Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-m8s7h Total loading time: 0 Render date: 2024-07-20T03:25:19.145Z Has data issue: false hasContentIssue false

16 - Illicit Market

Published online by Cambridge University Press:  04 February 2022

Get access

Summary

The illicit market is where the information about individuals ends up after it is stolen or hacked by criminals from any of the discussed domains, including data brokers. There are two primary types of illicit market activity: criminal networks and statesponsored data theft and collection. Criminal networks are more likely managing the stolen data in spreadsheets rather than “organizational databases.” Data from statesponsored theft are ending up in large databases and being correlated with other data sets from other sources, including publicly available data (Figure 16.1).

Relationship to Other Domains

Actors from the illicit market are actively involved in stealing data from all of the other domains articulated in this research.

Description of the Illicit Market

The illicit market is where data stolen by criminals from large databases of PII are traded. Just like the data broker industry, there is no enrollment process for individuals and no direct connection between individuals and the entities stealing their data. The main difference between the illicit market actors and the data broker industry is that data brokers operate legally, buying data from their sources and then reselling it to other legitimate businesses. The illicit market actors are stealing the data of people and using it for criminal activity themselves or repackaging the data to sell to criminal enterprises.

We can also compare this domain to the categories of surveillance. It is not voluntary known surveillance because people don't agree to it. If you actually know your data was stolen because of a data breach notification, your condition is similar to the involuntary known state of surveillance. Individuals who know their data has been stolen can take steps to try and mitigate harm with credit freezes and creditmonitoring services. When individuals do not know their data has been stolen, it is similar to involuntary unknown surveillance.

The information asymmetry created between an individual and the actors in the illicit market is very high. This is especially true given that it is an entirely illegal activity. So, unlike some data brokers, illicit market actors have little or no incentive to provide a way to see information they hold about individuals.

Type
Chapter
Information
The Domains of Identity
A Framework for Understanding Identity Systems in Contemporary Society
, pp. 103 - 106
Publisher: Anthem Press
Print publication year: 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×