Search results
21 – 30 of over 6000The purpose of this paper is to highlight the extent to which organised crime and the environment have altered in relation to money laundering and terrorist financing and to…
Abstract
Purpose
The purpose of this paper is to highlight the extent to which organised crime and the environment have altered in relation to money laundering and terrorist financing and to explore whether strategies to “follow the money” have been successful.
Design/methodology/approach
This paper is based on personal analysis and involvement as a practitioner in law enforcement and includes a broad literature review on the subject of terrorist financing and money laundering.
Findings
Money laundering, terrorist financing and economic crime activity are being disguised in the “noise” of business by specialists that have become very adept at their craft. Financial institutions and lawmakers have invested heavily in countering money laundering and terrorist financing. However, its real effectiveness is somewhat doubtful.
Originality/value
This paper serves to stimulate further discussion and research on how all actors can increase collaboration and co-operation to increase the effectiveness of disruption strategies associated with these classes of crime.
Details
Keywords
The purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and…
Abstract
Purpose
The purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.
Design/methodology/approach
A sectional research design and survey method was adopted throughout the study to examine the opinions and perceptions of internet users regarding cyberhate by descriptively exploring the existing situation from various perspectives. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users who are considered as highly literate in technology use. The data were collected through a personal data form and a survey (Cyberhate Perception Scale) from 372 internet users living in Turkey and the USA.
Findings
The findings of the study revealed that the majority of participants do not perceive cyberhate as a part of freedom of speech and they believe that online hate behaviors, which they also consider to be a violation of human rights, should be deemed illegal and be punished accordingly. The findings, which were discussed in line with the existing research, indicated some significant predictors of internet users’ perceptions on cyberhate.
Originality/value
As cyberhate is an understudied area that raises concerns in terms of internet user exposure, the objective of this research is to understand tendencies about the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.
Details
Keywords
Abstract
Details
Keywords
Simon Burnett and Annemaree Lloyd
The purpose of this paper is to introduce the concept of Dark Knowledge, an epistemology that acknowledges both alternative knowledge and ways of knowing which are cognizant of…
Abstract
Purpose
The purpose of this paper is to introduce the concept of Dark Knowledge, an epistemology that acknowledges both alternative knowledge and ways of knowing which are cognizant of the moral and ethical positioning of each.
Design/methodology/approach
This is a conceptual paper that uses existing relevant literature to develop the work. The paper uses a four-stage literature search process and draws upon a range of disciplines, including philosophy, computer science and information management, to underpin the evolution of the concept.
Findings
As a conceptual paper, no empirical findings are presented. Instead, the paper presents an embryonic model of Dark Knowledge and identifies a number of characteristics, which may be used to explore the concept in more detail.
Research limitations/implications
There is a clear need to develop a body of empirical work, adding to the theoretical perspectives presented in this paper. It is anticipated that this paper will provide one of the cornerstones for future studies in this area.
Originality/value
The paper makes an original contribution to the study of information behaviours, practices and epistemology.
Details
Keywords
INTERNATIONAL: Cyber security catches up on dark web
Details
DOI: 10.1108/OXAN-ES202979
ISSN: 2633-304X
Keywords
Geographic
Topical
Rolf van Wegberg, Jan-Jaap Oerlemans and Oskar van Deventer
This paper aims to shed light into money laundering using bitcoin. Digital payment methods are increasingly used by criminals to launder money obtained through cybercrime. As many…
Abstract
Purpose
This paper aims to shed light into money laundering using bitcoin. Digital payment methods are increasingly used by criminals to launder money obtained through cybercrime. As many forms of cybercrime are motivated by profit, a solid cash-out strategy is required to ensure that crime proceeds end up with the criminals themselves without an incriminating money trail. The authors examine how cybercrime proceeds can be laundered using services that are offered on the Dark Web.
Design/methodology/approach
Focusing on service-percentages and reputation-mechanisms in underground bitcoin laundering services, this paper presents the results of a cash-out experiment in which five mixing and five exchange services are included.
Findings
Some of the examined services provide an excellent, professional and well-reviewed service at competitive cost. Whereas others turned out to be scams, accepting bitcoin but returning nothing in return.
Practical implications
The authors discuss what these findings mean to law enforcement, and how bitcoin laundering chains could be disrupted.
Originality/value
These cash-out strategies are increasingly facilitated by cryptocurrencies, mainly bitcoin. Bitcoins are already relatively anonymous, but with the rise of specialised bitcoin money laundering services on the Dark Web, laundering money in the form of bitcoins becomes available to a wider audience.
Details
Keywords
Mohd Faizan, Raees Ahmad Khan and Alka Agrawal
Cryptomarkets on the dark web have emerged as a hub for the sale of illicit drugs. They have made it easier for the customers to get access to illicit drugs online while ensuring…
Abstract
Cryptomarkets on the dark web have emerged as a hub for the sale of illicit drugs. They have made it easier for the customers to get access to illicit drugs online while ensuring their anonymity. The easy availability of potentially harmful drugs has resulted in a significant impact on public health. Consequently, law enforcement agencies put a lot of effort and resources into shutting down online markets on the dark web. A lot of research work has also been conducted to understand the working of customers and vendors involved in the cryptomarkets that may help the law enforcement agencies. In this research, we present a ranking methodology to identify and rank top markets dealing in harmful illicit drugs. Using named entity recognition, a harm score of a drug market is calculated to indicate the degree of threat followed by the ranking of drug markets. The top-ranked markets are the ones selling the most harmful drugs. The rankings thus obtained can be helpful to law enforcement agencies by locating specific markets selling harmful illicit drugs and their further monitoring.
Details
Keywords
Ross Coomber, Andrew Childs, Leah Moyle and Monica Barratt
The online sourcing, supply, and purchase of illicit drugs is fast transforming drug markets worldwide. Although the long-term development of simple communications technology over…
Abstract
The online sourcing, supply, and purchase of illicit drugs is fast transforming drug markets worldwide. Although the long-term development of simple communications technology over time (from pagers to mobile phones) continues to impact and extend local drug supply dynamics, it is the recent developments of dark web cryptomarkets, social media applications (like Instagram), encrypted messaging applications (like WhatsApp), and surface web platforms, such as LeafedOut, that are changing the drug supply landscape online. The use of technology in drug supply has tended to go hand in hand with improving the efficiency of supply and opportunities to reduce exchange-related risks for both buyers and sellers. In relation to app-mediated supply, for example, the use of encrypted messaging provides enhanced security for arranging purchases beyond the lurking surveillance of law enforcement. Despite the perception of improved safety, however, the use of social media apps and other online platforms can expose both buyers and sellers to risk scenarios they may not fully appreciate. Drawing on two recent studies on the use of social media apps and the online platform LeafedOut as mediators of drugs supply, this chapter will consider how these mid-range (between cryptomarkets and traditional telecommunications such as basic texting/calling and material ‘street’ markets) virtual spaces are being utilised for drug supply and the extent to which this is ‘just more of the same’ or provides new structures and experiences for those engaging with it and in what ways. Consideration will also be given to contradictions in the mid-range market space where the broad perception of reduced risk from the use of encrypted messaging can in fact produce greater levels of risk for some buyers and sellers depending on how they engage with the process/es.
Details
Keywords
Ryan Scrivens, Tiana Gaudette, Garth Davies and Richard Frank
Purpose – This chapter examines how sentiment analysis and web-crawling technology can be used to conduct large-scale data analyses of extremist content online.Methods/approach …
Abstract
Purpose – This chapter examines how sentiment analysis and web-crawling technology can be used to conduct large-scale data analyses of extremist content online.
Methods/approach – The authors describe a customized web-crawler that was developed for the purpose of collecting, classifying, and interpreting extremist content online and on a large scale, followed by an overview of a relatively novel machine learning tool, sentiment analysis, which has sparked the interest of some researchers in the field of terrorism and extremism studies. The authors conclude with a discussion of what they believe is the future applicability of sentiment analysis within the online political violence research domain.
Findings – In order to gain a broader understanding of online extremism, or to improve the means by which researchers and practitioners “search for a needle in a haystack,” the authors recommend that social scientists continue to collaborate with computer scientists, combining sentiment analysis software with other classification tools and research methods, as well as validate sentiment analysis programs and adapt sentiment analysis software to new and evolving radical online spaces.
Originality/value – This chapter provides researchers and practitioners who are faced with new challenges in detecting extremist content online with insights regarding the applicability of a specific set of machine learning techniques and research methods to conduct large-scale data analyses in the field of terrorism and extremism studies.
Details
Keywords
This chapter investigates how new technologies of encryption and cryptocurrencies enable entrepreneurial opportunities outside legality in the dark net. Since ventures on illicit…
Abstract
This chapter investigates how new technologies of encryption and cryptocurrencies enable entrepreneurial opportunities outside legality in the dark net. Since ventures on illicit dark net markets lack access to the legal system and to law enforcement agencies, they must rely on mechanisms for settling disputes with business partners without the involvement of mediating agencies. To this end, the presence of trust is decisive in coordinating cryptomarket activities. Hence, entrepreneurs on dark net markets utilize technology to gain trust, establishing new ways of drug dealing, with disruptive potential for classic illicit drug markets. Against this background, this chapter shows how technological change affects the identity of entrepreneurs on the dark net. Special emphasis is given to the entrepreneurs’ self-concept, their consumer service, knowledge and capabilities and how, in a holistic view, this development innovates the traditional way of dealing illicit drugs.
Details