When Tigran Gambaryan the IRS agent and investigator who is a main character of Greenberg’s book traced a corrupt DEA agent in 2014, he essentially was working on his own, after hours, and doing so without any real tools. Now, if you flash forward to 2022, IRS criminal investigators have routinely used this technique to make the first, second, and third biggest seizures of money of any kind in Justice Department history. There are whole teams at probably every major law enforcement agency in the U.S. and probably others worldwide, who use this fluently.
After Massive Hack, It’s Pay Back Time For Silk Road 20

Hardware wallets are widely recognized for their ability to protect against online threats, such as hacking or phishing attacks, by keeping private keys offline. As with any investment in the cryptocurrency space, it is crucial for individuals to conduct thorough research and consider the inherent risks before participating in projects like Blackhole Protocol. But many others exposed themselves to a level of risk that was not fully transparent and that they could not really afford—although it’s impossible to nail down exactly how many people lost money and how badly they fared. Indeed, researchers have scant data on who owns cryptocurrencies, and even less data on the demographics and distribution of gains and losses. Neglected by the traditional financial system, they got into cryptocurrency with gusto—but late. The dark web is an anonymized overlay of the internet accessible through networks such as Tor (“The Onion Router”), I2P and Riffle that utilize layered encryption to obscure the identities and locations of users.
Protecting The American Public From Crypto Risks And Harms
Cryptocurrency fraud has seen a significant rise in recent years, with various schemes exploiting the digital nature of cryptocurrencies. This section explores Ponzi and pyramid schemes, ICO scams, rug pulls, and phishing attacks, as well as cryptojacking, fake wallets, and fraudulent exchanges. Addressing these risks requires clear regulations, effective monitoring, and collaboration between regulators and blockchain developers. Implementing compliance measures and leveraging technology can help balance privacy with security.
The Necessity Of Black Markets
- Many of these scams used methods like fraud and a trick known as “pig butchering,” which targeted people in Southeast Asia.
- This reflects a growing trend of younger Black Americans embracing emerging financial technologies.
- Elliptic says that Haowang Guarantee’s owners also own a stake in another similar Telegram-based market called Tudou Guarantee, according to a Telegram post from one of Haowang’s administrators, and they may seek to rebuild their business there.
- The horizontal bars represent each market lifetime, i.e., the time when the market becomes active until its closure, and is colored according to the market’s monthly trading volume in USD.
- You may have to turn to the underground market to acquire formula if nothing is available in local stores.
- Rather, it is everyday Americans who pay, including through taxpayer-funded bailouts.
Because they are already active in more than one market, the migration cost for the multihomers is usually smaller compared to that for non-multihomer users, especially for sellers, that need to rebuilt their reputation23. The empty point on the multiseller median income line demarcates the quarter with only two multisellers. After that quarter, their number remains small, which is represented by the dashed line. Distribution and exchange methods are often informal and rely heavily on established networks. Goods might be smuggled across borders to avoid tariffs or prohibitions, or they may be diverted from legitimate supply chains.
Cryptocurrency Continues To Attract Younger Investors
What was remarkable about Bitcoin at the time was not just buying a cup of coffee—but also, just like cash, you could put a bunch of unmarked bills in a briefcase and send it across the world without revealing anything about your identity. As someone who was interested in this world of cybercrime and evasion of surveillance, it seemed like this was going to unlock a whole new world of online crime and money laundering and drug dealing and cybercrime. The book tells the story, for example, of how blockchain tracing techniques led to the arrest of 337 people who participated in a horrifying dark web network that shared child pornography. These users believed their identities to be secure because of the network’s use of Bitcoin. But it was precisely the open nature of Bitcoin transactions that allowed for all them to be tracked down and arrested. Even its name is chosen specifically to reference the FBI’s repeated warnings about the Internet “going dark” — that encryption tools could effectively turn off law enforcement’s ability to surveil criminal and terrorist suspects online.
Symbiotic Relationship Between Legal And Black Markets
The Silk Road came to its demise in 2013 after the FBI learned about its existence. Although the federal agents admitted that the use of Tor and Bitcoin to obscure addresses were significant obstacles that they encountered, they were still able to crack down on the underground drug market. Sixth, we consider the cumulative mean interevent time for each entity i at time t, defined as the mean of the sequence of time interval between consecutive transactions of an entity until time t, which we denote by \(\phi _i(t)\). This feature is satisfied when \(\phi _i(t) \le \tau\), where \(\tau\) is the maximum value of mean interevent time. For each entity, we keep track of the cumulative values of the six features for each transaction performed by the entity over time. To be classified as a seller, an entity must simultaneously satisfy the six feature threshold criteria, as follows.
We highlight that these networks exhibit different resilience regimes in the presence of external shocks, the ecosystem’s resilience being mostly guaranteed by the network of buyers rather than sellers. Cryptocurrencies have become integral to the dark web economy, enabling illicit transactions and fueling cybercrime activities. Initially, Bitcoin was the primary currency for darknet markets, but its traceability led to the rise of privacy coins like Monero and Zcash, which offer enhanced anonymity.

They involve things that are happening around you and could be as simple as hiring illegal employees. When you pay a friend (without taxes) for helping you to mow your lawn, you are in some way contributing to black-market activities. Put that on a larger scale and you have a crime-related segment in your hands. This is most evident in terms of crime and illegal activities and when it deals with digital platforms, it could get harder to detect (or in some cases, easier depending on how one sees it).
While Haowang Guarantee responded to Telegram’s bans by almost immediately shutting down, Xinbi Guarantee appears to be making an effort to relaunch itself on new Telegram channels, Robinson says. Elliptic says that Haowang Guarantee’s owners also own a stake in another similar Telegram-based market called Tudou Guarantee, according to a Telegram post from one of Haowang’s administrators, and they may seek to rebuild their business there. Tudou Guarantee has already seen a significant surge in new users, Robinson says. Most of us are used to paying for things with either cash, credit or debit cards. Just making the leap to mobile payment apps like PayPal and Venmo still is a stretch for many people.
Crypto Marketing Attracted A Disproportionate Number Of Black Investors Here’s Why
- Shocks tend to induce serious structural changes in the multiseller network, but impact the multibuyer network much less severely.
- Black markets facilitate the exchange of a wide array of goods and services that are either illegal or transacted to avoid regulation.
- The black market refers to the trade of goods and services that occur outside the boundaries of official, legal channels.
- It introduces an innovative, approval-free decentralized and cross-chain burning protocol, enabling users and project governors to initiate burning pools.
A nuanced assessment of the operations of the black market is of great importance for policymakers to develop policy solutions cognizant of what drives the black market and tailored to the impact of the black market. With their focus on systemic aspects and on building inclusive economic growth, societies can reduce participation in illicit activities and create room for individuals to also participate effectively in formal economies. Nevertheless, durable change calls for continued commitment and participation by various stakeholders and sectors that would focus on the underlying factors of the black market and sustainable development as the solution. The illegal arms trade is another profitable field of the black market, and it facilitates conflicts and violence in different parts of the planet due to the fact that it traffics weapons. Dealing in arms, ranging from small arms and ammunition to military-grade weaponry, illegal arms traders make money by supplying weapons to terrorist organizations, insurgencies and criminal syndicates.
Anonymity And Privacy
After a major external shock in 2017, the S2S network shrinks but, unlike the multiseller network, recovers, and grows again (though slower than the multibuyer network). With the advent of several markets at the beginning of 2014, the number of multisellers rapidly grows, representing more than 20% of all sellers until the beginning of 2016 (see Supplementary Information Section S3). During 2016 and 2017, AphaBay becomes the dominant market (see Fig. 3), polarizing sellers around its own ecosystem, such that the fraction of multisellers decreases to 10% of all sellers until its closure.
7, we show the largest component of the S2S network one year before the operation Bayonet and one year after. However, the evolution of the S2S network shows a different pattern than that observed in both the multiseller and the multibuyer networks. However, the increased attention from the broader population coincided with increased attention from politicians and regulators. Unrest both among the Silk Road community and the administrators was brewing, as well, and the site was hit multiple times by hackers and extortionists. Ulbricht and his team created a spin-off site for the sale of guns, which proved more problematic. Furthermore, as more pressure mounted, there are speculations that Ulbricht hired people to murder those who wronged him.

Elliptic, the cryptocurrency compliance firm, traced billions of dollars flowing from Huione Guarantee, the Telegram marketplace, to Huione Pay. This was “likely so that these criminally-derived funds could be cashed out,” firm founder Tom Robinson told RFA. As online black marketplaces proliferate a US man is arrested for selling guns on the Black Market Reloaded site. In a definitive chapter for the infamous Silk Road online black market, a U.S. Court of Appeals finalized the forfeiture of approximately 69,370 Bitcoin BTC/USD and other cryptocurrencies such as Bitcoin Gold BTG/USD Bitcoin SV BSV/USD and Bitcoin Cash BCH/USD valued at more than $3.4 billion.
For more details on all of the fundamentals of cryptocurrencies, listen in to the entire part one episode. Then click here for part two of the series as Stuff They Don’t Want You To Know goes even further down the bitcoin rabbit hole. Blockchain technology requires an open network with many computers, making it nearly impossible to hack. How could they know it would be the first to get the transaction data deciphered? Security in the digital realm seems shaky, but blockchains could be the answer.
Legacy Of Silk Road
In 2024, the platform grew significantly in popularity, partly because of its strategic acquisition of users from a number of recently shut-down marketplaces, such as AlphaBay and Incognito Market, which had recently closed their doors. Based on our observations from analysis on dark web data using Lunar, we’ve identified the top 7 marketplaces on the dark web in 2025. We developed Lunar to monitor the deep and dark web, including dark web marketplace sites. To protect the identity of the user receiving coins instead of spending them, Dark Wallet offers a different technique known as a stealth address.