Sifting through the Net: Monitoring of Online Offenders by Researchers

Criminologists have traditionally used official records, interviews, surveys, and observation to gather data on offenders. Over the past two decades, more and more illegal activities have been conducted on or facilitated by the Internet. This shift towards the virtual is important for criminologists as traces of offenders’ activities can be accessed and monitored, given the right tools and techniques. This paper will discuss three techniques that can be used by criminologists looking to gather data on offenders who operate online: 1) mirroring, which takes a static image of an online resource like websites or forums; 2) monitoring, which involves an on-going observation of static and dynamic resources like websites and forums but also online marketplaces and chat rooms and; 3) leaks, which involve downloading of data placed online by offenders or left by them unwittingly. This paper will focus on how these tools can be developed by social scientists, drawing in part on our experience developing a tool to monitor online drug “cryptomarkets” like Silk Road and its successors. Special attention will be given to the challenges that researchers may face when developing their own custom tool, as well as the ethical considerations that arise from the automatic collection of data online.

[1]  K. Durkin,et al.  propagandizing pederasty: a thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles , 1999 .

[2]  Brian Krebs,et al.  Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door , 2014 .

[3]  Christian Platzer,et al.  Covertly Probing Underground Economy Marketplaces , 2010, DIMVA.

[4]  Charlotte Brownlow,et al.  Ethical Issues for Qualitative Research in On-line Communities , 2002 .

[5]  A. Sergi,et al.  Types of organised crime in Italy. The multifaceted spectrum of Italian criminal associations and their different attitudes in the financial crisis and in the use of Internet technologies , 2014 .

[6]  Elizabeth Reid,et al.  Informed Consent in the Study of On-Line Communities: A Reflection on the Effects of Computer-Mediated Social Research , 1996, Inf. Soc..

[7]  Storm A. King,et al.  Researching Internet Communities: Proposed Ethical Guidelines for the Reporting of Results , 1996, Inf. Soc..

[8]  B. Berg Qualitative Research Methods for the Social Sciences , 1989 .

[9]  Nicolas Christin,et al.  Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.

[10]  Carlo Morselli,et al.  Inside Criminal Networks , 2008 .

[11]  D. Bell An Introduction to Cybercultures , 2001 .

[12]  Stefan Savage,et al.  An analysis of underground forums , 2011, IMC '11.

[13]  Elizabeth B.-N. Sanders,et al.  Tools and techniques , 2012 .

[14]  Jennifer L. Marill,et al.  Tools and techniques for harvesting the World Wide Web , 2004, Proceedings of the 2004 Joint ACM/IEEE Conference on Digital Libraries, 2004..

[15]  Diana S. Dolliver Evaluating drug trafficking on the Tor Network: Silk Road 2, the sequel. , 2015, The International journal on drug policy.

[16]  Monica J. Barratt,et al.  Discussing illicit drugs in public internet forums: visibility, stigma, and pseudonymity , 2011, C&T.

[17]  Angela Cora Garcia,et al.  Ethnographic Approaches to the Internet and Computer-Mediated Communication , 2009 .

[18]  Åsa Rosenberg,et al.  Virtual World Research Ethics and the Private/Public Distinction , 2010 .

[19]  T. Holt Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On‐Line Data , 2010 .

[20]  D. Mann,et al.  NETCRIME More Change in the Organization of Thieving , 1998 .

[21]  Christopher Krügel,et al.  Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.

[22]  Monica J Barratt,et al.  The efficacy of interviewing young drug users through online chat. , 2012, Drug and alcohol review.

[23]  J Sixsmith,et al.  Ethical Issues in the Documentary Data Analysis of Internet Posts and Archives , 2001, Qualitative health research.

[24]  David Décary-Hétu,et al.  Policing the Hackers by Hacking Them: Studying Online Deviants in IRC Chat Rooms , 2014 .

[25]  David Calvey Covert Ethnography in Criminology: A Submerged yet Creative Tradition , 2013 .

[26]  Nir Kshetri,et al.  Cybercrime and Cybersecurity in the Global South , 2013 .

[27]  Fabrizio Schifano,et al.  e-Psychonauts: Conducting research in online drug forum communities , 2012, Journal of mental health.

[28]  Derek Manky,et al.  Cybercrime as a service: a very modern business , 2013 .

[29]  Caroline Haythornthwaite,et al.  Studying Online Social Networks , 2006, J. Comput. Mediat. Commun..

[30]  Anita Lavorgna,et al.  Organised crime goes online: realities and challenges , 2015 .

[31]  B. Wellman,et al.  The Cambridge Handbook of Personal Relationships: Personal Relationships: On and Off the Internet , 2006 .

[32]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[33]  John Horswell,et al.  Associative evidence – the Locard exchange principle , 2004 .

[34]  Stefan Savage,et al.  An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.

[35]  Mike Thelwall,et al.  Web crawling ethics revisited: Cost, privacy, and denial of service , 2006 .

[36]  Heith Copes,et al.  "How Edge Are You?" Constructing Authentic Identities and Subcultural Boundaries in a Straightedge Internet Forum , 2005 .

[37]  C. Hine Virtual Ethnography: Modes, Varieties, Affordances , 2008 .

[38]  Ramzi A. Haraty,et al.  I2P Data Communication System , 2011, ICON 2011.

[39]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[40]  Sara Kiesler,et al.  Ethical issues in conducting sex research on the internet , 1999 .

[41]  Elijah Anderson Code of the Street: Decency, Violence, and the Moral Life of the Inner City , 1999 .

[42]  Barry Wellman,et al.  Designing the Internet for a networked society , 2002, CACM.

[43]  Peter Reuter Disorganized crime : the economics of the visible hand , 1983 .

[44]  D. Décary-Hétu Le capital virtuel : entre compétition, survie et réputation , 2013 .

[45]  Marc Najork,et al.  Web Crawling , 2010, Found. Trends Inf. Retr..

[46]  Thomas J. Holt,et al.  Characterizing malware writers and computer attackers in their own words , 2008 .

[47]  Jerry Finn,et al.  Computer-Based Self-Help Groups for Sexual Abuse Survivors , 1994 .

[48]  Ronald V. Clarke,et al.  Become a Problem-Solving Crime Analyst , 2003 .

[49]  Carlo Morselli,et al.  Welcome to the Scene , 2012 .