Abstract
Widespread adoption of the Internet and mobile technologies has allowed for easy access to a variety of global services. Despite the many legitimate goods and services provided by online retailers, criminal illicit markets have also proliferated online. Illicit online markets capitalize on the anonymity and global nature of the Internet, creating challenges and difficulties for law enforcement investigations. This chapter provides an overview of the Dark Web and the current literature on illicit online markets operating on the Dark Web related to drugs, firearms, cybercrime services, and child sexual exploitation. This overview focuses on the online Dark Web marketplace, although several of these products are also bought, sold, and traded on sites that are publicly accessible. Special attention is dedicated to an overview of market forces and its processes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ablon, L. (2018). Data thieves: The motivations of cyber threat actors and their use and monetization of stolen data. Santa Monica, CA: RAND Corporation.
Aldridge, J., & Askew, R. (2017). Delivery dilemmas: How drug cryptomarket users identify and seek to reduce their risk of detection by law enforcement. International Journal of Drug Policy, 41, 101–109. https://doi.org/10.1016/j.drugpo.2016.10.010
Aldridge, J., & Décary-Hétu, D. (2016). Hidden wholesale: The drug diffusing capacity of online drug cryptomarkets. International Journal of Drug Policy, 35, 7–15. https://doi.org/10.1016/j.drugpo.2016.04.020.
Bancroft, A., & Reid, P. S. (2016). Concepts of illicit drug quality among darknet market users: Purity, embodied experience, craft and chemical knowledge. International Journal of Drug Policy, 35, 42–49. https://doi.org/10.1016/j.drugpo.2015.11.008.
Barnes, L. (2018, September 21). UK retail sees record online spending in 2018. PCR. Retrieved from https://www.pcr-online.biz/features/uk-retail-sees-record-online-spending-in-2018
Barratt, M. J., Lenton, S., Maddox, A., & Allen, M. (2016). ‘What if you live on top of a bakery and you like cakes?’ – Drug use and harm trajectories before, during and after the emergence of Silk Road. International Journal of Drug Policy, 35, 50–57. https://doi.org/10.1016/j.drugpo.2016.04.006.
Blevins, K. R., & Holt, T. J. (2009). Examining the virtual subculture of Johns. Journal of Contemporary Ethnography, 38, 619–648. https://doi.org/10.1177/0891241609342239.
Braithwaite, J. (2000). Shame and criminal justice. Canadian Journal of Criminology, 42(3), 281–298.
Bradbury, D. (2014). Unveiling the dark web. Network Security, 2014, 14–17. https://doi.org/10.1016/S1353-4858(14)70042-X.
Brenner, S. W. (2008). Cyberthreats: The emerging fault lines of the nation state. Oxford: Oxford University Press.
Burns, R. G., Whitworth, K. H., & Thompson, C. Y. (2004). Assessing law enforcement preparedness to address Internet fraud. Journal of Criminal Justice, 32(5), 477–493.
Buxton, J., & Bingham, T. (2015). The rise and challenge of dark net drug markets. Swansea: Global Drug Policy Observatory.
Castells, M. (2002). The internet galaxy: Reflections on the internet, business, and society. Oxford: Oxford University Press.
Castle, T., & Lee, J. (2008). Ordering sex in cyberspace: A content analysis of escort websites. International Journal of Cultural Studies, 11, 107–121. https://doi.org/10.1177/1367877907086395.
Caulkins, J. P., & Reuter, P. (2016). Dealing more effectively and humanely with illegal drugs. Crime and Justice, 46, 95–158. https://doi.org/10.1086/688458.
Christin, N. (2013). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In Proceedings of the 22nd international conference on World Wide Web (pp. 213–224).
Chu, B., Holt, T. J., & Ahn, G. J. (2010). Examining the creation, distribution, and function of malware on-line (pp. 1–183). Washington, DC: Department of Justice Abstract.
Clement, J. (2019). E-commerce worldwide – Statistics & Facts. Statista. Retrieved from https://www.statista.com/topics/871/online-shopping/
Cohen, A. K. (1955). Delinquent boys: The culture of the gang. Glencoe: Free Press.
Conditt, J. (2016, August 23). FBI improved a Dark Web child pornography site, lawyer argues. Engadget. Retrieved from https://www.engadget.com/2016/08/23/fbi-improved-dark-web-child-porn-site-lawyer/
Cook, P. J., Ludwig, J., Venkatesh, S., & Braga, A. A. (2007). Underground gun markets. The Economic Journal, 117. https://doi.org/10.1111/j.1468-0297.2007.02098.
Cook, P. J., Cukier, W., & Krause, K. (2009). The illicit firearms trade in North America. Criminology & Criminal Justice, 9, 265–286. https://doi.org/10.1177/1748895809336377.
Cook, P. J., Harris, R. J., Ludwig, J., & Pollack, H. A. (2015). Some sources of crime guns in Chicago: Dirty dealers, straw purchasers, and traffickers. The Journal of Criminal Law and Criminology, 104, 717.
Copeland, C., Wallin, M., & Holt, T. (2019). Assessing the practices and products of Darkweb Firearm vendors. Deviant Behavior, 40, 1–20.
Craun, S. W., Bourke, M. L., & Coulson, F. N. (2015). The impact of internet crimes against children work on relationships with families and friends: An exploratory study. Journal of Family Violence, 30(3), 393–402. https://doi.org/10.1007/s10896-015-9680-3.
Dahlberg, L., Ikeda, R., & Kresnow, M. (2004). Guns in the home and risk of a violent death in the home: Findings from a national study. American Journal of Epidemiology, 160, 929–936. https://doi.org/10.1093/aje/kwh309.
De Leon, S. (2013, July 17). Cyber-sex trafficking: a 21st century scourge. CNN News. Retrieved from https://www.cnn.com/2013/07/17/world/asia/philippines-cybersex-trafficking/index.html
Denning, D. E. (2011). Cyber conflict as an emergent social phenomenon. In Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 170–186). Hersey, NY: IGI Global.
Department of Justice. (2016). The national strategy for child exploitation prevention and interdiction. Retrieved from https://www.justice.gov/psc/file/842411/download
Department of Justice. (2017). Child pornography. Retrieved from https://www.justice.gov/criminal-ceos/child-pornography
Department of Justice. (2019, May 3). 3 Germans who allegedly operated Dark Web marketplace with over 1 million users face U.S. narcotics and money laundering charges. Department of Justice Press Releases. Retrieved from https://www.justice.gov/usao-cdca/pr/3-germans-who-allegedly-operated-dark-web-marketplace-over-1-million-users-face-us
Dolliver, D. S. (2015). Evaluating drug trafficking on the Tor Network: Silk Road 2, the sequel. International Journal of Drug Policy, 26, 1113–1123. https://doi.org/10.1016/j.drugpo.2015.01.008.
Dolliver, D. S., Ericson, S. P., & Love, K. L. (2018). A geographic analysis of drug trafficking patterns on the TOR network. Geographical Review, 108, 45–68. https://doi.org/10.1111/gere.12241.
Dupont, B. (2013). Cybersecurity futures: How can we regulate emergent risks? Technology Innovation Management Review, 3, 6–11.
Dupont, B. (2017). Bots, cops, and corporations: On the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime. Crime, Law and Social Change, 67, 97–116.
Durkin, K. F. (1997). Misuse of the Internet by pedophiles: Implications for law enforcement and probation practice. Federal Probation, 14, 14–18.
Durkin, K. F., & Bryan, C. D. (1999). Propagandizing pederasty: a thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles. Deviant Behavior: An Interdisciplinary Journal, 20, 103–127.
East, C. S. (2017). Demystifying the Dark Web. ITNOW, 59(1), 16–17. https://doi.org/10.1093/itnow/bwx007.
ECPAT. (2018). Trends in online child sexual abuse material. Bangkok. Retrieved from www.ecpat.org
Europol European Cybercrime Center. (2013). Commercial sexual exploitation of children online a strategic assessment. https://doi.org/10.1002/stem.1434
Federal Bureau of Investigation. (2017, May 5). ‘Playpen’ creator sentenced to 30 years: Dark Web ‘hidden service’ case spawned hundreds of child porn investigations. Federal Bureau of Investigation Press Release. Retrieved from https://www.fbi.gov/news/stories/playpen-creator-sentenced-to-30-years
Federal Bureau of Investigation. (2019, March 26). J-CODE announces 61 arrests in its second coordinated law enforcement operation targeting opioid trafficking on the darknet. Federal Bureau of Investigation Press Release. Retrieved from https://www.fbi.gov/news/pressrel/press-releases/j-code-announces-61-arrests-in-its-second-coordinated-law-enforcement-operation-targeting-opioid-trafficking-on-the-darknet
Fisher, W. A., & Barak, A. (2000). Online sex shops: Phenomenological, psychological, and ideological perspectives on internet sexuality (Vol. 3). Mary Ann Liebert. Retrieved from www.liebertpub.com.
Fossi, M., Johnson, E., & Turner, D. (2008). Symantec report on the underground economy. Symantec Security Response, 3(1), 77–82.
Franklin, J., Perrig, A., Paxson, V., & Savage, S. (2007, October). An inquiry into the nature and causes of the wealth of internet miscreants. In ACM conference on computer and communications security (pp. 375–388).
Gehl, R. W. (2018). Weaving the Dark Web: Legitimacy on freenet, Tor, and I2P. Cambridge, MA: MIT Press.
Gordon, S., & Ma, Q. (2003). Convergence of virus writers and hackers: Fact or fantasy? Cupertine: Symantec Security White paper.
Harkin, D., Whelan, C., & Chang, L. (2018). The challenges facing specialist police cyber-crime units: An empirical analysis. Police Practice and Research, 19(6), 519–536.
Hemenway, D. (2011). Risks and benefits of a gun in the home. American Journal of Lifestyle Medicine, 5, 502–511. https://doi.org/10.1177/1559827610396294.
Hinduja, S. (2004). Perceptions of local and state law enforcement concerning the role of computer crime investigative teams. Policing: An International Journal of Police Strategies and Management, 3, 341–357.
Holt, T. J. (2007). Deviant Behavior subcultural evolution? examining the influence of on-and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198. https://doi.org/10.1080/01639620601131065.
Holt, T. J. (2013). Examining the forces shaping cybercrime markets online. Social Science Computer Review, 31(2), 165–177. https://doi.org/10.1177/0894439312452998.
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. London: Routledge.
Holt, T. J., & Kilger, M. (2008, April). Techcrafters and makecrafters: A comparison of two populations of hackers. In 2008 WOMBAT workshop on information security threats data collection and sharing (pp. 67–78). Amsterdam, Netherlands: IEEE.
Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets online: Products and market forces. Criminal Justice Studies, 23, 33–50. https://doi.org/10.1080/14786011003634415.
Holt, T. J., & Blevins, K. R. (2010). Examining sex work from the client’s perspective: Assessing Johns using on-line data. Deviant Behavior, 28, 333–354. https://doi.org/10.1080/01639620701233282
Holt, T. J., & Bossler, A. M. (2012). Predictors of patrol officer interest in cybercrime training and investigation in selected United States police departments. Cyberpsychology, Behavior, and Social Networking, 15(9), 464–472.
Holt, T. J., Burruss, G. W., & Bossler, A. M. (2015). Policing cybercrime and cyberterror. Durham: Carolina Academic Press.
Holt, T. J., Soles, J., & Leslie, L. (2008, April). Characterizing malware writers and computer attackers in their own words. In 3rd international conference on information warfare and security (pp. 24–25).
Holt, T. J., Blevins, K. R., & Burkert, N. (2010). Considering the pedophile subculture online. Sexual Abuse: A Journal of Research and Treatment, 22(1), 3–24. https://doi.org/10.1177/1079063209344979.
Holt, T. J., Smirnova, O., Chua, Y. T., & Copes, H. (2015). Examining the risk reduction strategies of actors in online criminal markets. Global Crime, 16, 81–103. https://doi.org/10.1080/17440572.2015.1013211.
Holt, T. J., Smirnova, O., & Hutchings, A. (2016). Examining signals of trust in criminal markets online. Journal of Cybersecurity, 2(2), 137–145.
Holt, T. J., Lee, J. R., Liggett, R., Holt, K. M., & Bossler, A. (2019). Examining perceptions of online harassment among constables in England and Wales. International Journal of Cybersecurity Intelligence & Cybercrime, 2(1), 24–39.
Hutchings, A., & Holt, T. J. (2014). A crime script analysis of the online stolen data market. British Journal of Criminology, 55, 596–614. https://doi.org/10.1093/bjc/azu106.
Huey, L. J. (2002). Policing the abstract: Some observations on policing cyberspace. Canadian Journal of Criminology, 44, 243.
INHOPE. (2012). Annual report. European Union. https://doi.org/10.1017/CBO9781107415324.004
Internet Watch Foundation. (2015). Emerging patterns and trends report #1 online-produced sexual content. Retrieved from https://www.iwf.org.uk/sites/default/files/inline-files/Online-produced_sexual_content_report_100315.pdf
Interpol. (2018). Towards a global indicator on identified victims of child sexual exploitation material: Summary report. Retrieved from https://www.ecpat.org/wp-content/uploads/2018/03/TOWARDS-A-GLOBAL-INDICATOR-ON-UNIDENTIFIED-VICTIMS-IN-CHILD-SEXUAL-EXPLOITATION-MATERIAL-Summary-Report.pdf
James, L. (2005). Phishing exposed. Rockland: Syngress.
Jenkins, P. (2001). Beyond tolerance: Child pornography on the Internet. New York: New York University Press.
Jones, A. (2016). I Get Paid to Have Orgasms: Adult webcam models’ negotiation of pleasure and danger. Journal of Women in Culture and Society, 42(11), 227–256.
Kilmer, B., Everingham, S., Caulkins, J., Midgette, G., Pacula, R., Reuter, P., Burns, R., Han, B., & Lundberg, R. (2014). What America’s users spend on illegal drugs: 2000–2010. Santa Monica: RAND Corporation.
Latonero, M., Berhane, G., Fellow, L., Hernandez, A., Assistant, R., Mohebi, T., & Movius, L. (2011). Policy human trafficking online the role of social networking sites and online classifieds. Retrieved from http://technologyandtrafficking.usc.edu
Lee, J. R., Holt, T. J., Burruss, G. W., & Bossler, A. M. (2019). Examining English and Welsh detectives’ views of online crime. International Criminal Justice Review, 1–20.
Leukfeldt, R., Kleemans, E., & Stol, W. (2017). The use of online crime markets by cybercriminal networks: A view from within. American Behavioral Scientist, 61, 1387–1402. https://doi.org/10.1177/0002764217734267.
Li, W., & Chen, H. (2014, September). Identifying top sellers in underground economy using deep learning-based sentiment analysis. In 2014 IEEE joint intelligence and security informatics conference (pp. 64–67). The Hague, Netherlands: IEEE.
Liggett, R. (2019). Exploring online sextortion offenses: Ruses, demands, and motivations. Sexual Assault Report.
MacCoun, R., & Reuter, P. (1992). Are the Wages of Sin $30 an hour? Economic aspects of street-level drug dealing. Crime & Delinquency, 38, 477–491. https://doi.org/10.1177/0011128792038004005.
Maddox, A., Barratt, M. J., Allen, M., & Lenton, S. (2016). Constructive activism in the dark web: Cryptomarkets and illicit drugs in the digital ‘demimonde.’ Information, Communication and Society, 19, 111–126. https://doi.org/10.1080/1369118X.2015.1093531
Manky, D. (2013). Cybercrime as a service: A very modern business. Computer Fraud and Security, 2013, 9–13. https://doi.org/10.1016/S1361-3723(13)70053-8.
Martin, J. (2014). Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’. Criminology & Criminal Justice, 14, 351–367.
McFarlane, J. M., Campbell, J. C., Wilt, S., Sachs, C. J., Ulrich, Y., & Xu, X. (1999). Stalking and intimate partner femicide. Homicide Studies, 3, 300–316.
Mendoza, M. (2017, May 9). AP exclusive: Big child webcam sex bust reveals rising abuse. Associated Press. Retrieved from https://www.apnews.com/74b81f79e9024124a1cfe43a0ce9eec2
Mikhaylov, A., & Frank, R. (2018). Illicit payments for illicit goods: Noncontact drug distribution on Russian online drug marketplaces. Global Crime, 19, 146–170.
Mitchell, K. J., Jones, L. M., Finkelhor, D., & Wolak, J. (2011). Internet-facilitated commercial sexual exploitation of children: Findings from a nationally representative sample of law enforcement agencies in the United States. Sexual Abuse: A Journal of Research and Treatment, 23, 43–71.
Monuteaux, M. C., Lee, L. K., Hemenway, D., Mannix, R., & Fleegler, E. W. (2015). Firearm ownership and violent crime in the U.S. American Journal of Preventive Medicine, 49, 207–214.
Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011, November). An analysis of underground forums. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (pp. 71–80). Berlin, Germany: ACM.
Nakashima, E. (2016, January 21). This is how the government is catching people who use child porn sites. The Washington Post. Retrieved from https://www.washingtonpost.com/world/national-security/how-the-government-is-using-malware-to-ensnare-child-porn-users/2016/01/21/fb8ab5f8-bec0-11e5-83d4-42e3bceea902_story.html?noredirect=on&utm_term=.1393ab08f686
National Center for Missing and Exploited Children. (2019). The issues: Child sexual abuse imagery. Retrieved from http://www.missingkids.com/theissues/sexualabuseimagery
Ormsby, E. (2012). The drug’s in the mail. The Age. http://www.theage.com.au/victoria/ the-drugs-in-the-mail-20120426-1xnth.html. Accessed 1 Mar 2019.
Paoli, G. P., Aldridge, J., Ryan, N., & Warnes, R. (2017). Behind the curtain: The illicit trade of firearms, explosives and ammunition on the Dark Web. Retrieved 7 June 2018, from the RAND Corporation web site: http://www.rand.org/t/RR2091
Pauli, D. (2012). Aussie coppers bedevilled by online contraband networks. SC Magazine. http://www.scmagazine.com.au/Tools/Print.aspx?CIID=314984.0. Accessed 1 Mar 2019.
Pavlou, P. A., & Dimoka, A. (2006). The nature and role of feedback text comments in online marketplaces: Implications for trust building, price premiums, and seller differentiation. Information Systems Research, 17(4), 392–414.
Peretti, K. K. (2009). Data breaches: What the underground world of carding reveals. Santa Clara Computer & High Technology Law Journal, 25, 375.
Pleasance, C. (2015, February 26). Prisoner who used Parcelforce to import deadly 850-round-a-minute machine guns into the UK is jailed for life as judge slams lax jail security. Retrieved from https://www.dailymail.co.uk/news/article-2970878/Prisoner-used-Parcelforce-import-deadly-850-round-minute-machine-guns-UK-jailed-life-judge-slams-lax-jail-security.html
Pulido, M. L. (2014, January 23). Child pornography: basic facts about a horrific crime. Huffington Post. Retrieved from https://www.huffpost.com/entry/child-pornography-basic-f_b_4094430?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAAMxzSEbW74zyEUSeWEc04zCNX0Q-714Eq3ucLHx3xzBZW7j7cH7024da7g3QP8NulsM6BsW9dMHL48fh_jghq6m4fgdt1_xZEl7thyFtzzE5oXZkgXEkBSi8Uzb_JxLHnN4TafGLpVyaRiexSFAYAdPbEi9n5UwktH25x0Wolboi
Quayle, E., & Taylor, M. (2002). Child pornography and the Internet: Perpetuating a cycle of abuse. Deviant Behavior, 23, 331–361.
Raymond, N. (2015, July 8). Two people in N.Y. charged in massive probe of child porn website. Reuters. Retrieved from https://www.reuters.com/article/us-usa-crime-childporn-idUSKCN0PI2CH20150708
Reuters. (2018). Facebook is using new software to identify and remove child nudity photos uploaded to the site. Retrieved from https://www.cnbc.com/2018/10/24/facebook-cracks-down-on-child-nudity-photos-using-machine-learning.html
Rothman, E. F., Hemenway, D., Miller, M., & Azrael, D. (2005). Batterers’ use of guns to threaten intimate partners. Journal of the American Medical Women’s Association, 60, 62–68.
Schneider, J. L. (2003). Hiding in plain sight: An exploration of the illegal (?) Activities of a drugs newsgroup. The Howard Journal of Criminal Justice, 42(4), 374–389.
Sengupta, K.. (2016). How teenager used the Dark Web to buy gun for Munich mass murder. Retrieved from https://www.standard.co.uk/news/world/how-teenager-used-the-dark-web-to-buy-gun-for-munich-mass-murder-a3330406.html
Shulman, A. (2010). The underground credentials market. Computer Fraud & Security, 2010, 5–8.
Siegel, M., Ross, C. S., & King, C. (2013). The relationship between gun ownership and firearm homicide rates in the United States, 1981–2010. American Journal of Public Health, 103, 2098–2105.
Skidmore, M., Garner, S., Desroches, C., & Saggu, N. (2018). The threat of exploitation in the adult sex market: A pilot study of online sex worker advertisements. Policing, 12, 210–218.
Smirnova, O., & Holt, T. J. (2017). Examining the geographic distribution of victim nations in stolen data markets. American Behavioral Scientist, 61(11), 1403–1426.
Smith, S. (2012). Study of self-generated sexually explicit images and videos featuring young people online. Retrieved from https://www.iwf.org.uk/sites/default/files/inline-files/IWF_study_self_generated_content_online_011112.pdf
Smith, S. (2014a). Briefing paper-preliminary analysis of new commercial CSAM website accepting payment by Bitcoin. Retrieved from https://www.iwf.org.uk/sites/default/files/inline-files/Preliminary_analysis_into_commercial_CSAM_distributor_accepting_bitcoin_sanitised_not_restricted_01014.pdf
Smith, S. (2014b). Rogue affiliates distributing CSAM using disguised websites. Retrieved from https://www.iwf.org.uk/sites/default/files/inline-files/Analysis_of_rogue_affiliates_commercial_public_0414.pdf
Smith, B. (2018, April 22). Florida man get 330 years on child porn charges in ‘sex tourism’ trial. USA Today. Retrieved from https://www.usatoday.com/story/news/nation-now/2018/04/22/florida-man-gets-330-years-child-porn-charges-sex-tourism-trial/540295002/
Smith, A. & Anderson, M. (2016). Online shopping and e-commerce. Pew Research Center. Retrieved from http://www.pewinternet.org/2016/12/19/online-shopping-and-e-commerce/
Smith, L. A., Vardaman, S. H., & Snow, M. A. (2009). The national report on domestic minor sex trafficking. Retrieved from www.sharedhope.org
Sood, A. K., & Enbody, R. J. (2013). Crimeware-as-a-service – A survey of commoditized crimeware in the underground market. International Journal of Critical Infrastructure Protection, 6(1), 28–38.
Stambaugh, H., Beaupre, D. S., Icove, D. J., Baker, R., Cassady, W., & Williams, W. P. (2001). Electronic crime needs assessment for state and local law enforcement. National Washington, DC: Institute of Justice, NCJ 186276.
Symanovich, S. (2019). How to safely access the deep and dark webs. Norton. Retrieved from https://us.norton.com/internetsecurity-how-to-how-can-i-access-the-deep-web.html
Symantec. (2014). The future of mobile malware. Retrieved from http://www.symantec.com/connect/blogs/future-mobile-malware
Taylor, P. A. (1999). Hackers: Crime in the digital sublime. New York: Routledge.
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism. London, UK: Prentice Hall Press.
Thomas, W. I. (1975). Old world traits transplanted. Montclair: Patterson Smith.
Tor. (2019). About the Tor project. Retrieved from https://2019.www.torproject.org/index.html.en
UNDOC. (2018). Global report on trafficking in persons. United Nations Office on Drugs and Crime. Retrieved from https://www.unodc.org/documents/data-and-analysis/glotip/2018/GLOTiP_2018_BOOK_web_small.pdf
Van Hout, M. C., & Bingham, T. (2014). Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. International Journal of Drug Policy, 25, 183–189. https://doi.org/10.1016/j.drugpo.2013.10.009
Victims of Trafficking and Violence Act of 2000, 22 U.S.C. § 7101
Wall, D. (2007). Cybercrime: The transformation of crime in the information age (Vol. 4). Cambridge, UK: Polity.
Ward, M. (2014). Tor’s most visited hidden sites host child abuse images. http://www.bbc.com/news/technology-30637010. Accessed 30 Aug 2016.
Weinschenk, C. (2019, March 6). Growing malware, malicious insider attacks contributing to $13M Avg company cybersecurity costs. Retrieved 4 June 2019, from https://www.telecompetitor.com/growing-malware-malicious-insider-attacks-contributing-to-13m-avg-company-cybersecurity-costs/
Wilson, M. (2011). Accenture survey: Discounters continue to dominate back-to-school shopping. Chain Store Age. https://www.chainstoreage.com/article/accenture-survey-discounters-continue-dominate-back-school- shopping
Wittes, B. B., Poplin, C., Jurecic, Q., & Spera, C. (2016). Sextortion: Cybersecurity, teenagers, and remote sexual assault. Washinton, DC: The Brookings Institute.
Wolak, J., Finkelhor, D., & Mitchell, K. J. (2012). Trends in arrests for child pornography possession: The Third National Juvenile Online Victimization Study. Retrieved from https://scholars.unh.edu/ccrc/46
Wortley, & Smallbone, S. (2006). Applying situational principles to sexual offenses against children. In R. K. Wortley & S. Smallbone. (Eds.), Situational prevention of child abuse (Crime prevention studies, Vol. 19, pp. 7–36). Monsey: Criminal Justice Press.
Zeller, T. (2005). Black market in stolen credit card data thrives on Internet. New York Times. Retrieved from https://www.nytimes.com/2005/06/21/technology/black-market-in-stolen-credit-card-data-thrives-on-internet.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this entry
Cite this entry
Liggett, R., Lee, J.R., Roddy, A.L., Wallin, M.A. (2020). The Dark Web as a Platform for Crime: An Exploration of Illicit Drug, Firearm, CSAM, and Cybercrime Markets. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-78440-3_17
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-78439-7
Online ISBN: 978-3-319-78440-3
eBook Packages: Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences