Real Crimes in Virtual Worlds - IACP Center for Social Media



Real Crimes in Virtual Worlds - IACP Center for Social Media
in Virtual Worlds
Real Crimes
March 2012
About 2
Threats 3
Solutions 7
What are virtual worlds and
What specific crimes have
What can law enforcement
online gaming communities?
been identified? What
do to counter this new
How do they work?
social and economic
and emerging threat?
Why would criminals be
harms arise from those
Our Digital Playgrounds:
Virtual Worlds and Online Games
Criminal threats are emerging in online
communities where adults and children play
Virtual worlds and online gaming communities are
activities in virtual and online gaming communities
fast becoming the predominant entertainment
in their efforts to police cyberspace and to protect
medium in the world.
the jurisdictions they serve.
Collectively, they are
projected to generate $112 billion in sales
revenues annually by 2015 from hundreds of
Over the past two years, the Bureau of Justice
millions of individuals worldwide who subscribe
Assistance (BJA), in partnership with Drakontas
Millions of users enjoy these “digital
and Drexel University, has been investigating the
playgrounds” every day, and very rarely is their
rise of crime in virtual worlds and online gaming
experience interrupted by inappropriate or
communities, and its impact on the people that
criminal behavior.
subscribe to and play them. This document is
to them.1
designed to help raise awareness about the kinds
Unfortunately, as more people subscribe to virtual
of crimes being committed in virtual and online
worlds, and as the number of online games increase,
gaming worlds, and to provide an overview on
the opportunities for socially and economically
the methods of social interaction that occur
harmful crime will correspondingly rise. The law
within these worlds and what law enforcement
enforcement community must, consequently,
and the broader criminal justice community can
begin to develop a capacity to address criminal
do to respond to and mitigate future incidents.
March 2012
In his book, Virtual Justice:
The New Laws of Online Worlds,
Dr. Greg Lastowka of Rutgers
University defines virtual worlds
and online gaming communities
as “Internet-­based simulated
environments that feature
software-animated objects
and events.”
According to a recent report2 from Interpol,
the International Criminal Police Organization
headquartered in Lyon, France, virtual worlds
can often be classified according to their specific
features. The most commonly seen types of virtual
worlds fall into two general categories: game
playing and community-based.
Both of these
types of virtual worlds are created to provide
entertainment, first and foremost, while some also
provide social engagement and interaction, as
well as monetary benefits to their users. In the
game-playing category, social interaction is not
only encouraged, but is required, as players will
only be able to advance so far and accomplish
set-goals within a game before they will need to
No matter what type of virtual world or online
call upon others to assist them.
gaming world one plays, there are inherent risks
Community-based virtual worlds, on the other
associated with each of them, as the people
hand, have no specific purpose from the players’
one encounters along the way may have ulterior,
perspective, aside from fostering social interaction
criminal motives. The criminal opportunities that
and providing entertainment.
Any person can
exist within virtual worlds, and the subsequent call
explore community-based virtual worlds without
to action, that is required by law enforcement and
the assistance of other players that is required in
crime prevention communities, will be addressed
game-based virtual worlds.
in the following pages.
March 2012
communities have been created, as highlighted
communications features and provide access to
above, for children and adults as vehicles for
social networking platforms. Additionally, many
social engagement, entertainment, diversion,
have internet browsing capabilities, allowing
and, on occasion, as places to make money by
users to access any number of social media sites
selling and buying digital goods and services.
where they can meet friends or seek to establish
new relationships.
However, just like playgrounds in the real world,
digital playgrounds offer myriad new locations
One of the major challenges in these virtual
and opportunities for criminals to prey on
environments, however, is being able to identify
the person on the other end of the internet with
traditional “real-world” crimes, like theft, money
whom one is communicating. Due to the fact that
laundering, bullying, and stalking. The companies
many of these virtual and online gaming worlds
behind these new gaming environments certainly
are often free or very inexpensive to use, a person
did not intend to create virtual worlds that
can easily register for a particular game and
facilitate criminal behaviors, and most companies
provide false information. For example, a person
actively protect the safety and security of their
can indicate on a virtual world registration page
Nonetheless, these measures have not
that she is a 14-year old girl, when “she” is, in reality,
prevented criminals from exploiting vulnerabilities
a 35-year old man. Here, the communications
in gaming platforms and systems.
capabilities – chat, voice, text messaging – all
become potential means by which criminals can
For instance, the major gaming systems on the
exploit and target an unsuspecting victim.
March 2012
Threats and Vulnerabilities (Continued)
This is especially troubling if a
location to hide illicit images,
young person is unaware of
and the file sharing permitted by
the dangers inherent in virtual
these systems and embedded
into the virtual worlds and online
worlds and is not monitored
gaming communities accessed
via the gaming consoles offer new
playground. Complicating the
potential distribution mechanisms
issue even further is that many of
for these illegal materials.
these virtual worlds are built on
the need for social interaction
Many of these virtual worlds and
in order to advance to new
online gaming communities are
levels within a particular game.
accessible via handheld gaming
devices or even via smartphones.
players is often paramount to
one’s success within a game
seeking to ensure the gaming
and this fact further increases
experience is accessible wherever
the opportunity and likelihood
cellular networks can connect
for social or economic harms.
users to the games.
These same social capabilities
Sometimes, the games are even
have been used by criminals to
designed to combine real world
oversee and monitor prostitution
and virtual world interactions,
rings and by drug dealers to
where users know the physical
coordinate the exchange of
location of other participants so
illicit goods. They use the gaming
that they can meet or receive
system as a communications
offers for special deals from
platform in order to evade
wiretaps, as this is a channel that
location. This same information
law enforcement is not as likely
can be intercepted and used as
to monitor.
a beacon for a cyberstalker, or
offer targets for child exploitation.
Each gaming platform also has
some form of storage capacity
There are also vulnerabilities
and, much like a traditional
personal computer, these can
systems built to support virtual
be locations for storing pictures
and videos. This provides a child
worlds have their own currency,
Below are several
kinds of socially harmful
illegal activities occurring
in and/or inadvertently
facilitated by virtual
worlds and online
gaming communities:
• Online Solicitation
of a Minor:
Using communication tools
(e.g., email, video chat,
audio chat, text chat, and
instant messaging) in a
gaming environment or
virtual world to engage in
sexually explicit conversations
with a minor or for the
purposes of arranging a
sexual encounter in the
physical world.
• Child Pornography:
Storage and distribution of
images or videos via a gaming
console that contains people
under the age of 18 in a
sexual situation.
• Harassment, Bullying,
and Stalking:
Using communication tools
(e.g., email, video chat, audio
chat, text chat, and instant
messaging) in a gaming
environment or virtual world
to threaten, annoy, or alarm
other players.
March 2012
Threats and Vulnerabilities (Continued)
so that people playing the
between the real world and the
game can buy and sell objects.
virtual world in order to maximize
For the gaming company, this is
its profits for a particular brand.
another way of making money
Imagine a virtual world created
from the game; estimates are
for children, wherein a parent
that revenues from virtual goods
can spend a few pennies to
will exceed $14 billion by 2014.3
purchase a piece of digital
jewelry for his or her child’s
Below are some
economically harmful
illegal activities occurring
in and/or inadvertently
facilitated by virtual
worlds and online gaming
• Identity Theft:
Use of login credentials
to gain access to credit
card information and
other personal information
connected to a gaming or
virtual world account.
Most of these revenues come
virtual doll. This “virtual” jewelry
from “micro-transactions” – small
just so happens to look exactly
purchases of less than $1 that
make up the bulk of consumer
also purchases in the physical
purchases of virtual goods. The
process is very simple: a person
doll, allowing the company to
plays a game for which he or
maximize the amount of time a
she pays a nominal monthly
child interacts with its brand in
subscription fee.
In addition,
both the real and virtual worlds,
the user has the option of
thereby increasing its bottom line.
customizing an avatar – the
user’s digital character within a
Generating profits in the real
virtual world or online gaming
and virtual worlds isn¹t a crime.
world – or purchasing additional
However, with the increasing
items to increase the avatar’s
complexities involving real and
• Fraud:
The intentional
misrepresentation connected
to the sale of digital goods,
digital currencies, or gaming/
virtual world services.
strength or weaponry. Each of
these items, sometimes referred
there is a correspondingly rising
to as add-ons, can be purchased
likelihood that fraud andother
for a small fee. These purchases
crimes will be perpetrated in
can add up to a sizable sum of
• Money Laundering:
Using virtual economies to
channel funds into and out of
the physical-world economy.
money over time. Considering
enforcement needs to be aware
there are many virtual worlds
payment systems so that they are
of subscribers, the companies
prepared to respond accordingly.
• Phishing:
Using email or other
communications under a
pretense to gather personal
information from gamers or
virtual world inhabitants.
behind these games stand to
reap significant revenues from
There are millions upon millions
these micro-transactions.
In some cases, a virtual world
crossing credit card platforms,
company will blur the lines
banking systems, and payment
March 2012
Threats and Vulnerabilities (Continued)
services throughout the world. It is the kind of
real world currencies. There are even currency
playground where criminals can make money if
exchange platforms that allow users to trade in
they know how to intercept those transactions.
and out of virtual currencies in the same way they
could trade foreign currencies in the real world.
The sheer volume of transactions and sums of money
Individuals provide virtual goods and services
involved make virtual worlds and online games
– everything from new dresses for an avatar to
inviting targets for fraud, identity theft, and other
virtual prostitution – and money paid for these
economically harmful crimes. Gaming companies
goods and services can be transferred into U.S.
have become the new targets for cybercriminals
dollars through the currency exchange. However,
looking to steal credit card information or intellectual
unlike traditional “real” world banks, these virtual
property associated with the games themselves.
exchanges and operations are not subject to the
same regulatory oversight.
This trend is likely to expand further in the coming
years, as gaming companies seek to maximize
the consumer’s engagement with the gaming
platform on a daily basis. There was even one
gaming company several years ago that had
registered for and received a banking license,
which allowed gamers to transfer currency in
Phishing schemes, where computer users are
and out of the game readily through ATMs or a
tricked into entering user names, passwords, and
“real-world” bank branch. This creates a parallel
credit card information into websites that appear
banking system, where the potential exists for
to be legitimate, are just as likely to target gaming
money laundering and the illicit transfer of goods.
brands as they are to exploit large banking
There are also criminal organizations that use these
institutions. This is, in great part, due to the fact that
virtual currencies to earn real money, selling illegally
many gaming companies store both personally
obtained virtual goods to game players interested
identifiable information and financial data of their
in obtaining a powerful sword or special potion so
members on servers across the globe. Criminals
they can advance to the next level of the game.
gaining access to this information, using phishing
schemes or other nefarious methods, can easily
For people who have never played one of these
reap millions of dollars.
games, this may seem a bit farfetched. Yet, these
social and economic harms are very real and
Additionally, many gaming companies have
have been documented in the articles and news
created digital currencies that are meant to
stories included as an appendix to this document.
facilitate transactions within the virtual world.
The list we provide represents the tip of the iceberg
Some companies even contemplated that their
– an increasing threat that law enforcement must
virtual currencies would be transferrable into
address now.
March 2012
Drexel University recently held a BJA-sponsored Symposium on Real Crimes in Virtual Worlds
in Philadelphia, PA. Led by Dr. Robert D’Ovidio, Associate Professor of Criminal Justice,
a community of industry, academic, law enforcement, and cybercrime experts
discussed the challenges they face in this emerging area.
Law enforcement is constantly required to adapt
regarding the threats posed by crimes in virtual
its strategies and tactics to combat the rise of
worlds and online gaming communities.
new criminal behavior. The increase of socially
Symposium held in Philadelphia, pictured above
and economically harmful activity in virtual
- along with the training sessions conducted by
worlds and online gaming communities requires
Drakontas LLC and Drexel University, as part of
a unified response from law enforcement and
BJA’s program - represent a first step in helping law
other key stakeholders, some of which will come
enforcement better understand the challenges.
from refocusing existing policies, procedures, and
capabilities to match this new threat.
Nevertheless, new capabilities are required to
Second, existing policies and procedures need to
ensure law enforcement has sufficient capacity
be refined given the nature of the investigatory
and tools at their disposal to respond effectively.
process. For instance, as gaming technologies
Some of these are outlined below.
and digital storage devices evolve and are
increasingly adopted around the world, the
potential locations for digital evidence also
First and foremost, it is imperative that awareness
increases. Information is now being stored on
be raised among the criminal justice community
machines and devices located in other countries
March 2012
Solutions (Continued)
on other continents far away from a particular
Video game consoles have different proprietary
user’s gaming system.
that present numerous technical hurdles for
This greatly complicates an investigator’s work.
forensics tool manufacturers; as a result, it is very
An investigator needs to search for evidence on
difficult, if not impossible, to automate a sound
local devices (i.e., a computer or gaming system),
forensic examination of these platforms and
but they also must reach out to Internet Service
extract evidence for an investigation. Forensic
Providers (ISPs) and the gaming companies,
experts, therefore, are often required to employ
as well as the third party payment services that
manual techniques, such as a scroll analysis
often serve as the marketplace for the exchange
of digital goods and services.
Each has vital
locations, which can be time consuming and
information that law enforcement will want to
potentially subject to courtroom challenges, if not
use during an investigation, but it can be very
properly documented.
difficult and time consuming to collect all of
the relevant information for a particular case
Fortunately, there are resources available to law
involving gaming systems. Law enforcement must
enforcement to help combat this rising challenge.
piece together the various technologies involved
that facilitate the connection between an
These include:
offender and a victim. They must also familiarize
• Training Programs:
themselves with the data storage and retention
BJA has made available funding for training
practices of virtual world companies, as they
as part of a broader effort to raise awareness
begin investigating game-related cases for the
for law enforcement, probation and parole,
first time.
and other facets of the criminal justice
community about crimes in virtual worlds
and online gaming communities.
Finally, there are few tools available to automate
partnered with a company, Drakontas LLC,
the process of examining the gaming devices and
to provide this training, details for which
platforms used as gateways to these virtual worlds
can be requested via email at [email protected]
and online gaming communities. Law enforcement, or from BJA at
BJA has
has had success over the years in conducting
• Specialized Technical Assistance:
computing devices, such as personal computers
BJA funds partner organizations to assist state
and laptops; however, the pace at which video
and local law enforcement with technical
game consoles and handheld electronic devices
challenges associated with cybercrime, in
have emerged and been adopted by consumers
general, as well as with the specific issues
has presented a number of pressing issues for law
enforcement and private industry.
information, contact BJA at
March 2012
Solutions (Continued)
• Publications:
theft existed long before these new digital
Over the coming months, Drakontas will publish
playgrounds were built.
What is new are the
more documents that address key policy issues
techniques and methods used by criminals in
in virtual worlds and online gaming communities.
virtual worlds. They are able to take advantage of
The goal is to build further awareness of the
both technological and social vulnerabilities, and
challenges that exist in these digital playgrounds
unintended consequences inherent in game play.
and help to define the best tactics for responding
This document represents a resource for addressing
to criminal activities.
crime in virtual worlds, the subsequent challenges
The crimes discussed in this document are not new
facing the criminal justice community, and the
– unfortunately, crimes like child pornography,
broad-based response required to stem the tide
cyberbullying, online enticement, and identity
of this rising criminal threat.
Dr. Brian Regli, Drakontas LLC
Drakontas LLC
200 Federal Street, Suite 300
Camden, New Jersey 08103
(215) 887-5570
[email protected]
Michael Mitkus, Drakontas LLC
Dr. Robert D’Ovidio, Drexel University
This project was supported by Grant No. 2009-D2-BX-K005
awarded by the Bureau of Justice Assistance. The Bureau
of Justice Assistance is a component of the Office of Justice
Programs, which also includes the Bureau of Justice Statistics,
the National Institute of Justice, the Office of Juvenile Justice
and Delinquency Prevention, the Office for Victims of Crime,
and the Office of Sex Offender Sentencing, Monitoring,
Apprehending, Registering, and Tracking. Points of view or
opinions in this document are those of the authors and do
not necessarily represent the official position or policies of
the U.S. Department of Justice.
Drakontas ( develops mobile
collaboration software and provides training and technical
assistance that increase the safety and operational capacity
of law enforcement, emergency response, and security
personnel. The company was founded in partnership
with Drexel University in 2004 to transition technologies
developed at the Applied Communications and Information
Networking (ACIN) Center for the Department of Defense to
commercial, civilian and homeland security uses.
Bureau of Justice Assistance
Gartner. (2011). Gartner Says Spending on
Gaming to Exceed $74 Billion in 2011. Retrieved
on July 26, 2011 from the Gartner website:
International Association of Chiefs of Police (IACP)
Center for Social Media
Goodman. Marc. (2010). Crime and Policing in Virtual
Worlds (Interpol Working Party on IT Crime – Europe).
Internet Crime Complaint Center (IC3)
Reisinger, Don. (2010, November 15).
Virtual Goods Revenue to Hit $7.3 Billion this
Year. Retrieved on July 26, 2011 from the
CNET News website:
National White Collar Crime Center (NW3C)
Regional Computer Forensics Laboratory (RCFL)
March 2012
Related Articles:
Associated Press, The. (2010, January 6). Houston Mom Accused of Soliciting Teen Online.
Retrieved on July 26, 2011, from the MSNBC website
Cavalli, Earnest. (2009, January 12). Italian Woman Explores Prostitution Via Second Life.
Retrieved on July 26, 2011, from the Wired website
Cluley, Graham. (2011, February 3). Hacker Admits Stealing Zynga Poker Chips Worth $12 Million.
Retrieved on July 26, 2011, from the Naked Security website
Davis, Carolyn. (2010, December 8). Virtual Justice: Online Game World Meets Real-World Cops and Courts.
Retrieved on July 26, 2011, from the Philadelphia Inquirer website
Detroit News, The. (2011, February 28). Child Predators Turn to Gaming.
Retrieved on July 26, 2011, from The Detroit News website
Peterson, Debra. (2010, August 30). Disney World Employee Arrested on Xbox Child Porn Charges.
Retrieved on July 26, 2011, from The Examiner website
Potter, Ned. (2009, March 13). PlayStation Sex Crime Criminal Used Video Game to Get Girl’s Naked Pictures.
Retrieved on July 26, 2011, from the ABC News website
Roman, David. (2011, February 11). Entropia Universe: Where Online Money Meets Real-World Cash.
Retrieved on July 26, 2011, from the Wall Street Journal website
Semuels, Alana. (2008, January 22). Virtual Bank’s Second Life Scheme Raises Real Concerns.
Retrieved on July 26, 2011, from the Los Angeles Times website