Remain Anonymous, Create Characters and Backup Stories: Online Tools Used in Internet Crime Narratives

  • Andreas Zingerle
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8832)

Abstract

This research takes a closer look at online tools that anti-scam activists use when in contact with Internet scammers. These tools are used for defining one’s online character, for progressing the narrative or maintaining anonymity while uncovering the scammer’s identity. The tools are easy to use and, when combined together, they offer powerful methods to narrate stories online. This research draws mostly upon primary sources, like interviews with scambaiters or Internet forums, where scambaiters share their stories and discuss the authenticity of dubious online businesses. The discussed methods and tools are utilized while communicating with scammers. In conclusion, this paper illustrates how these tools can also used in other genres such as digital fiction, investigative journalism and advocacy.

Keywords

419scam scambaiting digital narratives Internet fiction Computer mediated communication online communities 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Advance fee fraud coalition AFF, http://affcoalition.org/
  2. 2.
    Channel 4, Secrets of the Scammers (January 2, 2014), http://youtu.be/KoTNuZmF_ws
  3. 3.
    Cms, Simo, Post an Neonazis: FP-Politiker unter Verdacht, (March 8, 2011), http://derstandard.at/1297819867094/Post-an-Neonazis-FP-Politiker-unter-Verdacht
  4. 4.
    Cox, J.: Mexico’s drug cartels love Social Media (November 4, 2013), http://www.vice.com/en_uk/read/mexicos-drug-cartels-are-using-the-internet-to-get-up-to-mischief
  5. 5.
    Crates, J.: ATF and D.C. Police Impersonate Rap Label; Arrest 70 in Year Long Guns and Drug Sting (December 19, 2011), http://allhiphop.com/2011/12/19/atf-and-d-c-police-impersonate-rap-label-arrest-70-in-year-long-guns-and-drug-sting/
  6. 6.
    Crawford, A.: Computer-generated ‘Sweetie’ catches online predators (November 5, 2013), http://www.bbc.co.uk/news/uk-24818769
  7. 7.
    Deceglie, A., Robertson, K.: Taliban using Facebook to lure Aussie soldier (Sepember 9, 2012), http://www.dailytelegraph.com.au/taliban-using-facebook-to-lure-aussie-soldier/story-e6freuy9-1226468094586
  8. 8.
    Fukuyama, F.: Trust: The social virtues and the creation of prosperity, pp. 61–67. Free Press, New York (1995)Google Scholar
  9. 9.
    Greenwald, G.: XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’. The Guardian (2013)Google Scholar
  10. 10.
    Hoeller, H.: Threatening fake news. Springerin (2012), http://www.springerin.at/dyn/hefttext.phptextid=2695&lang=en
  11. 11.
    Maher, J.: Police create fake Facebook profiles to bust criminals ( September 6, 2012), http://archive.news10.net/news/world/208252/5/Police-using-controversial-social-media-tactic-to-bust-criminals
  12. 12.
    Pearson, E.: All the World Wide Webs a stage: The performance of identity in online social networks. First Monday14(3) (March 2, 2009), http://firstmonday.org/ojs/index.php/fm/article/view/2162/2127
  13. 13.
    Lambert, J.: Digital Storytelling. Capturing Lives, Creating Community. Digital Diner Press, BerkeleyGoogle Scholar
  14. 14.
    Milestone, K.: Catching rats - Sporting scambaiters turntables on foreign scammers (April 3, 2007), http://articles.chicagotribune.com/2007-04-03/features/0704030230_1_scammers-con-artists-fraud-center/2
  15. 15.
    Poulsen, K.: If You Used This Secure Webmail Site, the FBI Has Your Inbox (January 27, 2014), http://www.wired.com/threatlevel/2014/01/tormail/
  16. 16.
    Renov, M. (ed.): Theorizing Documentary. Routledge, New York (1993)Google Scholar
  17. 17.
    Schneier, B.: Liars and outliers: enabling the trust that society needs to thrive. John Wiley & Sons (2012)Google Scholar
  18. 18.
    Stoate, R.: Internet Detectives: Performativity and Policing Authenticity on the Internet (2007), http://dichtung-digital.de/2007/Stoate/stoate.htm
  19. 19.
    Kelly, H.: Police embrace social media as crime-fighting tool (August 30, 2012), http://edition.cnn.com/2012/08/30/tech/social-media/fighting-crime-social-media/
  20. 20.
    Waddilove, R.: What’s the best free email service? We compare the top 6 providers (March 10, 2014), http://www.pcadvisor.co.uk/features/internet/3448241/whats-the-best-free-email-service/?pn=1
  21. 21.
    Waterman, S.: Fictitious femme fatale fooled cybersecurity (July 18, 2010), http://www.washingtontimes.com/news/2010/jul/18/fictitious-femme-fatale-fooled-cybersecurity/
  22. 22.
    Wilhelm, A.: Vice leaves metadata in photo of John McAfee, pin-pointing him to a location in Guatemala, Thenextweb Online Insider (December 3, 2012), http://thenextweb.com/insider/2012/12/03/vice-leaves-metadata-in-photo-of-john-mcafee-pinpointing-him-to-a-location-in-guatemala/2012/
  23. 23.
    Zingerle, A.: Towards a characterization of scambaiting techniques. International Journal of Art, Culture and Design Technologies (IJACDT), IGI-Global, doi:10.4018/IJACDTGoogle Scholar
  24. 24.
    Zingerle, A.: The Art of Trickery: Methods to establish first contact in Internet scams. In: xCoAx Conference, Porto, Portugal (June 26, 2014)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Andreas Zingerle
    • 1
  1. 1.University of Art and DesignLinzAustria

Personalised recommendations