Cybercrime and Dark or Deep Web (CARTELS-9)
Cybercrime Networks
Taylor and Francis online: Understanding How the Internet Facilitates Crime and
Deviance. By Loretta J. Stalans and Mary A. Finn. Vol. 11 29 Jul 2016
https://www.tandfonline.com/doi/full/10.1080/15564886.2016.1211404
From: Journal Victims & Offenders
An International Journal of Evidence-based Research, Policy, and Practice
Volume 11, 2016 - Issue 4: How the Internet Facilitates Deviance
Excerpt:
Cybercrime is crime that is mediated by networked technology (Wall, 2007 Wall, D. S.
(2007). Cybercrime: ). Old crimes such as theft, fraud, and harassment find new forms in
cyberspace and information technologies….
Unlawful behavior in some countries is tolerated and legal behavior in other countries,
allowing offenders to choose jurisdictions for their websites that have the least harsh
legal consequences. Moreover, maintaining anonymity or bogus identities during the
commission of crimes is easier in virtual spaces than in real physical space. Apps,
avatars, disposable devices, and the deep web—where search engines cannot detect
websites due to an added layer of security—facilitate a concealment of criminal
transactions, socialization into subcultures, and networking of those involved in illicit or
nonconventional behavior. Specialized forums and chat rooms in cyberspace have
created virtual spaces to network and to form trustworthy underground markets for
illicit drugs, prostitution, and child pornography (e.g., Beech, Elliot, Birgden, & Findlater,
2008
Resources
Beech, A. R., Elliott, I. A., Birgden, A., & Findlater, D. (2008). The Internet and child sexual
offending: A criminological review. Aggression and Violent Behavior, 13, 216–228.
doi:10.1016/j.avb.2008.03.007
[Crossref], [Web of Science ®], [Google Scholar]
; Lavorgna, 2014
Lavorgna, A. (2014). Internet-mediated drug trafficking: Towards a better understanding
of new criminal dynamics. Trends in Organized Crime, 27, 250–270. doi:10.1007/s12117-
014-9226-8
[Crossref], [Google Scholar]
; Stalans & Finn, 2016
Stalans, L. J. & Finn, M. A. (2016). Consulting legal experts in the real and virtual world:
Pimps’ and johns’ cultural schemas about strategies to avoid arrest and conviction.
Deviant Behavior, 37(6), 644–664. doi:10.1080/01639625.2015.1060810
[Taylor & Francis Online], [Google Scholar]
) and ideological deviant groups to incite terrorism, engage in espionage, or engage in
harmful health risks such as
The transformation of crime in the information age. Malden, MA: Polity Press.
[Google Scholar]
Article: Criminal and Routine Activities in Online Settings: Gangs, Offenders, and the
Internet
David C. Pyrooz et al.
Justice Quarterly
Volume 32, 2015 - Issue 3
Published online: 18 Mar 2013
Article: Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical
Analysis
Eric Rutger Leukfeldt et al.
Deviant Behavior
Volume 37, 2016 - Issue 3
Published online: 19 Jan 2016
Article: SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A
FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD
Thomas J. Holt et al.
Journal of Crime and Justice
Volume 33, 2010 - Issue 2
Journal: Victims & Offenders
An International Journal of Evidence-based Research, Policy, and Practice
Dark WEB: START HERE
Wikipedia: Dark Web
https://en.wikipedia.org/wiki/Dark_web
Excerpt: The dark web is the World Wide Web content that exists on darknets,
overlay networks that use the Internet but require specific software,
configurations, or authorization to access. The dark web forms a small part of the
deep web, the part of the Web not indexed by web search engines, although
sometimes the term deep web is mistakenly used to refer specifically to the dark
web. The darknets which constitute the dark web include small, friend-to-friend
peer-to-peer networks, as well as large, popular networks like Tor, Freenet, I2P,
and Riffle operated by public organizations and individuals. Users of the dark
web refer to the regular web as Clearnet due to its unencrypted nature. The Tor
dark web may be referred to as onionland, a reference to the network's top-level
domain suffix .onion and the traffic anonymization technique of onion routing.
https://en.wikipedia.org/wiki/Dark_web
ARTICLES - LINKS
AARP
(2018/09/04) Is My Identity on the Dark Web? Deep within the internet is a
secretive place where criminals buy and sell your private data. By Doug Shadel
with Neil Wertheimer, AARP Bulletin, September 4, 2018
https://www.aarp.org/money/scams-fraud/info-2018/what-is-the-dark-web.html
Durango Colorado Investigators Into Dark Web
(2018) [article also in Police Abuse/Info-Colorado]
https://durangoherald.com/articles/219599
Excerpt: Detective Josh Newman of Durango PD looks over dark web. Identity
theft, child pornography among top targets for detectives.
Forbes: (2016/06/28) The Dark Web is still a huge difficult problem
https://www.forbes.com/sites/timsparapani/2016/06/28/the-dark-web-is-still-a-
huge-difficult-problem/#3816568b65b1
Deep Web Sites dot com: (2017/06/19) Careless hack in Mexico reveals customers of
NSO Group; A 1$ Billion Dollar Spyware Company
https: //www dot deepweb-sites dot com/careless-hack-mexico-reveals-
customers-nso-group-1-billion-dollar-spyware-company/
Have you ever heard about the NSO Group? The famous professional spyware
maker group based in Israeli who sells them to government organizations around
the globe. Lately they were been on the news due to the sophisticated iphone
hacking tool which hacked the iphone with a single text message.
But today the name came up when one of its customers in Mexico did the
absolute sloppy way of hacking the phones of 15 journalists, human rights
activists and few scientists.
Updates: 2020/05/07 Cybercrime section moved from River Gold and added to
Dark/Deep Web section; Page started 10/21/2018
possible repeat
Taylor and Francis online: Understanding How the Internet Facilitates Crime and
Deviance. By Loretta J. Stalans and Mary A. Finn. Vol. 11 29 Jul 2016
https://www.tandfonline.com/doi/full/10.1080/15564886.2016.1211404
From: Journal Victims & Offenders
An International Journal of Evidence-based Research, Policy, and Practice
Volume 11, 2016 - Issue 4: How the Internet Facilitates Deviance
Excerpt:
Cybercrime is crime that is mediated by networked technology (Wall, 2007 Wall, D. S.
(2007). Cybercrime: ). Old crimes such as theft, fraud, and harassment find new forms in
cyberspace and information technologies….
Unlawful behavior in some countries is tolerated and legal behavior in other countries,
allowing offenders to choose jurisdictions for their websites that have the least harsh
legal consequences. Moreover, maintaining anonymity or bogus identities during the
commission of crimes is easier in virtual spaces than in real physical space. Apps,
avatars, disposable devices, and the deep web—where search engines cannot detect
websites due to an added layer of security—facilitate a concealment of criminal
transactions, socialization into subcultures, and networking of those involved in illicit or
nonconventional behavior. Specialized forums and chat rooms in cyberspace have
created virtual spaces to network and to form trustworthy underground markets for
illicit drugs, prostitution, and child pornography (e.g., Beech, Elliot, Birgden, & Findlater,
2008
Resources
Beech, A. R., Elliott, I. A., Birgden, A., & Findlater, D. (2008). The Internet and child sexual
offending: A criminological review. Aggression and Violent Behavior, 13, 216–228.
doi:10.1016/j.avb.2008.03.007
[Crossref], [Web of Science ®], [Google Scholar]
; Lavorgna, 2014
Lavorgna, A. (2014). Internet-mediated drug trafficking: Towards a better understanding
of new criminal dynamics. Trends in Organized Crime, 27, 250–270. doi:10.1007/s12117-
014-9226-8
[Crossref], [Google Scholar]
; Stalans & Finn, 2016
Stalans, L. J. & Finn, M. A. (2016). Consulting legal experts in the real and virtual world:
Pimps’ and johns’ cultural schemas about strategies to avoid arrest and conviction.
Deviant Behavior, 37(6), 644–664. doi:10.1080/01639625.2015.1060810
[Taylor & Francis Online], [Google Scholar]
) and ideological deviant groups to incite terrorism, engage in espionage, or engage in
harmful health risks such as
The transformation of crime in the information age. Malden, MA: Polity Press.
[Google Scholar]
Article: Criminal and Routine Activities in Online Settings: Gangs, Offenders, and the
Internet
David C. Pyrooz et al.
Justice Quarterly
Volume 32, 2015 - Issue 3
Published online: 18 Mar 2013
Article: Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical
Analysis
Eric Rutger Leukfeldt et al.
Deviant Behavior
Volume 37, 2016 - Issue 3
Published online: 19 Jan 2016
Article: SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A
FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD
Thomas J. Holt et al.
Journal of Crime and Justice
Volume 33, 2010 - Issue 2
Journal: Victims & Offenders
An International Journal of Evidence-based Research, Policy, and Practice
Updates: Page started 10/21/2018
Resources and Input
Policing, Borders, Drugs, Cartels
and System Corruption