649
Views
8
CrossRef citations to date
0
Altmetric
Research Articles

An assessment of the state of firearm sales on the Dark Web

, &
Pages 46-60 | Received 26 Oct 2021, Accepted 21 Mar 2022, Published online: 06 Apr 2022

References

  • Ablon, L., M. C. Libicki, and A. A. Golay. Hackers’ bazaar. 2014. Markets for Cybercrime Tools and Stolen Data. Santa Monica, CA: Rand Corporation.
  • Aldridge, J., and R. Askew. 2017. “Delivery Dilemmas: How Drug Cryptomarket Users Identify and Seek to Reduce Their Risk of Detection by Law Enforcement.” International Journal of Drug Policy 41: 101–109. doi:10.1016/j.drugpo.2016.10.010.
  • Aldridge, J., and D. Décary-Hétu. 2014. ”Not an ‘Ebay for Drugs’: The Cryptomarket ‘Silk Road’ as a Paradigm Shifting Criminal Innovation.” Social Science Research Network. doi:10.2139/ssrn.2436643.
  • Aldridge, J., and D. Décary-Hétu. 2016. “Hidden Wholesale: The Drug Diffusing Capacity of Online Drug Cryptomarkets.” International Journal of Drug Policy 35: 7–15. doi:10.1016/j.drugpo.2016.04.020.
  • Anahita, S. 2006. “Blogging the Borders: Virtual Skinheads, Hypermasculinity, and Heteronormativity.” Journal of Political & Military Sociology 34 (1): 143–164.
  • Australian Criminal Intelligence Commission. 2016. Illicit Firearms in Australia Report. Canberra: ACIC. https://www.acic.gov.au/publications/unclassified-intelligence-reports/illicit-firearms-australia-report
  • Barratt, M. J. 2012. “Silk Road: Ebay for Drugs.” Addiction 107 (3): 683. doi:10.1111/j.1360-0443.2011.03709.x.
  • Barratt, M. J., and J. Aldridge. 2016. “Everything You Always Wanted to Know about Drug Cryptomarkets*(* but Were Afraid to Ask.” International Journal of Drug Policy 35: 1–6. doi:10.1016/j.drugpo.2016.07.005.
  • Barratt, M. J., J. A. Ferris, and A. R. Winstock. 2014. “Use of Silk Road, the Online Drug Marketplace, in the United Kingdom, Australia and the United States.” Addiction 109 (5): 774–783. doi:10.1111/add.12470.
  • Baumgarten, N. 2017. “Othering Practice in a Right-wing Extremist Online Forum.” Language@ Internet 14 (1).
  • Braga, A. A., P. J. Cook, D. M. Kennedy, and M. H. Moore. 2002. “The Illegal Supply of Firearms.” Crime and Justice 29: 319–352. doi:10.1086/652223.
  • Broadhurst, R., J. Foye, C. Jiang, and M. Ball. 2021. “Illicit Firearms and Other Weapons on Darknet Markets.” Trends and Issues in Crime and Criminal Justice 622: 1–20.
  • Cook, P. J., W. Cukier, and K. Krause. 2009. “The Illicit Firearms Trade in North America.” Criminology & Criminal Justice 9 (3): 265–286. doi:10.1177/1748895809336377.
  • Cook, P. J., J. Ludwig, S. Venkatesh, and A. A. Braga. 2007. “Underground Gun Markets.” The Economic Journal 117 (524): F588–F618. doi:10.1111/j.1468-0297.2007.02098.x.
  • Cook, P. J., S. Molliconi, and T. B. Cole. 1995. “Regulating Gun Markets.” The Journal of Criminal Law & Criminology 86 (1): 59–92. doi:10.2307/1144000.
  • Cook, P. J., S. T. Parker, and H. A. Pollack. 2015. “Sources of Guns to Dangerous People: What We Learn by Asking Them.” Preventive Medicine 79: 28–36. doi:10.1016/j.ypmed.2015.04.021.
  • Copeland, C., M. Wallin, and T. J. Holt. 2020. “Assessing the Practices and Products of Darkweb Firearm Vendors.” Deviant Behavior 41 (8): 949–968. doi:10.1080/01639625.2019.1596465.
  • Cunliffe, J., J. Martin, D. Décary-Hétu, and J. Aldridge. 2017. “An Island Apart? Risks and Prices in the Australian Cryptomarket Drug Trade.” International Journal of Drug Policy 50: 64–73. doi:10.1016/j.drugpo.2017.09.005.
  • Décary-Hétu, D., and B. Dupont. 2013. “Reputation in a Dark Network of Online Criminals.” Global Crime 14 (2–3): 175–196. doi:10.1080/17440572.2013.801015.
  • Décary-Hétu, D., and A. Leppänen. 2016. “Criminals and Signals: An Assessment of Criminal Performance in the Carding Underworld.” Security Journal 29 (3): 442–460. doi:10.1057/sj.2013.39.
  • Décary-Hétu, D., M. Paquet-Clouston, and J. Aldridge. 2016. “Going International? Risk Taking by Cryptomarket Drug Vendors.” International Journal of Drug Policy 35: 69–76. doi:10.1016/j.drugpo.2016.06.003.
  • Demant, J., R. Munksgaard, D. Décary-Hétu, and J. Aldridge. 2018. “Going Local on A Global Platform: A Critical Analysis of the Transformative Potential of Cryptomarkets for Organized Illicit Drug Crime.” International Criminal Justice Review 28 (3): 255–274. doi:10.1177/1057567718769719.
  • European Monitoring Centre for Drugs and Drug Addiction and Europol. 2019. ”EU Drug Markets Report 2019.” Luxembourg: Publications Office of the European Union.
  • Figea, L., L. Kaati, and R. Scrivens. 2016. ”Measuring Online Affects in a White Supremacy Forum.” In 2016 IEEE Conference on Intelligence and Security Informatics (ISI) 85–90. Tucson, AZ, USA
  • Flamand, C., and D. Décary-Hétu. 2019. “The Open and Dark Web: Facilitating Cybercrime and Technology-enabled Offences.” The Human Factor of Cybercrime 60–80.
  • Franklin, J., A. Perrig, V. Paxson, and S. Savage. 2007. ”An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.” In ACM Conference on Computer and Communications Security, Alexandria, VA, USA. 10: 375–388.
  • Grimmett, R. F., and P. K. Kerr. 2012. ”Conventional Arms Transfers to Developing Countries, 2004-2011.” Congressional Research Service. Washington DC, 15.
  • Hales, G., C. Lewis, and D. Silverstone. 2006. “Gun Crime: The Market in and Use of Illegal Firearms.”
  • Herley, C., and D. Florêncio. 2010. “Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy.” In T. Moore, D. Pym, & C. Ioannidis (Eds.), Economics of Information Security and Privacy, 33–53. Boston, MA: Springer.
  • Holt, T. J. 2010. “Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On‐line Data.” Journal of Criminal Justice Education 21 (4): 466–487. doi:10.1080/10511253.2010.516565.
  • Holt, T. J. 2012. “Exploring the Intersections of Technology, Crime, and Terror.” Terrorism and Political Violence 24 (2): 337–354. doi:10.1080/09546553.2011.648350.
  • Holt, T. J. 2013. “Examining the Forces Shaping Cybercrime Markets Online.” Social Science Computer Review 31 (2): 165–177. doi:10.1177/0894439312452998.
  • Holt, T. J. 2017. “Identifying Gaps in the Research Literature on Illicit Markets On-line.” Global Crime 18 (1): 1–10. doi:10.1080/17440572.2016.1235821.
  • Holt, T., and A. Bossler. 2016. Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.
  • Holt, T. J., Y. Chua, and O. Smirnova. 2013. ”An Exploration of the Factors Affecting the Advertised Price for Stolen Data.” In 2013 APWG eCrime Researchers Summit, 1–10. San Francisco, CA, USA: IEEE.
  • Holt, T. J., and B. Dupont. 2019. “Exploring the Factors Associated with Rejection from a Closed Cybercrime Community.” International Journal of Offender Therapy and Comparative Criminology 63 (8): 1127–1147. doi:10.1177/0306624X18811101.
  • Holt, T. J., and E. Lampke. 2010. “Exploring Stolen Data Markets Online: Products and Market Forces.” Criminal Justice Studies 23 (1): 33–50. doi:10.1080/14786011003634415.
  • Holt, T. J., and J. R. Lee. 2022a. “A Crime Script Analysis of Counterfeit Identity Document Procurement Online.” Deviant Behavior 43 (3): 285–302. doi:10.1080/01639625.2020.1825915.
  • Holt, T. J., and J. R. Lee. 2022b. “A Crime Script Model of Dark Web Firearms Purchasing.” American Journal of Criminal Justice 1–21. doi:10.1007/s12103-022-09675-8.
  • Holt, T. J., O. Smirnova, and Y. Chua. 2016. “Exploring and Estimating the Revenues and Profits of Participants in Stolen Data Markets.” Deviant Behavior 37 (4): 353–367. doi:10.1080/01639625.2015.1026766.
  • Holt, T. J., O. Smirnova, Y. Chua, and H. Copes. 2015. “Examining the Risk Reduction Strategies of Actors in Online Criminal Markets.” Global Crime 16 (2): 81–103. doi:10.1080/17440572.2015.1013211.
  • Holt, T. J., O. Smirnova, and A. Hutchings. 2016. “Examining Signals of Trust in Criminal Markets Online.” Journal of Cybersecurity 2 (2): 137–145.
  • Hureau, D. M., and A. A. Braga. 2018. “The Trade in Tools: The Market for Illicit Guns in High‐risk Networks.” Criminology 56 (3): 510–545. doi:10.1111/1745-9125.12187.
  • Hutchings, A., and T. J. Holt. 2015. “A Crime Script Analysis of the Online Stolen Data Market.” British Journal of Criminology 55 (3): 596–614. doi:10.1093/bjc/azu106.
  • Hyslip, T. S., and T. J. Holt. 2019. “Assessing the Capacity of DRDoS-for-hire Services in Cybercrime Markets.” Deviant Behavior 40 (12): 1609–1625. doi:10.1080/01639625.2019.1616489.
  • Kitchin, H. A. 2003. “The Tri-Council Policy Statement and Research in Cyberspace: Research Ethics, the Internet, and Revising a ‘Living Document.” Journal of Academic Ethics 1 (4): 397–418. doi:10.1023/B:JAET.0000025671.83557.fa.
  • Li, W., and H. Chen. 2014. ”Identifying Top Sellers in Underground Economy Using Deep Learning-based Sentiment Analysis.” In 2014 IEEE joint intelligence and security informatics conference 64–67. Hague, Netherlands: IEEE.
  • Liggett, R., J. R. Lee, A. L. Roddy, and M. A. Wallin. 2020. “The Dark Web as a Platform for Crime: An Exploration of Illicit Drug, Firearm, CSAM, and Cybercrime Markets.” The Palgrave Handbook of International Cybercrime and Cyberdeviance 91–116.
  • Markowski, S., S. Koorey, P. Hall, and J. Brauer. 2009. “Multi‐Channel Supply Chain for Illicit Small Arms.” Defence and Peace Economics 20 (3): 171–191. doi:10.1080/10242690802030903.
  • Martin, J. 2014. Drugs on the Dark Net: How Cryptomarkets are Transforming the Global Trade in Illicit Drugs. New York: Springer.
  • McKay, Tom. 2018. ”Feds Bust over 35 Suspected Dark Web Vendors Seizing Everything from Drugs to a Grenade Launcher.” CA, United States: Gizmodo, G/O Media Inc.
  • Munksgaard, R., J. Demant, and G. Branwen. 2016. “A Replication and Methodological Critique of the Study “Evaluating Drug Trafficking on the Tor Network.” International Journal of Drug Policy 35: 92–96. doi:10.1016/j.drugpo.2016.02.027.
  • Olivier, J., and M. M. Norberg. 2010. “Positively Skewed Data: Revisiting the Box-cox Power Transformation.” International Journal of Psychological Research 3 (1): 68–95. doi:10.21500/20112084.846.
  • Ollmann, G. 2008. “The Evolution of Commercial Malware Development Kits and Colour-by-numbers Custom Malware.” Computer Fraud & Security 9 (9): 4–7. doi:10.1016/S1361-3723(08)70135-0.
  • Paoli, G. P., J. Aldridge, R. Nathan, and R. Warnes. 2017. “”Behind the Curtain: The Illicit Trade of Firearms, Explosives and Ammunition on the Dark Web.” Santa Monica, CA: RAND.
  • Peretti, K. K. 2008. “Data Breaches: What the Underground World of Carding Reveals.” Santa Clara Computer & High Technology Law Journal 25: 375.
  • Pleasance, C. 2015. Prisoner Who Used Parcelforce to Import Deadly 850-round-a-minute Machine Guns into the UK Is Jailed for Life as Judge Slams Lax Jail Security. Retrieved from https://www.dailymail.co.uk/news/article-2970878/Prisoner-used-Parcelforce-import-deadly-850-round-minute-machine-guns-UK-jailed-life-judge-slams-lax-jail-security.html
  • Rhumorbarbe, D., Werner, D., Gilliéron, Q., Staehli, L., Broséus, J., and Rossy, Q. 2018. “Characterising the online weapons trafficking on cryptomarkets.” Forensic science international 283: 16–20.
  • Roddy, A. L., and T. J. Holt. 2022. “An Assessment of Hitmen and Contracted Violence Providers Operating Online.” Deviant Behavior 43 (2): 139–151.
  • Rothe, D. L., and V. Collins. 2011. “An Exploration of Applying System Criminality to Arms Trafficking.” International Criminal Justice Review 21 (1): 22–38. doi:10.1177/1057567710392572.
  • Sengupta, K. 2016. How Teenager Used the Dark Web to Buy Gun for Munich Mass Murder. Retrieved from https://www.standard.co.uk/news/world/how-teenager-used-the-dark-web-to-buy-gun-for-munich-mass-murder-a3330406.html
  • Silverman, D. 2013. Interpreting Qualitative Data: Methods for Analyzing Talk, Text, and Interaction, 4nd Edition. Thousand Oaks, CA: SAGE Publications.
  • Smirnova, O., and T. J. Holt. 2017. “Examining the Geographic Distribution of Victim Nations in Stolen Data Markets.” American Behavioral Scientist 61 (11): 1403–1426. doi:10.1177/0002764217734270.
  • Thelwall, M. 2009. “Introduction to webometrics: Quantitative web research for the social sciences.” Synthesis lectures on information concepts, retrieval, and services 1 (1): 1–116.
  • Wehinger, F. 2011. “The Dark Net: Self-regulation Dynamics of Illegal Online Markets for Identities and Related Services.” In 2011 European intelligence and security informatics conference, 209–213. Athens, Greece: IEEE.
  • Wilkinson, D., and M. Thelwall. 2011. “Researching Personal Information on the Public Web: Methods and Ethics.” Social Science Computer Review 29 (4): 387–401. doi:10.1177/0894439310378979.
  • Wong, M. A., R. Frank, and R. Allsup. 2015. “The Supremacy of Online White Supremacists–an Analysis of Online Discussions by White Supremacists.” Information & Communications Technology Law 24 (1): 41–73. doi:10.1080/13600834.2015.1011845.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.