International Journal on Criminology Volume 7, Number 1, Winter 2019/2020 | Page 52
A (Guided) Tour of the Digital Wild West
out espionage or blackmail, find compromising information, or gain an unfair
market advantage, and so on.
Some British academic researchers contend that criminal e-commerce now
has its own mega-servers—a kind of illicit Amazon or Facebook—which transact
over 1,500 billion dollars of business a year, similar to the gross national product
(GNP) of Russia. Indeed, they claim that if “black market cyber capitalism” were a
country, it would be the thirteenth biggest in the world by GNP.
Through these mega-servers, which typically operate on the dark net, a
huge and ever-increasing clientele can gain easy access to drugs, weapons, ammunition,
explosives, hacking tools, illegal services, expert opinion from hackers, and
training in online fraud.
As with any well-managed system, these criminal mega-servers spend
around 300 billion dollars per year on improving their sites and their technical
infrastructure, on streamlining their customer interactions, optimizing their “customer
experience,” and so on. Of the 1,500 billion plus dollars a year that these
mega-servers transact:
• black market trading (illegal online markets) : 860 billion USD
• hacking, theft of intellectual property : 500 billion USD
• espionage, sale of stolen data : 160 billion USD
• sale of tools for hacking and online sabotage : 1.6 billion USD
• ransoms obtained from use of ransomware : 1 billion USD
... and so on.
Digital Identity: A Serious Problem Still Unresolved
To date, there exists no universal digital equivalent of the passport. Trying to prove
your identity online is impossible because—and this cannot be repeated enough—
the libertarian “configuring powers” of the net have staked everything on connectivity
and communication, with no concern for security. Fluidity is the key! The
rest? Look at that later. Maybe. In the physical world, authentication of ID relies on
direct cognition (meeting a person) or recognition (acceptance of ID credentials).
But it is not so straightforward in the digital world. What happens in the case of
lost, falsified, or stolen original documents? How about those famous “security
questions” (mother’s maiden name, and so on)? According to Google, the answers
have been forgotten in 74 percent of cases. In practice, no technology currently
meets all the necessary criteria of being simple, clear, unbreakable, and compatible
with all user systems, computers, and smartphone platforms.
47