[go: up one dir, main page]

Academia.eduAcademia.edu
Proceedings of the 54th Hawaii International Conference on System Sciences | 2021 CITATION: Harviainen, J.T., Haasio, A., Ruokolainen, T., Hassan, L., Siuda, P., Hamari, J. (2021). Information Protection in Dark Web Drug Markets Research [in:] Proceedings of the 54th Hawaii International Conference on System Sciences, HICSS 2021, Grand Hyatt Kauai, Hawaii, USA, 4-8 January 2021, Maui, Hawaii, (ed.) Tung X. Bui, Honolulu, HI, s. 4673-4680. Information Protection in Dark Web Drug Markets Research J. Tuomas Harviainen Tampere University tuomas.harviainen@tuni.fi Ari Haasio Seinäjoki University of Applied Sciences ari.haasio@seamk.fi Teemu Ruokolainen Tampere University teemu.ruokolainen@tuni.fi Lobna Hassan Tampere University lobna.hassan@tuni.fi Piotr Siuda Kazimierz Wielki University piotr.siuda@ukw.edu.pl Juho Hamari Tampere University juho.hamari@tuni.fi Abstract In recent years, there have increasingly been conflicting calls for more government surveillance online and, paradoxically, increased protection of the privacy and anonymity of individuals. Many corporations and groups globally have come under fire for sharing data with law enforcement agencies as well as for refusing to cooperate with said agencies, in order to protect their customers. In this study, we focus on Dark Web drug trading sites as an exemplary case of problematic areas of information protection, and ask what practices should be followed when gathering data from the Dark Web. Using lessons from an ongoing research project, we outline best practices for protecting the safety of the people under study on these sites without compromising the quality of research data gathering. 1. Introduction In recent years, there have increasingly been conflicting calls for more government surveillance online and, paradoxically, increased protection of the privacy and anonymity of individuals. Many corporations and groups globally have come under fire for sharing data with law enforcement agencies, as well as for refusing to cooperate with said agencies in order to protect their customers. Most recently, in an effort to balance both goals, the EU enforced a wide range of privacy protection regulations under the GDPR umbrella [1], the effects of which are still debated and are to materialize over the coming years and decades. While we might debate the balance between the need for monitoring and studying online activity and individuals’ rights, the Dark Web is, arguably, an online corner where this debate has heightened implications on individuals’ lives as well as on law enforcement and URI: https://hdl.handle.net/10125/71184 978-0-9981331-4-0 (CC BY-NC-ND 4.0) research into various subcultures, such as, drug users. The Dark Web represents free speech in both its anonymity and in the potential darker sides of what can be created when anonymity and uncontrolled speech – including marketing of illegal substances and services – connect. We could endlessly debate the legality or lack thereof of narcotics, or the issues of personal liberty and substance use, but that would be beside the point. What is important for this paper is that the drug subculture is, arguably, one of those with the most significant impact on individuals’ lives. As a result, it has been the subject of increased research and surveillance. Dark Web marketplaces are a growing trend in drug culture, due to issues of both novelty and perceived safety [2]. They are also currently the leading business trend on the Dark Web (see e.g., [3]). On such sites, dealers are openly promoting their wares, in environments where it is often also possible to leave vendor feedback, based on safety of the trade, price/quality ratio and so forth. These are online environments that are, furthermore, open for anyone able to locate them and use a modified browser [4]. Both of these criteria take some skill to apply, as for example search engines tend not to list drug trading Dark Web sites, but in fact not much skill is required beyond curiosity [3]. Due to the ways in which popular media has been covering such sites, curiosity by a sufficient number of users can almost certainly be guaranteed. Alongside direct social media and app use (see [5]), Dark Web sites are nowadays a key channel of access for many people wanting to sell or purchase narcotics. In this paper, we look into how research conducted on Dark Web cryptomarkets and drug trading imageboards, particularly machine-based research, should protect data and the communities being researched while carrying our needed research around, for example, drug policy (e.g., [6;7]), understanding anonymity technologies (e.g., [3;4]), disnormative Page 4673 information practices (e.g., [8;9;10]), or user name selection (e.g., [11]). The challenges in these lines of research are varied but interconnected. First and foremost, the population being studied is anonymous, cannot be reached by “standard” means, and takes care of their lifestyles and/or addictions by using disnormative information and dark knowledge. People may take pride in being part of a drug subculture, but from a research perspective, this is not sufficient as the sole reason for sheltering any respondents. Understanding the complexity of their situation and their subculture is necessary. Our research question is therefore “what practices should be employed when gathering data from anonymous Dark Web drug forums?” While earlier research has engaged with the relevant ethics in this area for the purposes of helping other researchers orient on the topic, it has not produced prescriptive lists for studying the Dark Web [2;13]. We approach the topic with a “best practices” viewpoint, rather than an angle of ethics discourse as has been previously done. Accordingly, we contribute guidelines for the ethical data gathering on Dark Web drug trading websites. These guidelines were utilized during and emerged out of an extensive research project, carried out by the authors. This three-university research project, ENNCODE, consists of deploying machine learning techniques for gathering and analyzing data from Dark Web sites, implemented in 2020-2022. This research work first gathered 9300 image board posts, coded and analyzed by the participating researchers. The posts were taken during a single night in January 2018, using copy-paste by Haasio to a Word document, and thereby represent an average vertical slice of typical discourses on a drug-trading image board. This data set is further supported by another set consisting of over two million posts made on the same site, the structure and collection conventions of which were checked via random sampling, in order to confirm that our initial sample was sufficiently representable. To solidify our knowledge of the topic, we also interviewed four persons engaged in drug trading on the studied image board. Using knowledge acquired from dealing with our sample, we demonstrate how and why additional practices, including ethical proofreading [12], are necessary in researching this topic. With this research, we contribute to the study of Dark Web research (see [2; 3;13], as well as to information systems research that discusses online commerce. 2. The Dark Web The so-called Dark Web is a part of the Internet, but requires specialized software to access [3]. The best known of these tools is the Tor (The Onion Router) network, but others such as the Invisible Internet (I2P), also known as “garlic routing”, also exist. The idea behind these technologies is, roughly put, to peel layers of routing from the traffic, so that only the previous and next node are known. This makes the online browsing and file transfer much harder, but not impossible, to monitor. Onion routing was originally developed for safer military communication, but it has since become a small but stable collection of web sites in which anonymity is expected and supported (see e.g., [4]). These sites contain everything from whistleblower data dumps to journalists, spousal abuse victims’ support groups, and democracy movements’ hidden forums, to drug trading and the sharing of child exploitation images. Even social media companies such as Facebook now provide a Tor-based access to them [3]. The most well-known use of the technology, however, is the establishment of drug trading sites. The now-defunct online marketplaces such as the original Silk Road (2011-2013) and Alpha Bay (2014-2017) are the most famous, but numerous local variations exist. Some of them, like the aforementioned former giants, are so-called cryptomarkets, where one could use cryptocurrencies such as Bitcoin to mail order narcotics and hormones from sellers advertising on those sites. Others are image boards where people report what they have for sale or what they want to buy, and people then set up face to face (f2f) sales using an instant messaging service such as Wickr [9]. Scholars have used mostly five types of approaches to data gathering, together or separately, but we are increasingly seeing also other alternatives. The core idea behind all of these methods is not to disturb the activities of the people who are being observed. Each of them, however, comes with its own challenges. 3. Approaches to the study of the Dark Web Several approaches exist for gathering Dark Web data. The first approach, used by both scholars and some Law Enforcement Agencies (LEAs), is lurking. Earlier work on the ethics of Dark Web data gathering has identified this as a particularly suitable approach, due to it being non-intrusive and non-offensive (e.g., [2;13]). As many of the sites are based on anonymity, the researcher have no real way to identify themselves to the communities being studied, nor is there usually an identifiable sysop from whom they could ask for permission (see [14]). Therefore, in contrast to the people who live-action researched drug users and their subcultures in past decades (e.g., [15;16]), the researchers are identified as researchers only when their work gets published. This sets the process apart from also many of the standard Page 4674 practices of netnography (see e.g., [3;17]). As noted by Ferguson [13], lurking can be seen as breaking ethical regulations, so it is good to understand that the image boards and cryptomarkets are generally anonymous sites that do not require registration of any kind. As stated by Christin ([18]; see also [2]) in their work on the original Silk Road: “The data we collected is essentially public. We did have to create an account on Silk Road to access it; but registration is open to anybody who connects to the site. We did not compromise the site in any way.” As noted by Nurmi et al. [4], the second and third approaches to the study of the Dark Web have included more traditional methods such as surveys and interviews [19;20;21;22]. Given the voluntary nature of answering such research, many of the ethical issues are alleviated, but as organizational ethnography has shown decades ago (e.g., [23]), people are not always honest informants. This is particularly the case in situations where they are protecting their professional or communal identities. This issue has been raised by scholars such as Barratt and colleagues [24] and Ferguson [13], also regarding global drug surveys’ reliability. Furthermore, such open research may also create hostile reactions from the community being studied, but has sometimes also been known to be an efficient approach (see e.g., [25]). The fourth approach to the study of the Dark Web is data scraping, in which web crawlers are used to automatically collect data from the sites. Some of the sites actively destroy all older posts beyond a certain time or quantity limit, so in order to gather any complete set of data, technical options have to be used (see e.g., [9]). The idea of scraping is to gather up digital traces left, unsolicited by the researcher, by the sites’ users, and to treat those as anonymous data (see [7]). There have been significant examples of these types of studies in the last half decade (e.g., [26]), but they have also received significant critique due the selection of data involved, as well as challenges in replication (e.g., [27;28;29;30]). If conducted without sufficient respect and/or care, scraping has the possibility to cause serious problems for both the researchers and the site’s user. The sites’ systems operators tend to be highly competent programmers and will note any significant intrusion in their site’s traffic. Since we can presume that some LEAs are already conducting lurking and scraping on the same sites, careless scrapers also holds the potential to disrupt police or customs operations, while causing possible damage to the users of the site. LEA presence does not excuse the researchers from needing to avoid causing harm. It is therefore necessary not to attempt too much or too soon, even on sites that destroy older posts. The central advantage of these types of studies is that they are, if properly executed, able to access the actual practices taking place on the sites, particularly cryptomarket-type sites where more or less complete transactions can be found and followed, up to and including user feedback to particular sellers or buyers. They are less useful on f2f trading sites, because the sites themselves tend to contain just advertisements but no recorded transactions, as the actual trading arrangements are conducted via instant messaging services. They do, however, sometimes contain verbal feedback on successful and failed trades, which can be recorded and studied. Cryptomarkets, in turn, may contain even start ratings similar to legal webstores [3]. Such sites bring us therefore to option five, which has been the manual taking of vertical slices from the trading sites. For example, Haasio, Harviainen and Savolainen [9] copy-pasted an anonymous image board’s content during a single night to Word documents, which were then individually and together coded manually by the researchers over the course of two months. The resulting sample of messages could thereafter be analyzed as a representative sample, even if the authors also had to note some inconsistencies due to e.g., market changes created by New Year. 4. Permissions and Intellectual Property For some sites, research permissions are however available. Some sites, such as Bluelight, have policies that openly support academia [7]. This can either be an explicit open policy or it may be the possibility to contact the systems administrator(s) for access to the content. Many designers of cryptomarkets and drug trading image boards are at the core idealists (e.g., libertarians or agorists; see [3]) with high technical skills, and very proud of their work. They may for instance just provide the platform, but do not partake in any trading and do not gather a commission. Therefore, they commit no crimes themselves, even as they provide a platform for criminal commerce. Others, however, profit directly from the trades (as did the owners of Silk Road and Alpha Bay, and the owner of Evolution, which vanished in an exit scam while $12 was held in escrow). They therefore have strong reasons not to permit researchers any access. An extremely advantageous side of such provided data sets is that they remove not only issues related to permissions, but also those concerning intellectual property. In many cases this is highly important, because while research ethics may permit data gathering from an anonymous site that has no mandatory registration, the posters on those sites can still in some cases be considered owners of the text which they have written on that site. Oftentimes, reproducing content and Page 4675 explaining its coding for academic review requires that sufficient examples are provided. These can create challenges for research, should any posters wish to identify themselves and seek reparations for intellectual property breaches. For example, a seller identified by a LEA due to reasons not relating to the research, may have nothing to lose and might seek to simply cause extra damage. Sites that explicitly permit research use of the material sidestep these problems completely, with their in-built end-user license agreements, which are visible on the site. Another option is getting a permission from LEAs, after court proceedings are complete and confiscated servers become open evidence for further study. This is a promising avenue for research in many cases and can be done using the same kinds of scraping technologies. It is however also a proverbial can of worms: LEAs are interested in getting more data for crime prevention or criminal investigation purposes, and this can be seen by drug traders as a breach of etiquette by the researchers. It is therefore best not to apply this strategy in most cases, if one wants to also continue researching active sites. 5. How to Do No Harm: Guidelines for Drug Study of the Dark Web In our own work, we have identified a set of policies with which to assist the safe treatment of the topic while holding on to participant safety. We have in many ways expanding on the points raised by especially Ferguson [13] and Martin and Christin [2]. This was done after discussion with the people we interviewed on their information practices on the studied sites. They all emphasized that we are here dealing with a vulnerable population that engages in disnormative and illegal practices, and thus needs special protection. Therefore, while the practices described here are typical of Internet research in general, the nature of the studied communities requires extensive care and the extension of existing safety protocols. The first of these is a sufficiently thorough data management plan. In scraping, the gathered data has a tendency to become so massive that third-party cloud services are necessary to store and process it. Iron-clad contracts are therefore required to make sure that everything stays safe. The data management plan must contain descriptions of these contracts. All of the data should furthermore be heavily encrypted, to avoid all possibility of third-party use of it - or even interference of any kind by third parties. The second line of protection is early-stage hashing. If possible, automated systems should be used for the purpose of one-direction hashing of all usernames from the posts, so as not to implicate any poster with a particular post. This however needs to be done with consistency, so that the same hash is recognizable as the same person throughout the material, in order to recognize different posts by the same person. All real names need to be completely removed from the material, in cases such as e.g., the doxing of known “rats” (users who are stated as cheating in deals or as police informants). Stylometric means, in turn, can be used to remove repeated posts by human spammers and spambots, both of which are notably active on such sites. All of this is particularly important in the case of data obtained by site owners. Two major exception to the above-mentioned process exist. The first of these is the case of username research, as conducted by e.g., Hämäläinen [11] and Harviainen, Haasio and Hämäläinen [31]. In such cases, the usernames should be removed into a separate file and analyzed without connection to the actual posts. The second exception are posts that directly relate to risks to national or international security, in the form of e.g., money laundering or terrorist funding. In such cases, should they be identified though either researcher analysis or machine-based stylometry, legal regulations in many countries may override data privacy. This is because pseudo-anonymous posters are not covered by the informant confidentiality that would protect interviewees, whistleblowers, or survey respondents. An interesting extra complication is caused by the fact that some of the anonymous posters on drug-related image boards are underaged. The forums are hostile to such posters, who are regarded as unwelcome by the rest of the drug trader community. Reasons for this include an avoidance of extra attention from LEAs, the more severe legal penalties involved in selling to minors - and also an ideological view that one should not take drugs before a certain age [9]. Yet some youths continue posting. This would normally require an ethics board permission, and we of course recommend obtaining one whenever possible for any sort of data scraping. In some cases, however, it is possible to remove all of the posts that mention details suggesting that the poster is underage, or of someone (e.g., a LEA officer) pretending to be underage. We recommend combining both options in most situations. It should also be noted that if one is not researching a native-language site, the user base of especially a cryptomarket may be international [2]. Local legislation and the rights of institutional review boards (IRBs) may therefore be insufficient for the task at hand. And in some cases, even native language sites may cross country lines. Examples of this include e.g., trading sites in Russian, but even the small Finnish site studied by Haasio, Harviainen and Savolainen [9] contained trading coming from Sweden. By engaging in Page 4676 information safety practices, researchers significantly increase the likelihood of this not being a problem. Interestingly, cryptomarket scholarship is often distinguished by a broad international participation and cross-disciplinary research teams [32]. Presented practices may help in this regard, setting the research framework for academics coming from different traditions and preferring the guidelines of different review boards. On the other hand, the presented steps are general to the degree that they may respond to growing trends in the expansion of cryptomarkets. Although most studies today address English-language sites, we are dealing with the increase in the proportion of smaller scale domestic and regional trading at the expense of international ones [4;32;33;34]. This turn towards locality is due to the changing preferences of transnational vendors who are increasingly seeking to operate within their home countries. In addition, there is a growth of small, particularly non-English language cryptomarkets directed to single countries or regions. At the same time, Dark Web markets increasingly intersect with offline drug markets. Online markets change patterns of drug consumption in a given country or the structure and organization of drug markets, as they exist outside the Dark Web [35]. This does not deny the usefulness of the presented guidelines, which – if applied accordingly – may result in data that could be the starting point for in-depth qualitative research aimed at discovering the specifics of local markets. In our own work, we have applied all of the aforementioned measures, excluding research conducted on LEA-seized servers. They have arisen from the best practices reported by other researchers, but also from the interviews we conducted. By discussing the principles with drug users and LEA representatives, we have chosen to curate the data to a maximal extent. This is one of the two key areas – when researching the Dark Web - where understanding community members’ views on how data on them may be gathered is important to inform research practices and protect the identities and lives of research subjects. Very interestingly, the interviewed community members have been highly supportive of the research, as long as they feel that they are treated with respect. The second key area, discussed in the following section, pertains to publishing of results, which, similar to data gathering from the Dark Web, requires sensitivity. 6. Publishing Research on the Dark Web Even as e.g., Munckgaard, Demant and Branwen [30] recommend opening data sets to other researchers, we partially disagree, as have Martin and Christin [2] before us. Raw datasets contain personal information and identifiers, including outright doxing of individuals by name. With massive amounts of data, as in our case and most cases facilitated by emerging Big Data techniques, scraping and automatic name removal are bound to produce errors and leave identifiers behind. The material has to be manually curated at least once before it is released to other scholars, in order to make sure that it is compliant with e.g., local privacy laws and the EU’s General Data Protection Regulation and other future regulations. It may also need to be withheld until statutes of limitations for at least non-serious crimes have passed. We acknowledge that this effectively makes some data impossible to use. On the other hand, with new Dark Web drug trading sites immediately appearing to replace the ones closed by LEAs where statutes of limitations are a concern, data and new data source are likely to remain abundant with little fears of running out of research material due to that reason in particular. All of the material that gets published from this type of research needs to go through maximal ethical proofreading (as per [12]). In it, the researcher assumes that the subjects will be identified despite the researcher’s best efforts to the contrary. Therefore, the process requires the minimization of any potential harm that could come to the subjects because of the published results. The aforementioned techniques all contribute to minimizing risks to the studied populations, in addition to assisting e.g., data security. These techniques have all been successfully used before, in slightly less advanced forms, by researchers such as Christin [17], as well as ourselves [9]. Available machine learning methods and increased researcher awareness of Dark Web’s properties allow us to do the same and more, to much larger data sets. Those datasets can then be shared with other scholars in a sufficiently curated form. This will, for example, be eventually done with our two million post dataset, once we have refined the one-directional name-hashing techniques. Under the current climate, a thorough ethical proofreading may also require hiding data from one’s research partners, especially in cases of LEA cooperation, should the data have arrived via a research agreement with an image board or a cryptomarket. And in many cases, the researcher has to choose in advance whether they want to work with the sites’ open data or with LEAs, as the latter option may offend and cause risks to the users of the sites being studied. Finally, and crucially, while it is recommended that even as the research work may be conducted at times under a pseudonym (as per e.g., [3;13], the project itself should be made visible and contactable. This may mean a project website, a user account on Wickr, or the publication of an early research paper on the topic, with Page 4677 some form of contact information included. We recommend all three, as that will enable the researchers to both negotiate the boundaries of ethical issues with concerned parties in the community and to establish premises on how to deal with the interests of LEAs. For example, an early publication may, as with us, practically establish and showcase the extent to which authors are (or are not) treating the subject with respect and can lead potential partners to join in or even provide mores data or potentially re-negotiate the terms of collaboration. Work by e.g., Barratt and colleagues [24;36], like ours [31], shows that establishing a solid, positive presence as community outsiders, but not as complete outsiders, can produce positive reactions from the researched groups, as well as good quality research. We have, for instance, received the best results when we have made our identities openly known to the studied communities of drug users. 7. Conclusions Dark Web marketplaces exist on the borderline of legality, and many of them contain criminal activities. They represent the ways in which the darker sides of privacy may come into play, yet also avoid government surveillance and contest many of the common policies for ethical research, by their practices, content and customs. In this paper, we have sought to establish principal guidelines for data collection on certain criminal activities on the Dark Web. Our main goal has been to expand from earlier research on the topic, but on a practical level, so that future researchers will be able to replicate such works, and to argue to institutional review boards that this can be done. It appears that when a suitable rapport is established between the researchers and community members, whether by interviews, personal contact, or high-quality publications, the communities’ members may actually appreciate the fact that they are taken seriously and treated with respect. As pointed out by e.g., Bilgrei [37] and Enghoff and Aldridge [7], many of them are practical experts on the technical topics of the boards studied and support emic ways of harm reduction within their chosen lifestyle. They should therefore first and foremost be treated as such experts by researchers, instead of seeing just a deviant population of criminals. By establishing guidelines and best practiced such as the ones listed in this article, it is possible to deploy new methods of data gathering to a marginal population that has largely been ignored as professional-level subjects who actively engage in online trading. As noted by Markoff [38], legend has it that the first ever online commerce transaction was the sale of a small quality of Cannabis over the ARPAnet between students in the participating universities. Studying these Dark Web sales environments in a careful manner, noting how they sometimes are similar to massive web shop giants like Amazon or eBay, how they differ [39], and how they sometimes also just functions as contact points for tiny trades [9], teaches us more about online trading in general than about drug trading in the specific. Earlier research [remove for review] has already shown that these image boards are far more heterogenous than cryptomarkets typically are, and contain very different information needs, information sharing, and also peer support, in addition to their basic function of drug trading. The accentuated, disnormative nature of these trading sites furthermore makes certain business practices more visible than they are on legal sites. This includes, for example, a very different type of customerseller trust than what is common in other online markets. The central challenge in all of these approaches is that they are, at the end, almost all about visible practices. The researchers, using the online data, are able to observe what is taking place, but not usually the users’ motives. We therefore recommend that despite the challenged listed in this article, researchers eventually also engage in the traditional interviews or surveys, for the purpose of improved triangulation. At that stage, if they have done the earlier work with care and respect, and published signs of doing so, they will have a much easier time to locate informants willing to share their experiences, instead of hostile people who will think that the scholars are directly assisting lawenforcement agencies and should therefore be seen as a threat, and only a threat. By mitigating risks to the studied community, researchers will also reduce risks to themselves. Acknowledgments Parts of this research were supported by the Academy of Finland project: ENNCODE, Finnish Foundation for Economic Education (grants: 12-6385 and 14-7824), and the Academy of Finland project: Centre of Excellence in Game Culture Studies (CoEGameCult). References [1] European Union, “General Data Protection Regulation”, (EU) 2016/679. [2] J. Martin and N. Christin, “Ethics in Cryptomarket Research”, International Journal of Drug Policy, 35, 2016, pp. 84–91. [3] R. W. Gehl, “Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P”, MIT Press, Cambridge, MA, 2018. [4] J. Nurmi, T. Kaskela, J. Perälä, and A. Oksanen, “Seller’s Reputation and Capacity on the Illicit Drug Page 4678 [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] Markets: 11-Month Study on the Finnish Version of The Silk Road”, Drug and Alcohol Dependence, 178, 2017, pp. 201–207. A. Oksanen, B.L. Miller, I. Savolainen, A. Sirola, J. Demant, M. Kaakinen, and I. Zych, “Illicit Drug Purchases via Social Media Among American Young People”, in Meiselwitz, G. (ed.), Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis, Springer,.New York, NY, 2020, pp. 278-288. D.S. Dolliver and J.L. Kenney, “Characteristics of Drug Vendors on the Tor Network: A Cryptomarket Comparison”, Victims and Offenders, 11, 2016, pp. 600–620. O. Enghoff and J. Aldridge, “The Value of Unsolicited Online Data in Drug Policy Research”, International Journal of Drug Policy, 73, 2019, pp. 210-218. A. Haasio, “What is Disnormative Information?”, Information and Communication Sciences Research, 23(1), 2019, pp. 9-16. A. Haasio, J.T. Harviainen, and R. Savolainen, “Information Needs of Drug Users on a Local Dark Web Marketplace”, Information Processing & Management, preprint, 2019. S. Burnett and A. Lloyd, “Hidden and Forbidden: Conceptualising Dark Knowledge”, Journal of Documentation, EarlyCite, 2020. L. Hämäläinen, “User Names of Illegal Drug Vendors on a Darknet Cryptomarket”, Onoma, 50, 2019. R.M. Lee, “Doing research on sensitive topics”, Sage, London, 1993. R-H. Ferguson, “Offline ‘Stranger’ and Online Lurker: Methods for an Ethnography of Illicit Transactions on the Darknet”, Qualitative Research, 17(6), 2017, pp. 683–698. A. Grimani, A. Gavine, and W. Moncur, “An Evidence Synthesis of Strategies, Enablers and Barriers for Keeping Secrets Online Regarding the Procurement and Supply of Illicit Drugs”, International Journal of Drug Policy, 75, 2020. M.H. Agar, “The Professional Stranger” (2nd ed.), Academic Press, San Diego, CA, 1996. H.S. Becker, “Outsiders: Studies in the Sociology of Deviance”, MacMillan , New York, NY, 1963. R. Kaufmann and M. Tzanetakis, “Doing Internet Research with Hard-to-reach Communities: Methodological Reflections on Gaining Meaningful Access”, Qualitative Research, OnlineFirst, 2020. N. Christin, “Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace”, Proceedings of the 22nd World Wide Web Conference (WWW'13), Rio de Janeiro, Brazil, 2013, pp. 213-224. M.J. Barratt, J.A. Ferris, and A.R. Winstock, “Use of Silk Road, the Online Drug Marketplace, in the United Kingdom, Australia and the United States”, Addiction, 109, 2014, pp. 774–783. [20] M.C. Van Hout and T. Bingham, “‘Silk Road’, the Virtual Drug Marketplace: A Single Case Study of User Experiences”, International Journal of Drug Policy, 24, 2013, pp. 385–391. [21] M.C. Van Hout and T. Bingham, “‘Surfing the Silk Road’: A Study of Users’ Experiences”, International Journal of Drug Policy, 24, 2013, pp. 524–529. [22] S.A. Bakken and J.J. Demant, “Sellers’ Risk Perceptions in Public and Private Social Media Drug Markets”, International Journal of Drug Policy, 73, 2019, pp. 255-262. [23] J. Van Maanen, “Fact of Fiction in Organizational Ethnography”, In Van Maanen, J. (ed.), Qualitative Methodology, Sage, Beverly Hills, 1983 [1979], pp. 37–55. [24] M.J. Barratt, A. Maddox, S. Lenton, and M. Allen, “‘What if You Live on Top of a Bakery and You Like Cakes?’ – Exploring the Drug Use and Harm Trajectories Before, During and After the Emergence of Silk Road”, International Journal of Drug Policy, 35, 2016, pp. 50-57. [25] R. Munksgaard, “Intersections of Crime and Politics - A Macroanalysis of Cryptomarket Discourse”, Master's thesis, University of Copenhagen, 2016. [26] D.S. Dolliver, “Evaluating Drug Trafficking on the Tor Network: Silk Road 2, the Sequel”, International Journal of Drug Policy, 26, 2015, pp. 1113–1123. [27] J. Aldridge and D. Décary-Hétu, “A Response to Dolliver's ‘Evaluating Drug Trafficking on the Tor Network: Silk Road 2, the Sequel”, International Journal of Drug Policy, 26, 2015, pp. 1124–1125. [28] D.S. Dolliver, “A Rejoinder to Authors: Data Collection on Tor”, International Journal of Drug Policy, 26, 2015, pp. 1128–1129. [29] J. Van Buskirk, A. Roxburgh, S. Naicker, and L. Burns, “A Response to Dolliver’s ‘Evaluating Drug Trafficking on the Tor Network’”, International Journal of Drug Policy 26, 2015, pp. 1126–1127. [30] R. Munksgaard, J. Demant, and G. Branwen, “A Replication and Methodological Critique of the Study ‘Evaluating drug trafficking on the Tor Network’”, International Journal of Drug Policy, 35, 2016, 92–96. [31] J.T. Harviainen, A. Haasio, and L. Hämäläinen, ”Drug Traders on a Local Dark Web Marketplace”, Proceedings of the 23rd International Academic Mindtrek Conference, January 2020, ACM, New York, NY, pp. 20-26. [32] J. Martin, J. Cunliffe, and R. Munksgaard, “Cryptomarkets: A Research Companion”, Emerald, Bradford, 2019. [33] J. Demant, R. Munksgaard, D. Décary-Hétu, and J. Aldridge, “Going Local on a Global Platform: A Critical Analysis of the Transformative Potential of Cryptomarkets for Organized Illicit Drug Crime”, International Criminal Justice Review, 28(3), 2018, pp. 255–274. [34] J. Van Buskirk, S. Naicker, A. Roxburgh, R. Bruno, Page 4679 and L. Burns, “Who Sells What? Country Specific Differences in Substance Availability on the Agora Cryptomarket”, International Journal of Drug Policy, 35, 2016, pp. 16–23. [35] J. Martin, J.D. Cunliffe, D. Décary-Hétu, and J. Aldridge, “The International Darknet Drugs Trade— A Regional Analysis of Cryptomarkets”, in Smith, R.G. (ed.), Organised Crime Research in Australia 2018, Australian Institute of Criminology, Canberra, 2018, pp. 95-103. [36] M. Barratt, J. Ferris, and A. Winstock, “Safer Scoring? Cryptomarkets, Social Supply and Drug Market Violence”, International Journal of Drug Policy, 35, 2016, pp. 24–31. [37] O.R. Bilgrei, “Broscience. Creating Trust in Online Drug Communities”, New Media & Society, 20(8), 2018, pp. 2712–2727. [38] J. Markoff, “What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry”, Viking Press, New York, NY, 2005. [39] J. Aldridge and D. Décary-Hétu, “Not an ‘Ebay for Drugs’: The Cryptomarket ‘Silk Road’ as a Paradigm Shifting Criminal Innovation”, SSRN, 2014. Page 4680