Author Guidelines for 8

Total Page:16

File Type:pdf, Size:1020Kb

Author Guidelines for 8 Proceedings of the 53rd Hawaii International Conference on System Sciences | 2020 Knowledge Sharing Network in a Community of Illicit Practice: A Cybermarket Subreddit Case K. Hazel Kwon Weiwen Yu Steve Kilar Arizona State University Arizona State University Arizona State University [email protected] [email protected] [email protected] Chun Shao Kailey Broussard Thomas Lutes Arizona State University Arizona State University Arizona State University [email protected] [email protected] [email protected] Abstract online communities of lawful practices. Often neglected is the fact that online knowledge sharing Often neglected in the literature about communities communities exist, and thrive, for illicit collectives of practice is the fact that online knowledge-sharing whose activities are stigmatized or outlawed [10]. communities thrive among illicit collectives whose Illicit knowledge sharing communities are mostly activities are stigmatized or outlawed. This paper hosted in a hidden side of the digital world: the dark focuses on a knowledge-sharing community of users web, a collection of websites and web services that are who engage in illegal practices by examining the ways accessible only through an anonymizing browser (e.g., in which the community’s network structure changes Tor) or special routing software (e.g., I2P). Not all when a high-stakes, uncertain event—the July 2017 activities in the dark web are harmful. In fact, some shutdown of the dark web market Alphabay—occurs. dark web activity helps expand civil liberties, This study compares the discussion network structures challenging an institutionalized, governmental, or in the subreddit r/AlphaBay during pre-shutdown days otherwise rigid notion of “legitimacy” [11]. The dark (the “routine” period) and shutdown days (the web often serves as the most secure channel for free “market defect” period) and offers a content analysis speech, offering space for journalists, whistleblowers, of the knowledge and resources shared by users during and political dissidents who challenge repressive these periods. Several differences were observed: (a) regimes [12, 13]. the network structure changed such that the network Nonetheless, much dark web activity is dedicated size grew while becoming more centralized; (b) new to transactions involving illegal products (e.g., drugs crisis-specific players emerged; (c) types of knowledge and weapons), cybercrimes (e.g., malware and cyber- shared during the market defect period was frauds), and the circulation of harmful content (e.g., qualitatively different from the routine period. child pornography). The ecology of communities of illicit practices is complicated by the fact that some dark web-related content is visible in the surface web (e.g., subreddits, news aggregator sites). However, 1. Introduction information exchanges that occur within communities of illicit practices almost always use anonymization Knowledge sharing communities are technologies to conceal identities, regardless of commonplace in digital spaces. Decades of literature whether the community operates only in the darknet or has explored motivations for and effectiveness of is visible in both the dark and surface web. knowledge collaboration online in various contexts This paper focuses on knowledge sharing such as business [1, 2], distributed software communities of dark web users who engage in illegal development [3—5] and e-learning [6—8]. economic practices. Specifically, we define a cyber- Studies on virtual knowledge sharing have largely underground market community as a self-organized centered around the notion of “communities of community of practice and examine the ways in which practice,” an informal group of people who share the community’s knowledge sharing network structure knowledge, resources, and meaning, and collectively changes when a high-stakes, uncertain event occurs. learn how to solve problems or do the work better [9]. Illegal markets have been one of the most troubling Most studies of knowledge collaboration examine cybersecurity issues concerned with dark web URI: https://hdl.handle.net/10125/64076 978-0-9981331-3-3 Page 2731 (CC BY-NC-ND 4.0) activities, and thus worth the empirical attention. The markets, other commodities such as weapons, illegal empirical case of interest is the subreddit community services, hacked data, and malware are also sold. r/AlphaBay, which was dedicated to discussing a If marketplaces are one pillar of the cyber- cryptomarket called AlphaBay. AlphaBay, which underground economy, the other pillar is discussion became the biggest cyber-underground market, forums [19]. Given the instability of market platforms, operated from December 2014 until July 2017, when it the sustainability of the cyber-underground economy was compromised and permanently shut down by law depends on timely information sharing among market enforcement [14]. This study compares the discussion members to help assess vendor and platform credibility network structures in r/AlphaBay during pre-shutdown and security updates. Beyond the whole market being days (the “routine” period) and shutdown days (the compromised, even a single individual’s identity “market defect” period). This study also offers a breach can increase the collective risk. Therefore, content analysis of the types of knowledge and community members tend to be proactive with respect resources that were shared by users during these to sharing knowledge about identity concealment periods and how members’ communicative activities strategies, called OPSEC [20—22]. Vendors and users differed during the two periods. often maintain the same screen name across different marketplaces and forums as a trust-building 2. Illicit Cybermarket Communities in the mechanism [19]. Participation in discussion forums helps contributors advertise products, demonstrate Dark Web expertise, and gain visibility as reliable informants. A positive reputation established in discussion forums The existence of cryptomarkets in hidden parts of can function as social capital [23] that may translate the web has become widely known to the public since into higher economic returns. the seizure of the infamous cyber-underground marketplace SilkRoad by the Federal Bureau of 3. Illicit Cybermarket Communities as Investigation in October 2013. Research has found that illicit drugs comprise the most common products Self-Organized Communities of Practice exchanged in cryptomarkets, followed by stolen data [15, 16]. AlphaBay was no exception: A vast portion of Considering the role online forums play in the illicit online discussions about the AlphaBay market alluded cybermarket ecology, an examination of the network to illegal drugs. structures in these forums may help explain how Virtual information sharing to assist drug cybermarket users engage in knowledge sharing to transactions is arguably older than the Internet. pursue their collective interests. Accordingly, we Stanford University and MIT students struck a deal propose to conceptualize illicit cybermarket forums as regarding a marijuana sale in the early 1970s through self-organized communities of practice. the ARPANET, the Internet’s predecessor [17]. In the The characteristics of illicit market forums fit 1980s and 1990s, a forum known as alt.drugs existed incredibly well the definition of communities of in Usenet for drug-related discussions [17]. Early cyber practice. Communities of practice are defined as drug markets such as AdamFlowers were based on “groups of people informally bound together by shared encrypted email accounts and relied on monetary expertise and passion for a joint enterprise” [24, p. transactions via Western Union, Paypal, Pecunix, I- 139]. Communities of practice have become an integral Golder and cash [18]. part of organizational systems that require some level Illicit market transactions in the early days were of collective knowledge management, including sometimes traceable, making it was easier for law business, government, education, and social sectors enforcement to detect the involved actors [18]. The rise [25]. Online networks help create decentralized of anonymizing technologies such as Tor, Virtual communities of practice that are larger scope and size. Private Network (VPN), and cryptocurrency enhanced The ways in which hidden cyber-collectives exploit the security of transactions, contributing to the digital platforms are commensurate with essential expansion of the illicit digital economy. As of April features of communities of practices [24, 25]. 2019, 11 retail markets and seven vendor shops were listed as English-based marketplaces on 3.1. Purposiveness deepdotweb.com, one of the main news sites for dark web market users. Although the status of those A community of practice “is defined by a shared marketplaces may fluctuate (e.g., being offline, online, domain of interest” [25, p.1]. The illicit market actors or temporarily unavailable), they are active markets. share a clearly defined agenda: to engage in economic While drugs are the most common products in these activities that are stigmatized or outlawed by legitimate Page 2732 institutions. Due to the nature of illegitimacy, members A community of practice is not a formal also share another problem: OPSEC. Specifically, the organization. Unlike project group assignments or interests in OPSEC have evolved at two levels. At the organizational divisions, members voluntarily choose “system level,” market platforms are vulnerable to the to be a part of the community [24]. Individual
Recommended publications
  • Open Secrecy: How Police Crackdowns and Creative Problem-Solving Brought Illegal Markets out of the Shadows
    Open Secrecy 1 Downloaded from https://academic.oup.com/sf/advance-article-abstract/doi/10.1093/sf/soz140/5805358 by National University of Singapore user on 17 March 2020 March 17 on user Singapore of University National by https://academic.oup.com/sf/advance-article-abstract/doi/10.1093/sf/soz140/5805358 from Downloaded Open Secrecy Open Secrecy: How Police Crackdowns and Creative Problem-Solving Brought Illegal Markets out of the Shadows Isak Ladegaard, University of Illinois at Urbana-Champaign, Monash University an organized illegal activities grow stronger and more advanced in response to legal pressure? In October 2013, the FBI shut down Silk Road, a thriving C e-commerce market for illegal drugs. After the shock, market actors adopted a new identity verification method that enabled mass-migration to other markets, and created websites for information distribution that reduced post-shock uncertainties. The outcome was a decentralized market in which actors could operate in “open secrecy” across multiple websites. With verifiable pseudonyms and securely obfus- cated real-world identities, actors could publicly discuss, plan, and participate in illegal activities. Threats from police and opportunistic criminals persisted but were no longer crippling concerns as buyers and sellers could reasonably expect that their exchange partners would be available for future business; the illegal market could operate more like a legal one. Drawing on quantitative and qualitative data, the author argues that advances in information technology have expanded the opportunity structure for cooperation and creative problem-solving in the underworld, and therefore that shocks did not hinder but rather stimulate development in digital drug markets.
    [Show full text]
  • Deep Web for Journalists: Comms, Counter-Surveillance, Search
    Deep Web for Journalists: Comms, Counter-surveillance, Search Special Complimentary Edition for Delegates attending the 28th World Congress of the International Federation of Journalists * By Alan Pearce Edited by Sarah Horner * © Alan Pearce June 2013 www.deepwebguides.com Table of Contents Introduction by the International Federation of Journalists A Dangerous Digital World What is the Deep Web and why is it useful to Journalists? How Intelligence Gathering Works How this affects Journalists 1 SECURITY ALERT . Setting up Defenses 2 Accessing Hidden Networks . Using Tor . Entry Points 3 Secure Communications . Email . Scramble Calls . Secret Messaging . Private Messaging . Deep Chat . Deep Social Networks 4 Concealed Carry 5 Hiding Things . Transferring Secret Data . Hosting, Storing and Sharing . Encryption . Steganography – hiding things inside things 6 Smartphones . Counter-Intrusion . 007 Apps 7 IP Cameras 8 Keeping out the Spies . Recommended Free Programs . Cleaning Up . Erasing History . Alternative Software Share the Knowledge About the Authors Foreword by the International Federation of Journalists Navigating the Dangerous Cyber Jungle Online media safety is of the highest importance to the International Federation of Journalists. After all, the victims are often our members. The IFJ is the world’s largest organization of journalists and our focus is on ways and means to stop physical attacks, harassment and the killing of journalists and media staff. In an age where journalism – like everything else in modern life – is dominated by the Internet, online safety is emerging as a new front. In this new war, repressive regimes now keep a prying eye on what journalists say, write and film. They want to monitor contacts and they want to suppress information.
    [Show full text]
  • From Dealer to Doorstep – How Drugs Are Sold on the Dark Net Alois Afilipoaie and Patrick Shortis
    GDPO Situation Analysis June 2015 From Dealer to Doorstep – How Drugs Are Sold On the Dark Net Alois Afilipoaie and Patrick Shortis Subject The growing trade in narcotics being sold over the Tor Dark Net is causing academics, law enforcement and policy makers to reassess the impact of ICT technology on real-world crime. Despite growing media attention there are many misconceptions about the difficulty involved and technical knowledge required to participate in these markets and successfully make a sale or purchase. This Situation Analysis aims to explain some of the common practices that vendors and customers alike undertake in order to conduct a secure purchase or sale. The Common Starting Point: Computer Security Regardless of buying or selling, both parties must first ensure their computer system is properly secure before engaging in illicit activity. An average internet user leaves data trails that law enforcement can follow and therefore understanding how to obfuscate or remove these trails altogether is a constant concern of Dark Net market participants. Tor1, Bitcoin2 and PGP (Pretty Good Encryption) 3 encryption are three key technologies that allow successful participation in Dark Net markets. • Tor - Makes tracking a user via their IP address very difficult by bouncing encrypted data through relays prior to their intended destination. • Bitcoin - Allows members to use a currency that is difficult to trace to a real-world identity and easy to launder online. • PGP - Allows messages that might be intercepted by third parties to remain unreadable by anyone who is not the intended recipient of the message, rendering attempts to intercept and read messages between users extremely difficult.
    [Show full text]
  • How to Address Dark Web Markets
    Dark Web Markets HOW TO ADDRESS THE DARK WEB THREATS Dark Web Threats with Chuck Easttom www.ChuckEasttom.com About the Speaker 23 books (2 more in progress) Over 40 industry certifications 2 Masters degrees D.Sc. in Cybersecurity in progress 13 Computer science related patents Over 25 years experience, over 15 years teaching/training Helped create CompTIA Security+, Linux+, Server+. Helped revise CEH v8 Created ECES, created OSFCE Frequent consultant/expert witness Frequent speaker/presenter including: Defcon, Hakon India, Hakon Africa, SecureWorld, ISC2 Security Congress, AAFS, IAFSL, etc. Conducts security related training internationally www.chuckeasttom.com [email protected] Dark Web Threats with Chuck Easttom www.ChuckEasttom.com Tor Networks TOR, https://www.torproject.org/, is an anonymous network of proxy servers. One can use the TOR network to send any sort of network traffic, including emails. This makes tracing the traffic back to its source extremely difficult. Dark Web Threats with Chuck Easttom www.ChuckEasttom.com Accessing a website VIA TOR Each proxy just sends the packet on and only knows the last and next hop. Proxy #2 The path can change Users Machine Proxy #1 each route The target server only knows the last hop the packet came from The user only knows the first proxy in the chain Proxy #3 Proxy #4 Target Server. Onion site Dark Web Threats with Chuck Easttom www.ChuckEasttom.com IP address ??? What does this mean Searching from my home in Texas, it appears I am in Romania Dark Web Threats with Chuck Easttom www.ChuckEasttom.com 6 How they work Dark Web Threats with Chuck Easttom www.ChuckEasttom.com Search the dark web https://hss3uro2hsxfogfq.onion.to/ is a good general dark web search engine Dark Web Threats with Chuck Easttom www.ChuckEasttom.com 8 Torch http://xmh57jrzrnw6insl.onion/ Dark Web Threats with Chuck Easttom www.ChuckEasttom.com What’s for sale? U.S.
    [Show full text]
  • Combatting Cybercrime: Tools and Capacity Building for Emerging Economies, Washington, DC: World Bank License: Creative Commons Attribution 3.0 IGO (CC by 3.0 IGO)
    Combatting Cybercrime Tools and Capacity Building for Emerging Economies Page 1 | Chapter 1 | § Table of Contents Combatting Cybercrime Tools and Capacity Building for Emerging Economies Some Rights Reserved This work is a co-publication of The World Bank and the United Nations. The findings, interpretations, and conclusions expressed in this work do not necessarily reflect the views of The World Bank, its Board of Executive Directors, or the governments they represent, or those of the United Nations. The World Bank and the United Nations do not guarantee the accuracy of the data included in this work. The boundaries, colors, denominations, and other information shown on any map in this work do not imply any judgment on the part of The World Bank or the United Nations concerning the legal status of any territory or the endorsement or acceptance of such boundaries. Nothing herein shall constitute or be considered to be a limitation upon or waiver of the privileges and immunities of The World Bank or the United Nations, all of which are specifically reserved. Rights & Permission This work is available under the Creative Commons Attribution 3.0 IGO license (CC BY 3.0 IGO) http://creativecommons.org/licenses/by/3.0/igo. Under the Creative Commons Attribution license, you are free to copy, distribute, transmit, and adapt this work, including for commercial purposes, under the following conditions: Attribution — Please cite the work as follows: World Bank and United Nations. 2017. Combatting Cybercrime: Tools and Capacity Building for Emerging Economies, Washington, DC: World Bank License: Creative Commons Attribution 3.0 IGO (CC BY 3.0 IGO).
    [Show full text]
  • Demystifying the Dark Web Opioid Trade: Content Analysis on Anonymous Market Listings and Forum Posts
    JOURNAL OF MEDICAL INTERNET RESEARCH Li et al Original Paper Demystifying the Dark Web Opioid Trade: Content Analysis on Anonymous Market Listings and Forum Posts Zhengyi Li1*, MSc; Xiangyu Du1*, MSc; Xiaojing Liao1, PhD; Xiaoqian Jiang2, PhD; Tiffany Champagne-Langabeer2, PhD 1Department of Computer Science, Indiana University Bloomington, Bloomington, IN, United States 2The University of Texas Health Science Center at Houston, Houston, TX, United States *these authors contributed equally Corresponding Author: Xiaojing Liao, PhD Department of Computer Science Indiana University Bloomington 700 N Woodlawn Ave Bloomington, IN United States Phone: 1 8646508137 Email: [email protected] Abstract Background: Opioid use disorder presents a public health issue afflicting millions across the globe. There is a pressing need to understand the opioid supply chain to gain new insights into the mitigation of opioid use and effectively combat the opioid crisis. The role of anonymous online marketplaces and forums that resemble eBay or Amazon, where anyone can post, browse, and purchase opioid commodities, has become increasingly important in opioid trading. Therefore, a greater understanding of anonymous markets and forums may enable public health officials and other stakeholders to comprehend the scope of the crisis. However, to the best of our knowledge, no large-scale study, which may cross multiple anonymous marketplaces and is cross-sectional, has been conducted to profile the opioid supply chain and unveil characteristics of opioid suppliers, commodities, and transactions. Objective: We aimed to profile the opioid supply chain in anonymous markets and forums via a large-scale, longitudinal measurement study on anonymous market listings and posts. Toward this, we propose a series of techniques to collect data; identify opioid jargon terms used in the anonymous marketplaces and forums; and profile the opioid commodities, suppliers, and transactions.
    [Show full text]
  • Content-Based Peer-To-Peer Network Overlay for Full-Text Federated Search
    Content-Based Peer-to-Peer Network Overlay for Full-Text Federated Search Jie Lu Jamie Callan Language Technologies Institute, Carnegie Mellon University, Pittsburgh, PA 15213, USA {jielu, callan}@cs.cmu.edu Abstract Peer-to-peer network overlays have mostly been designed to support search over document names, identifiers, or keywords from a small or controlled vocabulary. In this paper we propose a content-based P2P network overlay for full-text federated search over heterogeneous, open-domain contents. Local algorithms are developed to dynamically construct a network overlay with content-based locality and content-based small-world properties. Experimental results using P2P testbeds of real documents demonstrate the effectiveness of our approach. 1. INTRODUCTION Peer-to-peer (P2P) networks integrate autonomous computing resources without requiring a central coordinating authority, which makes them a potentially robust and scalable model for providing federated search to large-scale networks of text digital libraries. Search in current P2P networks has mostly relied on matching over document names, identifiers, or keywords from a small or controlled vocabulary. Recently, a set of solutions to full-text federated search in P2P networks has been proposed that searches the full body of text documents and returns results with relevance- based rankings (Lu & Callan, 2006a). Multiple regional directory services (“hubs”) in a hierarchical P2P architecture collectively provide resource location and result merging services based on full-text resource representations, and act as gateways between peers providing contents (“information providers”) and those making information requests (“information consumers”). The main communication channels for federated search are logical connections between peers established at the protocol layer, which build a network overlay on top of the underlying physical network.
    [Show full text]
  • The Onion Crate - Tor Hidden Service Index
    onion.to does not host this content; we are simply a conduit connecting Internet users to content hosted inside the Tor network.. onion.to does not provide any anonymity. You are strongly advised to download the Tor Browser Bundle and access this content over Tor. For more information see our website for more details and send us your feedback. hide Tor2web header Online onions The Onion Crate - Tor Hidden Service Index nethack3dzllmbmo.onion A public nethack server. j4ko5c2kacr3pu6x.onion/wordpress Paste or blog anonymously, no registration required. redditor3a2spgd6.onion/r/all Redditor. Sponsored links 5168 online onions. (Ctrl-f is your friend) A AUTOMATED PAYPAL AND CREDIT CARD MARKET 2222bbbeonn2zyyb.onion A Beginner Friendly Comprehensive Guide to Installing and Using A Safer yuxv6qujajqvmypv.onion A Coca Growlog rdkhliwzee2hetev.onion ==> https://freenet7cul5qsz6.onion.to/freenet:USK@yP9U5NBQd~h5X55i4vjB0JFOX P97TAtJTOSgquP11Ag,6cN87XSAkuYzFSq-jyN- 3bmJlMPjje5uAt~gQz7SOsU,AQACAAE/cocagrowlog/3/ A Constitution for the Few: Looking Back to the Beginning ::: Internati 5hmkgujuz24lnq2z.onion ==> https://freenet7cul5qsz6.onion.to/freenet:USK@kpFWyV- 5d9ZmWZPEIatjWHEsrftyq5m0fe5IybK3fg4,6IhxxQwot1yeowkHTNbGZiNz7HpsqVKOjY 1aZQrH8TQ,AQACAAE/acftw/0/ A Declaration of the Independence of Cyberspace ufbvplpvnr3tzakk.onion ==> https://freenet7cul5qsz6.onion.to/freenet:CHK@9NuTb9oavt6KdyrF7~lG1J3CS g8KVez0hggrfmPA0Cw,WJ~w18hKJlkdsgM~Q2LW5wDX8LgKo3U8iqnSnCAzGG0,AAIC-- 8/Declaration-Final%5b1%5d.html A Dumps Market - Dumps, Cloned Cards,
    [Show full text]
  • SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report)
    SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report) David Maimon Yubao Wu Michael McGuire Nicholas Stubler Zijie Qiu Executive Summary As organizations focus on the digital transformation of This is the first of three reports—the first of their kind— their businesses, the importance of encryption as the focused on the underground SSL/TLS marketplace and cornerstone of security and privacy is increasingly vital. In its role in the wider cybercrime economy. This report 2018, over 70 percent of internet traffic was encrypted. will show that there is a machine identity-as-a-service Experts believe that this figure is expected to rise to 80 marketplace on the dark web, where fraudulent TLS percent in 2019 (Google, 2019). Secure Sockets Layer certificates are readily available for purchase. (SSL, an older standard) and Transport Layer Security Key findings: (TLS, a newer standard) certificates are essential to encryption because they authorize all encrypted • Five of the Tor network markets observed—Dream communication between machines. SSL/TLS certificates are Market, Wall Street Market, BlockBooth, Nightmare instrumental in protecting privacy and improving security, Market and Galaxy3—offer a steady supply of providing each machine with a unique machine identity. SSL/TLS certificates, along with a range of related They control the flow of sensitive data to authorized services and products. machines and are used in everything from website transactions and mobile devices to smart city initiatives, • One representative search of these five marketplaces robots, artificial intelligence algorithms and containers in uncovered 2,943 mentions for “SSL” and 75 for “TLS.” the cloud.
    [Show full text]
  • Evolving Reality: the Strategic Shift in Crypto-Drug Market Enforcement
    Evolving Reality: The Strategic Shift in Crypto-Drug Market Enforcement Martin Horton-Eddison, Global Drug Policy Observatory [email protected] Introduction Crypto-Drug Markets (CDMs), also referred to as Dark Net Drug Markets are anonymised internet sites which facilitate the sale and purchase of narcotic substances both domestically and internationally. This statement offers a strategic assessment of the evolving CDM Law Enforcement landscape, and some thoughts on the future direction of CDMs and CDM enforcement. ‘Historic’ Strategic Approach In the recent past, the standard law enforcement strategy has been one of site takedown, aimed at arresting CDM administrators, and eliminating site servers with the sole purpose of taking the CDM offline. On the face of it, the site takedown strategy, as applied to the original Silk Road and its immediate successors, seemed a logical response – forcing sites simply to cease to exist. Although CDMs represent a novel threat, takedown may be usefully described as conventional: utilising existing law enforcement force-structures, general agents and agencies, and often unilateral approaches in order to attack the CDMs’ Centre of Gravity; to takedown the hub on which everything depends. The Failure of Takedown Strategy However, despite numerous high-profile historic takedowns, CDMs continue to exist – with new sites emerging or increasing their capacity to facilitate the online trade just as quickly as their predecessors can be taken down. To illustrate the point: the value of CDM drug transactions rose by 50% in the two years following the takedown of Silk Road in 2013. As can be seen by the slide, even by the UNODC’s own assessment therefore, takedown simply doesn’t appear to work.
    [Show full text]
  • Prosecuting Dark Net Drug Marketplace Operators Under the Federal Crack House Statute
    Fordham Law Review Volume 88 Issue 1 Article 9 2019 Prosecuting Dark Net Drug Marketplace Operators Under the Federal Crack House Statute Thomas J. Nugent Fordham University School of Law Follow this and additional works at: https://ir.lawnet.fordham.edu/flr Part of the Internet Law Commons, and the Law Enforcement and Corrections Commons Recommended Citation Thomas J. Nugent, Prosecuting Dark Net Drug Marketplace Operators Under the Federal Crack House Statute, 88 Fordham L. Rev. 345 (2019). Available at: https://ir.lawnet.fordham.edu/flr/vol88/iss1/9 This Note is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Law Review by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. PROSECUTING DARK NET DRUG MARKETPLACE OPERATORS UNDER THE FEDERAL CRACK HOUSE STATUTE Thomas J. Nugent* Over 70,000 Americans died as the result of a drug overdose in 2017, a record year following a record year. Amidst this crisis, the popularity of drug marketplaces on what has been called the “dark net” has exploded. Illicit substances are sold freely on such marketplaces, and the anonymity these marketplaces provide has proved troublesome for law enforcement. Law enforcement has responded by taking down several of these marketplaces and prosecuting their creators, such as Ross Ulbricht of the former Silk Road. Prosecutors have typically leveled conspiracy charges against the operators of these marketplaces—in Ulbricht’s case, alleging a single drug conspiracy comprising Ulbricht and the thousands of vendors on the Silk Road.
    [Show full text]
  • Behind the Dark Net Black Mirror Threats Against the Enterprise
    BEHIND THE DARK NET BLACK MIRROR THREATS AGAINST THE ENTERPRISE The next chapter of Into The Web of Profit By Dr. Michael McGuire, Senior Lecturer in Criminology, University of Surrey Sponsored by Bromium BEHIND THE DARK NET BLACK MIRROR – THREATS AGAINST THE ENTERPRISE CONTENTS Executive summary Introduction: Catching smoke – the challenges of navigating the increasingly invisible net 1 The dark net economy – platforms, commodities and profits 1.2 The multidimensional risk posed by the dark net to the enterprise – a 3D threat assessment 1.3 Tools and services being sold to enable compromises of enterprise networks 1.3.1 Infection/attack tools 1.3.2 Access 1.3.3 Targeting and espionage 1.3.4 Support services 1.4 Tools and services being sold to enable financially-motivated compromises 1.4.1 Card credentials 1.4.2 Phishing tools 1.4.3 Refunds and other scams 1.5 Tools and services being sold to compromise data 1.5.1 Customer data 1.5.2 Operational data 1.5.3 Financial data 1.5.4 Trade secrets and intellectual property 2 Dark net enablement of traditional crime relating to the enterprise 2.1 Insider trading on the dark net 2.2 Recruitment and fraud 3 Enterprise and the grey net: quasi-legal uses of the dark net 3.1 Competitive intelligence or corporate espionage? 3.2 Sharing blacklists 4 The legitimate commercialisation of the dark net by the enterprise 4.1 Cybersecurity 4.2 Secure communication 4.3 Business intelligence 4.4 Credit monitoring 4.5 Recruitment 4.6 Potential risks of engaging in the dark net 5 Closing thoughts 5.1 Recommendations for law enforcement 5.2 Recommendations for enterprise Methodology Bibliography 2 BEHIND THE DARK NET BLACK MIRROR – THREATS AGAINST THE ENTERPRISE FOREWORD Working with Dr.
    [Show full text]