Troll Hunting

Total Page:16

File Type:pdf, Size:1020Kb

Troll Hunting For my father, Brian, who taught me to love wor ds. Hell is empty, and all the devils are here. William Shakespeare, The Tempest, Act 1, Scene 2 THIS IS A work of nonfiction, researched and documented to the best of my ability. There were significant security risks in writing this book. I sought expert advice and wrote according to it. Therefore, some of the trolling syndicates mentioned within these pages have been given pseudonyms or go unnamed. Likewise, some of the trolls themselves are discussed only with a pseudonym. A few of the trolls who spoke to me behind the scenes are not named at all and others are composites or have been segmented. Some readers may be critical of the decision to provide anonymity for people who are hurting others so much. However, sometimes access to information comes at a cost – and, all things being equal, the trolls gave me great access. By the same token, some predator-troll victims are in physical danger. This is especially true where domestic violence is involved. In those cases, names and other identifying details may have been altered but the facts of the stories are unchanged. I have worked hard to quote all interviewees verbatim, but for the sake of readability have corrected some spelling errors and syntax. When I’m messaging with trolls in the United States, I use Australian spelling and they use American spelling. For authenticity, I’ve left this as is. This is a book about the internet and how it bleeds into real life. When quoting links and screenshots, I’ve aimed for accuracy. However, the internet is not a static beast. Some posts have changed or disappeared in the time since I started writing. There’s something else. Trolls frequently use language that is designed to shock. It can be deeply offensive, as can their actions. This book invites you to look harder and think harder. If words were neutral, people wouldn’t use them like this. Words are a weapon – and a gateway to much greater harm. – Ginger Contents Cover Page Title Page Preface Part 1: Trolls 1 The paedophiles, the trolls and the journalist 2 WTF is trolling? 3 Meet the trolls 4 When the flowers grow funny 5 You are literally the enemy Notes in the margins: What the fuck did you expect? Part 2: Targets 6 She was asking for it 7 Misogyny on the internet 8 Deep in the grey 9 Your demons are omnipresent 10 Not much cop 11 Champions of free speech controlling the message Notes in the margins: White women are cancer Part 3: Troll hunting 12 Hunting a terrorist troll 13 The internet was my parent 14 White men at the centre 15 A professional racist Notes in the margins: The hardest conversation of all Conclusion: Reaching back across the cold water Endnotes Acknowledgements Copyright Page Preface 12 December 2017 As a compulsive social media checker, I can’t help it: I click on the Twitter notification straight away. Even after all this time, the sight of his name makes my skin prickle. This is ‘Mark’, the vicious and committed internet troll. He’s a member of an international online syndicate that tries to harm people and wreck their lives. They document all their exploits on their website. We’ve been in contact for a couple of years now. He’ll go quiet for a while and then suddenly there he is again, trying to reel me in. This time he’s sent me a link to a CNN story.1 It’s about William Atchison, a 21-year-old man who shot and killed two teenagers – Casey Jordan Marquez and Francisco Fernandez – in a New Mexico school a few days earlier. Atchison died at the scene from a self-inflicted gunshot wound. ‘One of my admins was the shooter,’ Mark writes. He’s involved in running a trolling-related wiki and so, apparently, was Atchison. A familiar, creeping anxiety sits low in my stomach. According to Mark himself, trolls lie and their game is to hurt you. Staying calm is the only tool I’ve got; predator trolls like Mark can sense your fear. With artificial steadiness, I reply, ‘Prove it.’ He sends me another link. It contains reams of information about the shooter and his miserable online life. It’s encyclopaedic: photos of Atchison as an adult and also as a sweet-faced, freckled kid. In one photo he’s with a black-and-white cat and in another he’s with a curly haired spaniel. The pet images are dated July 2008. Atchison would have been twelve years old. He liked animals and somehow this makes the slaughter harder to believe. The link includes the shooter’s birthdate, email addresses, his dozens of online usernames and profiles, his IP address and the time and date he last logged on to this forum. His exact location – latitude and longitude – are listed. There are links to his bigoted, hopeless rants and endless ‘jokes’ and memes about the 1999 Columbine High School massacre. I’m scanning the links and threads, looking for something. I’m not sure what until I find it; a sketch of his world: How am I supposed to function in this world? Wherever I go, I see degeneracy. Pointless materialism, hedonism, sexual decay, dirty niggers who do nothing but slowly break down this society etc. it’s fucking everywhere. No way to escape it, 99% of people are part of it and whatever I do I am confronted with the death of the West. Go to the store to buy groceries in peace? Nope here’s a group of LGBT liberal filth in line with you. And there’s a nigger family with 10 kids over there. And a Finn too, but he’s overweight as fuck and he’s buying alcohol and shit junk food. Fucking fantastic. I used to think that this was a phase and we’d get over it but I have now come to realise that I was born into a literal dystopia. I’m fighting off a suffocating sadness. How did this kid come to be so filled with hate? Why didn’t anyone help him before he became a killer? Clicking and scrolling. Clicking and scrolling. Then I’m staring at a photo of one of the victims. Casey Jordan Marquez’s floral skirt has caught the wind and she’s smiling. She’s so young. In his photo, Francisco Fernandez’s hands are clasped together and he’s smiling too – as if he knows something you don’t.2 These kids are in the morgue now. Their parents may well be visiting their bodies as Mark and I correspond. The police seemed unaware of Atchison’s plans. Sheriff Ken Christensen from the New Mexico State Police said, ‘It’s just a shame that he [Atchison] wasn’t on our radar. I don’t think he had as much as a traffic ticket or anything else here locally … I don’t think that we know so far that anyone else knew of his intentions.’3 But Mark and his trolling buddies knew. One of the trolls on the forum where Atchison’s details are posted writes: ‘Maybe we should have actually said something instead of laughing at him about it for years lol.’ The ‘laugh out loud’ is deftly placed, right at the end of the sentence so that any regret is negated: No, we shouldn’t have done anything, except what we did do – nothing. The ‘lol’ means this is for laughs. Or ‘lulz’, as the trolls like to say. Another person on the forum writes, ‘Rest in piss’, and a third poster describes Atchison as ‘an hero’. For the unanointed, ‘an hero’ in trolling culture is anyone who dies by suicide. It sometimes comes with the added implication that the person was somehow incompetent.4 In some detail, Mark describes Atchison’s obsession with mass shootings. ‘His entire life revolved around talking about the Columbine school shooting,’ he explains. Then, a few moments later: ‘I just saw what he was posting and talking about and knew it was only a matter of time.’ ‘You wouldn’t report that to the police?’ I ask, knowing he’d never report something like this. Predictably, he replies, ‘I’m not going to report something like that because it doesn’t bother me but if someone had asked me I would have told them that he was a threat.’ The FBI had interviewed Atchison, along with members of his family, in March 2016 after he made some alarming comments on a gaming forum about mass shootings. But as the would-be killer hadn’t yet committed a crime, they were obliged to let him go. During a press conference with New Mexico police, FBI agent Terry Wade recalled: ‘We did conduct an interview with him at his home and we talked to him extensively. He was cooperative. At that time he didn’t have any guns … he told us that he enjoyed trolling on the internet …’ At this point in our conversation Mark senses an opportunity. ‘Tbh [to be honest] I’m disappointed he aimed so high and for so long but only managed 2 [victims].’ Two years earlier, when Mark and I first came into contact, a comment like this would have enraged me to the point of lashing out. He knows this much about me, but perhaps doesn’t realise I’ve changed since then. He’s still trying. Still pushing to get a rise.
Recommended publications
  • The Internet and Drug Markets
    INSIGHTS EN ISSN THE INTERNET AND DRUG MARKETS 2314-9264 The internet and drug markets 21 The internet and drug markets EMCDDA project group Jane Mounteney, Alessandra Bo and Alberto Oteo 21 Legal notice This publication of the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) is protected by copyright. The EMCDDA accepts no responsibility or liability for any consequences arising from the use of the data contained in this document. The contents of this publication do not necessarily reflect the official opinions of the EMCDDA’s partners, any EU Member State or any agency or institution of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). More information on the European Union is available on the internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2016 ISBN: 978-92-9168-841-8 doi:10.2810/324608 © European Monitoring Centre for Drugs and Drug Addiction, 2016 Reproduction is authorised provided the source is acknowledged. This publication should be referenced as: European Monitoring Centre for Drugs and Drug Addiction (2016), The internet and drug markets, EMCDDA Insights 21, Publications Office of the European Union, Luxembourg. References to chapters in this publication should include, where relevant, references to the authors of each chapter, together with a reference to the wider publication. For example: Mounteney, J., Oteo, A. and Griffiths, P.
    [Show full text]
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • An Evolving Threat the Deep Web
    8 An Evolving Threat The Deep Web Learning Objectives distribute 1. Explain the differences between the deep web and darknets.or 2. Understand how the darknets are accessed. 3. Discuss the hidden wiki and how it is useful to criminals. 4. Understand the anonymity offered by the deep web. 5. Discuss the legal issues associated withpost, use of the deep web and the darknets. The action aimed to stop the sale, distribution and promotion of illegal and harmful items, including weapons and drugs, which were being sold on online ‘dark’ marketplaces. Operation Onymous, coordinated by Europol’s Europeancopy, Cybercrime Centre (EC3), the FBI, the U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) and Eurojust, resulted in 17 arrests of vendors andnot administrators running these online marketplaces and more than 410 hidden services being taken down. In addition, bitcoins worth approximately USD 1 million, EUR 180,000 Do in cash, drugs, gold and silver were seized. —Europol, 20141 143 Copyright ©2018 by SAGE Publications, Inc. This work may not be reproduced or distributed in any form or by any means without express written permission of the publisher. 144 Cyberspace, Cybersecurity, and Cybercrime THINK ABOUT IT 8.1 Surface Web and Deep Web Google, Facebook, and any website you can What Would You Do? find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located 1. The deep web offers users an anonym- on the surface web. It is likely that when you ity that the surface web cannot provide. use the Internet for research and/or social What would you do if you knew that purposes you are using the surface web.
    [Show full text]
  • Ironic Feminism: Rhetorical Critique in Satirical News Kathy Elrick Clemson University, [email protected]
    Clemson University TigerPrints All Dissertations Dissertations 12-2016 Ironic Feminism: Rhetorical Critique in Satirical News Kathy Elrick Clemson University, [email protected] Follow this and additional works at: https://tigerprints.clemson.edu/all_dissertations Recommended Citation Elrick, Kathy, "Ironic Feminism: Rhetorical Critique in Satirical News" (2016). All Dissertations. 1847. https://tigerprints.clemson.edu/all_dissertations/1847 This Dissertation is brought to you for free and open access by the Dissertations at TigerPrints. It has been accepted for inclusion in All Dissertations by an authorized administrator of TigerPrints. For more information, please contact [email protected]. IRONIC FEMINISM: RHETORICAL CRITIQUE IN SATIRICAL NEWS A Dissertation Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Rhetorics, Communication, and Information Design by Kathy Elrick December 2016 Accepted by Dr. David Blakesley, Committee Chair Dr. Jeff Love Dr. Brandon Turner Dr. Victor J. Vitanza ABSTRACT Ironic Feminism: Rhetorical Critique in Satirical News aims to offer another perspective and style toward feminist theories of public discourse through satire. This study develops a model of ironist feminism to approach limitations of hegemonic language for women and minorities in U.S. public discourse. The model is built upon irony as a mode of perspective, and as a function in language, to ferret out and address political norms in dominant language. In comedy and satire, irony subverts dominant language for a laugh; concepts of irony and its relation to comedy situate the study’s focus on rhetorical contributions in joke telling. How are jokes crafted? Who crafts them? What is the motivation behind crafting them? To expand upon these questions, the study analyzes examples of a select group of popular U.S.
    [Show full text]
  • Hacking for ISIS: the Emergent Cyber Threat Landscape
    Hacking for ISIS: The Emergent Cyber Threat Landscape By Laith Alkhouri, Alex Kassirer, & Allison Nixon April 2016 Hacking For ISIS Contents Click on a title to navigate to the page Introduction ...........................................................................................................................................2 Cyber Caliphate ...................................................................................................................................3 Islamic State Hacking Division .......................................................................................................6 Islamic Cyber Army ............................................................................................................................9 Rabitat Al-Ansar ................................................................................................................................ 12 Sons Caliphate Army ...................................................................................................................... 15 United Cyber Caliphate .................................................................................................................. 17 Techniques, Tactics, & Procedures (TTPs) .............................................................................. 20 The Future of ISIS’s Cyber Capabilities .................................................................................... 24 Conclusion .........................................................................................................................................
    [Show full text]
  • USA -V- Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • MIAMI UNIVERSITY the Graduate School
    MIAMI UNIVERSITY The Graduate School Certificate for Approving the Dissertation We hereby approve the Dissertation of Bridget Christine Gelms Candidate for the Degree Doctor of Philosophy ______________________________________ Dr. Jason Palmeri, Director ______________________________________ Dr. Tim Lockridge, Reader ______________________________________ Dr. Michele Simmons, Reader ______________________________________ Dr. Lisa Weems, Graduate School Representative ABSTRACT VOLATILE VISIBILITY: THE EFFECTS OF ONLINE HARASSMENT ON FEMINIST CIRCULATION AND PUBLIC DISCOURSE by Bridget C. Gelms As our digital environments—in their inhabitants, communities, and cultures—have evolved, harassment, unfortunately, has become the status quo on the internet (Duggan, 2014 & 2017; Jane, 2014b). Harassment is an issue that disproportionately affects women, particularly women of color (Citron, 2014; Mantilla, 2015), LGBTQIA+ women (Herring et al., 2002; Warzel, 2016), and women who engage in social justice, civil rights, and feminist discourses (Cole, 2015; Davies, 2015; Jane, 2014a). Whitney Phillips (2015) notes that it’s politically significant to pay attention to issues of online harassment because this kind of invective calls “attention to dominant cultural mores” (p. 7). Keeping our finger on the pulse of such attitudes is imperative to understand who is excluded from digital publics and how these exclusions perpetuate racism and sexism to “preserve the internet as a space free of politics and thus free of challenge to white masculine heterosexual hegemony” (Higgin, 2013, n.p.). While rhetoric and writing as a field has a long history of examining myriad exclusionary practices that occur in public discourses, we still have much work to do in understanding how online harassment, particularly that which is gendered, manifests in digital publics and to what rhetorical effect.
    [Show full text]
  • JW Apostate Reply Supporting Motion to Quash April 6Th
    Case 7:20-mc-00119-CS Document 13 Filed 04/06/20 Page 1 of 21 1 JANE / JOHN DOE 2 Email: [email protected] 3 4 Pro se 5 IN THE UNITED STATES DISTRICT COURT FOR THE 6 SOUTHERN DISTRICT OF NEW YORK 7 8 IN RE: DMCA SUBPOENA TO GOOGLE, LLC Case No.: 7:20-mc-00119 9 10 JANE / JOHN DOE’S REPLY IN SUPPORT OF THE OBJECTION AND MOTION TO 11 QUASH DMCA SUBPOENA 12 13 A. INTRODUCTION 14 15 While it is true that Jehovah’s Witnesses are well known for their distribution of 16 Bible based books and publications, they are also a notorious group of criminal 17 pedophiles running a scam “religion” who are guilty of abuse of process and emotional 18 19 extortion through sham litigation in their pathetic efforts at discovering leaks and 20 moles and whistleblowers. Unfortunately for them, this is the year 2020 and things 21 22 like VPNs, anonymous proxies, and TOR exit nodes frustrate them at every turn. 23 Whether one is known as Darkspilver or John Redwood or JW Apostate, or any 24 number of other pseudonyms, it does not really matter as we are all Spartacus in this 25 26 fight! Reporting on and exposing to public comment and ridicule the doctrinal 27 inconsistencies and reversals, failed predictions, mistranslation of the Bible, harsh 28 JANE / JOHN DOE’S REPLY IN SUPPORT OF OBJECTION AND MOTION TO QUASH DMCA SUBPOENA- 1 Case 7:20-mc-00119-CS Document 13 Filed 04/06/20 Page 2 of 21 1 treatment of former members and autocratic and coercive leadership (not to mention 2 the child raping!) is a public duty that Jane / John Doe takes extremely seriously at 3 1 great personal risk.
    [Show full text]
  • Mapping Right-Wing Extremism in Victoria Applying a Gender Lens to Develop Prevention and Deradicalisation Approaches
    MAPPING RIGHT-WING EXTREMISM IN VICTORIA APPLYING A GENDER LENS TO DEVELOP PREVENTION AND DERADICALISATION APPROACHES Authors: Dr Christine Agius, Associate Professor Kay Cook, Associate Professor Lucy Nicholas, Dr Ashir Ahmed, Dr Hamza bin Jehangir, Noorie Safa, Taylor Hardwick & Dr Sally Clark. This research was supported by the Victorian Department of Justice and Community Safety Acknowledgments We would like to thank Dr Robin Cameron, Professor Laura Shepherd and Dr Shannon Zimmerman for their helpful advice and support. We also thank the stakeholders who participated in this research for their important feedback and insights which helped shape this report. All authors were employees of Swinburne University of Technology for the purpose of this research, except for Associate Professor Lucy Nicholas who is employed by Western Sydney University. Publication Design by Mina Teh, Swinburne Design Bureau. Disclaimer This report does not constitute Victorian Government policy. The content of this publication is solely the responsibility of the authors and does not necessarily represent the views of the Victorian Government. Suggested Citation Agius C, Cook K, Nicholas L, Ahmed A, bin Jehangir H, Safa N, Hardwick T & Clark S. (2020). Mapping right-wing extremism in Victoria. Applying a gender lens to develop prevention and deradicalisation approaches. Melbourne: Victorian Government, Department of Justice and Community Safety: Countering Violent Extremism Unit and Swinburne University of Technology. ISBN: 978-1-925761-24-5 (Print) 978-1-925761-25-2 (Digital) DOI: https://doi.org/10.25916/5f3a26da94911 TABLE OF CONTENTS Executive summary 2 Background 2 Aims 2 Main Findings 2 Policy Considerations 2 Glossary 3 A. Project Overview 6 Overview and Background 6 Aims and Objectives 6 Scope and Gap 6 B.
    [Show full text]
  • Introduction Points
    Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database) TORLINKS Directory for .onion sites, moderated. Core.onion - Simple onion bootstrapping Deepsearch - Another search engine. DuckDuckGo - A Hidden Service that searches the clearnet. TORCH - Tor Search Engine. Claims to index around 1.1 Million pages. Welcome, We've been expecting you! - Links to basic encryption guides. Onion Mail - SMTP/IMAP/POP3. ***@onionmail.in address. URSSMail - Anonymous and, most important, SECURE! Located in 3 different servers from across the globe. Hidden Wiki Mirror - Good mirror of the Hidden Wiki, in the case of downtime. Where's pedophilia? I WANT IT! Keep calm and see this. Enter at your own risk. Site with gore content is well below. Discover it! Financial Services Currencies, banks, money markets, clearing houses, exchangers. The Green Machine Forum type marketplace for CCs, Paypals, etc.... Some very good vendors here!!!! Paypal-Coins - Buy a paypal account and receive the balance in your bitcoin wallet. Acrimonious2 - Oldest escrowprovider in onionland. BitBond - 5% return per week on Bitcoin Bonds. OnionBC Anonymous Bitcoin eWallet, mixing service and Escrow system. Nice site with many features. The PaypalDome Live Paypal accounts with good balances - buy some, and fix your financial situation for awhile. EasyCoin - Bitcoin Wallet with free Bitcoin Mixer. WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more. Cheap Euros - 20€ Counterfeit bills. Unbeatable prices!! OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry. BestPal BestPal is your Best Pal, if you need money fast. Sells stolen PP accounts.
    [Show full text]
  • Brenton Tarrant: the Processes Which Brought Him to Engage in Political Violence
    CSTPV Short Papers Brenton Tarrant: the processes which brought him to engage in political violence Beatrice Williamson 1 Contents Introduction .......................................................................................................................... 3 Brenton Tarrant .................................................................................................................... 3 Conceptualising Tarrant and his violence ............................................................................. 5 The Lone Actor Puzzle ........................................................................................................... 5 ‘A dark social web’: online ‘radicalisation’ ............................................................................ 7 Online communities: Social Network Ties and Framing .................................................... 7 Funnelling and Streams ..................................................................................................... 9 Conclusion ........................................................................................................................... 11 Bibliography ........................................................................................................................ 12 2 Introduction Individual radicalisation is a complex and bespoke process influenced by multiple factors and variables, meaning every individual follows their own path to terrorism and political violence. This paper will endeavour to demonstrate and explore some of the
    [Show full text]
  • Longitudinal Analysis of Misuse of Bitcoin⋆
    Longitudinal Analysis of Misuse of Bitcoin? Karim Eldefrawy1, Ashish Gehani1, and Alexandre Matton2?? 1 SRI International, USA 2 Stanford University, USA Abstract. We conducted a longitudinal study to analyze the misuse of Bitcoin. We first investigated usage characteristics of Bitcoin by analyz- ing how many addresses each address transacts with (from January 2009 to May 2018). To obtain a quantitative estimate of the malicious activity that Bitcoin is associated with, we collected over 2.3 million candidate Bitcoin addresses, harvested from the dark web between June 2016 and December 2017. The Bitcoin addresses found on the dark web were la- beled with tags that classified the activities associated with the onions that these addresses were collected from. The tags covered a wide range of activities, from suspicious to outright malicious or illegal. Of these addresses, only 47,697 have tags we consider indicative of suspicious or malicious activities. We saw a clear decline in the monthly number of Bitcoin addresses seen on the dark web in the periods coinciding with takedowns of known dark web markets. We also found interesting behavior that distinguishes the Bitcoin addresses collected from the dark web when compared to activity of a random address on the Bitcoin blockchain. For example, we found that Bitcoin addresses used on the dark web are more likely to be involved in mixing transactions. To identify mixing transactions, we developed a new heuristic that extends previously known ones. We found that Bitcoin addresses found on the dark web are significantly more ac- tive, they engage in transactions with 20 times the neighbors and 4 times the Bitcoin amounts when compared to random addresses.
    [Show full text]