117
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Towards a Conceptual Typology of Darknet Risks

, &

References

  • Morgan S. Cybercrime to cost the World $10.5 trillion annually by 2025. Cybersecurity ventur [Internet]; 2020 [accessed 2023 Jun 6]. https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/.
  • Heidenreich S, Westbrooks D. Darknet markets. Am Intell J. 2017;34:38–45.
  • Zambiasi D. Drugs on the web, crime in the streets. The Impact of shutdowns of dark net marketplaces on street crime. J Econ Behav Organ [Internet]. 2022;202:274–306. doi:10.1016/j.jebo.2022.08.008.
  • Chan J, He S, Qiao D, Whinston AB. Shedding light on the dark: the impact of legal enforcement on darknet transactions. Inf Syst Res Publ [Internet]. 2023;Articles i:1–20. doi:10.1287/isre.2023.1222.
  • Horton-Eddison M, Shortis P, Aldridge J, Caudevilla F. Drug cryptomarkets in the 2020s: policy, enforcement, harm, and resilience. [place unknown]; 2021.
  • Department of Justice. Objective 2.5: combat drug trafficking and prevent overdose deaths. DOJ strategic PLAN [Internet]; 2023 [accessed 2023 Jun 23]. https://www.justice.gov/doj/doj-strategic-plan/objective-25-combat-drug-trafficking-and-prevent-overdose-deaths.
  • Cederström C, Fleming P. On bandit organizations and their (Il)legitimacy: concept development and illustration. Organ Stud. 2016;37(11):1575–94. doi:10.1177/0170840616655484.
  • Mahmood MA, Siponen M, Straub DW, Rao HR, Raghu TS. Moving toward black hat research in information systems security: an editorial introduction to the special issue. MIS Q. 2010;34(3):431–33. doi:10.2307/25750685.
  • Holt TJ. Understanding the state of criminological scholarship on cybercrimes. Comput Human Behav [Internet]. 2023;139(August 2022):107493. doi:10.1016/j.chb.2022.107493.
  • Eve MP. Warez: the infrastructure and aesthetics of piracy. [ place unknown]: Punctum Books; 2021. doi:10.53288/0339.1.00.
  • Hutchings A, Clayton R. Exploring the provision of online booter services. Deviant Behav. 2016;37(10):1163–78. doi:10.1080/01639625.2016.1169829.
  • Décary-Hétu D, Giommoni L. Do police crackdowns disrupt drug cryptomarkets? A longitudinal analysis of the effect of operation onymous. Crime, Law Soci Al Chang. 2017;13:104–16.
  • Aldridge J, Askew R. Delivery dilemmas: how drug cryptomarket users identify and seek to reduce their risk of detection by law enforcement. Int J Drug Policy [Internet]. 2017;41:101–09. doi:10.1016/j.drugpo.2016.10.010.
  • Holt T, Freilich JD, Chermak SM. Exploring the subculture of ideologically motivated cyber-attackers. J Contemp Crim Justice. 2017;33(3):212–33. doi:10.1177/1043986217699100.
  • Hutchings A, Holt T. A crime script analysis of the online stolen data market. Br J Criminol. 2015;55(3):596–614. doi:10.1093/bjc/azu106.
  • van Hardeveld GJ, Webber C, O’Hara K. Deviating from the cybercriminal script: exploring tools of anonymity (mis)used by carders on cryptomarkets. Am Behav Sci. 2017;61(11):1244–66. doi:10.1177/0002764217734271.
  • Jardine E. Policing the cybercrime script of darknet drug markets: methods of effective law enforcement intervention. Am J Crim Justice [Internet]. 2021;46(6):980–1005. doi:10.1007/s12103-021-09656-3.
  • Shan S. Behavioral profiling of darknet marketplace vendors. [place unknown]; 2020.
  • Kruithof K, Aldridge J, Hétu D, Sim M, Dujso E, Hoorens S. Internet-facilitated drugs trade: an analysis of the size, scope and the role of the Netherlands. Internet-facilitated drugs trade an analysis, scope role Netherlands. 2016. doi:10.7249/rr1607.
  • Broséus J, Rhumorbarbe D, Mireault C, Ouellette V, Crispino F, Décary-Hétu D. Studying illicit drug trafficking on darknet markets: structure and organisation from a Canadian perspective. Forensic Sci Int. 2016;264:7–14. doi:10.1016/j.forsciint.2016.02.045.
  • Soska K, Christin N. Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In: Proceeding of 24th USENIX security symposium. 2015. p. 33–48.
  • Shakarian J, Gunn AT, Shakarian P. Exploring malicious hacker forums. In: Jajodia S, Subrahmanian V, Swarup V Wang C, editors. Cyber decept. [place unknown]: Springer, Cham; 2016. p. 256–82. doi:10.1007/978-3-319-32699-3_11.
  • Howell CJ, Maimon D, Perkins RC, Burruss GW, Ouellet M, Wu Y. Risk avoidance behavior on darknet marketplaces. Crime Delinq. 2022;001112872210927. doi:10.1177/00111287221092713.
  • Holt T, Strumsky D, Smirnova O. Examining the social networks of malware writers and hackers. Int J Cyber Criminol. 2012;6:891–903.
  • Décary-Hétu D, Dupont B. Reputation in a dark network of online criminals. Glob Crime. 2013;14(February):2–3. doi:10.1080/17440572.2013.801015.
  • Tzanetakis M, Kamphausen G, Werse B, von Laufenberg R. The transparency paradox. Building trust, resolving disputes and optimising logistics on conventional and online drugs markets. Int J Drug Policy [Internet]. 2016;35(2016):58–68. doi:10.1016/j.drugpo.2015.12.010.
  • Espinosa R. Scamming and the reputation of drug dealers on darknet markets. Int J Ind Organ [Internet]. 2019;67:102523. doi:10.1016/j.ijindorg.2019.102523.
  • Zimba A, Wang Z, Mulenga M, Odongo NH. Crypto mining attacks in information systems: an emerging threat to cyber security. J Comput Inf Syst [Internet]. 2020;60(4):297–308. doi:10.1080/08874417.2018.1477076.
  • Ladegaard I. Open secrecy: how police crackdowns and creative problem-solving brought illegal markets out of the shadows. Soc Forces. 2020;99(2):532–59. doi:10.1093/sf/soz140.
  • Horton-Eddison M. Updating escrow: demystifying the CDM multisig process. Wales (UK): Global Drug Policy Observatory; 2017. https://www.swansea.ac.uk/media/Updating-Escrow-Demystifying-the-CDM-multisig-process.pdf.
  • Liu M, Yeoh W, Jiang F, Choo KKR. blockchain for cybersecurity: systematic literature review and classification. J Comput Info Syst Query [Internet]. 2022;62(6):1182–98. doi:10.1080/08874417.2021.1995914.
  • Holt TJ, Smirnova O, Chua YT, Copes H. Examining the risk reduction strategies of actors in online criminal markets. Glob Crime [Internet]. 2015;16(2):81–103. doi:10.1080/17440572.2015.1013211.
  • Holt TJ, Lee JR, Smirnova O. exploring risk avoidance practices among on-demand cybercrime-as-service operations. Crime Delinq. 2023;69(2):415–38. doi:10.1177/00111287221103753.
  • Hyslip TS, Holt TJ. Assessing the capacity of DRDoS-For-Hire services in cybercrime markets. Deviant Behav. 2019;40(12):1609–25. doi:10.1080/01639625.2019.1616489.
  • Waldner O. Identifying patterns of darknet drug vendor migration. [place unknown]; 2022.
  • Fraser I, Chauvin GS, Faubert C, Décary-Hétu D. Police interventions directed toward crime facilitators. Criminologie. 2021;54(2):295–320. doi:10.7202/1084298AR.
  • Décary-Hétu D, Paquet-Clouston M, Aldridge J. Going international? Risk taking by cryptomarket drug vendors. Int J Drug Policy. 2016;35:69–76. doi:10.1016/j.drugpo.2016.06.003.
  • Décary-Hétu D, Aldridge J. Sifting through the net: monitoring of online offenders by researchers. Eur Rev Organised Crime [Internet]. 2015;2(Iccc):1–19. http://sgocnet.org/site/wp-content/uploads/2014/07/07_DecaryHetuAldridge_pp122-141.pdf.
  • Morselli C, Décary-Hétu D, Paquet-Clouston M, Aldridge J. Conflict management in illicit drug cryptomarkets. Int Crim Justice Rev. 2017;27(4):237–54. doi:10.1177/1057567717709498.
  • Kamphausen G, Werse B. Digital figurations in the online trade of illicit drugs: a qualitative content analysis of darknet forums. Int J Drug Policy [Internet]. 2019;73:281–87. doi:10.1016/j.drugpo.2019.04.011.
  • Aldridge J, Stevens A, Barratt MJ. Will growth in cryptomarket drug buying increase the harms of illicit drugs? Addiction. 2018;113(5):789–96. doi:10.1111/add.13899.
  • Bancroft A, Scott Reid P. Concepts of illicit drug quality among darknet market users: purity, embodied experience, craft and chemical knowledge. Int J Drug Policy [Internet]. 2016;35:42–49. doi:10.1016/j.drugpo.2015.11.008.
  • Davis S, Arrigo B. The dark web and anonymizing technologies: legal pitfalls, ethical prospects, and policy directions from radical criminology. Crime Law Soc Chang [Internet]. 2021;76(4):367–86. doi:10.1007/s10611-021-09972-z.
  • Maimon D, Howell CJ, Burruss GW. Restrictive deterrence and the scope of hackers’ reoffending: findings from two randomized field trials. Comput Human Behav [Internet]. 2021;125(December 2020):106943. doi:10.1016/j.chb.2021.106943.
  • Department of Justice. Largest International operation against darknet trafficking of fentanyl and opioids results in record arrests and seizures. Press release [Internet]; 2023 [accessed 2023 Jun 6]. https://www.justice.gov/opa/pr/largest-international-operation-against-darknet-trafficking-fentanyl-and-opioids-results.
  • Décary-Hétu D, Morselli C, Leman-Langlois S. Welcome to the scene: a study of social organization and recognition among Warez Hackers. J Res Crime Delinq. 2012;49(3):359–82. doi:10.1177/0022427811420876.
  • Paquet-Clouston M, Haslhofer B, Dupont B. Ransomware payments in the bitcoin ecosystem. J Cybersecur. 2019;5(1):1–11. doi:10.1093/cybsec/tyz003.
  • Lacson W, Jones B. The 21st century dark net market: lessons from the fall of silk road. Int J Cyber Criminol. 2016;10:40–61.
  • Meland PH, Bayoumy YFF, Sindre G. The ransomware-as-a-service economy within the darknet. Comput Secur [Internet]. 2020;92(7034):101762. doi:10.1016/j.cose.2020.101762.
  • Saputra FA, Nadhori IU, Barry BF. Detecting and blocking onion router traffic using deep packet inspection. In: Proceeding of 2016 International Electronics Symposium IES; 2017 Nov. p. 283–88. doi:10.1109/ELECSYM.2016.7861018.
  • Rao Z, Niu W, Zhang XS, Li H. Tor anonymous traffic identification based on gravitational clustering. Peer To Peer Netw Appl. 2018;11(3):592–601. doi:10.1007/s12083-017-0566-4.
  • Sarkar D, Vinod P, Yerima SY. Detection of tor traffic using deep learning. In: Proceeding of IEEE/ACS international conference on computer systems and applications AICCSA; 2020 Nov. doi:10.1109/AICCSA50499.2020.9316533.
  • Wang X, Peng P, Wang C, Wang G. You are your photographs: detecting multiple identities of vendors in the darknet marketplaces. In: ASIACCS 2018 proceeding of 2018 ACM Asia conference on computer and communications security; 2018. p. 431–42. doi:10.1145/3196494.3196529.
  • Zhang Y, Fan Y, Zhao L, Song W, Hou S, Shi C, Ye Y, Li X, Wang J, Xiong Q. Your style your identity: leveraging writing and photography styles for drug trafficker identification in darknet markets over attributed heterogeneous information network. In: Web conference 2019 proceeding of world wide web conference WWW; 2019. p. 3448–54. doi:10.1145/3308558.3313537.
  • Manolache A, Brad F, Barbalau A, Ionescu RT, Popescu M. VeriDark: a large-scale benchmark for authorship verification on the dark web [Internet]. (NeurIPS). 2022. http://arxiv.org/abs/2207.03477.
  • Tai XH, Soska K, Christin N. Adversarial matching of dark net market vendor accounts. In: Proceedings of ACM SIGKDD International conference on knowledge discovery & data mining; 2019. p. 1871–80. doi:10.1145/3292500.3330763.
  • Huang DY, Aliapoulios MM, Li VG, Invernizzi L, Bursztein E, McRoberts K, Levin J, Levchenko K, Snoeren AC, McCoy D. Tracking ransomware end-to-end. In: Proceeding - IEEE symposium on security and privacy; 2018 May 1. p. 618–31. doi:10.1109/SP.2018.00047.
  • Afilipoaie A, Shortis P. The booming market of alternative cryptocurrencies. Wales (UK): Global Drug Policy Observatory; 2015. https://www.swansea.ac.uk/media/The-Booming-Market-of-Alternative-Cryptocurrencies.pdf.
  • Bahamazava K, Nanda R. The shift of DarkNet illegal drug trade preferences in cryptocurrency: the question of traceability and deterrence. Forensic Sci Int Digit Investig [Internet]. 2022;40:301377. doi:10.1016/j.fsidi.2022.301377.
  • Ursani Z, Peersman C, Edwards M, Chen C, Rashid A. The impact of adverse events in darknet markets: an anomaly detection approach. In: Proceeding- IEEE European symposium on security and privacy workshops; [ place unknown]: IEEE; 2021. p. 227–38.
  • Dickinson T, Wright R. Gossip, decision-making and deterrence in drug markets. Br J Criminol. 2015;55(6):1263–81. doi:10.1093/bjc/azv010.
  • Hutchings A, Holt TJ. The online stolen data market: disruption and intervention approaches. Glob Crime. 2017;18(1):11–30. doi:10.1080/17440572.2016.1197123.
  • Markopoulos P, Dimitris X, Chrysanthos D. Manipulating reviews in dark net markets to reduce crime. In: Tenth mediterranean conference on information systems and technology (MCIS); Paphos, Cyprus; 2016 Sept. p. 1–18.
  • Fernandez EF, Carofilis RAV, Martino FJ, Medina PB. Classifying suspicious content in tor darknet [Internet]. [place unknown]; 2020. http://arxiv.org/abs/2005.10086.
  • Paquet-Clouston M, Décary-Hétu D, Morselli C. Assessing market competition and vendors’ size and scope on AlphaBay. Int J Drug Policy [Internet]. 2018;54:87–98. doi:10.1016/j.drugpo.2018.01.003.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.