Black Spots in Cyberspace?

  • Stuart S. BrownEmail author
  • Margaret G. Hermann
Part of the International Political Economy Series book series (IPES)


Central themes of this book have revolved around rethinking sovereignty and the global economy. What happens when we introduce the notion of cyberspace, a domain that appears to eliminate political jurisdictions and to move globalization to a new level? Do black spots become less relevant to the study of illicit activities as criminals, insurgents, and terrorists increasingly adopt cyber-technology? Or are black spots just as likely to be found in this so-called virtual world in ways similar to the physical world of states? This chapter explores if there are black spots in cyberspace. We start by introducing the concept of cyberspace and exploring how it relates to the illicit world. Of interest are the various ways criminal actors use cyber-technology to enhance their operations. In other words, are illicit activities changing in response to the evolution of cyberspace? Building on this discussion, we show the relevance of the notion of black spots to cyberspace and provide examples of their impact.


  1. Adams, Devin M. 2017. The 2016 Amendment to Criminal Rule 41: National Search Warrants to Seize Cyberspace, “Particularly” Speaking. University of Richmond Law Review 51: 721–773.Google Scholar
  2. Adams, Jackson, and Mohamad Albakajai. 2016. Cyberspace: A New Threat to the Sovereignty of the State. Management Studies 4 (6): 256–265.Google Scholar
  3. Allen, Ernie. 2010. Domestic Minor Sex Trafficking. Testimony before the Subcommittee on Crime, Terrorism, and Homeland Security, Committee on the Judiciary, US House of Representatives, September 15.Google Scholar
  4. Anderson, Nate. 2011. LulzSec Manifesto: “We Screw Each Other Over for a Jolt of Satisfaction.” Ars Technica, May 17.Google Scholar
  5. Bevir, George. 2017. Cost of Online Piracy to Hit $52bn. IBC 365, October 30.Google Scholar
  6. Bhattacharjee, Yudhijit. 2011. Welcome to Hackerville: The Romanian Cybercriminal Hotspot. Wired, March.Google Scholar
  7. Bischoff, Paul. 2016. Guide: How to Access the Deep Web and Darknet. VPN & Privacy, May 31.Google Scholar
  8. Bran, Mirel. 2013. In Romania, a Quiet City Has Become the Global Hub for Hackers and Online Crooks. Le Monde (English Edition), January 7.Google Scholar
  9. BrightPlanet. 2012. Deep Web: A Primer., June 4.
  10. Broadhurst, Roderic, Peter Grabosky, Mamoun Alazab, and Steve Chon. 2014. Organizations and Cybercrime: An Analysis of the Nature of Groups Engaged in Cybercrime. International Journal of Cyber Criminology 8 (1): 1–20.Google Scholar
  11. Broadhurst, Roderic, Peter Grabosky, Mamoun Alazab, Brigitte Bohours, Steve Chon, and Chen Da. 2013. Crime in Cyberspace: Offenders and the Role of Organized Crime Groups. Working Paper, Australian National University Cybercrime Observatory, May 15.Google Scholar
  12. Caldwell, Leslie R. 2016. Highlighting Cybercrime Enforcement. Speech at Center for Strategic and International Studies, December 7.Google Scholar
  13. Cardenas, Alvarao A., Svetlana Radosavac, Jens Grossklags, John Chuang, and Chris Hoofnagle. 2009. An Economic Map of Cybercrime. Paper Presented at the 37th Research Conference on Communication Information, and Internet Policy, George Mason University.Google Scholar
  14. Chacos, Brad. 2013. Meet Darknet: The Hidden Anonymous Underbelly of the Searchable Web. PC World, August 12.Google Scholar
  15. Chawki, Mohamed. 2006. Anonymity in Cyberspace: Finding the Balance. Computer Crime Research Center, July 9.Google Scholar
  16. Choo, Raymond, and Peter Grabosky. 2013. Cyber Crime. In Oxford Handbook of Organized Crime, ed. Letizia Paoli. Oxford: Oxford University Press.Google Scholar
  17. Clayton, Richard. 2009. How Much Did Shutting Down McColo Help? Cambridge: Cambridge Computer Laboratory, Cambridge University.Google Scholar
  18. Cohen-Almagor, Raphael. 2012. Freedom of Expression, Internet Responsibility, and Business Ethics: The Yahoo Saga and Its Implications. Journal of Business Ethics 106 (3): 353–365.CrossRefGoogle Scholar
  19. Correll, Sean-Paul. 2010. Inside Mariposa—The Largest Botnet Takedown in History. ISSA Magazine, May.Google Scholar
  20. Couch, Robbie. 2014. 70 Percent of Child Sex Trafficking Victims Are Sold Online: Study. The Huffington Post, July 25.Google Scholar
  21. CyberBunker. 2016. Spamhaus Blackmail War. Accessed 24 July 2018.
  22. Fielding, Sarah. 2018. Craigslist Has Banned Personal Ads Thanks to a New Trafficking Law—Here’s How Sex Workers Say It Could Put Them in Huge Danger. INSIDER, March 20.Google Scholar
  23. Franceschi-Bicchierai, Lorenzo. 2015. Inside “Hackerville,” Romania’s Infamous Cyber Crime Hub. Motherboard, June 17.Google Scholar
  24. Freed, Anthony M. 2010. An Interview with UN Cybersecurity Expert Raoul Chiesa. The Huffington Post, April 15.Google Scholar
  25. Gaspareniene, Ligita, and Rita Remeikiene. 2015. Digital Shadow Economy: A Critical Review of the Literature. Mediterranean Journal of Social Sciences 6 (6): 402–409.Google Scholar
  26. Global RADAR. 2017. US Government Stopping Piracy Across the Globe. Global RADAR, December 25.Google Scholar
  27. Greenberg, Andy. 2016. The Silk Road’s Dark Web Dream Is Dead. Wired, January 14.Google Scholar
  28. Holt, Thomas J. and Adam M. Bossler. 2014. Cybercrime. Oxford Handbooks Online. Oxford University Press, June.Google Scholar
  29. Holt, Thomas J., April M. Zeoli, and Kathleen Bohner. 2013. Examining the Decision-Making Processes of Sex Tourists Using Online Data. Journal of Qualitative Criminal Justice and Criminology 1: 122–155.Google Scholar
  30. International Telecommunications Union (ITU). 2017. ICT Facts and Figures 2017. Geneva: ITU.Google Scholar
  31. Jenkins, Quentin. 2011. Dutch ISP Attempts False Police Report. Spamhaus News, October 14.Google Scholar
  32. Kiguolis, Ugnius. 2017. Koobface Worm Proliferates and Makes Astounding Profit for Its Owners. 2SpyWare, February 7.Google Scholar
  33. Krebs, Brian. 2007a. Shadowy Russian Firm Seen as Conduit for Cybercrime. Washington Post, October 13.Google Scholar
  34. ———. 2007b. Russian Business Network: Down, But Not Out. Washington Post, November 7.Google Scholar
  35. ———. 2008. Host of Internet Spam Groups Is Cut Off. Washington Post, November 12.Google Scholar
  36. ———. 2010. Naming and Shaming ‘Bad’ ISPs. Krebs on Security, March 19.Google Scholar
  37. ———. 2014. How a Car Wreck in a Moscow Square Affected the Spam We Receive Everyday. Krebs on Security, December 29.Google Scholar
  38. ———. 2016. Inside “The Attack that Almost Broke the Internet.” Krebs on Security, August 26.Google Scholar
  39. Latonero, Mark. 2011. Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds. Los Angeles: Center on Communication Leadership and Policy, Annenberg School for Communications and Journalism, University of Southern California, September.Google Scholar
  40. Leyden, John. 2012. Five Koobface Botnet Suspects Named by New York Times. The Register, January 18.Google Scholar
  41. McAfee. 2018. The Economic Impact of Cybercrime—No Slowing Down. Washington, DC: McAfee and Center for Strategic and International Studies.Google Scholar
  42. Moura, Giovane C.M. 2013. Internet Bad Neighborhoods. The Netherlands Center for Telematrics and Information Technology, University of Twente.Google Scholar
  43. Moura, Giovane C.M., Ramin Sadre, and Aiko Pras. 2014. Bad Neighborhoods on the Internet. IEEE Communications Magazine 52 (7). preprint.CrossRefGoogle Scholar
  44. Mueller, Milton, Andreas Schmidt, and Brenden Kuerbis. 2013. Internet Security and Networked Governance in International Relations. International Studies Review 15 (1): 86–104.CrossRefGoogle Scholar
  45. Negi, Yogita. 2011. Pragmatic Overview of Hacking & Its Counter Measures. Proceedings of the 5th National Conference, INDIACom, New Delhi, March 10–11.Google Scholar
  46. Pfanner, Eric and Kevin J. O’Brien. 2013. Provocateur Comes into View after Cyberattack. New York Times. March 29.Google Scholar
  47. Prince, Brian. 2010. How The Koobface Botnet Made $2 Million in a Year. eWeek, November 13.Google Scholar
  48. Prince, Matthew. 2013. The DDoS that Almost Broke the Internet. The Cloudflare Blog, March 27.Google Scholar
  49. Sedgwick, Kai. 2018. These Are the Most Popular Darknet Marketplaces Right Now. Bitcoin News, May 1.Google Scholar
  50. Soska, Kyle and Nicolas Christin. 2015. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. Proceedings of the 24th USENIX Security Symposium, Washington, DC, August 12–14.Google Scholar
  51. Stone-Gross, Brett, Christopher Kruegel, Kevin Almeroth, Andreas Moser, and Engin Kirda. 2009. FIRE: Finding Rogue Networks. Paper Presented at the 25th Annual Conference on Computer Security Applications, Honolulu, December 7–9.Google Scholar
  52. The Economist. 2014. The Amazons of the Darknet, November 1.Google Scholar
  53. ———. 2016. Shedding Light on the Dark Web, July 16.Google Scholar
  54. United Nations Office on Drugs and Crime (UNODC). 2012. Transnational Organized Crime in Central America and the Caribbean: A Threat Assessment. Vienna: UNODC.Google Scholar
  55. ———. 2013. Comprehensive Study on Cybercrime. Vienna: UNODC.Google Scholar
  56. Van der Sar, Ernesto. 2017. US Government Teaches Anti-Piracy Skills Around the Globe. Torrent Freak, December 17.Google Scholar
  57. Van Eeten, Michel, Johannes M. Bauer, Hadi Asghari, Shirin Tabatabaie, and Dave Rand. 2010. The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data. Paper Presented at the Ninth Workshop on the Economics of Information Security, George Mason University, June 7–8.Google Scholar
  58. Vernetti, Gianmaria. 2010. The Power of Networking: An Insight of the Russian Business Network. United Nations Interregional Crime and Justice Research Institute, July.Google Scholar
  59. Wall, David S. 2005. Cybercrime, Deviance, and the Internet. Cambridge, UK: Polity.Google Scholar
  60. Winstock, Adam R., Monica I. Barratt, Larissa J. Maier, and Jason A. Ferris. 2018. Global Drug Survey 2018: Key Findings Report. London: Global Drug Survey.Google Scholar
  61. Zickuhr, Kathryn. 2010. Generations 2010. Pew Internet & American Life Project, December 16.Google Scholar

Copyright information

© The Author(s) 2020

Authors and Affiliations

  1. 1.Moynihan Institute of Global AffairsMaxwell School, Syracuse UniversitySyracuseUSA

Personalised recommendations