Cybercriminal Networks and Operational Dynamics of Business Email Compromise (BEC) Scammers: Insights from the “Black Axe” Confraternity

Deviant Behavior 46:1-25 (2024)
  Copy   BIBTEX

Abstract

I explored the relationship between the “Black Axe” Confraternity and cybercrime, with a particular emphasis on the structural dynamics of the Business Email Compromise (BEC) schemes. I investigated whether a conventional hierarchical system governs the membership and remuneration for BEC roles as perpetrators by interviewing an accused “leader” of the “Black Axe” affiliated cybercriminal incarcerated in a prominent Western nation. I supplemented the analysis of interview data with insights from tapped phone records monitored by a law enforcement entity. I merged Actor-network theory and Social Network theory as analytical frameworks and thematically analyzed data to produce six overarching themes: (1) The fluidity of Structure and Adaptive Roles in BEC, (2) Challenges in Visualizing Criminal Networks, (3) Globalization and Transnational Dimensions, (4) Social and Cultural Influences, (5) Internal Cybersecurity Threats and Money Laundering, and (6) Remuneration and Influences of Cryptocurrency, casting a brighter light on the topic. Unlike traditional organized crime, BEC scammers have adopted a nonhierarchical model that is flexible and fluid. I found no evidence of a rigid hierarchy dictating positions and remuneration for BEC roles. Instead, I observed that cybercriminals involved in BEC activities functioned horizontally, promoting fluidity, maneuverability, collaboration, and specialization across various facets of their illicit pursuits. I also highlighted the cross-border links BEC offenders have with other criminal actors facilitated by Black Axe organizational machinery. My research adds value to the existing body of knowledge, utilizing a unique dataset comprising direct testimonies of a high-profile BEC offender affiliated with the ‘hard–to–access,’ Black Axe gang.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,497

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Network-based filtering for large email collections in E-Discovery.Hans Henseler - 2010 - Artificial Intelligence and Law 18 (4):413-430.
Corporate Responsibilities in Internet-Enabled Social Networks.Stephen Chen - 2009 - Journal of Business Ethics 90 (S4):523 - 536.
Structure and Agency in Firm-Stakeholder Networks.Dominic Kaeslin - 2007 - Proceedings of the International Association for Business and Society 18:443-447.
Ethics and Network Organizations.Robert A. Phillips - 2010 - Business Ethics Quarterly 20 (3):533-543.
Ethics and Network Organizations.Robert A. Phillips - 2010 - Business Ethics Quarterly 20 (3):533-543.
Email, voicemail, and privacy: What policy is ethical?Marsha Woodbury - 2000 - Science and Engineering Ethics 6 (2):235-244.

Analytics

Added to PP
2024-05-18

Downloads
4 (#1,630,023)

6 months
4 (#799,256)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Suleman Lazarus
London School of Economics

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references