • Seniors have a “nest egg” • Seniors were raised to be polite and trus<ng • Seniors are less likely to report a fraud • Seniors are more likely to live alone “Millennials” are
    [Show full text]
  • Gangs Beyond Borders
    Gangs Beyond Borders California and the Fight Against Transnational Organized Crime March 2014 Kamala D. Harris California Attorney General Gangs Beyond Borders California and the Fight Against Transnational Organized Crime March 2014 Kamala D. Harris California Attorney General Message from the Attorney General California is a leader for international commerce. In close proximity to Latin America and Canada, we are a state laced with large ports and a vast interstate system. California is also leading the way in economic development and job creation. And the Golden State is home to the digital and innovation economies reshaping how the world does business. But these same features that benefit California also make the state a coveted place of operation for transnational criminal organizations. As an international hub, more narcotics, weapons and humans are trafficked in and out of California than any other state. The size and strength of California’s economy make our businesses, financial institutions and communities lucrative targets for transnational criminal activity. Finally, transnational criminal organizations are relying increasingly on cybercrime as a source of funds – which means they are frequently targeting, and illicitly using, the digital tools and content developed in our state. The term “transnational organized crime” refers to a range of criminal activity perpetrated by groups whose origins often lie outside of the United States but whose operations cross international borders. Whether it is a drug cartel originating from Mexico or a cybercrime group out of Eastern Europe, the operations of transnational criminal organizations threaten the safety, health and economic wellbeing of all Americans, and particularly Californians.
    [Show full text]
  • Asia-Europe Meeting
    Asia-Europe Meeting Topic A: Identifying, Sharing and Remediating Faults in Cybersecurity Topic B: Tackling Local, Regional and Global Hunger MUNUC 32 TABLE OF CONTENTS ______________________________________________________ Letter from the Chair………………………………………………………….. 3 Topic A ………………………………………………………………………..… 4 Statement of the Problem…………………………………………….. 4 History of the Problem……………………………………….…..…….. 9 Past Actions…………………………………………………………….. 14 Possible Solutions………………………………………………………. 18 Bloc Positions…………………………………………………………… 20 Glossary…………………………………………………………………. 22 Topic B ………………………………………………………………...………. 23 Statement of the Problem…………………………………………….23 History of the Problem………………………………………………… 28 Past Actions…………………………………………………………….. 31 Possible Solutions………………………………………………………. 33 Bloc Positions…………………………………………………………… 35 Glossary…………………………………………………………………. 37 Bibliography……………………………………….…………………………. 38 2 Asia-Europe Meeting | MUNUC 32 LETTER FROM THE CHAIR ______________________________________________________ Dear Delegates, Welcome to the Asia-Europe Meeting Forum, or ASEM, at MUNUC 32! My name is Randolph Ramirez, and I usually go by Randy. I am a third year here at The University of Chicago studying Statistics and Political Science. I was born and raised in Wilton, Connecticut, and coming out to attend UChicago was my first trip out to Illinois! All throughout high school I was heavily involved in Model Congress, and partaking in MUNUC my first year here helped transition me into the world of Model UN! I am certain that this conference and committee will be a success, and I cannot wait to experience it with you all! The Asia-Europe Meeting Forum will offer a multitude of experiences, problems, solutions, and overall will hopefully give a descriptive look into the affairs of the two regions. Throughout this experience, I hope delegates learn the various factors that make solving the issues of cybersecurity and huger instability a difficult endeavor, and how best to go about solving them.
    [Show full text]
  • Universita' Degli Studi Di Padova
    UNIVERSITA’ DEGLI STUDI DI PADOVA DIPARTIMENTO DI SCIENZE ECONOMICHE ED AZIENDALI “M. FANNO” CORSO DI LAUREA MAGISTRALE IN BUSINESS ADMINISTRATION – ECONOMIA E DIREZIONE AZIENDALE TESI DI LAUREA “ONLINE SELLING STRATEGIES: THE MATRIX SCHEME CASE” RELATORE: CH.MO PROF. STEFANO GALAVOTTI LAUREANDO: CARLO BASSAN MATRICOLA N. 1130364 ANNO ACCADEMICO 2017 – 18 Il candidato dichiara che il presente lavoro è originale e non è già stato sottoposto, in tutto o in parte, per il conseguimento di un titolo accademico in altre Università italiane o straniere. Il candidato dichiara altresì che tutti i materiali utilizzati durante la preparazione dell’elaborato sono stati indicati nel testo e nella sezione “Riferimenti bibliografici” e che le eventuali citazioni testuali sono individuabili attraverso l’esplicito richiamo alla pubblicazione originale. Firma dello studente _________________ TABLE OF CONTENTS INTRODUCTION 1 CHAPTER 1 FEATURES OF NEW MECHANISM OF SALES 3 1.1 E-commerce era characteristics 3 1.2 The matrix schemes case: a genuine cooperation among customers? 5 1.3 Comparison with other similar schemes 13 1.3.1 Pyramid scheme 13 1.3.2 Ponzi scheme 15 1.3.3 Multi-level marketing 19 1.3.4 Referral programs 21 1.3.5 Differences among schemes 22 1.4 Legal issue 24 CHAPTER 2 A MODEL WITH THREE ROUNDS 26 2.1 The Model 26 2.2 Equilibrium analysis 27 2.3 Seller’s profit 32 2.4 Cooperation among players 36 CHAPTER 3 ADDING ONE MORE ROUND 42 3.1 Equilibrium analysis 42 3.2 Seller’s profit 48 3.3 Comparison with case A 50 CHAPTER 4 THE RELEVANCE OF
    [Show full text]
  • Special Committee Report
    REPORT OF THE 2009 SPECIAL REVIEW COMMITTEE ON FINRA’S EXAMINATION PROGRAM IN LIGHT OF THE STANFORD AND MADOFF SCHEMES SEPTEMBER 2009 SPECIAL REVIEW COMMITTEE Charles A. Bowsher (Chairman) ———————————— Ellyn L. Brown ———————————— Harvey J. Goldschmid ———————————— Joel Seligman ———————————— INDUSTRY GOVERNOR ADVISERS OF COUNSEL Mari Buechner Paul V. Gerlach W. Dennis Ferguson Griffith L. Green G. Donald Steel Dennis C. Hensley Michael A. Nemeroff SIDLEY AUSTIN LLP 1501 K Street, NW Washington, DC 20005 TABLE OF CONTENTS I. EXECUTIVE SUMMARY .............................................................................................. 1 A. The Stanford Case................................................................................................. 2 B. The Madoff Case................................................................................................... 4 C. Recommendations................................................................................................. 6 II. BACKGROUND ON FINRA EXAMINATION PROGRAM...................................... 9 III. EXAMINATIONS OF MEMBER FIRMS INVOLVED IN THE STANFORD AND MADOFF SCANDALS.................................................................. 11 A. The Stanford Case............................................................................................... 12 1. Background............................................................................................... 12 2. Daniel Arbitration and 2003 Cycle Examination...................................... 13 3. 2003
    [Show full text]
  • Stanford Ponzi Scheme: Lessons for Protecting Investors from the Next Securities Fraud
    THE STANFORD PONZI SCHEME: LESSONS FOR PROTECTING INVESTORS FROM THE NEXT SECURITIES FRAUD HEARING BEFORE THE SUBCOMMITTEE ON OVERSIGHT AND INVESTIGATIONS OF THE COMMITTEE ON FINANCIAL SERVICES U.S. HOUSE OF REPRESENTATIVES ONE HUNDRED TWELFTH CONGRESS FIRST SESSION MAY 13, 2011 Printed for the use of the Committee on Financial Services Serial No. 112–30 ( U.S. GOVERNMENT PRINTING OFFICE 66–868 PDF WASHINGTON : 2011 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Nov 24 2008 17:24 Aug 25, 2011 Jkt 066868 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 K:\DOCS\66868.TXT TERRIE HOUSE COMMITTEE ON FINANCIAL SERVICES SPENCER BACHUS, Alabama, Chairman JEB HENSARLING, Texas, Vice Chairman BARNEY FRANK, Massachusetts, Ranking PETER T. KING, New York Member EDWARD R. ROYCE, California MAXINE WATERS, California FRANK D. LUCAS, Oklahoma CAROLYN B. MALONEY, New York RON PAUL, Texas LUIS V. GUTIERREZ, Illinois DONALD A. MANZULLO, Illinois NYDIA M. VELA´ ZQUEZ, New York WALTER B. JONES, North Carolina MELVIN L. WATT, North Carolina JUDY BIGGERT, Illinois GARY L. ACKERMAN, New York GARY G. MILLER, California BRAD SHERMAN, California SHELLEY MOORE CAPITO, West Virginia GREGORY W. MEEKS, New York SCOTT GARRETT, New Jersey MICHAEL E. CAPUANO, Massachusetts RANDY NEUGEBAUER, Texas RUBE´ N HINOJOSA, Texas PATRICK T. MCHENRY, North Carolina WM. LACY CLAY, Missouri JOHN CAMPBELL, California CAROLYN MCCARTHY, New York MICHELE BACHMANN, Minnesota JOE BACA, California THADDEUS G. McCOTTER, Michigan STEPHEN F.
    [Show full text]
  • Financial Abuse of Elderly People Vs. Other Forms of Elder Abuse: Assessing Their Dynamics, Risk Factors, and Society's Respon
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Financial Abuse of Elderly People vs. Other Forms of Elder Abuse: Assessing Their Dynamics, Risk Factors, and Society’s Response Author: Shelly L. Jackson, Ph.D., Thomas L. Hafemeister, J.D., Ph.D. Document No.: 233613 Date Received: February 2011 Award Number: 2006-WG-BX-0010 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Final Report Presented to the National Institute of Justice Financial Abuse of Elderly People vs. Other Forms of Elder Abuse: Assessing Their Dynamics, Risk Factors, and Society’s Response Shelly L. Jackson, Ph.D. & Thomas L. Hafemeister, J.D., Ph.D. University of Virginia Supported under award No. 2006-WG-BX-0010 from the National Institute of Justice, U.S. Department of Justice August 2010 Points of view in this paper are those of the authors and do not necessarily represent the official position of the U.S.
    [Show full text]
  • The Nutshell Studies of Unexplained Death Stephanie Witt
    School of Graduate and Professional Studies 100 Campus Circle, Owings Mills, Maryland 21117 1-877-468-6852 accelerate.stevenson.edu STEVENSON UNIVERSITY FORENSICS JOURNAL VOLUME 4 EDITORIAL BOARD EDITOR-IN-CHIEF Carolyn Hess Johnson, Esq. PUBLISHER Carolyn Hess Johnson, Esq. EDITORS Abigail Howell Stephanie Witt COVER PHOTO Bruce Goldfarb Assistant to the Chief Medical Examiner, Maryland DESIGN & LAYOUT Chip Burkey Cassandra Bates Stevenson University Marketing and Public Relations Office Copyright © 2013, author(s) and Stevenson University Forensics Journal. No permission is given to copy, distribute or reproduce this article in any format without prior explicit written permission from the article’s author(s) who hold exclusive rights to impose usage fee or royalties. FORENSICS JOURNAL Welcome to our fourth annual Stevenson University Forensics Journal. This year, as always, we bring fresh voices and perspectives from all aspects and areas of the field. I am pleased to note that a new section has been added this year, highlighting the process of library research in the vast field of Forensic Studies. Our Stevenson University librarians bring the research pro- cess into the twenty-first century by showcasing a variety of on-line resources available to researchers. Also of note is the connection between our cover photo and the interview conducted with Dr. David Fowler, Chief Medical Examiner for the State of Maryland. Assistant Editor Stephanie Witt joins the Journal as a contributor to explain the fascinating Nutshell Series of Unexplained Deaths. We are privileged this year to have the Honorable Lynne A. Battaglia providing her insights into the Court’s perspective on the prominent role of forensic evidence in modern litigation.
    [Show full text]
  • Cyber Romance Scam Victimization Analysis Using Routine Activity Theory Versus Apriori Algorithm
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 12, 2018 Cyber Romance Scam Victimization Analysis using Routine Activity Theory Versus Apriori Algorithm Mohd Ezri Saad1 Siti Norul Huda Sheikh Abdullah2, Mohd Zamri Murah3 Commercial Crime Investigation Department Center for Cyber Security Faculty of Information Royal Malaysia Police, Bukit Aman Science and Technology Bangi, Kuala Lumpur, Malaysia Selangor, Malaysia Abstract—The advance new digital era nowadays has led to These cyber romance scams has fraud Australians out of the increasing cases of cyber romance scam in Malaysia. These millions every years [1], [5]. No exception to Malaysia that technologies have offered both opportunities and challenge, has been the top 6 countries that recorded highest number of depending on the purpose of the user. To face this challenge, the cybercrime cases, with total loses reaching RM1 billion key factors that influence the susceptibility to cyber romance (Source: Bernama Report in 2014). Other countries like scam need to be identified. Therefore, this study proposed cyber Taiwan, China, Thailand, Indonesia and Hong Kong also were romance scam models using statistical method and Apriori listed together. While, Sophos Threat Report in 2014 stated techniques to explore the key factors of cyber romance scam that cybercrime attacks have been increased in the first quarter victimization based on the real police report lodged by the of 2014 and 81% of them happened in Malaysia. This victims. The relationship between demographic variables such as phenomenon was in line with the rapid growth of Malaysia's age, education level, marital status, monthly income and independent variables such as level of computer skills and the digital economy [6].
    [Show full text]
  • Is the Mafia Taking Over Cybercrime?*
    Is the Mafia Taking Over Cybercrime?* Jonathan Lusthaus Director of the Human Cybercriminal Project Department of Sociology University of Oxford * This paper is adapted from Jonathan Lusthaus, Industry of Anonymity: Inside the Business of Cybercrime (Cambridge, Mass. & London: Harvard University Press, 2018). 1. Introduction Claims abound that the Mafia is not only getting involved in cybercrime, but taking a leading role in the enterprise. One can find such arguments regularly in media articles and on blogs, with a number of broad quotes on this subject, including that: the “Mafia, which has been using the internet as a communication vehicle for some time, is using it increasingly as a resource for carrying out mass identity theft and financial fraud”.1 Others prescribe a central role to the Russian mafia in particular: “The Russian Mafia are the most prolific cybercriminals in the world”.2 Discussions and interviews with members of the information security industry suggest such views are commonly held. But strong empirical evidence is rarely provided on these points. Unfortunately, the issue is not dealt with in a much better fashion by the academic literature with a distinct lack of data.3 In some sense, the view that mafias and organised crime groups (OCGs) play an important role in cybercrime has become a relatively mainstream position. But what evidence actually exists to support such claims? Drawing on a broader 7-year study into the organisation of cybercrime, this paper evaluates whether the Mafia is in fact taking over cybercrime, or whether the structure of the cybercriminal underground is something new. It brings serious empirical rigor to a question where such evidence is often lacking.
    [Show full text]