The role of phone numbers in understanding cyber-crime schemes