Explore chapters and articles related to this topic
The Event Analysis of Systemic Teamwork Broken Links (EAST-BL)
Published in Paul M. Salmon, Neville A. Stanton, Guy H. Walker, Adam Hulme, Natassia Goode, Jason Thompson, Gemma J. M. Read, Handbook of Systems Thinking Methods, 2022
Paul M. Salmon, Neville A. Stanton, Guy H. Walker, Adam Hulme, Natassia Goode, Jason Thompson, Gemma J. M. Read
The darknet is a layer of the Internet that cannot be indexed and searched through popular search engines such as Google, and cannot be accessed via conventional browsers such as Google Chrome and Mozilla Firefox. Within the darknet various marketplaces exist to facilitate the trade of both legitimate and illicit products and services. A key feature of the darknet is that applications enable Internet traffic to route through random pathways in order to disguise their point of origin (Bradbury, 2014). This allows users to communicate and trade without their real identity becoming known to authorities, reducing the likelihood of detection and prosecution (Martin, 2014). Consequently, darknet marketplaces are used as a means to trade illicit goods including drugs, firearms, child pornography, and stolen identity credentials (Bhaskar et al., 2019; Chen, 2012; Haasio et al., 2020; Europol, 2017a; Lane et al., 2019; Rhumorbarbe et al., 2016). Transactions span continents (Broséus et al. 2017) and market administrators have been known to earn millions of dollars in illicit profits (US Department of Justice, 2017).
Future Applications and Opportunities
Published in Gemma J.M. Read, Vanessa Beanland, Michael G. Lenné, Neville A. Stanton, Paul M. Salmon, Integrating Human Factors Methods and Systems Thinking for Transport Analysis and Design, 2017
Gemma J.M. Read, Vanessa Beanland, Michael G. Lenné, Neville A. Stanton, Paul M. Salmon
Cybersecurity represents a topical ‘wicked problem’ that could be tackled through a systems approach, such as that adopted in this research programme. One cybersecurity issue that is currently problematic is identity theft and trading in the dark net. The dark net is a layer of the Internet not accessible through popular search engines such as Google. Features of the dark net include websites, discussion forums and marketplaces that trade in both legitimate and illicit products and services. As such, the dark net facilitates various criminal activities, one of which is identity theft. The buying and selling of identity credentials (e.g. passports, driving licenses, credit card details, bank details, utility bills) via dark net forums has been identified as a significant and growing global problem (Ablon et al. 2014) and one for which appropriate interventions have not yet been developed.
Using the Event Analysis of Systemic Teamwork (EAST) broken-links approach to understand vulnerabilities to disruption in a darknet market
Published in Ergonomics, 2019
Ben R. Lane, Paul M. Salmon, Adrian Cherney, David Lacey, Neville A. Stanton
The Darknet is an alternate layer of the Internet, accessible using anonymising software, such as The Onion Router (TOR), which disguises user activity. One of the revolutions brought about by the Darknet has been in allowing users to transact anonymously when used in conjunction with cryptocurrencies. Markets on the Darknet consequently provide a venue for buying and selling illicit goods, including drugs, weapons and fraudulent personal identity documents and information. Transactions span continents (Broséus et al. 2017) and market administrators have been known to earn millions of dollars in illicit profits (US Department of Justice 2017).
Towards a Conceptual Typology of Darknet Risks
Published in Journal of Computer Information Systems, 2023
Obi Ogbanufe, Jordan Wolfe, Fallon Baucum
Given the illegal nature of the activities on the darknet, access to it is primarily through specific software like Tor and I2P. The software allows darknet participants to transact anonymously, making it difficult for their identities and activities to be traced by law enforcement.13 When accessing darknet sites, the Tor Browser routes participants through random Tor nodes so that the path of the traffic is random and encrypted, increasing the difficulty in tracing the user’s identity.18