This book examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breaches, to engage in cybercrime and fraud. Social network analyses of the relational networks of participants are also utilised to examine their sophistication and structure.