Skip to main content
  • Sections
  • Search

Center for Strategic & International Studies

User menu

  • Subscribe
  • Sign In

   Ranked #1 Think Tank in U.S. by Global Go To Think Tank Index

Topics

  • Climate Change
  • Cybersecurity and Technology
    • Cybersecurity
    • Data Governance
    • Intelligence, Surveillance, and Privacy
    • Military Technology
    • Space
    • Technology and Innovation
  • Defense and Security
    • Counterterrorism and Homeland Security
    • Defense Budget
    • Defense Industry, Acquisition, and Innovation
    • Defense Strategy and Capabilities
    • Geopolitics and International Security
    • Long-Term Futures
    • Missile Defense
    • Space
    • Weapons of Mass Destruction Proliferation
  • Economics
    • Asian Economics
    • Global Economic Governance
    • Trade and International Business
  • Energy and Sustainability
    • Energy, Climate Change, and Environmental Impacts
    • Energy and Geopolitics
    • Energy Innovation
    • Energy Markets, Trends, and Outlooks
  • Global Health
    • Family Planning, Maternal and Child Health, and Immunizations
    • Multilateral Institutions
    • Health and Security
    • Infectious Disease
  • Human Rights
    • Civil Society
    • Transitional Justice
    • Human Security
  • International Development
    • Food and Agriculture
    • Governance and Rule of Law
    • Humanitarian Assistance
    • Private Sector Development
    • U.S. Development Policy

Regions

  • Africa
    • North Africa
    • Sub-Saharan Africa
  • Americas
    • Caribbean
    • North America
    • South America
  • Arctic
  • Asia
    • Afghanistan
    • Australia, New Zealand & Pacific
    • China
    • India
    • Japan
    • Korea
    • Pakistan
    • Southeast Asia
  • Europe
    • European Union
    • NATO
    • Post-Soviet Europe
    • Turkey
  • Middle East
    • The Gulf
    • Egypt and the Levant
    • North Africa
  • Russia and Eurasia
    • The South Caucasus
    • Central Asia
    • Post-Soviet Europe
    • Russia

Sections menu

  • Programs
  • Experts
  • Events
  • Analysis
    • Blogs
    • Books
    • Commentary
    • Congressional Testimony
    • Critical Questions
    • Interactive Reports
    • Journals
    • Newsletter
    • Reports
    • Transcript
  • Podcasts
  • iDeas Lab
  • Transcripts
  • Web Projects

Main menu

  • About Us
  • Support CSIS
    • Securing Our Future
Photo: Adobe Stock
Blog Post - Technology Policy Blog
Share
  • LinkedIn
  • Facebook
  • Twitter
  • Email
  • Printfriendly.com

What’s Next for Law Enforcement in Disrupting Dark Markets

July 25, 2017

On July 20, the U.S. Department of Justice announced the takedown of the two largest dark web markets, AlphaBay and Hansa Market. News of the take-down began circulating in early July after AlphaBay went offline without warning. Reporting from The Wall Street Journal later confirmed a coordinated effort involving partners in at least the U.S., Canada, and Thailand, and the arrest of the site administrator, Alexandre Cazes, a Canadian citizen who died shortly after his arrest in Thailand. While successful, this latest effort raises questions about the current approach to disrupting online criminal networks. 
 
Monitoring and halting the growing breadth of activities taking place on dark web criminal markets is time and resource intensive. U.S. officials estimate that AlphaBay alone was responsible for at least $1 billion in sales since 2014, allowing over 40,000 vendors to traffic illicit commodities to over 200,000 users. AlphaBay was primarily a hub for narcotics—at the time of the takedown, approximately two-thirds of the listings were drug-related—but AlphaBay’s user base also advertised the sale of firearms, stolen credentials, malware, and other illegal goods. The challenge for law enforcement is that dark web markets are highly decentralized and resilient. For large dark web markets, identifying and arresting all vendors and users is unrealistic, leading law enforcement to focus their efforts on prosecuting site administrators and seizing their supporting infrastructure to deter would be cyber criminals. 
 
In 2013, U.S. law enforcement took down the then-largest online marketplace for illicit goods, Silk Road, and arrested its administrator following a two-year law enforcement investigation. Following the highly publicized takedown, dark market activities grew in popularity. AlphaBay was estimated to be ten times larger in volume of sales than Silk Road was at its peak. Site administrators and users have also grown more sophisticated in their adoption of new techniques, such as encrypted communications, anonymous browsing tools, and digital currencies to mask their location and activities. These tools and the growing professionalization of cyber criminals have frustrated efforts by law enforcement to monitor ever-shifting dark web marketplaces and attribute activities to specific domains.
 
Less than a month after Silk Road was shut down, administrators launched Silk Road 2.0, which remained active until U.S. law enforcement officials seized the site in 2014. Both sites remained active while law enforcement gathered additional intelligence, evidence, and developed a coordinated response. All the while, vendors continued to generate revenue and market their illegal products. Researchers estimated that AlphaBay generated between $600,000 - $800,00 a day in revenue. As was the case with Silk Road, law enforcement action against AlphaBay and Hansa will likely result in a temporary pause and disruption in the underground criminal markets. Indeed, officials reported that traffic to Hansa increased by eightfold following the immediate takedown of AlphaBay, demonstrating the ease with which cyber criminals maneuver to find new platforms for their illicit goods and activities.
 
Sharing of forensic information among international partners and coordinating attempts to take down illicit dark web markets and arrest site administrators has been the favored approach. Law enforcement agencies must now consider whether this approach is achieving the intended effect of deterring cybercrime, and whether the amount of time and resources spent on large takedowns is worth a temporary pause in activity. The next iteration of AlphaBay and Hansa is inevitable, a point noted by the DEA acting Deputy Administrator during the July 20 DOJ press conference. U.S. and international law enforcement entities should first consider how the market will respond to this latest disruption and adapt accordingly. 
 
One question is whether the next online market for illicit goods will take the form of a large clearinghouse that mirrors AlphaBay, or whether niche markets such as those used by hackers to traffic vulnerabilities and exploits will emerge. As such, law enforcement efforts to better understand key players and incentives driving activity in these markets should be intensified throughout the course of an investigation. 
 
Researchers at Carnegie Mellon University published a widely-used data archive on dark web markets, products and vendors, and the “lifetime” of sellers and the markets themselves. Security vendors have also completed analyses of cybercrime trends in key countries. Mapping physical locations and assets by crawling forums and collecting data on vendors and transactions may also yield evidence that allows law enforcement to take more aggressive action by seizing physical goods at their source. At the time of the AlphaBay takedown, for example, officials announced that the investigation resulted in new leads relevant to investigations in 37 countries. Expanding the use of intelligence collected with the assistance of private companies on dark web markets can help fill the gaps in resourcing and technical expertise until law enforcement can develop long-term strategies to cultivate more of those assets in-house. 
 
Cyber criminals are agile and will continue to find new ways to evade law enforcement, either through the greater adoption of encryption or by migrating to new platforms to conduct illicit activities. The AlphaBay and Hansa takedowns demonstrate that law enforcement agencies too are becoming more sophisticated in their ability to take joint action and coordinate responses to transborder cybercrime. Still, the temporary interruption of market infrastructure does not deter new players from entering these markets. Improving law enforcement’s capacity to understand dark web market dynamics will allow law enforcement entities to develop new areas of expertise, make better use of limited resources, and deter illicit activity online.

Media Queries

Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Caleb Diamond
Media Relations Manager and Editorial Associate
Tel: 202.775.3173

Related
Cybersecurity and Technology, Strategic Technologies Program, Technology and Law Enforcement

More from this blog

Blog Post
The Evolving Role of Artificial Intelligence and Machine Learning in US Politics
In Technology Policy Blog
December 21, 2020
Blog Post
No One is Immune: The Spread of Q-anon Through Social Media and the Pandemic
In Technology Policy Blog
December 17, 2020
Blog Post
Assessing the Impact of U.S.-China Technology Competition and Decoupling: Focusing on 5G
In Technology Policy Blog
December 16, 2020
Blog Post
Covid-19 and the Trajectory of US Venture Capital and Technology Innovation
In Technology Policy Blog
December 3, 2020
Blog Post
Managing U.S.-China Technology Competition and Decoupling
In Technology Policy Blog
November 24, 2020
Blog Post
Applications of Synthetic Aperture Radar Satellites to Environmental Monitoring
In Technology Policy Blog
November 9, 2020
Blog Post
The Goldilocks Porridge Problem with Section 230
By Zhanna Malekos Smith
In Technology Policy Blog
November 3, 2020
Blog Post
Notes from a CSIS Virtual Event: Innovation in the Intelligence Community
In Technology Policy Blog
October 20, 2020

Related Content

Transcript
Global Partnerships to Combat Cybercrime & the Challenge of Going Dark
December 6, 2019
Blog Post
Notes from a CSIS Virtual Event: Countering Covid-19 Related Fraud
In Technology Policy Blog
June 12, 2020
Transcript
The Launch of the Stephenson Ocean Security Project
January 10, 2019
Blog Post
No Easy Way Out for Social Media Companies Under the New Hong Kong National Security Law
By Lauren Maranto
In New Perspectives on Asia
September 16, 2020
Commentary
‘Abrazos no Balazos’—Evaluating AMLO’s Security Initiatives
By Linnea Sandin, Gladys McCormick
December 13, 2019
Blog Post
Covid-19, Cybercrime, and Capitol Hill
In Technology Policy Blog
June 25, 2020
Blog Post
Assessing the Impact of U.S.-China Technology Competition and Decoupling: Focusing on 5G
In Technology Policy Blog
December 16, 2020
Blog Post
How Accurate are Facial Recognition Systems – and Why Does It Matter?
By William Crumpler
In Technology Policy Blog
April 14, 2020
Footer menu
  • Topics
  • Regions
  • Programs
  • Experts
  • Events
  • Analysis
  • Web Projects
  • Podcasts
  • iDeas Lab
  • Transcripts
  • About Us
  • Support Us
Contact CSIS
Email CSIS
Tel: 202.887.0200
Fax: 202.775.3199
Visit CSIS Headquarters
1616 Rhode Island Avenue, NW
Washington, DC 20036
Media Queries

Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Caleb Diamond
Media Relations Manager and Editorial Associate
Tel: 202.775.3173

Daily Updates

Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs.

Subscribe to CSIS Newsletters

Follow CSIS
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

All content © 2020. All rights reserved.

Legal menu
  • Credits
  • Privacy Policy
  • Reprint Permissions