Law Enforcement Strategies for Disrupting Cryptomarkets: A Practical Guide to Network Structure, Trust Dynamics, and Agent-Based Modelling Approaches

Vincent Harinam, Barak Ariel, Barak Ariel

Research output: Book/ReportBookpeer-review

Abstract

This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly. It outlines the current landscape of this market, highlighting: • What is known about drug markets on the dark web. • How transactions involving illicit goods occur in cryptomarkets. • How the illegal trade of drugs is conducted in the dark web. • The role of blockchain technology in these transactions. The chapters that follow identify effective methods suppliers and purchasers employ to trade under conditions of uncertainty. They explore the role that trust plays in network structures and vendor selections for drug markets. The volume includes a review of the targeting strategies available for law enforcement and offers new solutions to target the trade of illicit goods on the dark web. It is ideal for law enforcement officers and practitioners combatting cybercrime.

Original languageEnglish
PublisherSpringer Nature
Number of pages183
ISBN (Electronic)9783031628214
ISBN (Print)9783031628207
DOIs
StatePublished - 1 Jan 2024

Bibliographical note

Publisher Copyright:
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.

Keywords

  • Cryptomarkets and their role in crime
  • Cybercrime and ways to tackle it
  • Drugs that can be bought online
  • Empirical original research of dark web markets
  • Fraud and cyberfraud
  • How is Crime conducted between parties online
  • Social networks and the role of trust
  • What is the Dark Web and how is it used

Fingerprint

Dive into the research topics of 'Law Enforcement Strategies for Disrupting Cryptomarkets: A Practical Guide to Network Structure, Trust Dynamics, and Agent-Based Modelling Approaches'. Together they form a unique fingerprint.

Cite this