Skip to main content

Black Spots in Cyberspace?

  • Chapter
  • First Online:
Book cover Transnational Crime and Black Spots

Part of the book series: International Political Economy Series ((IPES))

  • 406 Accesses

Abstract

Central themes of this book have revolved around rethinking sovereignty and the global economy. What happens when we introduce the notion of cyberspace, a domain that appears to eliminate political jurisdictions and to move globalization to a new level? Do black spots become less relevant to the study of illicit activities as criminals, insurgents, and terrorists increasingly adopt cyber-technology? Or are black spots just as likely to be found in this so-called virtual world in ways similar to the physical world of states? This chapter explores if there are black spots in cyberspace. We start by introducing the concept of cyberspace and exploring how it relates to the illicit world. Of interest are the various ways criminal actors use cyber-technology to enhance their operations. In other words, are illicit activities changing in response to the evolution of cyberspace? Building on this discussion, we show the relevance of the notion of black spots to cyberspace and provide examples of their impact.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Adams, Devin M. 2017. The 2016 Amendment to Criminal Rule 41: National Search Warrants to Seize Cyberspace, “Particularly” Speaking. University of Richmond Law Review 51: 721–773.

    Google Scholar 

  • Adams, Jackson, and Mohamad Albakajai. 2016. Cyberspace: A New Threat to the Sovereignty of the State. Management Studies 4 (6): 256–265.

    Google Scholar 

  • Allen, Ernie. 2010. Domestic Minor Sex Trafficking. Testimony before the Subcommittee on Crime, Terrorism, and Homeland Security, Committee on the Judiciary, US House of Representatives, September 15.

    Google Scholar 

  • Anderson, Nate. 2011. LulzSec Manifesto: “We Screw Each Other Over for a Jolt of Satisfaction.” Ars Technica, May 17.

    Google Scholar 

  • Bevir, George. 2017. Cost of Online Piracy to Hit $52bn. IBC 365, October 30.

    Google Scholar 

  • Bhattacharjee, Yudhijit. 2011. Welcome to Hackerville: The Romanian Cybercriminal Hotspot. Wired, March.

    Google Scholar 

  • Bischoff, Paul. 2016. Guide: How to Access the Deep Web and Darknet. VPN & Privacy, May 31.

    Google Scholar 

  • Bran, Mirel. 2013. In Romania, a Quiet City Has Become the Global Hub for Hackers and Online Crooks. Le Monde (English Edition), January 7.

    Google Scholar 

  • BrightPlanet. 2012. Deep Web: A Primer. brightplanet.com, June 4.

  • Broadhurst, Roderic, Peter Grabosky, Mamoun Alazab, and Steve Chon. 2014. Organizations and Cybercrime: An Analysis of the Nature of Groups Engaged in Cybercrime. International Journal of Cyber Criminology 8 (1): 1–20.

    Google Scholar 

  • Broadhurst, Roderic, Peter Grabosky, Mamoun Alazab, Brigitte Bohours, Steve Chon, and Chen Da. 2013. Crime in Cyberspace: Offenders and the Role of Organized Crime Groups. Working Paper, Australian National University Cybercrime Observatory, May 15.

    Google Scholar 

  • Caldwell, Leslie R. 2016. Highlighting Cybercrime Enforcement. Speech at Center for Strategic and International Studies, December 7.

    Google Scholar 

  • Cardenas, Alvarao A., Svetlana Radosavac, Jens Grossklags, John Chuang, and Chris Hoofnagle. 2009. An Economic Map of Cybercrime. Paper Presented at the 37th Research Conference on Communication Information, and Internet Policy, George Mason University.

    Google Scholar 

  • Chacos, Brad. 2013. Meet Darknet: The Hidden Anonymous Underbelly of the Searchable Web. PC World, August 12.

    Google Scholar 

  • Chawki, Mohamed. 2006. Anonymity in Cyberspace: Finding the Balance. Computer Crime Research Center, July 9.

    Google Scholar 

  • Choo, Raymond, and Peter Grabosky. 2013. Cyber Crime. In Oxford Handbook of Organized Crime, ed. Letizia Paoli. Oxford: Oxford University Press.

    Google Scholar 

  • Clayton, Richard. 2009. How Much Did Shutting Down McColo Help? Cambridge: Cambridge Computer Laboratory, Cambridge University.

    Google Scholar 

  • Cohen-Almagor, Raphael. 2012. Freedom of Expression, Internet Responsibility, and Business Ethics: The Yahoo Saga and Its Implications. Journal of Business Ethics 106 (3): 353–365.

    Article  Google Scholar 

  • Correll, Sean-Paul. 2010. Inside Mariposa—The Largest Botnet Takedown in History. ISSA Magazine, May.

    Google Scholar 

  • Couch, Robbie. 2014. 70 Percent of Child Sex Trafficking Victims Are Sold Online: Study. The Huffington Post, July 25.

    Google Scholar 

  • CyberBunker. 2016. Spamhaus Blackmail War. http://cyberbunker.com/web/spamhaus.php. Accessed 24 July 2018.

  • Fielding, Sarah. 2018. Craigslist Has Banned Personal Ads Thanks to a New Trafficking Law—Here’s How Sex Workers Say It Could Put Them in Huge Danger. INSIDER, March 20.

    Google Scholar 

  • Franceschi-Bicchierai, Lorenzo. 2015. Inside “Hackerville,” Romania’s Infamous Cyber Crime Hub. Motherboard, June 17.

    Google Scholar 

  • Freed, Anthony M. 2010. An Interview with UN Cybersecurity Expert Raoul Chiesa. The Huffington Post, April 15.

    Google Scholar 

  • Gaspareniene, Ligita, and Rita Remeikiene. 2015. Digital Shadow Economy: A Critical Review of the Literature. Mediterranean Journal of Social Sciences 6 (6): 402–409.

    Google Scholar 

  • Global RADAR. 2017. US Government Stopping Piracy Across the Globe. Global RADAR, December 25.

    Google Scholar 

  • Greenberg, Andy. 2016. The Silk Road’s Dark Web Dream Is Dead. Wired, January 14.

    Google Scholar 

  • Holt, Thomas J. and Adam M. Bossler. 2014. Cybercrime. Oxford Handbooks Online. Oxford University Press, June.

    Google Scholar 

  • Holt, Thomas J., April M. Zeoli, and Kathleen Bohner. 2013. Examining the Decision-Making Processes of Sex Tourists Using Online Data. Journal of Qualitative Criminal Justice and Criminology 1: 122–155.

    Google Scholar 

  • International Telecommunications Union (ITU). 2017. ICT Facts and Figures 2017. Geneva: ITU.

    Google Scholar 

  • Jenkins, Quentin. 2011. Dutch ISP Attempts False Police Report. Spamhaus News, October 14.

    Google Scholar 

  • Kiguolis, Ugnius. 2017. Koobface Worm Proliferates and Makes Astounding Profit for Its Owners. 2SpyWare, February 7.

    Google Scholar 

  • Krebs, Brian. 2007a. Shadowy Russian Firm Seen as Conduit for Cybercrime. Washington Post, October 13.

    Google Scholar 

  • ———. 2007b. Russian Business Network: Down, But Not Out. Washington Post, November 7.

    Google Scholar 

  • ———. 2008. Host of Internet Spam Groups Is Cut Off. Washington Post, November 12.

    Google Scholar 

  • ———. 2010. Naming and Shaming ‘Bad’ ISPs. Krebs on Security, March 19.

    Google Scholar 

  • ———. 2014. How a Car Wreck in a Moscow Square Affected the Spam We Receive Everyday. Krebs on Security, December 29.

    Google Scholar 

  • ———. 2016. Inside “The Attack that Almost Broke the Internet.” Krebs on Security, August 26.

    Google Scholar 

  • Latonero, Mark. 2011. Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds. Los Angeles: Center on Communication Leadership and Policy, Annenberg School for Communications and Journalism, University of Southern California, September.

    Google Scholar 

  • Leyden, John. 2012. Five Koobface Botnet Suspects Named by New York Times. The Register, January 18.

    Google Scholar 

  • McAfee. 2018. The Economic Impact of Cybercrime—No Slowing Down. Washington, DC: McAfee and Center for Strategic and International Studies.

    Google Scholar 

  • Moura, Giovane C.M. 2013. Internet Bad Neighborhoods. The Netherlands Center for Telematrics and Information Technology, University of Twente.

    Google Scholar 

  • Moura, Giovane C.M., Ramin Sadre, and Aiko Pras. 2014. Bad Neighborhoods on the Internet. IEEE Communications Magazine 52 (7). preprint.

    Article  Google Scholar 

  • Mueller, Milton, Andreas Schmidt, and Brenden Kuerbis. 2013. Internet Security and Networked Governance in International Relations. International Studies Review 15 (1): 86–104.

    Article  Google Scholar 

  • Negi, Yogita. 2011. Pragmatic Overview of Hacking & Its Counter Measures. Proceedings of the 5th National Conference, INDIACom, New Delhi, March 10–11.

    Google Scholar 

  • Pfanner, Eric and Kevin J. O’Brien. 2013. Provocateur Comes into View after Cyberattack. New York Times. March 29.

    Google Scholar 

  • Prince, Brian. 2010. How The Koobface Botnet Made $2 Million in a Year. eWeek, November 13.

    Google Scholar 

  • Prince, Matthew. 2013. The DDoS that Almost Broke the Internet. The Cloudflare Blog, March 27.

    Google Scholar 

  • Sedgwick, Kai. 2018. These Are the Most Popular Darknet Marketplaces Right Now. Bitcoin News, May 1.

    Google Scholar 

  • Soska, Kyle and Nicolas Christin. 2015. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. Proceedings of the 24th USENIX Security Symposium, Washington, DC, August 12–14.

    Google Scholar 

  • Stone-Gross, Brett, Christopher Kruegel, Kevin Almeroth, Andreas Moser, and Engin Kirda. 2009. FIRE: Finding Rogue Networks. Paper Presented at the 25th Annual Conference on Computer Security Applications, Honolulu, December 7–9.

    Google Scholar 

  • The Economist. 2014. The Amazons of the Darknet, November 1.

    Google Scholar 

  • ———. 2016. Shedding Light on the Dark Web, July 16.

    Google Scholar 

  • United Nations Office on Drugs and Crime (UNODC). 2012. Transnational Organized Crime in Central America and the Caribbean: A Threat Assessment. Vienna: UNODC.

    Google Scholar 

  • ———. 2013. Comprehensive Study on Cybercrime. Vienna: UNODC.

    Google Scholar 

  • Van der Sar, Ernesto. 2017. US Government Teaches Anti-Piracy Skills Around the Globe. Torrent Freak, December 17.

    Google Scholar 

  • Van Eeten, Michel, Johannes M. Bauer, Hadi Asghari, Shirin Tabatabaie, and Dave Rand. 2010. The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data. Paper Presented at the Ninth Workshop on the Economics of Information Security, George Mason University, June 7–8.

    Google Scholar 

  • Vernetti, Gianmaria. 2010. The Power of Networking: An Insight of the Russian Business Network. United Nations Interregional Crime and Justice Research Institute, July.

    Google Scholar 

  • Wall, David S. 2005. Cybercrime, Deviance, and the Internet. Cambridge, UK: Polity.

    Google Scholar 

  • Winstock, Adam R., Monica I. Barratt, Larissa J. Maier, and Jason A. Ferris. 2018. Global Drug Survey 2018: Key Findings Report. London: Global Drug Survey.

    Google Scholar 

  • Zickuhr, Kathryn. 2010. Generations 2010. Pew Internet & American Life Project, December 16.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stuart S. Brown .

Copyright information

© 2020 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Brown, S.S., Hermann, M.G. (2020). Black Spots in Cyberspace?. In: Transnational Crime and Black Spots. International Political Economy Series. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-49670-6_7

Download citation

Publish with us

Policies and ethics