Abstract
This research takes a closer look at online tools that anti-scam activists use when in contact with Internet scammers. These tools are used for defining one’s online character, for progressing the narrative or maintaining anonymity while uncovering the scammer’s identity. The tools are easy to use and, when combined together, they offer powerful methods to narrate stories online. This research draws mostly upon primary sources, like interviews with scambaiters or Internet forums, where scambaiters share their stories and discuss the authenticity of dubious online businesses. The discussed methods and tools are utilized while communicating with scammers. In conclusion, this paper illustrates how these tools can also used in other genres such as digital fiction, investigative journalism and advocacy.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Advance fee fraud coalition AFF, http://affcoalition.org/
Channel 4, Secrets of the Scammers (January 2, 2014), http://youtu.be/KoTNuZmF_ws
Cms, Simo, Post an Neonazis: FP-Politiker unter Verdacht, (March 8, 2011), http://derstandard.at/1297819867094/Post-an-Neonazis-FP-Politiker-unter-Verdacht
Cox, J.: Mexico’s drug cartels love Social Media (November 4, 2013), http://www.vice.com/en_uk/read/mexicos-drug-cartels-are-using-the-internet-to-get-up-to-mischief
Crates, J.: ATF and D.C. Police Impersonate Rap Label; Arrest 70 in Year Long Guns and Drug Sting (December 19, 2011), http://allhiphop.com/2011/12/19/atf-and-d-c-police-impersonate-rap-label-arrest-70-in-year-long-guns-and-drug-sting/
Crawford, A.: Computer-generated ‘Sweetie’ catches online predators (November 5, 2013), http://www.bbc.co.uk/news/uk-24818769
Deceglie, A., Robertson, K.: Taliban using Facebook to lure Aussie soldier (Sepember 9, 2012), http://www.dailytelegraph.com.au/taliban-using-facebook-to-lure-aussie-soldier/story-e6freuy9-1226468094586
Fukuyama, F.: Trust: The social virtues and the creation of prosperity, pp. 61–67. Free Press, New York (1995)
Greenwald, G.: XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’. The Guardian (2013)
Hoeller, H.: Threatening fake news. Springerin (2012), http://www.springerin.at/dyn/hefttext.phptextid=2695&lang=en
Maher, J.: Police create fake Facebook profiles to bust criminals ( September 6, 2012), http://archive.news10.net/news/world/208252/5/Police-using-controversial-social-media-tactic-to-bust-criminals
Pearson, E.: All the World Wide Webs a stage: The performance of identity in online social networks. First Monday14(3) (March 2, 2009), http://firstmonday.org/ojs/index.php/fm/article/view/2162/2127
Lambert, J.: Digital Storytelling. Capturing Lives, Creating Community. Digital Diner Press, Berkeley
Milestone, K.: Catching rats - Sporting scambaiters turntables on foreign scammers (April 3, 2007), http://articles.chicagotribune.com/2007-04-03/features/0704030230_1_scammers-con-artists-fraud-center/2
Poulsen, K.: If You Used This Secure Webmail Site, the FBI Has Your Inbox (January 27, 2014), http://www.wired.com/threatlevel/2014/01/tormail/
Renov, M. (ed.): Theorizing Documentary. Routledge, New York (1993)
Schneier, B.: Liars and outliers: enabling the trust that society needs to thrive. John Wiley & Sons (2012)
Stoate, R.: Internet Detectives: Performativity and Policing Authenticity on the Internet (2007), http://dichtung-digital.de/2007/Stoate/stoate.htm
Kelly, H.: Police embrace social media as crime-fighting tool (August 30, 2012), http://edition.cnn.com/2012/08/30/tech/social-media/fighting-crime-social-media/
Waddilove, R.: What’s the best free email service? We compare the top 6 providers (March 10, 2014), http://www.pcadvisor.co.uk/features/internet/3448241/whats-the-best-free-email-service/?pn=1
Waterman, S.: Fictitious femme fatale fooled cybersecurity (July 18, 2010), http://www.washingtontimes.com/news/2010/jul/18/fictitious-femme-fatale-fooled-cybersecurity/
Wilhelm, A.: Vice leaves metadata in photo of John McAfee, pin-pointing him to a location in Guatemala, Thenextweb Online Insider (December 3, 2012), http://thenextweb.com/insider/2012/12/03/vice-leaves-metadata-in-photo-of-john-mcafee-pinpointing-him-to-a-location-in-guatemala/2012/
Zingerle, A.: Towards a characterization of scambaiting techniques. International Journal of Art, Culture and Design Technologies (IJACDT), IGI-Global, doi:10.4018/IJACDT
Zingerle, A.: The Art of Trickery: Methods to establish first contact in Internet scams. In: xCoAx Conference, Porto, Portugal (June 26, 2014)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Zingerle, A. (2014). Remain Anonymous, Create Characters and Backup Stories: Online Tools Used in Internet Crime Narratives. In: Mitchell, A., Fernández-Vara, C., Thue, D. (eds) Interactive Storytelling. ICIDS 2014. Lecture Notes in Computer Science, vol 8832. Springer, Cham. https://doi.org/10.1007/978-3-319-12337-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-12337-0_8
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12336-3
Online ISBN: 978-3-319-12337-0
eBook Packages: Computer ScienceComputer Science (R0)