2019
DOI: 10.1080/01639625.2019.1596465
|View full text |Cite
|
Sign up to set email alerts
|

Assessing the Practices and Products of Darkweb Firearm Vendors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
30
0
6

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(37 citation statements)
references
References 21 publications
1
30
0
6
Order By: Relevance
“…In an online setting, this social capital (criminal capital in the current context), translates into both the interest generated by (passive) offenders buying a product or service and using it for illicit consumption and also by (active) offenders buying a product or service and receiving support and protection whilst using it to carry out illicit activities. This study resonates with the market analysis and social network approach of those studies which analyse online criminal organisations and cryptomarkets (Leukfeldt et al 2017;Munksgaard et al 2019;Lusthaus 2018;Copeland et al 2020). Our study, however, explores a different type of opportunistic product/servicethe booter or stresser service, which can be hired and used to deliver illegal DDoS attacks.…”
Section: Introductionsupporting
confidence: 58%
“…In an online setting, this social capital (criminal capital in the current context), translates into both the interest generated by (passive) offenders buying a product or service and using it for illicit consumption and also by (active) offenders buying a product or service and receiving support and protection whilst using it to carry out illicit activities. This study resonates with the market analysis and social network approach of those studies which analyse online criminal organisations and cryptomarkets (Leukfeldt et al 2017;Munksgaard et al 2019;Lusthaus 2018;Copeland et al 2020). Our study, however, explores a different type of opportunistic product/servicethe booter or stresser service, which can be hired and used to deliver illegal DDoS attacks.…”
Section: Introductionsupporting
confidence: 58%
“…The challenge of the Tor anonymity network, as intimated by its dual use nature, is that maximal policy solutions all promise to cause harm to some party. Leaving the Tor network up and free from law enforcement investigation is likely to lead to direct and indirect harms that results from the system being used by those engaged in child exploitation ( 7 , 8 ), drug exchange ( 9 13 ), and the sale of firearms ( 14 , 15 ), although these harms are of course highly heterogeneous in terms of their potential negative social impacts and some, such as personal drug use, might also have predominantly individual costs in some cases. Conversely, simply working to shut down Tor would cause harm to dissidents and human rights activists, particularly, our results suggest, in more repressive, less politically free regimes where technological protections are often needed the most ( 19 , 20 ).…”
Section: Discussionmentioning
confidence: 99%
“…They can also use the Tor browser to anonymously read either these Onion/Hidden Services (i.e., sites with rendezvous points located internal to the Tor network) or to access Clear Web sites ( 1 5 ). With these diverse supply-side and demand-side functions ( 6 ), many point to the socially harmful uses of Tor as an anonymous platform for child abuse imagery sites ( 7 , 8 ), illicit drug markets ( 9 13 ), gun sales ( 14 , 15 ), and potential extremist content that has shifted to the Dark Web after extensive Clear Web content moderation efforts ( 16 ). Others emphasize its socially beneficial potential as a privacy-enhancing tool and censorship circumvention technology ( 17 – 22 ).…”
mentioning
confidence: 99%
“…One precondition for CSAM offenders operating on the darknet is access to the internet and the ability to navigate the clear web in the first place. Rarely do offenders enter the darknet without first navigating the clear web (see Copeland, Wallin & Holt 2020;Martin et al 2020). Once offenders with a certain propensity for CSAM are present on the clear web, they will simply search for CSAM by visiting adult pornographic websites, or searching for keywords via Google, as an example (Westlake 2020).…”
Section: The Crime Set-up Phasementioning
confidence: 99%