• Indexed in

  • Latest News

    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2022
    Volume 11, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2022
    Volume 11, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • The Darknet: A New Passageway to Identity Theft

    Author(s): HOLM, Eric

    Quick view | Full article | Citations | Views: 1,685

    Author(s) keywords: , ,

    Reference keywords: , ,


    This paper considers how the darknet has emerged as a passageway for identity theft. The paper identifies the darknet as a means of facilitating the distribution of identification particulars and how this contributes toward identity theft. The paper considers the part of the darknet as an enabler in the distribution of information related to offending in identity crime and as a passive contributor toward identity crimes.


    [1]. C. Mc Manamon and Fredrick Mtenzi, “Defending privacy: The development and deployment of a darknet,” in Internet Technology and Secured Transactions, London, 2010, pp. 1-6.

    [2]. P. Biddle, P. England, M. Peinado, and B. Willman, “The Darknet and the Future of Content Distribution,” Digital Rights Management, vol. 1, 2696, pp. 155-176, Oct. 2003.

    [3]. K. McCaffrey, “The dark side of the Net,” Access, vol. 21, no. 2, pp.13-15, Aug. 2007. 9

    [4]. T. C. Bailey. “Identity Theft and Underground Economy,” The University of Texas at Austin, Centre for identity; Network Security, Austin, Texas, 2016, p. 20.

    [5]. V. Ciancaglini, M. Balduzzi, M. Goncharov and R. McArdle, “Deep web and Cybercrime; It’s Not All About TOR,” Trend Micro.,Cupertino, CA, 2013, p. 5 & 18.

    [6]. Network Security, “Darknet less secure than many think, say researchers,”, vol. 2015, no. 6, p. 2, Jun. 2015. 2.

    [7]. J. Wakefield. (2014). Huge raid to shut down 400-plus dark net sites (BBC News) [Online]. Available: http://www.bbc.com/news/technology-29950946

    [8]. H. Ellyatt. (2013). How business can shed light on the ‘dark net’ (CNBC) [Online]. Available: http://www.cnbc.com/2013/12/02/how-business-is-helping-to-shed-light-on-the-dark-net.html

    [9]. G. A. Fowler. (2012). Tor: An Anonymous, And Controversial, Way to Web-Surf (The Wall Street Journal) [Online]. Available: http://online. wsj.com/article/SB10001424127887324677204578185382377144280.html.

    [10]. M. Barratt. (2011). A trip down the Silk Road (Injecting advice) [Online]. Available:http://injectingadvice.com/articles/guestwrite/247-monicabarrat.

    [11]. A. Phelps and A. Watt, “I shop online – recreationally! Internet anonymity and Silk Road enabling drug use in Australia,” in Digital Investigation, vol. 11, no. 4, pp. 261-272, Dec. 2014, 262-263.

    [12]. M. Maras, “Inside Darknet: the takedown of Silk Road,” in Criminal Justice Matters, vol. 98, no. 1, pp 22-23, Dec. 2014, 22-23.

    [13]. N. Christin. (2012). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace (Working paper online) [Online]. Available http://arxiv.org/pdf/1207.7139v1.pdf

    [14]. Commonwealth of Australia. (2014) Identity crime and misuse in Australia (Identity Security Strategy) [Online]. Available: https://goo.gl/14oxxB

    [15]. M. Zillman. (2017). Deep Web Research 2012 (White Paper) [Online]. Available: http://DeepWeb.us/.

    [16]. A. Moses. (2013). Identities for sale: fake documentation on the rise (Sydney Morning Herald) [Online]. Available: http://www.smh.com.au/technology/ technology-news/identities-for-sale-fake-documentation-on-the-rise-20130126-2ddev.html.

    [17]. P. Wen. (2015). Man faked identity to get Australian citizenship after stealing $21m, police say (Busseltonmail) [Online]. Available: http://www.busseltonmail.com.au/story/3111729/man-faked-identity-to-get-australian-citizenship-after-stealing-21m-police-say/?cs=12.

    [18]. BBC News. (2013). Fake airline pilot ‘landed planes at Gatwick’ (BBC News) [Online]. Available: http://www.bbc.com/news/uk-england-hampshire-22487205.

    [19]. Australian Criminal Intelligence Commission. (2016). Identity crime (ACIC) [Online]. Available: https://www.acic.gov.au/about-crime/organised-crime-groups/identity-crime.

    [20]. Commonwealth of Australia. (2014) Identity crime and misuse in Australia (Identity Security Strategy) [Online]. Available: https://goo.gl/1Ncas8, 48.

    [21]. L. D. Roberts, D. Indermaur and C. Spiranovic. “Fear of Cyber-Identity Theft and Related Fraudulent Activity,” Psychiatry, psychology, and law, vol. 2013, no. 3, pp.315 -328, May. 2013. 315-328.

    [22]. S. Tombs. (2016). Corporate theft and fraud: business as usual (Centre for crime and justice studies) [Online]. Available: https://www.crimeandjustice.org.uk/ publications/cjm/article/corporate-theft-and-fraud-business-usual.

    [23]. T. Thompson, “Adding up the real cost of fraud,” Computer Fraud & Security, vol. 2010, no. 4, p. 12, Apr. 2010. 12.

    [24]. J. Lynch, “Identity theft in cyberspace: Crime control methods and their effectiveness in combatting phishing attacks,” Berkeley Technology Journal, vol. 20, no. 259, pp. 259-300, Jan. 2005. 259-300.

    [25]. D.J. Solove, The digital person: Technology and privacy in the digital world, New York: NYU Press, 2004.

    [26]. B. Koops, R. E. Leenes, M. Meints, N. Meulen and D. Jaquet-Chiffelle, A Typology of Identity Related Crime, Information, Communication & Society, vol. 12, no. 1, pp. 1-24, Feb. 2009, 3.

    [27]. G. R. Newman and M.M McNally. (2005). Identity Theft Literature Review (U.S. Department of Justice) [Online]. Available: https://www.ncjrs.gov/pdffiles1/ nij/grants/210459.pdf, 39 & 68.

    [28]. N. Mitchison, M. Wilikens, L. Breitenbach, R. Urry and S. Portesi (2004). (European Commission) [Online]. Available: http://cordis.europa.eu/publication/ rcn/200417574_en.html.

    [29]. B. Koops and R.E. Leens, (2006). ID theft, ID fraud and/or ID-related crime - Definitions matter, Datenschutz and Datensicherheit, vol. 30, no. 9, pp. 553-556, Apr. 2006. 553-556.

    [30]. C. McManamon and F. Mtenzi, “Defending Privacy: The Development and Deployment of a Darknet,” in IEEE 5th Internet Technology and Secured Transactions, INFOCOM, Proceedings, Dublin, Ireland, 2010, pp 515-619.

    [31]. J. Clough (2011) Cybercrime, Commonwealth Law Bulletin, vol. 37, no. 4, pp.371-680, Dec. 2011. 675, 674.

    [32]. Australian Communications and Media Authority (2009). Attitudes towards use of personal information online - Qualitative research report (ACMA) [Online]. Available: http://www.acma.gov.au/~/media/mediacomms/Research%20library %20reports%20old/pdf/attitudes_towards_use_of_personal_info%20pdf.pdf. 1.

    [33]. L. Vieraitis, H. Copes, Z. Powell, A. Pike. A Little Information Goes a Long Way: Expertise and Identity Theft. Aggression and Violent Behavior, vol. 20, pp. 10-18, Feb. 2015. 14-16.

    [34]. R. Siciliano (2014). Stolen identities are cheap on the Darknet (RobertSililiano) [Online]. Available: http://bestidtheftcompanys.com/2014/stolen-identities-are-cheap-on-the-darknet.

    [35]. Commonwealth of Australia. (2014). Identity crime and misuse in Australia (Identity Security Strategy) [Online]. Available: https://www.ag.gov.au/RightsAnd Protections/IdentitySecurity/Documents/IdentityCrimeAndMisuseInAustralia.pdf, 47-49.

    [36]. J. Cook (2014). Reddit and Instagram have a thriving marketplace for Fake IDs (Business Insider) [Online]. Available: http://www.businessinsider.com.au/reddit-and-instagram-have-a-marketplace-for-fake-ids-2014-10.

    [37]. Twitter (2014). Darknet Markets (Twitter – DarknetMarkets.org) [Online]. Available: https://twitter.com/darknetmarkets.

    [38]. B. McKelvey, (2001). Comment, Financial Institutions’ Duty of Confidentiality to Keep Customer’s Personal Information Secure from the Treat of Identity Theft, University of California Davis Law Review, vol. 34, pp.1082-88, Summer. 1082-1088.

    [39]. M. Betron, (2012). The state of anti-fraud and AML measures in the banking industry, Computer Fraud & Security, vol. 2012, no.5, pp. 5-7, May. 2012. 5-7.

    [40]. T. Thompson, (2010). Adding up the real cost of fraud, Computer Fraud and Security. vol. 2010, no. 4, p. 12. Apr. 2010. 12.

    [41]. S. Tombs, (2013). Corporate theft and fraud: business as usual, Centre for Crime and Justice Studies. No. 94, 14-15.

    [42]. D. Shichor, D. Sechrest and J. Doocy, “Victims of investment fraud” in Contemporary issues in crime and criminal justice: Essays in honor of Gilbert Beis, Upper Saddle River, US: Prentice Hall, 2000, pp. 87-96.

    [43]. Elsevier, 43% of credit card fraud not reported, (Network Security) [Online] Available: http://www.sciencedirect.com/science/article/pii/S135348580010011X

    [44]. K. Harrell, L. Langton. (2013). Victims of Identity Theft, 2012 (U.S. Department of Justice) [Online]. Available: http://www.sciencedirect.com/science/article/pii/ S1361372315300518http://www.bjs.gov/content/pub/pdf/vit12.pdf.

    [45]. Australian Government. (2014). National Identity Security Strategy – Identity Crime and Misuse in Australia. (Identity security) [Online]. Available: https://www.ag.gov.au/.../Documents/National-Identity-Crime-and-Misuse-Pilot.doc.

    [46]. J. McGee and J. Byington. (2015). Corporate Identity Theft: A Growing Risk. Journal of Corporate Accounting & Finance, vol. 26, no. 5, pp. 37-40, Jun.2015. 37.

    [47]. Elsevier, Large growth in identity fraud in 2015, says Cifas.2015 (Computer Fraud & Security) [Online]. Available: http://www.sciencedirect.com/science/article/ pii/S1361372315300518. 2.

    [48]. Canada Department of the Solicitor General and U.S. Department of Justice. (2003). Public Advisory: Special Report for Consumers on Identity Theft (CIPPIC) [Online}. Available: https://cippic.ca/sites/default/files/bulletins/Introduction.pdf, 4.

    [49]. Federal Trade Commission. (2001). Identity Theft: the FTC’s Response (FTC) [Online]. Available: https://www.ftc.gov/sites/default/files/documents/public_ statements/prepared-statement-federal-trade-commission-identity-theft/idthefttest 2002.pdf.

    [50]. M. W. Perl, (2003). It’s not always about the money: why the State identity theft laws fail to adequately address criminal record identity theft, vol. 94, no. 1, pp. 169-208, Fall, 2003.

    [51]. R. Thomas and B. Buchanan, (2015). Attributing Cyber Attacks. Journal of Strategic Studies, vol. 38, no. 1-2, pp. 4-37. Dec. 2014, 4, 31, 32.

    [52]. European Commission, (2012). Study for an Impact Assessment on a Proposal for a New Legal Framework on Identity Theft [Online]. Available: http://ec.europa.eu/dgs/home-affairs/e-library/documents/policies/organized-crime-and-human-trafficking/cybercrime/docs/final_report_identity_theft_11_ december_2012_en.pdf.

    [53]. E. Holm, Responding to identity crime on the internet. International Journal of Cyber Security and Digital Forensics, vol.1, no.2, pp. 67-74. Jan. 2012. 70-71.

    [54]. W. Wang, Y. Yuan, N. Archer. (2006). A Contextual Framework for Combating Identity Theft. IEEE Security & Privacy, vol. 4, no. 2, pp.30-38, March/April 2006. 25.

    [55]. Commonwealth of Australia. (2014). Identity crime and misuse in Australia (Identity Security Strategy) [Online]. Available: https://goo.gl/1Ncas8.

    [56]. R. Lombardi, (2006). Myths about identity theft debunked by experts, (IT World Canada) [Online]. Available: http://www.itworldcanada.com/article/myths-about-identity-theft-debunked-by-experts/5080.

    [57]. E. Holm, (2016). The role of the Refrigerator in Identity Theft, International Journal of Cyber-Security and Digital Forensics, vol. 5, no. 1, pp. 1-9. Jan. 2016.

    [58]. Zdnet, (2015). Interpol is training police to fight crime on the Darket (Zdnet) [Online]. Available: http://www.zdnet.com/article/interpol-is-training-police-to-fight-crime-on-the-darknet/.

    [59]. F. Wehinger, “The Dark Net: Self-Regulation Dynamics of Illegal Intelligence and Security,” in Intelligence and Security Informatics Conference, Athens, Greece, 2011, 209 -213.

    [60]. G. Newman and R. V. Clarke, Superhighway Robbery: Preventing E-Commerce Crime, London: Willan. 2003.

    [61]. M.D. Reisig, T.C. Pratt and K Holtfreter, (2009). Perceived risk of internet theft victimization: Examining the effects of social vulnerability and financial impulsivity. Criminal Justice and Behavior, vol.36, no. 4, pp. 369-384. Apr. 2009.
    [62]. M. Looi,
    (2001). “Enhanced Authentication services for Internet Systems using Mobile Networks” in Proceedings of the IEEE Global Telecommunication Conference., San Antonio, USA, 2001, 6.

    [63]. M. Pririgg, (2015). Nasa Joins US government project to create ‘Google for the dark net’ that could uncover cyber criminals, pedophiles’ and drug dealers in the online underworld (Dailymail) [Online] Available: http://www.dailymail.co.uk/sciencetech/article-3096464/Nasa-joins-government-project-create-Google-deep-web-uncover-cyber-criminals-paedophiles-drug-dealers-online-underworld.html.

    [64]. K. Scaachi, (2012). The dark side of the Internet: If you think the web is evil, wait till you hear about the darknet. (Maclean's) [Online]. Available: http://www.macleans.ca/society/technology/the-dark-side-of-the-internet/.

    [65]. J. Franklin,V. Paxson, A. Perrig and S. Savage, “An inquiry into the nature and causes of the wealth of internet miscreants,” in the Proc. of the 14th ACM Conf. on Computer communications security, New York, US, 2007, pp. 375 - 388.

    [66]. S. Mizoguchi, Y. Fukushima, Y. Kasahara, Y. Hori, and K. Sakurai., “Darknet Monitoring on Real-Operated Networks,” in Broadband, Wireless Computing, Communication and Applications), Fukuoka, Japan, (2010), 278-285.

    Additional Information

    Article Title: The Darknet: A New Passageway to Identity Theft
    Author(s): HOLM, Eric
    Date of Publication: 2017-06-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2017.01.04
    Issue: Volume 6, Issue 1, Year 2017
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 41-50 (10 pages)

    Copyright ©2012-2024
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.