Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Science

Criminals opt for online security

Criminals are often just like any other citizen, found criminologist and PhD candidate Rolf van Wegberg (TPM). They look for the most reliable service on online markets.

(Illustration: Pxhere)

There is a dedicated area on the internet for criminal activities. It is not the ‘clear web’ where you are reading this, but the ‘dark web’ where a TOR browser guarantees anonymity. Marketplaces there do not sell children’s bicycles or clothing, but drugs, weapons, stolen credit cards and assembly packages for DDoS attacks, phishing campaigns or ransomware. At least, this is what criminologist Rolf van Wegberg has seen over the last few years.

After completing his studies at Leiden University, Van Wegberg combined Computer Sciences at the Cyber Security group at TPM with criminology for his doctoral degree research. “The reasons for criminals to choose a particular service provider are the same as in the ordinary world,” Van Wegberg says. “Buyers check the ratings left by other customers. Customer service, a money return policy for dissatisfied customers, and offering brand names strengthen trust.” The result is that the top 10% most professional vendors on a market platform generate 90% of the turnover.

How does Van Wegberg know this? From studying six years’ worth of transactions on eight important underground platforms. Dark web marketplaces are regularly removed. The first marketplace was Silk Road followed by AlphaBay, Hansa Market and plenty of others. It is estimated that, despite regular removals, there are still about 10 to 15 marketplaces in operation.

Their structure is mainly the same still, explains Van Wegberg. Access is through a TOR browser and payment is done in bitcoins as soon as customers have received their ‘orders’. With the help of two American researchers, Van Wegberg could save the source codes of some of the market pages. This is called ‘scraping’ and it revealed a database of thousands of vendors, tens of thousands of products and millions of feedback. Since then, after working with police services, he also has access to the files of other defunct illegal marketplaces.

Analysing these showed that not only do a small number of vendors generate the most turnover, but that these professional vendors are very versatile. Apart from malware packages, they also supply ‘bulletproof hosting’ for phishing websites or to share child pornography.

When planning a raid on online criminal activities, the logical thing would be to concentrate on the most professional vendors. Van Wegberg endorses this saying that choosing them would make best use of the tracing capacity. At the same time, detectives are always dependent on often unprofessional errors to reveal the identity of the suspects and on the organisations being based in the Netherlands.

Science editor Jos Wassink

Do you have a question or comment about this article?

j.w.wassink@tudelft.nl

Comments are closed.