How to Beat Cybercriminals at Their Own Game, Part I