首页 > 最新文献

Journal of Contemporary Criminal Justice最新文献

英文 中文
In the Name of Dark Web Justice: A Crime Script Analysis of Hacking Services and the Underground Justice System 以暗网正义之名:黑客服务和地下司法系统的犯罪脚本分析
IF 2 2区 社会学 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2023-04-01 DOI: 10.1177/10439862231157520
Kyung-shick Choi, C. S. Lee
The Dark Web serves as a key venue for peddling illegal goods and services, from stolen possessions and drugs to illicit activities. The concurrent increase in Tor network usage and the development of cryptocurrency has led to the creation of major black market sites. One of the most popular illicit services offered on the Dark Web is hacking, which includes website/social media account hacking, Denial-of-service attacks, and custom malware. At the same time, the Dark Web community has formed its own justice system leveraging the layer of anonymity that exists between underground community users and the cybercrime ecosystem. Existing studies predominantly focus on the major drug market operating on the Dark Web, firearm sales, sexual exploitation, and money laundering. To address the gaps in the current research as well as the relative nascency of an underground justice system to monitor hacking services on the Dark Web, this study attempts to broadly capture the dynamic nature of hacking services, which requires continuous research to identify new trends and develop effective responses. The study aims to examine the characteristics and the operations of the hacking service market and the underground justice system on the Dark Web via an in-depth examination of Dark Web forums with a crime script analysis vis-à-vis thematic analysis. The study defines the crime script as that which includes pretrial, mid-trial, finalization, and exit stages. This research sheds light on Dark Web justice courts’ procedures and the courts’ implications for shaping the future of the Dark Web.
暗网是兜售非法商品和服务的关键场所,从被盗财产、毒品到非法活动。Tor网络使用量的同时增加和加密货币的发展导致了主要黑市网站的创建。暗网上最受欢迎的非法服务之一是黑客攻击,包括网站/社交媒体账户黑客攻击、拒绝服务攻击和自定义恶意软件。与此同时,暗网社区利用地下社区用户和网络犯罪生态系统之间的匿名层,形成了自己的司法系统。现有的研究主要集中在暗网上的主要毒品市场、枪支销售、性剥削和洗钱。为了弥补当前研究中的空白,以及地下司法系统在监控暗网黑客服务方面的相对不足,本研究试图广泛捕捉黑客服务的动态性质,这需要持续的研究来确定新的趋势并制定有效的应对措施。该研究旨在通过对暗网论坛的深入研究,结合犯罪脚本分析和主题分析,研究暗网上黑客服务市场和地下司法系统的特征和运作。该研究将犯罪脚本定义为包括审前、中期审判、最终确定和退出阶段。这项研究揭示了暗网司法法院的程序以及法院对塑造暗网未来的影响。
{"title":"In the Name of Dark Web Justice: A Crime Script Analysis of Hacking Services and the Underground Justice System","authors":"Kyung-shick Choi, C. S. Lee","doi":"10.1177/10439862231157520","DOIUrl":"https://doi.org/10.1177/10439862231157520","url":null,"abstract":"The Dark Web serves as a key venue for peddling illegal goods and services, from stolen possessions and drugs to illicit activities. The concurrent increase in Tor network usage and the development of cryptocurrency has led to the creation of major black market sites. One of the most popular illicit services offered on the Dark Web is hacking, which includes website/social media account hacking, Denial-of-service attacks, and custom malware. At the same time, the Dark Web community has formed its own justice system leveraging the layer of anonymity that exists between underground community users and the cybercrime ecosystem. Existing studies predominantly focus on the major drug market operating on the Dark Web, firearm sales, sexual exploitation, and money laundering. To address the gaps in the current research as well as the relative nascency of an underground justice system to monitor hacking services on the Dark Web, this study attempts to broadly capture the dynamic nature of hacking services, which requires continuous research to identify new trends and develop effective responses. The study aims to examine the characteristics and the operations of the hacking service market and the underground justice system on the Dark Web via an in-depth examination of Dark Web forums with a crime script analysis vis-à-vis thematic analysis. The study defines the crime script as that which includes pretrial, mid-trial, finalization, and exit stages. This research sheds light on Dark Web justice courts’ procedures and the courts’ implications for shaping the future of the Dark Web.","PeriodicalId":47370,"journal":{"name":"Journal of Contemporary Criminal Justice","volume":"39 1","pages":"201 - 221"},"PeriodicalIF":2.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48040901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The “Yelp-Ification” of the Dark Web: An Exploration of the Use of Consumer Feedback in Dark Web Markets 暗网的“Yelp Ifification”:消费者反馈在暗网市场中的应用探索
IF 2 2区 社会学 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2023-04-01 DOI: 10.1177/10439862231157519
Jordan Brinck, Brooke Nodeland, Scott Belshaw
Law enforcement are tasked with confronting a variety of crimes on a daily basis, ranging from traditional offenses, such as burglary or assault, to online crimes, such as identity theft. The expansion of the internet has provided a new realm for investigatory consideration as buyers seek the tools of the crime as well as illegal products online. Since the inception of the Silk Road, the Dark Web’s first darknet marketplace, buyers and sellers have worked together to distribute and obtain products and services that were previously only available offline. For example, drugs, weapons, consumer data such as credit cards numbers, and other illicit products are all available for purchase on the Dark Web. Early on, Ross Ulbricht, founder of the original Silk Road Dark Web marketplace, incorporated consumer “reviews” on illegal websites to protect customers and to ensure that sellers were not taking advantage of potential buyers. The nature of illicit markets, where websites, vendors, or markets themselves can be online one day and gone the next, present challenges to developing a complete understanding as to how these networks operate. This study builds on existing research by providing an exploratory examination of the prevalence of consumer feedback and review indicators on approximately 50 Dark Web marketplaces. Findings indicate that more than half of explored sites displayed consumer reviews on their postings. Policies incorporating feedback indicators may be implemented to both identify and target for investigation and prosecution highly rated and high-profile sellers on Dark Web markets.
执法部门的任务是每天面对各种各样的犯罪,从传统的犯罪,如入室盗窃或袭击,到网络犯罪,如身份盗窃。随着买家在网上寻找犯罪工具和非法产品,互联网的扩张为调查提供了一个新的领域。自丝绸之路(暗网的第一个暗网市场)成立以来,买家和卖家一直在共同努力,分销和获得以前只能在线下获得的产品和服务。例如,毒品、武器、信用卡号等消费者数据和其他非法产品都可以在暗网上购买。最初的丝绸之路暗网市场创始人罗斯·乌布里希特(Ross Ulbricht)在非法网站上加入了消费者的“评论”,以保护消费者,并确保卖家不会占潜在买家的便宜。非法市场的本质是,网站、供应商或市场本身可能今天还在线,明天就消失了,这对全面了解这些网络的运作方式提出了挑战。本研究建立在现有研究的基础上,对大约50个暗网市场的消费者反馈和评论指标进行了探索性检查。调查结果表明,超过一半的被调查网站在其帖子上显示消费者评论。可以实施包含反馈指标的政策,以确定并针对暗网市场上的高评级和高知名度卖家进行调查和起诉。
{"title":"The “Yelp-Ification” of the Dark Web: An Exploration of the Use of Consumer Feedback in Dark Web Markets","authors":"Jordan Brinck, Brooke Nodeland, Scott Belshaw","doi":"10.1177/10439862231157519","DOIUrl":"https://doi.org/10.1177/10439862231157519","url":null,"abstract":"Law enforcement are tasked with confronting a variety of crimes on a daily basis, ranging from traditional offenses, such as burglary or assault, to online crimes, such as identity theft. The expansion of the internet has provided a new realm for investigatory consideration as buyers seek the tools of the crime as well as illegal products online. Since the inception of the Silk Road, the Dark Web’s first darknet marketplace, buyers and sellers have worked together to distribute and obtain products and services that were previously only available offline. For example, drugs, weapons, consumer data such as credit cards numbers, and other illicit products are all available for purchase on the Dark Web. Early on, Ross Ulbricht, founder of the original Silk Road Dark Web marketplace, incorporated consumer “reviews” on illegal websites to protect customers and to ensure that sellers were not taking advantage of potential buyers. The nature of illicit markets, where websites, vendors, or markets themselves can be online one day and gone the next, present challenges to developing a complete understanding as to how these networks operate. This study builds on existing research by providing an exploratory examination of the prevalence of consumer feedback and review indicators on approximately 50 Dark Web marketplaces. Findings indicate that more than half of explored sites displayed consumer reviews on their postings. Policies incorporating feedback indicators may be implemented to both identify and target for investigation and prosecution highly rated and high-profile sellers on Dark Web markets.","PeriodicalId":47370,"journal":{"name":"Journal of Contemporary Criminal Justice","volume":"39 1","pages":"185 - 200"},"PeriodicalIF":2.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46493773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keeping Pace With the Evolution of Illicit Darknet Fentanyl Markets: Using a Mixed Methods Approach to Identify Trust Signals and Develop a Vendor Trustworthiness Index 跟上非法暗网芬太尼市场的发展:使用混合方法识别信任信号并开发供应商可信度指数
IF 2 2区 社会学 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2023-03-19 DOI: 10.1177/10439862231159530
Marie-Helen Maras, Jana Arsovska, A. S. Wandt, Kenji Logie
Illicit darknet markets (DNMs) are highly uncertain and in a perpetual state of flux. These markets thrive in a zero-trust, high-risk environment. However, the trustworthiness of vendors plays a critical role in illicit transactions and the sustainability of the illegal trade of goods and services on DNMs. Focusing on the illicit fentanyl trade and applying signaling theory and embedded mixed methods design, we examined different ways that trustworthiness is signaled by vendors on darknet sites. Fentanyl, a synthetic opioid, in recent years, has been declared a public health emergency in the United States due to its high potency and unprecedented number of deaths associated with its use; however, the topic remains understudied and requires urgent attention. There are few studies that have focused on fentanyl trafficking on DNMs and no mixed method studies that have focused specifically on trust signals in DNM fentanyl networks. In our research, first, we conducted a focus group and in-depth interviews with criminal justice professionals to understand the inner workings of darknet sites, fentanyl networks, and how trust is assessed. Second, we scraped select darknet sites to collect and curate scraped data for later examination of vendor trustworthiness on DNMs. Third, using signaling theory to understand how vendors signal trustworthiness on select darknet sites selling drugs, including fentanyl, we applied both qualitative and quantitative content analysis of DNM features, and language used in vendor profiles, listings, and product/vendor reviews, to inform the development of a trustworthiness index. In this research, we used software, such as Atlas.ti and Python, to analyze our data. The main purpose of this article is to provide an in-depth description of the mixed methods approach we used to inform the development of a vendor trustworthiness index, which we used to examine trust between illicit fentanyl vendors and buyers. Our research can serve as a guide for the development of DNM vendor trustworthiness index for future research on other illegal markets.
非法暗网市场(DNM)具有高度的不确定性,并且处于不断变化的状态。这些市场在零信任、高风险的环境中蓬勃发展。然而,供应商的可信度在DNM上的非法交易以及商品和服务非法贸易的可持续性方面发挥着关键作用。围绕非法芬太尼贸易,应用信号理论和嵌入式混合方法设计,我们研究了供应商在暗网网站上发出可信度信号的不同方式。芬太尼是一种合成阿片类药物,近年来在美国被宣布为公共卫生紧急事件,因为它的效力很高,与使用相关的死亡人数也前所未有;然而,这一主题仍然研究不足,急需关注。很少有研究关注DNM上的芬太尼贩运,也没有专门关注DNM芬太尼网络中信任信号的混合方法研究。在我们的研究中,首先,我们进行了一个焦点小组,并对刑事司法专业人员进行了深入采访,以了解暗网网站、芬太尼网络的内部运作,以及如何评估信任。其次,我们搜集了一些精选的暗网网站,以收集和整理搜集的数据,以便稍后检查供应商在DNM上的可信度。第三,使用信号理论来了解供应商如何在销售药物(包括芬太尼)的选定暗网网站上发出可信度信号,我们应用了DNM特征的定性和定量内容分析,以及供应商简介、列表和产品/供应商评论中使用的语言,为可信度指数的制定提供信息。在这项研究中,我们使用Atlas.ti和Python等软件来分析我们的数据。本文的主要目的是深入描述我们用来为供应商可信度指数的开发提供信息的混合方法,我们用来检查非法芬太尼供应商和买家之间的信任。我们的研究可以为DNM供应商可信度指数的发展提供指导,用于未来对其他非法市场的研究。
{"title":"Keeping Pace With the Evolution of Illicit Darknet Fentanyl Markets: Using a Mixed Methods Approach to Identify Trust Signals and Develop a Vendor Trustworthiness Index","authors":"Marie-Helen Maras, Jana Arsovska, A. S. Wandt, Kenji Logie","doi":"10.1177/10439862231159530","DOIUrl":"https://doi.org/10.1177/10439862231159530","url":null,"abstract":"Illicit darknet markets (DNMs) are highly uncertain and in a perpetual state of flux. These markets thrive in a zero-trust, high-risk environment. However, the trustworthiness of vendors plays a critical role in illicit transactions and the sustainability of the illegal trade of goods and services on DNMs. Focusing on the illicit fentanyl trade and applying signaling theory and embedded mixed methods design, we examined different ways that trustworthiness is signaled by vendors on darknet sites. Fentanyl, a synthetic opioid, in recent years, has been declared a public health emergency in the United States due to its high potency and unprecedented number of deaths associated with its use; however, the topic remains understudied and requires urgent attention. There are few studies that have focused on fentanyl trafficking on DNMs and no mixed method studies that have focused specifically on trust signals in DNM fentanyl networks. In our research, first, we conducted a focus group and in-depth interviews with criminal justice professionals to understand the inner workings of darknet sites, fentanyl networks, and how trust is assessed. Second, we scraped select darknet sites to collect and curate scraped data for later examination of vendor trustworthiness on DNMs. Third, using signaling theory to understand how vendors signal trustworthiness on select darknet sites selling drugs, including fentanyl, we applied both qualitative and quantitative content analysis of DNM features, and language used in vendor profiles, listings, and product/vendor reviews, to inform the development of a trustworthiness index. In this research, we used software, such as Atlas.ti and Python, to analyze our data. The main purpose of this article is to provide an in-depth description of the mixed methods approach we used to inform the development of a vendor trustworthiness index, which we used to examine trust between illicit fentanyl vendors and buyers. Our research can serve as a guide for the development of DNM vendor trustworthiness index for future research on other illegal markets.","PeriodicalId":47370,"journal":{"name":"Journal of Contemporary Criminal Justice","volume":"39 1","pages":"276 - 297"},"PeriodicalIF":2.0,"publicationDate":"2023-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48235405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Depiction and Classification of the Stolen Data Market Ecosystem and Comprising Darknet Markets: A Multidisciplinary Approach 被盗数据市场生态系统的描述和分类,包括暗网市场:一个多学科的方法
IF 2 2区 社会学 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2023-03-19 DOI: 10.1177/10439862231158005
C. J. Howell, Taylor Fisher, Caitlyn N. Muniz, David Maimon, Yolanda Rotzinger
Scant research has investigated the illicit online ecosystem that enables the sale of stolen data. Even fewer studies have examined the longitudinal trends of the markets on which these data are bought and sold. To fill this gap in the literature, our research team identified 30 darknet markets advertising stolen data products from September 1, 2020, through April 30, 2021. We then developed python web scrapers to systematically extract information pertaining to stolen data products on a weekly basis. Using these data, we calculated the number of vendors, listings, sales, and revenue across the markets and at the aggregate, ecosystem level. Moreover, we developed a data-driven market classification system drawing from ecological principles and dominant firm theory. Findings indicate that markets vary in size and success. Although some markets generated over $91 million in revenue from stolen data products, the median revenue across markets during the observational period was only $95,509. Variability also exists across markets in respect to the number of vendors, listings, and sales. Only three markets were classified as financially successful and stable (i.e., dominant firms). We argue resources should be allocated to target markets fitting these criteria.
很少有研究调查非法的网络生态系统,使被盗数据的销售成为可能。甚至更少的研究考察了这些数据买卖所依据的市场的纵向趋势。为了填补这一文献空白,我们的研究团队确定了30个暗网市场,从2020年9月1日到2021年4月30日,广告被盗数据产品。然后,我们开发了python网络抓取器,系统地每周提取与被盗数据产品有关的信息。利用这些数据,我们计算了整个市场和整个生态系统层面的供应商、列表、销售额和收入的数量。此外,我们还根据生态学原理和主导企业理论建立了一个数据驱动的市场分类系统。研究结果表明,市场的规模和成功程度各不相同。尽管一些市场从被盗数据产品中获得了超过9100万美元的收入,但在观察期间,所有市场的平均收入仅为95,509美元。在不同的市场中,供应商数量、上市数量和销售额也存在差异。只有三个市场被归类为财务成功和稳定(即占主导地位的公司)。我们认为,应将资源分配给符合这些标准的目标市场。
{"title":"A Depiction and Classification of the Stolen Data Market Ecosystem and Comprising Darknet Markets: A Multidisciplinary Approach","authors":"C. J. Howell, Taylor Fisher, Caitlyn N. Muniz, David Maimon, Yolanda Rotzinger","doi":"10.1177/10439862231158005","DOIUrl":"https://doi.org/10.1177/10439862231158005","url":null,"abstract":"Scant research has investigated the illicit online ecosystem that enables the sale of stolen data. Even fewer studies have examined the longitudinal trends of the markets on which these data are bought and sold. To fill this gap in the literature, our research team identified 30 darknet markets advertising stolen data products from September 1, 2020, through April 30, 2021. We then developed python web scrapers to systematically extract information pertaining to stolen data products on a weekly basis. Using these data, we calculated the number of vendors, listings, sales, and revenue across the markets and at the aggregate, ecosystem level. Moreover, we developed a data-driven market classification system drawing from ecological principles and dominant firm theory. Findings indicate that markets vary in size and success. Although some markets generated over $91 million in revenue from stolen data products, the median revenue across markets during the observational period was only $95,509. Variability also exists across markets in respect to the number of vendors, listings, and sales. Only three markets were classified as financially successful and stable (i.e., dominant firms). We argue resources should be allocated to target markets fitting these criteria.","PeriodicalId":47370,"journal":{"name":"Journal of Contemporary Criminal Justice","volume":"39 1","pages":"298 - 317"},"PeriodicalIF":2.0,"publicationDate":"2023-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46017566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trust Factors in the Social Figuration of Online Drug Trafficking: A Qualitative Content Analysis on a Darknet Market 网络毒品交易社会形态中的信任因素:暗网市场定性内容分析
IF 2 2区 社会学 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2023-03-17 DOI: 10.1177/10439862231159996
Akos Szigeti, R. Frank, Tibor Kiss
The rise in illicit drug trafficking on darknet markets (DNMs) was boosted by those restrictions imposed due to the COVID-19 pandemic. This study aims to put this trend into context by exploring the characteristics of vendors’ services and reputations and understand how products are advertised and what customers tend to value. Qualitative content analysis was conducted on a sample (n = 100) randomly selected from 6,357 product descriptions and a sample (n = 500) randomly selected from 34,619 reviews. Both samples are from products found in the drug category of the darknet market Dark0de Reborn. On the supply side, vendors tended to provide basic information on the drugs, a mention of their high quality, the speed and stealth of delivery, their availability for responding to messages, the effects of the drugs, and sometimes even instructions for use. Regarding the demand side, customers usually praised the quality of the product, mentioned the speed and stealth-secure packaging of delivery as essentials, and expressed only a small number of issues. These results support the applicability of Norbert Elias’ social figuration theory in which the interdependencies of the actors are fueled by trust. This theoretical frame sheds light on the social value of the community of DNMs. Furthermore, the findings formulate a robust hypothesis for future research about the previously undervalued role of delivery providers.
由于新冠肺炎大流行而实施的限制措施推动了暗网市场(dnm)非法毒品贩运的增加。本研究旨在通过探索供应商的服务和声誉的特点,了解产品是如何宣传的,以及客户倾向于重视什么,从而将这一趋势置于背景中。从6357个产品描述中随机抽取样本100个,从34619条评论中随机抽取样本500个,进行定性内容分析。这两个样品都来自暗网市场Dark0de Reborn的药品类别。在供应方面,供应商倾向于提供药物的基本信息,提到药物的高质量、运送的速度和隐蔽性、可获得的信息、药物的效果,有时甚至是使用说明。在需求方面,客户通常会称赞产品的质量,提到送货的速度和隐形安全包装是最重要的,只表达了少数问题。这些结果支持了诺伯特·埃利亚斯的社会形象理论的适用性,该理论认为行为者的相互依赖是由信任推动的。这一理论框架阐明了dnm群体的社会价值。此外,研究结果为未来的研究提出了一个强有力的假设,即以前被低估的交付提供者的作用。
{"title":"Trust Factors in the Social Figuration of Online Drug Trafficking: A Qualitative Content Analysis on a Darknet Market","authors":"Akos Szigeti, R. Frank, Tibor Kiss","doi":"10.1177/10439862231159996","DOIUrl":"https://doi.org/10.1177/10439862231159996","url":null,"abstract":"The rise in illicit drug trafficking on darknet markets (DNMs) was boosted by those restrictions imposed due to the COVID-19 pandemic. This study aims to put this trend into context by exploring the characteristics of vendors’ services and reputations and understand how products are advertised and what customers tend to value. Qualitative content analysis was conducted on a sample (n = 100) randomly selected from 6,357 product descriptions and a sample (n = 500) randomly selected from 34,619 reviews. Both samples are from products found in the drug category of the darknet market Dark0de Reborn. On the supply side, vendors tended to provide basic information on the drugs, a mention of their high quality, the speed and stealth of delivery, their availability for responding to messages, the effects of the drugs, and sometimes even instructions for use. Regarding the demand side, customers usually praised the quality of the product, mentioned the speed and stealth-secure packaging of delivery as essentials, and expressed only a small number of issues. These results support the applicability of Norbert Elias’ social figuration theory in which the interdependencies of the actors are fueled by trust. This theoretical frame sheds light on the social value of the community of DNMs. Furthermore, the findings formulate a robust hypothesis for future research about the previously undervalued role of delivery providers.","PeriodicalId":47370,"journal":{"name":"Journal of Contemporary Criminal Justice","volume":"39 1","pages":"167 - 184"},"PeriodicalIF":2.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45642330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Follow the Money: Analyzing Darknet Activity Using Cryptocurrency and the Bitcoin Blockchain 跟踪资金:使用加密货币和比特币区块链分析暗网活动
IF 2 2区 社会学 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2023-03-14 DOI: 10.1177/10439862231157521
Thomas E. Dearden, Samantha E. Tucker
Transactions on the darknet are notoriously difficult to examine. Prior criminological research has generally used web scraping and qualitative text analysis to examine illegal darknet markets. One disadvantage of this process is that individuals can lie. Fortunately for researchers, the currency used for transactions on the darknet, cryptocurrency, is designed to be tracked. In this article, we examine transactions from a former darknet marketplace, AlphaBay. Using the blockchain, we examine the interconnectedness of both legal and illegal cryptocurrencies. In addition, we provide a structured approach to quantitatively examine the Bitcoin blockchain ledger, offering both the tools and our own experiences for other researchers interested in such approaches. While cybersecurity, information technology, accounting, and other disciplines can examine the financial data itself, we believe that criminologists can provide additional benefits in pattern analysis and organizing the context and theory around the transactions. Our results show that cryptocurrency transactions are generally identifiable (90%) and involve likely illegal transactions, transactions that attempt to obfuscate other transactions, and legal transactions. We end with a discussion of newer cryptocurrencies and related technology and how they will likely shape future work.
众所周知,暗网上的交易很难检查。先前的犯罪学研究通常使用网络抓取和定性文本分析来检查非法暗网市场。这个过程的一个缺点是,个人可能会撒谎。对研究人员来说幸运的是,用于暗网交易的货币,加密货币,被设计成可以追踪的。在这篇文章中,我们研究了来自前暗网市场AlphaBay的交易。使用区块链,我们检查合法和非法加密货币的相互关联性。此外,我们提供了一种结构化的方法来定量检查比特币区块链账本,为其他对这种方法感兴趣的研究人员提供了工具和我们自己的经验。虽然网络安全、信息技术、会计和其他学科可以检查金融数据本身,但我们相信,犯罪学家可以在模式分析和组织交易的背景和理论方面提供额外的好处。我们的研究结果表明,加密货币交易通常是可识别的(90%),可能涉及非法交易、试图混淆其他交易的交易以及合法交易。最后,我们将讨论较新的加密货币和相关技术,以及它们可能如何影响未来的工作。
{"title":"Follow the Money: Analyzing Darknet Activity Using Cryptocurrency and the Bitcoin Blockchain","authors":"Thomas E. Dearden, Samantha E. Tucker","doi":"10.1177/10439862231157521","DOIUrl":"https://doi.org/10.1177/10439862231157521","url":null,"abstract":"Transactions on the darknet are notoriously difficult to examine. Prior criminological research has generally used web scraping and qualitative text analysis to examine illegal darknet markets. One disadvantage of this process is that individuals can lie. Fortunately for researchers, the currency used for transactions on the darknet, cryptocurrency, is designed to be tracked. In this article, we examine transactions from a former darknet marketplace, AlphaBay. Using the blockchain, we examine the interconnectedness of both legal and illegal cryptocurrencies. In addition, we provide a structured approach to quantitatively examine the Bitcoin blockchain ledger, offering both the tools and our own experiences for other researchers interested in such approaches. While cybersecurity, information technology, accounting, and other disciplines can examine the financial data itself, we believe that criminologists can provide additional benefits in pattern analysis and organizing the context and theory around the transactions. Our results show that cryptocurrency transactions are generally identifiable (90%) and involve likely illegal transactions, transactions that attempt to obfuscate other transactions, and legal transactions. We end with a discussion of newer cryptocurrencies and related technology and how they will likely shape future work.","PeriodicalId":47370,"journal":{"name":"Journal of Contemporary Criminal Justice","volume":"39 1","pages":"257 - 275"},"PeriodicalIF":2.0,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49131069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Dark Web: What Is It, How to Access It, and Why We Need to Study It 暗网:它是什么,如何访问它,为什么我们需要研究它
IF 2 2区 社会学 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2023-03-11 DOI: 10.1177/10439862231159774
Fawn T. Ngo, Catherine D. Marcum, Scott Belshaw
The dark web is a subsection of the deep web that conventional search engines cannot index. As an encrypted network of websites, the dark web can only be accessed using special browsers such as Tor. Tor, formerly an acronym for “The Onion Router,” is a free and open-source software intended to protect the personal privacy of its users and keep their internet activities unmonitored. While the dark web is known for both legitimate and illegitimate purposes, it remains notorious for facilitating illegal and deviant activities ranging from drug dealing to child pornography, human trafficking, arms dealing, and extremist recruitment. Accordingly, researching and understanding the dark web is a critical and essential step in fighting and preventing cybercrime. However, studying the dark web poses unique challenges. This special issue seeks to provide a platform for researchers and criminologists to share and discuss research designs and methods that help shed light on the actual activity going on in the dark web’s shadowy realms.
暗网是传统搜索引擎无法索引的深层网络的一个子部分。作为一个加密的网站网络,暗网只能使用Tor等特殊浏览器访问。Tor,以前是“洋葱路由器”的缩写,是一款免费开源软件,旨在保护用户的个人隐私,并使他们的互联网活动不受监控。尽管暗网以合法和非法目的而闻名,但它仍然因为非法和越轨活动提供便利而臭名昭著,这些活动包括毒品交易、儿童色情、人口贩运、武器交易和招募极端分子。因此,研究和了解暗网是打击和预防网络犯罪的关键和必不可少的一步。然而,研究暗网带来了独特的挑战。这期特刊旨在为研究人员和犯罪学家提供一个平台,分享和讨论有助于揭示暗网阴影领域实际活动的研究设计和方法。
{"title":"The Dark Web: What Is It, How to Access It, and Why We Need to Study It","authors":"Fawn T. Ngo, Catherine D. Marcum, Scott Belshaw","doi":"10.1177/10439862231159774","DOIUrl":"https://doi.org/10.1177/10439862231159774","url":null,"abstract":"The dark web is a subsection of the deep web that conventional search engines cannot index. As an encrypted network of websites, the dark web can only be accessed using special browsers such as Tor. Tor, formerly an acronym for “The Onion Router,” is a free and open-source software intended to protect the personal privacy of its users and keep their internet activities unmonitored. While the dark web is known for both legitimate and illegitimate purposes, it remains notorious for facilitating illegal and deviant activities ranging from drug dealing to child pornography, human trafficking, arms dealing, and extremist recruitment. Accordingly, researching and understanding the dark web is a critical and essential step in fighting and preventing cybercrime. However, studying the dark web poses unique challenges. This special issue seeks to provide a platform for researchers and criminologists to share and discuss research designs and methods that help shed light on the actual activity going on in the dark web’s shadowy realms.","PeriodicalId":47370,"journal":{"name":"Journal of Contemporary Criminal Justice","volume":"39 1","pages":"160 - 166"},"PeriodicalIF":2.0,"publicationDate":"2023-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45956072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Assessment of Cryptomixing Services in Online Illicit Markets 在线非法市场中加密混合服务的评估
IF 2 2区 社会学 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2023-03-11 DOI: 10.1177/10439862231158004
T. Holt, J. R. Lee, Elizabeth Griffith
The internet has become a popular marketplace for the sale of illicit products, including stolen personal information, drugs, and firearms. Many of these products are acquired using cryptocurrencies, which are generally defined as forms of digital currency that is traceable through blockchain ledger technology. These currencies are thought to be more secure than other forms of digital payment, though law enforcement and financial service providers have found ways to investigate account holders and their transactions. Consequently, several service providers have begun to offer cryptomixing services, which effectively launders payments to circumvent detection and investigation tools. Few have explored the practices of cryptomixing services, or the ways in which they are marketed on the Open and Dark Web. This inductive qualitative analysis will examine a sample of 18 cryptomixing services advertised on both the Open and Dark Web to better understand cryptomixing and its role in facilitating illicit transactions across the internet.
互联网已经成为销售非法产品的热门市场,包括被盗的个人信息、毒品和枪支。这些产品中的许多都是使用加密货币购买的,加密货币通常被定义为可通过区块链分类账技术追踪的数字货币形式。这些货币被认为比其他形式的数字支付更安全,尽管执法部门和金融服务提供商已经找到了调查账户持有人及其交易的方法。因此,一些服务提供商已经开始提供加密服务,这种服务可以有效地洗钱,以绕过检测和调查工具。很少有人探索过密码混合服务的实践,或者它们在开放网络和暗网上的营销方式。这一归纳定性分析将对公开网和暗网上广告的18种加密服务进行抽样调查,以更好地了解加密技术及其在促进互联网非法交易方面的作用。
{"title":"An Assessment of Cryptomixing Services in Online Illicit Markets","authors":"T. Holt, J. R. Lee, Elizabeth Griffith","doi":"10.1177/10439862231158004","DOIUrl":"https://doi.org/10.1177/10439862231158004","url":null,"abstract":"The internet has become a popular marketplace for the sale of illicit products, including stolen personal information, drugs, and firearms. Many of these products are acquired using cryptocurrencies, which are generally defined as forms of digital currency that is traceable through blockchain ledger technology. These currencies are thought to be more secure than other forms of digital payment, though law enforcement and financial service providers have found ways to investigate account holders and their transactions. Consequently, several service providers have begun to offer cryptomixing services, which effectively launders payments to circumvent detection and investigation tools. Few have explored the practices of cryptomixing services, or the ways in which they are marketed on the Open and Dark Web. This inductive qualitative analysis will examine a sample of 18 cryptomixing services advertised on both the Open and Dark Web to better understand cryptomixing and its role in facilitating illicit transactions across the internet.","PeriodicalId":47370,"journal":{"name":"Journal of Contemporary Criminal Justice","volume":"39 1","pages":"222 - 238"},"PeriodicalIF":2.0,"publicationDate":"2023-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47516350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mapping Real-World Use of the Onion Router 映射洋葱路由器的实际使用
IF 2 2区 社会学 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2023-03-11 DOI: 10.1177/10439862231157553
A. Ghazi-Tehrani
Since its inception, The Onion Router (TOR) has been discussed as an anonymizing tool used for nefarious purposes. Past scholarship has focused on publicly available lists of onion URLs containing illicit or illegal content. The current study is an attempt to move past these surface-level explanations and into a discussion of actual use data; a multi-tiered system to identify real-world TOR traffic was developed for the task. The researcher configured and deployed a fully functioning TOR “exit” node for public use. A Wireshark instance was placed between the node and the “naked” internet to collect usage data (destination URLs, length of visit, etc.), but not to deanonymize or otherwise unmask TOR users. For 6 months, the node ran and collected data 24 hr per day, which produced a data set of over 4.5 terabytes. Using Python, the researcher developed a custom tool to filter the URLs into human-readable form and to produce descriptive data. All URLs were coded and categorized into a variety of classifications, including e-commerce, banking, social networking, pornography, and cryptocurrency. Findings reveal that most TOR usage is rather benign, with users spending much more time on social networking and e-commerce sites than on those with illegal drug or pornographic content. Likewise, visits to legal sites vastly outnumber visits to illegal ones. Although most URLs collected were for English-language websites, there were a sizable amount for Russian and Chinese sites, which may demonstrate the utilization of TOR in countries where internet access is censored or monitored by government actors. Akin to other new technologies which have earned bad reputations, such as file-sharing program BitTorrent and intellectual property theft or cryptocurrency Bitcoin and online drug sales, this study demonstrates that TOR is utilized by offenders and non-offenders alike.
自成立以来,洋葱路由器(TOR)一直被认为是一种用于邪恶目的的匿名工具。过去的学术研究主要集中在公开的洋葱网址列表中,这些网址包含非法或非法内容。目前的研究试图超越这些表面层面的解释,转而讨论实际使用数据;为该任务开发了一个用于识别真实世界TOR流量的多层系统。研究人员配置并部署了一个功能齐全的TOR“出口”节点供公众使用。Wireshark实例被放置在节点和“裸”互联网之间,以收集使用数据(目的地URL、访问长度等),但不是为了匿名或以其他方式揭开TOR用户的面纱。在6个月的时间里,该节点每天24小时运行和收集数据,产生了超过4.5 TB的数据集。研究人员使用Python开发了一种自定义工具,将URL过滤成人类可读的形式,并生成描述性数据。所有URL都经过编码并分类为各种类型,包括电子商务、银行、社交网络、色情和加密货币。研究结果显示,大多数TOR的使用都是良性的,用户在社交网络和电子商务网站上花费的时间比那些拥有非法毒品或色情内容的用户多得多。同样,访问合法网站的次数远远超过访问非法网站的次数。尽管收集到的大多数URL都是针对英语网站的,但俄语和中文网站也有相当多的URL,这可能表明TOR在互联网访问受到政府行为者审查或监控的国家的使用情况。与其他声誉不佳的新技术类似,如文件共享程序BitTorrent和知识产权盗窃或加密货币比特币和在线毒品销售,这项研究表明TOR被罪犯和非罪犯利用。
{"title":"Mapping Real-World Use of the Onion Router","authors":"A. Ghazi-Tehrani","doi":"10.1177/10439862231157553","DOIUrl":"https://doi.org/10.1177/10439862231157553","url":null,"abstract":"Since its inception, The Onion Router (TOR) has been discussed as an anonymizing tool used for nefarious purposes. Past scholarship has focused on publicly available lists of onion URLs containing illicit or illegal content. The current study is an attempt to move past these surface-level explanations and into a discussion of actual use data; a multi-tiered system to identify real-world TOR traffic was developed for the task. The researcher configured and deployed a fully functioning TOR “exit” node for public use. A Wireshark instance was placed between the node and the “naked” internet to collect usage data (destination URLs, length of visit, etc.), but not to deanonymize or otherwise unmask TOR users. For 6 months, the node ran and collected data 24 hr per day, which produced a data set of over 4.5 terabytes. Using Python, the researcher developed a custom tool to filter the URLs into human-readable form and to produce descriptive data. All URLs were coded and categorized into a variety of classifications, including e-commerce, banking, social networking, pornography, and cryptocurrency. Findings reveal that most TOR usage is rather benign, with users spending much more time on social networking and e-commerce sites than on those with illegal drug or pornographic content. Likewise, visits to legal sites vastly outnumber visits to illegal ones. Although most URLs collected were for English-language websites, there were a sizable amount for Russian and Chinese sites, which may demonstrate the utilization of TOR in countries where internet access is censored or monitored by government actors. Akin to other new technologies which have earned bad reputations, such as file-sharing program BitTorrent and intellectual property theft or cryptocurrency Bitcoin and online drug sales, this study demonstrates that TOR is utilized by offenders and non-offenders alike.","PeriodicalId":47370,"journal":{"name":"Journal of Contemporary Criminal Justice","volume":"39 1","pages":"239 - 256"},"PeriodicalIF":2.0,"publicationDate":"2023-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44904317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Corrigendum to Against All Odds, Femicide Did Not Increase During the First Year of the COVID-19 Pandemic: Evidence From Six Spanish-Speaking Countries 排除万难,在COVID-19大流行的第一年,杀害妇女的行为没有增加:来自六个西班牙语国家的证据
2区 社会学 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2023-01-06 DOI: 10.1177/10439862221144865
The article uses threshold models —as developed by Bruce (2008, 2012) and adapted by Maldonado-Guzmán et al. (2020)— to measure whether the number of femicides recorded in each country in 2020 differed significantly from the average number recorded from 2017 to 2019. However, due to a misinterpretation of the formula proposed by Maldonado-Guzmán et al. (2020), there is a mistake in the estimation of the Z-scores. Concretely, the formula applied in the article is based on the weighted standard deviation and includes the year 2020, when it should have been based on the standard deviation and exclude that year. Consequently, the last two paragraphs of the section Data Analysis (pages 626-627) should read as follows:
{"title":"Corrigendum to Against All Odds, Femicide Did Not Increase During the First Year of the COVID-19 Pandemic: Evidence From Six Spanish-Speaking Countries","authors":"","doi":"10.1177/10439862221144865","DOIUrl":"https://doi.org/10.1177/10439862221144865","url":null,"abstract":"The article uses threshold models —as developed by Bruce (2008, 2012) and adapted by Maldonado-Guzmán et al. (2020)— to measure whether the number of femicides recorded in each country in 2020 differed significantly from the average number recorded from 2017 to 2019. However, due to a misinterpretation of the formula proposed by Maldonado-Guzmán et al. (2020), there is a mistake in the estimation of the Z-scores. Concretely, the formula applied in the article is based on the weighted standard deviation and includes the year 2020, when it should have been based on the standard deviation and exclude that year. Consequently, the last two paragraphs of the section Data Analysis (pages 626-627) should read as follows:","PeriodicalId":47370,"journal":{"name":"Journal of Contemporary Criminal Justice","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135276831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Journal of Contemporary Criminal Justice
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1