In Focus Trafficking Over the Darknet

Total Page:16

File Type:pdf, Size:1020Kb

In Focus Trafficking Over the Darknet IN FOCUS TRAFFICKING OVER THE DARKNET CROSS-CUTTING ISSUES: EVOLVING TRENDS AND 4 NEW CHALLENGES 2020 This publication may be reproduced in whole or in part and in any form for educational or non-profit purposes without special permission from the copyright holder, provided acknowledgement of the source is made. The United Nations Office on Drugs and Crime (UNODC) would appreciate receiving a copy of any publication that uses this publication as a source. Suggested citation: In Focus: Trafficking over the Darknet - World Drug Report 2020. No use of this publication may be made for resale or any other commercial purpose whatsoever without prior permission in writing from UNODC. Applications for such permission, with a statement of purpose and intent of the reproduction, should be addressed to the Research and Trend Analysis Branch of UNODC. DISCLAIMER The content of this publication does not necessarily reflect the views or policies of UNODC or contributory organizations, nor does it imply any endorsement. Comments on the report are welcome and can be sent to: Division for Policy Analysis and Public Affairs United Nations Office on Drugs and Crime PO Box 500 1400 Vienna Austria Tel: (+43) 1 26060 0 Fax: (+43) 1 26060 5827 E-mail: [email protected] Website: www.unodc.org/wdr2020 2020 WORLD DRUG REPORT Acknowledgements The World Drug Report 2020 was prepared by the Research and Trend Analysis Branch, Division for Policy Analysis and Public Affairs, United Nations Office on Drugs and Crime (UNODC), under the supervi- sion of Jean-Luc Lemahieu, Director of the Division, and Angela Me, Chief of the Research and Trend Analysis Branch, and the coordination of Chloé Carpentier, Chief of the Drug Research Section. Content overview Graphic design and production Chloé Carpentier Anja Korenblik Angela Me Suzanne Kunnen Kristina Kuttnig Analysis and drafting Federica Martinelli Thomas Pietschmann Administrative support Editing Andrada-Maria Filip Jonathan Gibbons Iulia Lazar Review and comments The World Drug Report 2020 benefited from the expertise of and invaluable contributions from UNODC colleagues in all divisions. The Research and Trend Analysis Branch acknowledges the invaluable contributions and advice provided by the World Drug Report Scientific Advisory Committee: Jonathan Caulkins Afarin Rahimi-Movaghar Paul Griffiths Peter Reuter Marya Hynes Alison Ritter Vicknasingam B. Kasinather Francisco Thoumi Charles Parry The analysis on purchases of drugs on the darknet is based on original data graciously shared by the Global Drug Survey team. 2 EXPLANATORY NOTES The designations employed and the presentation of The following abbreviations have been used in the the material in the World Drug Report do not imply present booklet: the expression of any opinion whatsoever on the part of the Secretariat of the United Nations con- alpha-PVP alpha-pyrrolidinovalerophenone cerning the legal status of any country, territory, city APAAN alpha-phenylacetoacetonitrile or area, or of its authorities, or concerning the delim- ATS amphetamine-type stimulants itation of its frontiers or boundaries. Countries and areas are referred to by the names CBD cannabidiol that were in official use at the time the relevant data DEA Drug Enforcement Administration were collected. EMCDDA European Monitoring Centre for Since there is some scientific and legal ambiguity Drugs and Drug Addiction about the distinctions between “drug use”, “drug misuse” and “drug abuse”, the neutral term “drug Europol European Union Agency for Law use” is used in the World Drug Report. The term Enforcement Cooperation “misuse” is used only to denote the non-medical use GDP gross domestic product of prescription drugs. INCB International Narcotics Control All uses of the word “drug” and the term “drug use” Board in the World Drug Report refer to substances con- trolled under the international drug control INTERPOL International Criminal Police conventions, and their non-medical use. Organization All analysis contained in the World Drug Report is LSD lysergic acid diethylamide based on the official data submitted by Member MAPA methyl alpha-phenylacetoacetate States to the UNODC through the annual report MDA methylenedioxyamphetamine questionnaire unless indicated otherwise. The data on population used in the World Drug MDMA 3,4-methylenedioxymethampheta- Report are taken from: World Population Prospects: mine The 2019 Revision (United Nations, Department MDPV methylenedioxypyrovalerone of Economic and Social Affairs, Population 4-MEC 4-methylethcathinone Division). References to dollars ($) are to United States dollars, 3-MMC 3-methylmethcathinone unless otherwise stated. 4-MMC 4-methylmethcathinone References to tons are to metric tons, unless other- NPS new psychoactive substances wise stated. PCP phencyclidine P-2-P 1-phenyl-2-propanone PMK piperonyl methyl ketone S-DDD defined daily doses for statistical purposes THC Δ-9 – tetrahydrocannabinol UNODC United Nations Office on Drugs and Crime 3 Drug trafficking over the darknet buyer.254, 255 Parcels are often sent to anonymous DRUG TRAFFICKING OVER post office boxes, including automated lockers for THE DARKNET self-service collection. In jurisdictions with strong secrecy-of-correspondence laws, which typically Vendors and customers perceive apply to letters, drugs are often dispatched in letters. advantages in using the In some countries, drugs purchased on the darknet darknet for drug transactions are thus preferably posted in letters to destinations within the poster’s own country. This has also Purchases and sales of drugs and NPS over the Inter- prompted some darknet vendors to transport letters net involve both the open net (using encrypted containing drugs across the border into neighbouring communication) and the darknet, which forms part countries in order to post them within the client’s of the deep web. Although not discussed in this destination country and avoid detection.256 chapter, various social media apps are also increas- ingly being used for purchasing and selling drugs. Darknet platforms bring anonymous suppliers and anonymous customers together. Although some The main characteristic and comparative advantage darknet drug sales are from dealer to dealer, there of darknet markets is their perceived anonymity, in are indications that most are still from dealer to user. particular the physical anonymity of those who do Purchasers may benefit from other customers’ feed- business on such markets. Purchasing drugs on those back about the quality of the drugs sold, which can markets does not necessarily require physical con- help them to evaluate the perceived reliability of the tact, which reduces the inhibitions of some supplier.257, 258, 259 The platforms may guarantee the customers who might otherwise be reticent to inter- payments of the goods sold, typically by making use act personally with drug dealers. In addition, the of escrow account systems,260 into which the client customer does not have to go to dangerous places is required to pay immediately for the required goods to buy drugs. Darknet trafficking also overcomes but the finalization of the payment to the supplier the challenge of sellers and buyers having to be in is postponed until the goods have actually been the same location; thus, organizations that traffic received by the customer. drugs over the darknet do not need to have the criti- cal mass of customers necessary to sustain a local The darknet appears to be particularly attractive for market. Customers intending to buy drugs over the darknet 254 World Customs Organization, Illicit Trade Report 2015 (Brussels, December 2016), p. 44. typically access it through the onion router (TOR) 255 See the background report prepared by UNODC for the in order to conceal their identities. Specialized dark- meeting on the recent development of the opiate market in net explorers (such as GRAMS, before it was taken Central Asia, the Russian Federation and the Caucasus, held down in December 2017, DuckDuckGo, Ahmia,251 in Vienna on 29 and 30 January 2020. 252 256 Presentation by Robert Taferner, Austrian Criminal Intelli- Torch, Hidden Wiki, etc.) enable them to access gence Service, on online drug trafficking at the workshop of their desired market platforms. The goods bought the National Reitox Academy on online drug purchases and on the various darknet marketplaces are then typi- implications for health responses, organized by Gesundheit cally paid for in cryptocurrencies, most notably Österreich, 2 December 2019. 257 M.J. Barratt, J.A. Ferris and A.R. Winstock, “Use of Silk bitcoins, which are also used for licit transactions Road, the online drug marketplace, in the United Kingdom, on the open web.253 These cryptocurrencies can sub- Australia and the United States”, Addiction, vol. 10, No. 4 sequently be used to buy other goods and services, (May 2014). or they may be exchanged for various national 258 Meropi Tzanetakis, Gerrit Kamphausen, Bernd Werse and Roger von Laufenberg, “The transparency paradox. Building currencies. trust, resolving disputes and optimising logistics on conven- tional and online drugs markets”, International Journal of In general, the drugs are delivered by public or Drug Policy, vol. 35 (September 2016). private postal services, presumably without their 259 Judith Aldridge and David Décary-Hétu, “Not an ‘eBay for knowledge, although the drugs may also be hidden drugs’: the cryptomarket ‘Silk Road’ as a paradigm shifting in locations that are secretly communicated to the criminal innovation”,
Recommended publications
  • BUGS in the SYSTEM a Primer on the Software Vulnerability Ecosystem and Its Policy Implications
    ANDI WILSON, ROSS SCHULMAN, KEVIN BANKSTON, AND TREY HERR BUGS IN THE SYSTEM A Primer on the Software Vulnerability Ecosystem and its Policy Implications JULY 2016 About the Authors About New America New America is committed to renewing American politics, Andi Wilson is a policy analyst at New America’s Open prosperity, and purpose in the Digital Age. We generate big Technology Institute, where she researches and writes ideas, bridge the gap between technology and policy, and about the relationship between technology and policy. curate broad public conversation. We combine the best of With a specific focus on cybersecurity, Andi is currently a policy research institute, technology laboratory, public working on issues including encryption, vulnerabilities forum, media platform, and a venture capital fund for equities, surveillance, and internet freedom. ideas. We are a distinctive community of thinkers, writers, researchers, technologists, and community activists who Ross Schulman is a co-director of the Cybersecurity believe deeply in the possibility of American renewal. Initiative and senior policy counsel at New America’s Open Find out more at newamerica.org/our-story. Technology Institute, where he focuses on cybersecurity, encryption, surveillance, and Internet governance. Prior to joining OTI, Ross worked for Google in Mountain About the Cybersecurity Initiative View, California. Ross has also worked at the Computer The Internet has connected us. Yet the policies and and Communications Industry Association, the Center debates that surround the security of our networks are for Democracy and Technology, and on Capitol Hill for too often disconnected, disjointed, and stuck in an Senators Wyden and Feingold. unsuccessful status quo.
    [Show full text]
  • The Internet and Drug Markets
    INSIGHTS EN ISSN THE INTERNET AND DRUG MARKETS 2314-9264 The internet and drug markets 21 The internet and drug markets EMCDDA project group Jane Mounteney, Alessandra Bo and Alberto Oteo 21 Legal notice This publication of the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) is protected by copyright. The EMCDDA accepts no responsibility or liability for any consequences arising from the use of the data contained in this document. The contents of this publication do not necessarily reflect the official opinions of the EMCDDA’s partners, any EU Member State or any agency or institution of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). More information on the European Union is available on the internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2016 ISBN: 978-92-9168-841-8 doi:10.2810/324608 © European Monitoring Centre for Drugs and Drug Addiction, 2016 Reproduction is authorised provided the source is acknowledged. This publication should be referenced as: European Monitoring Centre for Drugs and Drug Addiction (2016), The internet and drug markets, EMCDDA Insights 21, Publications Office of the European Union, Luxembourg. References to chapters in this publication should include, where relevant, references to the authors of each chapter, together with a reference to the wider publication. For example: Mounteney, J., Oteo, A. and Griffiths, P.
    [Show full text]
  • Van De Laarschot and Rolf Van Wegberg, Delft University of Technology
    Risky Business? Investigating the Security Practices of Vendors on an Online Anonymous Market using Ground-Truth Data Jochem van de Laarschot and Rolf van Wegberg, Delft University of Technology https://www.usenix.org/conference/usenixsecurity21/presentation/van-de-laarschot This paper is included in the Proceedings of the 30th USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to the Proceedings of the 30th USENIX Security Symposium is sponsored by USENIX. Risky Business? Investigating the Security Practices of Vendors on an Online Anonymous Market using Ground-Truth Data Jochem van de Laarschot Rolf van Wegberg Delft University of Technology Delft University of Technology Abstract However, there are numerous indications in earlier work that cybercriminals do not always achieve maximum security. Cybercriminal entrepreneurs on online anonymous markets Due to competing business incentives, criminals may turn rely on security mechanisms to thwart investigators in at- to insecure practices that ease transacting illegal products or tributing their illicit activities. Earlier work indicates that – services. Here, we witness an inevitable trade-off between despite the high-risk criminal context – cybercriminals may enhanced security and improved efficiency of operations [42]. turn to poor security practices due to competing business ‘Perfect security’ therefore, is not economically viable. Like incentives. This claim has not yet been supported through in the legitimate economy [54], security in the underground empirical, quantitative analysis on ground-truth data. In this economy comes at a cost [53]. This leads us to wonder how paper, we investigate the security practices on Hansa Mar- prevalent poor security practices (or: “insecure practices”) ket (2015-2017) and measure the prevalence of poor security among online anonymous market vendors actually are.
    [Show full text]
  • BUGS in the SYSTEM a Primer on the Software Vulnerability Ecosystem and Its Policy Implications
    ANDI WILSON, ROSS SCHULMAN, KEVIN BANKSTON, AND TREY HERR BUGS IN THE SYSTEM A Primer on the Software Vulnerability Ecosystem and its Policy Implications JULY 2016 About the Authors About New America New America is committed to renewing American politics, Andi Wilson is a policy analyst at New America’s Open prosperity, and purpose in the Digital Age. We generate big Technology Institute, where she researches and writes ideas, bridge the gap between technology and policy, and about the relationship between technology and policy. curate broad public conversation. We combine the best of With a specific focus on cybersecurity, Andi is currently a policy research institute, technology laboratory, public working on issues including encryption, vulnerabilities forum, media platform, and a venture capital fund for equities, surveillance, and internet freedom. ideas. We are a distinctive community of thinkers, writers, researchers, technologists, and community activists who Ross Schulman is a co-director of the Cybersecurity believe deeply in the possibility of American renewal. Initiative and senior policy counsel at New America’s Open Find out more at newamerica.org/our-story. Technology Institute, where he focuses on cybersecurity, encryption, surveillance, and Internet governance. Prior to joining OTI, Ross worked for Google in Mountain About the Cybersecurity Initiative View, California. Ross has also worked at the Computer The Internet has connected us. Yet the policies and and Communications Industry Association, the Center debates that surround the security of our networks are for Democracy and Technology, and on Capitol Hill for too often disconnected, disjointed, and stuck in an Senators Wyden and Feingold. unsuccessful status quo.
    [Show full text]
  • Support for Transitions to Address Barriers to Student Learning
    A Center Training Tutorial . SUPPORT FOR TRANSITIONS TO ADDRESS BARRIERS TO STUDENT LEARNING This document is a hardcopy version of a resource that can be downloaded at no cost from the Center’s website http://smhp.psych.ucla.edu. This Center is co-directed by Howard Adelman and Linda Taylor and operates under the auspice of the School Mental Health Project, Dept. of Psychology, UCLA. Center for Mental Health in Schools, Box 951563, Los Angeles, CA 90095-1563 (310) 825-3634 Fax: (310) 206-8716; E-mail: [email protected] Website: http://smhp.psych.ucla.edu Support comes in part from the Office of Adolescent Health, Maternal and Child Health Bureau (Title V, Social Security Act), Health Resources and Services Administration (Project #U45 MC 00175). Continuing Education Modules & Training Tutorials: Self-directed opportunities to learn In addition to offering Quick Training Aids, the Center’s Continuing Education Modules and Training Tutorials are designed as self-directed opportunities for more in-depth learning about specific topics. These resources provide easy access to a wealth of planfully organized content and tools that can be used as a self-tutorial or as a guide in training others. As with most of our resources, these can be readily downloaded from our website – http://smhp.psych.ucla.edu – see Center Materials and scroll down to VI. In the coming years, the Center will continue to develop a variety of continuing education modules and training tutorials related to the various topics covered by our Clearinghouse. In all its work, the Center tries to identify resources that represent "best practice" standards.
    [Show full text]
  • Into the Reverie: Exploration of the Dream Market
    Into the Reverie: Exploration of the Dream Market Theo Carr1, Jun Zhuang2, Dwight Sablan3, Emma LaRue4, Yubao Wu5, Mohammad Al Hasan2, and George Mohler2 1Department of Mathematics, Northeastern University, Boston, MA 2Department of Computer & Information Science, Indiana University - Purdue University, Indianapolis, IN 3Department of Mathematics and Computer Science, University of Guam, Guam 4Department of Mathematics and Statistics, University of Arkansas at Little Rock, AK 5Department of Computer Science, Georgia State University, Atlanta, GA [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract—Since the emergence of the Silk Road market in Onymous" in 2014, a worldwide action taken by law enforce- the early 2010s, dark web ‘cryptomarkets’ have proliferated and ment and judicial agencies aimed to put a kibosh on these offered people an online platform to buy and sell illicit drugs, illicit behaviors [5]. Law enforcement interventions such as relying on cryptocurrencies such as Bitcoin for anonymous trans- actions. However, recent studies have highlighted the potential for Onymous, along with exit scams and hacks, have successfully de-anonymization of bitcoin transactions, bringing into question shut down numerous cryptomarkets, including AlphaBay, Silk the level of anonymity afforded by cryptomarkets. We examine a Road, Dream, and more recently, Wall Street [6]. Despite these set of over 100,000 product reviews from several cryptomarkets interruptions, new markets have continued to proliferate. The collected in 2018 and 2019 and conduct a comprehensive analysis authors of [7] note that there appears to be a consistent daily of the markets, including an examination of the distribution of drug sales and revenue among vendors, and a comparison demand of about $500,000 for illicit products on the dark web, of incidences of opioid sales to overdose deaths in a US city.
    [Show full text]
  • Honeypots: Not for Winnie the Pooh But
    2018] 259 HONEYPOTS: NOT FOR WINNIE THE POOH BUT FOR WINNIE THE PEDO — LAW ENFORCEMENT’S LAWFUL USE OF TECHNOLOGY TO CATCH PERPETRATORS AND HELP VICTIMS OF CHILD EXPLOITATION ON THE DARK WEB Whitney J. Gregory* Cruelty, like every other vice, requires no motive outside itself—it only requires opportunity.1 INTRODUCTION Lawyers, doctors, teachers, politicians, and Hollywood stars—what do they all have in common? Smarts? Success? Wealth? Respect in their com- munities? Demonstrating the terrible divergence between appearance and re- ality, some members of these professions are also frequent customers and producers of child pornography. Contrary to what some may assume, child pornographers are not just antisocial, out-of-work, reclusive basement dwellers. They may be people you would least expect.2 Take, for instance, the teen heartthrob Mark Salling, who starred on Fox’s hit show Glee as handsome bad-boy Puck from 2009 to 2015. Twenty-fifteen was also the year Salling was arrested and charged * Antonin Scalia Law School at George Mason University, J.D. Candidate, May 2019; Articles Editor, George Mason Law Review, 2018–19. This Comment is dedicated to the memory of my grandfa- ther Guido A. Ianiero. 1 George Eliot, Janet’s Repentance, in SCENES OF CLERICAL LIFE 102, 146 (Harper & Bros. 1858). 2 Judges have described child pornography defendants as seemingly ordinary, even upstanding, men (and a few women). “The defendants’ professional careers [are] often highlighted, including Air Force Captain, physician, trust specialist, and teacher.” Melissa Hamilton, The Efficacy of Severe Child Pornography Sentencing: Empirical Validity or Political Rhetoric?, 22 STAN.
    [Show full text]
  • Measurement and Analysis of Cryptolocker Ransoms in Bitcoin
    Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin Kevin Liao, Ziming Zhao, Adam Doupe,´ and Gail-Joon Ahn Arizona State University fkevinliao, zmzhao, doupe, [email protected] Abstract—Bitcoin, a decentralized cryptographic currency that called bitcoins1, to other addresses by issuing transactions, has experienced proliferating popularity over the past few years, which are then broadcast to the public blockchain. is the common denominator in a wide variety of cybercrime. Since all confirmed transactions are visible to the public, the We perform a measurement analysis of CryptoLocker, a family of ransomware that encrypts a victim’s files until a ransom blockchain’s inherent transparency has proven to be ineffective is paid, within the Bitcoin ecosystem from September 5, 2013 in preserving the anonymity of its users (legitimate users through January 31, 2014. Using information collected from and cybercriminals alike). While Bitcoin addresses alone are online fora, such as reddit and BitcoinTalk, as an initial starting not explicitly tied to any real-world entities, a number of point, we generate a cluster of 968 Bitcoin addresses belonging recent research efforts have shown that monetary movements to CryptoLocker. We provide a lower bound for CryptoLocker’s economy in Bitcoin and identify 795 ransom payments totalling and address links can be traced throughout the blockchain 1,128.40 BTC ($310,472.38), but show that the proceeds could data structure [3]–[8]. Even though there have been many have been worth upwards of $1.1 million at peak valuation. By attempts to enhance user privacy with varying degrees of analyzing ransom payment timestamps both longitudinally across success (i.e.
    [Show full text]
  • Combining Bittorrent with Darknets for P2P Privacy
    Combining Bittorrent with Darknets for P2P privacy Öznur Altintas Niclas Axelsson Abstract Over the last few years, traditional downloading of programs and application from a website has been replaced by another medium - peer to peer file sharing networks and programs. Peer- to-peer sharing has grown to tremendous level with many networks having more then millions of users to share softwareʼs, music files, videos and programs etc. However, this rapid growth leaves privacy concerns in its awake. P2P applications disable clients to limit the sharing of documents to a specific set of users and maintain their anonymity. Using P2P applications like BitTorrent exposes clientsʼ information to the other people. OneSwarm is designed to overcome this privacy problem. OneSwarm is a new P2P data sharing system that provides users with explicit, configurable control over their data. In this report, we will discuss briefly Darknets and privacy terms, and mainly how OneSwarm solves privacy problem while providing good performance. Introduction For a better understanding of this report, we begin with the explanation of some terms such as Darknets and privacy and brief background information underlies the idea of OneSwarm. Darknet—a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protocol layer riding on existing networks. Examples of Darknets are peer-to-peer file sharing, CD and DVD copying and key or password sharing on email and newsgroups. When used to describe a file sharing network, the term is often used as a synonym for "friend-to-friend", both describing networks where direct connections are only established between trusted friends.
    [Show full text]
  • Introduction Points
    Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database) TORLINKS Directory for .onion sites, moderated. Core.onion - Simple onion bootstrapping Deepsearch - Another search engine. DuckDuckGo - A Hidden Service that searches the clearnet. TORCH - Tor Search Engine. Claims to index around 1.1 Million pages. Welcome, We've been expecting you! - Links to basic encryption guides. Onion Mail - SMTP/IMAP/POP3. ***@onionmail.in address. URSSMail - Anonymous and, most important, SECURE! Located in 3 different servers from across the globe. Hidden Wiki Mirror - Good mirror of the Hidden Wiki, in the case of downtime. Where's pedophilia? I WANT IT! Keep calm and see this. Enter at your own risk. Site with gore content is well below. Discover it! Financial Services Currencies, banks, money markets, clearing houses, exchangers. The Green Machine Forum type marketplace for CCs, Paypals, etc.... Some very good vendors here!!!! Paypal-Coins - Buy a paypal account and receive the balance in your bitcoin wallet. Acrimonious2 - Oldest escrowprovider in onionland. BitBond - 5% return per week on Bitcoin Bonds. OnionBC Anonymous Bitcoin eWallet, mixing service and Escrow system. Nice site with many features. The PaypalDome Live Paypal accounts with good balances - buy some, and fix your financial situation for awhile. EasyCoin - Bitcoin Wallet with free Bitcoin Mixer. WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more. Cheap Euros - 20€ Counterfeit bills. Unbeatable prices!! OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry. BestPal BestPal is your Best Pal, if you need money fast. Sells stolen PP accounts.
    [Show full text]
  • Data Capture and Analysis of Darknet Markets
    Data Capture & Analysis of Darknet Markets Data Capture and Analysis of Darknet Markets Australian National University Cybercrime Observatory Matthew Ball, Roderic Broadhurst1, Alexander Niven, and Harshit Trivedi March 2019 Abstract Darknet markets have been studied to varying degrees of success for several years (since the original Silk Road was launched in 2011), but many obstacles are involved which prevent a complete and systematic survey. The Australian National University’s Cybercrime Observatory has developed tools to collect and analyse data captured from the darknet (illicit cryptomarkets). This report describes, at the high level, a method for collecting, and analysing, data from specific darknet marketplaces. Examples of typical results that may be obtained from darknet markets and current limitations to the automation of data capture are breifly outlined. While the proposed solution is not error-free, it is a significant step in the direction of providing a comprehensive solution tailored for data scientists, social scientists, and anyone interested in analysing trends from darknet markets. 1 Corresponding author: Professor R.G. Broadhurst, School of Regulation and Global Givernance, College of Asia and the Pacific, email; [email protected]>. We thank the Australian Federal Police division of the Australian Cyber Security Centre, the Australian Institute of Criminology, and ANU Cybercrime Observatory interns Nikita Bhatia, Paige Brown and Benjamin Donald-Wilson for their assistance with aspects of this report. 1 Introduction Illicit cryptomarkets (or darknet markets) are e-commerce style websites specializing in the sale and distribution of illicit content. Typical products offered on darknet markets include: drugs, pharmaceuticals, identity documents, malware and exploit kits, counterfeit goods, weapons, and other contraband.
    [Show full text]
  • The Internet Organised Crime Threat Assessment (IOCTA) 2015
    The Internet Organised Crime Threat Assessment (IOCTA) 2015 2 THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015 THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015 3 TABLE OF FOREWORD 5 CONTENTS ABBREVIATIONS 6 EXECUTIVE SUMMARY 7 KEY FINDINGS 10 KEY RECOMMENDATIONS 12 SUGGESTED OPERATIONAL PRIORITIES 15 INTRODUCTION 16 MALWARE 18 ONLINE CHILD SEXUAL EXPLOITATION 29 PAYMENT FRAUD 33 SOCIAL ENGINEERING 37 DATA BREACHES AND NETWORK ATTACKS 40 ATTACKS ON CRITICAL INFRASTRUCTURE 44 CRIMINAL FINANCES ONLINE 46 CRIMINAL COMMUNICATIONS ONLINE 50 DARKNETS 52 BIG DATA, IOT AND THE CLOUD 54 THE GEOGRAPHICAL DISTRIBUTION OF CYBERCRIME 57 GENERAL OBSERVATIONS 62 APPENDICES 67 A1. THE ENCRYPTION DEBATE 67 A2. AN UPDATE ON CYBER LEGISLATION 70 A3. COMPUTER CRIME, FOLLOWED BY CYBERCRIME FOLLOWED BY …. ROBOT AND AI CRIME? 72 4 THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015 FOREWORD These include concrete actions under the three main mandated Threat Assessment (IOCTA), the annual presentation of the areas – child sexual exploitation, cyber attacks, and payment I am pleased to present the 2015 Internet Organised Crime fraud – such as targeting certain key services and products Centre (EC3). offered as part of the Crime-as-a-Service model, addressing the cybercrime threat landscape by Europol’s European Cybercrime growing phenomenon of live-streaming of on-demand abuse of children, or targeted actions with relevant private sector partners ofUsing cybercrime the 2014 for report the asperiod a baseline, under this consideration. assessment Itcovers offers the a cross-cutting crime enablers such as bulletproof hosting, illegal viewkey developments, predominantly changes from a lawand enforcement emerging threats perspective in the based field tradingagainst onlinesites on payment Darknets fraud.
    [Show full text]