Crime Sourcing

From P2P Foundation
Jump to navigation Jump to search


Description

by Marc Goodman:

"The growing popularity of crowdsourcing has not gone unnoticed, either, by international organized crime groups and local neighborhood thugs, each of which is quickly updating its tactics to drive operational efficiencies. Welcome to the world of "crime-sourcing." Borrowing from Howe's concept, crime-sourcing can be defined as the act of taking the whole or part of a criminal act and outsourcing it to a crowd of either witting or unwitting individuals.

The growth in crime-sourcing is shaking up long-standing business models and traditions within the criminal underground and is leading to innovations in crime. For example, all organized crime groups have historically looked upon outsiders with great suspicion: don't trust somebody you don't know and who has not been vetted. Elaborate processes were established, such as the Mafia's Omertà, to ensure newcomers to the criminal enterprise were neither rats nor cops. It would often take years of robberies, loan sharking and murder to gain the trust and confidence of the "boss."


As the world turned to globalization, so too did organized crime. Their initial attempts were limited, but generally effective. Drug cartels in Latin American began to work with organized crime groups in Eastern Europe. The Japanese Yakuza and Chinese Triads developed ties and turned to one another for very specific tasks, such as carrying out a particular "hit" or laundering a large sum of money in a different jurisdiction. Though these disparate crime groups were located in different parts of the world, they found ways to build trust and work together in their joint illicit pursuits.

Eventually, specialties emerged and criminal enterprises learned to outsource all tasks not within their specific areas of expertise. For example, in a standard phishing operation, an organized crime group might commission the creation of a scam web page and contact a secondary broker to get a list of thousands of email addresses. Using another intermediary, the crime group would get access to a compromised computer and rent a botnet to distribute the spam emails for a period of agreed upon time, such as 12 or 24 hours.

As hapless victims readily provided their banking and credit card information, the data would be culled and forwarded to the contracting criminals. The crime group would likely rent a distributed proxy network to obfuscate their true locations and to run transactions against the compromised accounts.

Of course, all this money needs to be received, processed and laundered in a way that protects the criminal enterprise, and there are numerous illicit techniques for hiring unsuspecting participants to take on the task. The most common is to place an ad in a print newspaper or an online publication offering opportunities to "work from home" and make "quick money" as an "importer/exporter."

Using this ruse, organized crime groups have duped thousands into receiving stolen property at their homes and opening shell bank accounts in their own names. After the funds are received in the account of the unwary pawn, he is instructed to immediately send them overseas via Western Union exchange for a small fee or commission. In doing so, the crime groups have crowdsourced the most dangerous part of their business, leaving behind a trail of false leads for law enforcement to find." (http://radar.oreilly.com/2011/09/crime-sourcing.html)