Exploring illicit personal information trading behind telecom fraud in China
Guangxuan Chen (),
Qiang Liu,
Guangxiao Chen and
Anan Huang
Additional contact information
Guangxuan Chen: Zhejiang Police College
Qiang Liu: Zhejiang Police College
Guangxiao Chen: Wenzhou Public Security Bureau
Anan Huang: Zhejiang Police College
Humanities and Social Sciences Communications, 2025, vol. 12, issue 1, 1-11
Abstract:
Abstract Illicit personal information trading, a hallmark of internet dark and gray industries, has deeply infiltrated the global criminal economic system, serving as a critical driver and “raw material factory” for numerous offenses. This study focuses on its role as the core enabler of China’s telecom fraud criminal ecosystem, revealing its systemic characteristics and multi-dimensional evolutionary patterns, with significant theoretical and practical implications. Utilizing telecom fraud case data and anonymous network transaction data, this research employs analytical description and Event Logic Graph (ELG) to systematically uncover the operational mechanisms and evolutionary rules of illicit personal information trading. The findings demonstrate a pronounced “data capitalization” feature within this trade, empirically validating the cybercrime economics law of “data-as-criminal-capital”. The constructed “communication-fund flow-transaction” evolution model reveals a paradigm shift from traditional tool reliance to technology-driven operations: communication modes migrated from traditional channels to hybrid Telegram API and Tor+Signal architectures; fund flow evolved from fiat cash to USDT mixing and money laundering via “Pao Fen” platforms; transaction models upgraded from bulk sales to “customized subscription” services. This illicit trade has matured into an industrialized division of labor: upstream actors steal full-lifecycle data via automated scripts; midstream processes and packages standardized data products; downstream legitimizes criminal proceeds through diverse money laundering methods. This research not only deepens the understanding of cybercrime economics but also, by uncovering the evolutionary pathways of the criminal ecosystem and its industrial chain structure, provides crucial theoretical foundations and practical targets for formulating targeted governance strategies and building a global collaborative regulatory framework.
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1057/s41599-025-05972-9 Abstract (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:pal:palcom:v:12:y:2025:i:1:d:10.1057_s41599-025-05972-9
Ordering information: This journal article can be ordered from
https://www.nature.com/palcomms/about
DOI: 10.1057/s41599-025-05972-9
Access Statistics for this article
More articles in Humanities and Social Sciences Communications from Palgrave Macmillan
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().