Periodic Reporting for period 2 - iCrime (Interdisciplinary Cybercrime Project)
Reporting period: 2023-01-01 to 2024-06-30
The research staff and doctoral students engaged in this interdisciplinary project integrate skills and tools from criminology and computer science. From computer science we leverage: machine learning and natural language processing (NLP) to classify massive datasets; tools to automate the detection of, and measure change in, criminal infrastructure; and technical knowledge about complex cybercrimes and how to prevent them. Criminology provides frameworks for theorising about offenders’ involvement in crime, and how crimes may be prevented, as well as methodologies to evaluate the effects of interventions designed to disrupt crime.
For the second component, cybercrime types, we analyse how cybercrime changes in response to externalities, as well as new and emerging aspects of cybercrime. We analyse web defacement and DDoS attacks before and after the Russian invasion of Ukraine. We found the conflict briefly but significantly caught the attention of the low-level cybercrime community, with notable shifts in the geographical distribution of both attack types. We have also investigated the evolution of investment scam lures and scam-related keywords at scale longitudinally (over 13 years) and across multiple platforms. We used NLP approaches to classify threads into four categories: overt scams, potential scams, scam comments and not investment scam related. During the COVID-19 pandemic we find scam invitations increased, as well as the type of strategies used to lure victims.
The third component uses place as the unit of analysis. We have researched the use of argot, or slang, within cybercrime communities. We apply signalling theory to explore how argot (slang and jargon) is used to signal trust in untrustworthy environments. Our findings indicate forum users are using argot to overcome the cold start problem, a conundrum faced by new entrants to markets with feedback systems. We also analyse music shared on underground forums. While we find little evidence of the glamorisation of cybercrime, lyrics often depict a ‘gangster’ lifestyle, including the promotion of violence.
In the fourth component, cybercrime responses, we evaluate the effects of cybercrime responses. We measured the impact of the community-led disruption of a hate and harassment forum. This intervention resulted in the forum becoming unavailable for some time, although it has since re-emerged. The campaign raises issues about how the industry deals with coordinated abuse. We have also evaluated the anti-stalking features of tracking devices using a naturalistic quasi-experimental gamified design. We find that most users are not aware of anti-stalking features, and even when users were aware of them and would benefit from their use, if not enabled by default they were rarely used.
In Component 1: Cybercrime offenders, the research challenges prevailing notions of cybercriminal sophistication and highlights how this misrepresentation distorts criminological analysis. Additionally, we provide crucial evidence in the debate around the role of autism in cybercrime offending. In our ongoing work, we aim understand not only why people commit cybercrime, but also why people do not pursue this potentially lucrative opportunity.
Component 2: Cybercrime types introduces innovative research methodologies in analysing the evolution of investment scam tactics longitudinally and across platforms. The use of NLP approaches to classify scam-related threads and the identification of shifting scam tactics over time, including the influence of the COVID-19 pandemic, represent advancements in understanding cybercrime trends and strategies.
Component 3: We explore new territory by examining the role of online spaces as facilitators of cybercriminal activities. We developed an argot detection tool and develop our understanding of trust dynamics within cybercrime communities. We currently have work in progress to understand how third party modded app markets are being used maliciously, such as enabling premium features without payment, distributing malware and keyloggers, or changing advertiser ID to siphon advertising revenue.
In Component 4: Cybercrime responses, the evaluation of anti-stalking features in tracking devices provides not only methodological developments (through our unique research design), but also actionable findings that have been adopted by industry. We have ongoing work with law enforcement in relation to the provision of denial of service attacks for a fee.
 
           
        