References


MODULE 1 — Foundations: What the Web Actually Is

1.2 — Historical Evolution of Hidden Networks

Foundational Cryptography

  1. Diffie, W., Hellman, M. (1976).
    New Directions in Cryptography.
    IEEE Transactions on Information Theory.
    https://doi.org/10.1109/TIT.1976.1055638

  2. Rivest, R., Shamir, A., Adleman, L. (1978).
    A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.
    Communications of the ACM.
    https://doi.org/10.1145/359340.359342


Mix Networks & Anonymous Communication

  1. Chaum, D. (1981).
    Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
    Communications of the ACM.
    https://doi.org/10.1145/358549.358563

  2. Chaum, D. (1988).
    The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability.
    Journal of Cryptology.
    https://doi.org/10.1007/BF02323528


Early Anonymous Remailers

  1. Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.
    https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf

  2. Mixmaster & Mixminion Documentation (Cypherpunks).
    Archived technical specifications:
    https://mixminion.net
    https://www.chaum.com


Onion Routing & Tor Development

  1. Goldschlag, D. M., Reed, M. G., Syverson, P. F. (1999).
    Onion Routing for Anonymous and Private Internet Connections.
    Communications of the ACM (Extended abstract available via NRL).
    https://www.onion-router.net/Publications.html

  2. Tor Project Official Design Documents.
    https://spec.torproject.org
    https://community.torproject.org


Alternative Darknet Architectures

  1. Freenet Project Paper
    Clarke, I., Sandberg, O., Wiley, B., Hong, T. (2000).
    Freenet: A Distributed Anonymous Information Storage and Retrieval System.
    ICSI Berkeley.
    https://freenetproject.org/papers/freenet.pdf

  2. I2P — Invisible Internet Project Documentation.
    https://geti2p.net/en/docs

  3. GNUnet Technical Documentation.
    https://gnunet.org/en/philosophy.html
    https://gnunet.org/en/architecture.html

  4. Yggdrasil Network Whitepaper.
    https://yggdrasil-network.github.io/whitepaper.pdf

  5. Nym Mixnet Academic Whitepaper.
    Khovratovich, D., et al.
    Nym Mixnet Overview.
    https://nymtech.net/docs/whitepaper


Dark Web Mainstreamization (2010s)

  1. Christin, N. (2013).
    Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
    WWW Conference.
    https://doi.org/10.1145/2488388.2488408

  2. Moore, D., Rid, T. (2016).
    Cryptopolitik and the Darknet.
    Survival Journal (International Institute for Strategic Studies).
    https://doi.org/10.1080/00396338.2016.1142085


Tor Hidden Service Upgrade (v3)

  1. Tor v3 Onion Services Specification.
    Next-Generation Hidden Services.
    https://spec.torproject.org/hiddensvc.html

  2. Tor Proposal 224 — Hidden Service Protocol Improvements.
    https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt

 

1.3 Misconceptions & Media Myths: A Scientific Deconstruction

  1. Moore, D., Rid, T. (2016).
    Cryptopolitik and the Darknet.
    Survival Journal.
    https://doi.org/10.1080/00396338.2016.1142085

  2. Christin, N. (2013).
    Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
    WWW Conference.
    https://doi.org/10.1145/2488388.2488408

  3. Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.
    https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf

  4. The Tor Project — Myths and FAQs.
    https://support.torproject.org

  5. Electronic Frontier Foundation (EFF) — Surveillance & Anonymity Resources.
    https://www.eff.org

  6. I2P Documentation — Project Overview.
    https://geti2p.net/en/docs

  7. Freenet Whitepaper — Clarke et al. (2000).
    https://freenetproject.org/papers/freenet.pdf

 

1.4 Why Humans Built Hidden Networks: A Sociotechnical Perspective

  1. Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.
    https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf

  2. Chaum, D. (1981).
    Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
    Communications of the ACM.
    https://doi.org/10.1145/358549.358563

  3. Hughes, E. (1993).
    A Cypherpunk’s Manifesto.
    Published on Cypherpunk mailing list archives.

  4. Moore, D., Rid, T. (2016).
    Cryptopolitik and the Darknet.
    International Institute for Strategic Studies.
    https://doi.org/10.1080/00396338.2016.1142085

  5. Electronic Frontier Foundation.
    Why Privacy Matters.
    https://www.eff.org

  6. United Nations Human Rights Council. (2015).
    Report on the Right to Privacy in the Digital Age.

  7. Tor Project — Mission and Overview.
    https://www.torproject.org/about

 

1.5 Deep Web vs Dark Web vs Darknets: Taxonomy and Terminology

  1. Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.
    https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf

  2. Moore, D., Clayton, R., Anderson, R. (2009).
    The Anatomy of the Deep Web.
    Cambridge University Computer Laboratory (Technical Discussion — widely cited).

  3. Moore, D., Rid, T. (2016).
    Cryptopolitik and the Darknet.
    International Institute for Strategic Studies.
    https://doi.org/10.1080/00396338.2016.1142085

  4. I2P Project Documentation.
    https://geti2p.net/en/docs

  5. Freenet Whitepaper — Clarke et al. (2000).
    Freenet: A Distributed Anonymous Information Storage and Retrieval System.
    https://freenetproject.org/papers/freenet.pdf

  6. GNUnet Architecture Overview.
    https://gnunet.org/en/architecture.html

  7. Yggdrasil Network Whitepaper.
    https://yggdrasil-network.github.io/whitepaper.pdf

  8. Nym Mixnet Whitepaper.
    https://nymtech.net/docs/whitepaper

 

1.6 The Philosophy of Anonymity: Privacy as a Technological Construct

  1. Hughes, E. (1993).
    A Cypherpunk’s Manifesto.
    Archived mailing list document.

  2. Chaum, D. (1981).
    Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
    Communications of the ACM.
    https://doi.org/10.1145/358549.358563

  3. Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.
    https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf

  4. United Nations Human Rights Council (2015).
    The Right to Privacy in the Digital Age.

  5. Electronic Frontier Foundation — Privacy and Surveillance Resources.
    https://www.eff.org

  6. Solove, D. (2007).
    “I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy.
    San Diego Law Review.

  7. Nissenbaum, H. (2004).
    Privacy as Contextual Integrity.
    Washington Law Review.

  8. Zimmer, M. (2010).
    “Web Search Studies and the Problem of Privacy.”
    Library Trends Journal.

1.7 A Comparative Anatomy of Hidden Networks (F2F, I2P, Tor, Yggdrasil, Nym, Lokinet)

  1. Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.
    https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf

  2. I2P Project Documentation
    https://geti2p.net/en/docs

  3. Clarke, I., Sandberg, O., Wiley, B., Hong, T. (2000).
    Freenet: A Distributed Anonymous Information Storage and Retrieval System.
    https://freenetproject.org/papers/freenet.pdf

  4. Yggdrasil Network Whitepaper
    https://yggdrasil-network.github.io/whitepaper.pdf

  5. Nym Mixnet Whitepaper
    https://nymtech.net/docs/whitepaper

  6. Chaum, D. (1981).
    Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
    Communications of the ACM.
    https://doi.org/10.1145/358549.358563

  7. Lokinet (Oxen) Technical Overview
    https://lokinet.org/docs

MODULE 2 — Network Architectures of Hidden Ecosystems

2.1 Tor’s Onion Routing — Architectural Deep Dive

  1. Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.
    https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf

  2. Goldschlag, D., Reed, M., Syverson, P. (1999).
    Onion Routing for Anonymous and Private Internet Connections.
    Naval Research Laboratory.
    https://www.onion-router.net/Publications.html

  3. Murdoch, S. J., & Zieliński, P. (2007).
    Sampled Traffic Analysis Against Tor.
    IEEE Symposium on Security and Privacy.

  4. Tor Project Specifications.
    https://spec.torproject.org

  5. Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
    Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization.
    IEEE Symposium on Security and Privacy.

  6. Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P. (2013).
    Users Get Routed: Traffic Correlation on Tor.
    ACM Conference on Computer and Communications Security.

2.2 Hidden Services Infrastructure: v2→v3 Transition, Cryptographic Upgrade

2.3 Alternative Darknets:

  • I2P Tunnels

  • Freenet Data Store Mechanics

  • GNUnet’s Peer Group Cryptography

  • Yggdrasil’s DHT-Routed IPv6 Mesh

  • Nym Mixnet Layered Privacy

    I2P

I2P Project Documentation
https://geti2p.net/en/docs

Zantout, B., & Haraty, R. (2011).
I2P Data Communication System.
ICICS Conference.

Freenet

Clarke, I., Sandberg, O., Wiley, B., & Hong, T. (2000).
Freenet: A Distributed Anonymous Information Storage and Retrieval System.
https://freenetproject.org/papers/freenet.pdf

GNUnet

GNUnet Documentation — Architecture
https://gnunet.org/en/architecture.html

Grothoff, C. (2017).
The GNU Name System.
PETS (Privacy Enhancing Technologies Symposium).
https://doi.org/10.1515/popets-2017-0056

Yggdrasil

Yggdrasil Network Whitepaper
https://yggdrasil-network.github.io/whitepaper.pdf

Nym

Kwon, A., Lazar, D., Devadas, S., Ford, B. (2017).
The Loopix Anonymity System.
USENIX Security.

Nym Project Whitepaper
https://nymtech.net/docs/whitepaper

2.4 Comparative Latency Studies Across Darknets

  • Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.

  • Johnson, A., et al. (2013).
    Users Get Routed: Traffic Correlation on Tor.
    ACM CCS.

  • Zantout, B., & Haraty, R. (2011).
    I2P Data Communication System.
    ICICS Conference.

  • Clarke, I., Sandberg, O., Wiley, B., Hong, T. (2000).
    Freenet: A Distributed Anonymous Information Storage and Retrieval System.
    Freenet Whitepaper.

  • Grothoff, C. (2017).
    The GNU Name System.
    PETS.

  • Yggdrasil Network Whitepaper
    https://yggdrasil-network.github.io/whitepaper.pdf

  • Kwon, A., Lazar, D., Devadas, S., Ford, B. (2017).
    The Loopix Anonymity System.
    USENIX Security.

  • Nym Project Whitepaper
    https://nymtech.net/docs/whitepaper

2.5 How Exit Relays Actually Work

2.6 Pluggable Transports: Obfuscation War Between Censorship & Anonymity

  • Tor Project — Pluggable Transport Specification (v2).
    https://spec.torproject.org/pt-spec

  • Wilde, E., Winter, P., Lindskog, S. (2018).
    How to Build a Censorship Circumvention Tool.
    USENIX FOCI Workshop.

  • Fifield, D., Lan, C., Hynes, N., Wegmann, P., Paxson, V. (2015).
    Blocking-Resistant Communication Through Domain Fronting.
    ACM CCS.
    https://doi.org/10.1145/2810103.2813682

  • Houmansadr, A., Brubaker, C., Shmatikov, V. (2013).
    The Parrot Is Dead: Observations on the Imitation Resistance of Traffic Mimicry.
    IEEE Symposium on Security & Privacy.

  • Wang, L., Dyer, K. P., Aksoy, S., et al. (2015).
    Seeing Through Network-Protocol Obfuscation.
    USENIX Security.

  • Snowflake Technical Overview (Tor Project).
    https://snowflake.torproject.org

  • FTE (Format-Transforming Encryption) Specification.
    https://fteproxy.org

2.7 Ecosystem Fragility: Why Darknets Collapse and Rebuild

  • Fifield, D., et al. (2015).
    Blocking-Resistant Communication Through Domain Fronting.
    ACM CCS.
    https://doi.org/10.1145/2810103.2813682

  • Wilde, E., Winter, P., Lindskog, S. (2018).
    How to Build a Censorship Circumvention Tool.
    USENIX FOCI.

  • Khattak, S., et al. (2013).
    Do You See What I See? Differential Treatment of Anonymous Users.
    NDSS Symposium.

  • Tor Project: Snowflake Overview.
    https://snowflake.torproject.org

  • Tor Project: Pluggable Transport Specs.
    https://spec.torproject.org/pt-spec

  • Winter, P., & Lindskog, S. (2012).
    Great Firewall of China: Blocking and Evolving Strategies.
    FOCI Workshop.

  • Aryan, S., Aryan, H., & Halderman, J.A. (2013).
    Internet Censorship in Iran: A First Look.
    USENIX FOCI.

  • Ramesh, R., et al. (2020).
    Examining Russia’s DPI Deployment.
    IMC (Internet Measurement Conference).

 

 

MODULE 3 — Cryptography Behind Hidden Services

3.1 Public Key Cryptography in Onion Ecosystems

3.2 HSDir (Hidden Service Directory) Cryptographic Workflows

  • Tor Project — Onion Service v3 Specification (HSDir).
    https://spec.torproject.org/rend-spec-v3

  • Tor Proposal 224.
    Next-Generation Hidden Services.
    https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt

  • Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
    Trawling for Tor Hidden Services.
    IEEE Symposium on Security and Privacy.

  • Kadianakis, G., Johnson, A., et al. (2017).
    Onion Services: Design and Improvements.
    Tor Project Technical Report.

  • Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.

  • Johnson, A., et al. (2013).
    Users Get Routed: Traffic Correlation on Tor.
    ACM CCS.

3.3 Why v3 Onion Services Were Necessary

  1. Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
    Trawling for Tor Hidden Services.
    IEEE Symposium on Security and Privacy.

  2. Tor Proposal 224.
    Next-Generation Hidden Services.
    https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt

  3. Tor Project — Onion Service v3 Specification.
    https://spec.torproject.org/rend-spec-v3

  4. Kadianakis, G., Johnson, A., et al. (2017).
    Onion Services: Design and Improvements.
    Tor Project Technical Report.

  5. Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.

  6. Bernstein, D. J., et al. (2012).
    High-Speed High-Security Signatures (Ed25519).
    https://ed25519.cr.yp.to

  7. NIST Cryptographic Standards Transition Reports
    (RSA-1024 & SHA-1 deprecation guidance)


3.4 Post-Quantum Threats to Darknets

  1. Shor, P. (1994).
    Algorithms for Quantum Computation: Discrete Logarithms and Factoring.
    IEEE FOCS.

  2. Grover, L. (1996).
    A Fast Quantum Mechanical Algorithm for Database Search.
    STOC.

  3. NIST Post-Quantum Cryptography Project.
    https://csrc.nist.gov/projects/post-quantum-cryptography

  4. Mosca, M. (2018).
    Cybersecurity in an Era with Quantum Computers.
    Communications of the ACM.

  5. Tor Project — Cryptographic Specifications & Proposals.
    https://spec.torproject.org

  6. Bernstein, D. J., et al.
    Introduction to Post-Quantum Cryptography.
    Springer.

3.5 Decentralized PKI for Anonymous Services3.6 Zero-Knowledge Proof Concepts Relevant to Darknets

  1. Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.

  2. Tor Project — Onion Service v3 Specification.
    https://spec.torproject.org/rend-spec-v3

  3. Goldberg, I. (2015).
    Improving the Privacy and Security of Tor Hidden Services.
    PETS Symposium.

  4. Chaum, D. (1981).
    Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
    Communications of the ACM.

  5. Kahn Academy / Stanford CS.
    Public Key Infrastructure Concepts.

  6. Anderson, R. (2008).
    Security Engineering.
    Wiley.

3.6 Zero-Knowledge Proof Concepts Relevant to Darknets

  1. Goldwasser, S., Micali, S., Rackoff, C. (1985).
    The Knowledge Complexity of Interactive Proof Systems.
    SIAM Journal on Computing.

  2. Chaum, D., Evertse, J., van de Graaf, J. (1988).
    An Improved Protocol for Demonstrating Possession of Discrete Logarithms.
    CRYPTO.

  3. Camenisch, J., Lysyanskaya, A. (2001).
    An Efficient System for Non-transferable Anonymous Credentials.
    EUROCRYPT.

  4. Kahn Academy / MIT OpenCourseWare.
    Zero-Knowledge Proof Lectures.

  5. Tor Project — Cryptographic Protocol Overview.
    https://spec.torproject.org

  6. Boneh, D., Shoup, V. (2020).
    A Graduate Course in Applied Cryptography.

 

3.7 Metadata Minimization Engineering

  • Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.

  • Murdoch, S. J., Zieliński, P. (2007).
    Sampled Traffic Analysis Against Tor.
    IEEE Security & Privacy.

  • Johnson, A., et al. (2013).
    Users Get Routed: Traffic Correlation on Tor.
    ACM CCS.

  • Goldberg, I. (2015).
    Improving the Privacy and Security of Tor Hidden Services.
    PETS Symposium.

  • Tor Project — Threat Models & Design Docs.
    https://spec.torproject.org

  • Pfitzmann, A., Hansen, M. (2010).
    A Terminology for Talking About Privacy by Data Minimization.

  • RFC 6973 — Privacy Considerations for Internet Protocols.

 


MODULE 4 — Cybersecurity Failures in Hidden Networks

4.1 How Hidden Services De-Anonymize Themselves

  • Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
    Trawling for Tor Hidden Services.
    IEEE Symposium on Security and Privacy.

  • Murdoch, S. J., Zieliński, P. (2007).
    Sampled Traffic Analysis Against Tor.
    IEEE Security & Privacy.

  • Goldberg, I. (2015).
    Improving the Privacy and Security of Tor Hidden Services.
    PETS Symposium.

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

  • Tor Project — Onion Services Documentation.
    https://spec.torproject.org

  • Narayanan, A., et al. (2012).
    On the Feasibility of Internet-Scale Author Identification.
    IEEE Symposium on Security and Privacy.

4.2 Browser-Level Identity Leaks: Fingerprinting Anatomy

  • Eckersley, P. (2010).
    How Unique Is Your Web Browser?
    Electronic Frontier Foundation.

  • Panopticlick Project (EFF).
    https://panopticlick.eff.org

  • Narayanan, A., et al. (2012).
    On the Feasibility of Internet-Scale Author Identification.
    IEEE Symposium on Security and Privacy.

  • Mowery, K., et al. (2012).
    Fingerprinting Information in JavaScript Implementations.
    W2SP Workshop.

  • Tor Project — Tor Browser Design Documentation.
    https://support.torproject.org

  • Boda, K., et al. (2011).
    User Tracking on the Web via Cross-Browser Fingerprinting.
    WWW Conference.

4.3 Deanonymization Attacks Observed in Research Papers

  1. Murdoch, S. J., Zieliński, P. (2007).
    Sampled Traffic Analysis Against Tor.
    IEEE Security & Privacy.

  2. Johnson, A., et al. (2013).
    Users Get Routed: Traffic Correlation on Tor.
    ACM CCS.

  3. Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
    Trawling for Tor Hidden Services.
    IEEE S&P.

  4. Wang, T., et al. (2014).
    Effective Attacks and Provable Defenses for Website Fingerprinting.
    USENIX Security.

  5. Panchenko, A., et al. (2016).
    Website Fingerprinting at Internet Scale.
    NDSS.

  6. Eckersley, P. (2010).
    How Unique Is Your Web Browser?
    EFF.

  7. Edman, M., Syverson, P. (2009).
    As-Awareness in Tor Path Selection.
    ACM CCS.

4.4 Traffic-Correlation Attacks & Global Adversaries

  • Murdoch, S. J., Zieliński, P. (2007).
    Sampled Traffic Analysis Against Tor.
    IEEE Security & Privacy.

  • Johnson, A., et al. (2013).
    Users Get Routed: Traffic Correlation on Tor.
    ACM CCS.

  • Feamster, N., Dingledine, R. (2004).
    Location Diversity in Anonymity Networks.
    WPES.

  • Edman, M., Syverson, P. (2009).
    As-Awareness in Tor Path Selection.
    ACM CCS.

  • Kwon, A., et al. (2017).
    The Loopix Anonymity System.
    USENIX Security.

  • Tor Project — Threat Model Documentation.
    https://spec.torproject.org

4.5 Cryptocurrency Mistakes That Lead to Identity Exposure

  1. Meiklejohn, S., et al. (2013).
    A Fistful of Bitcoins: Characterizing Payments Among Men with No Names.
    USENIX Security Symposium.

  2. Androulaki, E., et al. (2013).
    Evaluating User Privacy in Bitcoin.
    FC (Financial Cryptography).

  3. Reid, F., Harrigan, M. (2013).
    An Analysis of Anonymity in the Bitcoin System.
    Security and Privacy in Social Networks.

  4. Kappos, G., et al. (2018).
    An Empirical Analysis of Anonymity in Zcash.
    USENIX Security.

  5. Biryukov, A., Khovratovich, D. (2017).
    Deanonymization of Clients in Bitcoin P2P Network.
    ACM CCS.

  6. Moser, M., Böhme, R., Breuker, D. (2014).
    An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem.
    eCrime Symposium.

4.6 Tor Over VPN vs VPN Over Tor — Mythology & Reality

  • Tor Project — FAQ: Tips on Staying Anonymous.
    https://support.torproject.org

  • Dingledine, R., et al. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security.

  • Murdoch, S. J., Zieliński, P. (2007).
    Sampled Traffic Analysis Against Tor.
    IEEE Security & Privacy.

  • Johnson, A., et al. (2013).
    Users Get Routed: Traffic Correlation on Tor.
    ACM CCS.

  • Tor Project Blog & Threat Model Discussions.

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

4.7 Side-Channel Leaks in Onion Architectures

  • Murdoch, S. J. (2006).
    Hot or Not: Revealing Hidden Services by Their Clock Skew.
    IEEE Symposium on Security and Privacy.

  • Murdoch, S. J., Danezis, G. (2005).
    Low-Cost Traffic Analysis of Tor.
    IEEE Security & Privacy.

  • Backes, M., et al. (2012).
    Statistical Disclosure Attacks against Tor.
    ESORICS.

  • Bauer, K., et al. (2007).
    Low-Resource Routing Attacks Against Tor.
    WPES.

  • Goldberg, I. (2015).
    Improving the Privacy and Security of Tor Hidden Services.
    PETS.

  • Tor Project — Design & Threat Model Documentation.
    https://spec.torproject.org

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

 


MODULE 5 — Threat Intelligence: Mapping Darknet Ecosystems

5.1 How Security Firms Profile Darknet Activity

  • Décary-Hétu, D., Giommoni, L. (2017).
    Do Police Crackdowns Disrupt Drug Cryptomarkets?
    International Journal of Drug Policy.

  • Christin, N. (2013).
    Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
    WWW Conference.

  • Ablon, L., Libicki, M., Golay, A. (2014).
    Markets for Cybercrime Tools and Stolen Data.
    RAND Corporation.

  • Holt, T. J., Smirnova, O., Chua, Y. T. (2016).
    Examining the Structure, Organization, and Processes of Cybercrime Markets.
    Deviant Behavior.

  • Europol (IOCTA Reports).
    Internet Organised Crime Threat Assessment.

  • Krebs, B. (Investigative reporting on darknet markets).

5.2 OSINT Techniques Adapted for Anonymous Networks

  1. Christin, N. (2013).
    Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
    WWW Conference.

  2. Décary-Hétu, D., et al. (2016).
    Analyzing Darknet Markets.
    International Journal of Drug Policy.

  3. Holt, T. J. (2013).
    Exploring the Social Organisation and Structure of Dark Web Forums.
    Global Crime.

  4. Ablon, L., Libicki, M., Golay, A. (2014).
    Markets for Cybercrime Tools and Stolen Data.
    RAND Corporation.

  5. Europol IOCTA Reports.

  6. OSINT Framework (methodological reference).

5.3 Linguistic Profiling in Anonymous Forums

  1. Narayanan, A., et al. (2012).
    On the Feasibility of Internet-Scale Author Identification.
    IEEE Symposium on Security and Privacy.

  2. Juola, P. (2006).
    Authorship Attribution.
    Foundations and Trends in Information Retrieval.

  3. Holt, T. J. (2013).
    Exploring the Social Organisation and Structure of Dark Web Forums.
    Global Crime.

  4. Décary-Hétu, D., et al. (2016).
    Analyzing Darknet Markets.
    International Journal of Drug Policy.

  5. Grant, T., Baker, K. (2001).
    Identifying Reliable, Valid Markers of Authorship.
    Forensic Linguistics.

  6. Europol IOCTA Reports (linguistic and behavioral analysis sections).

5.4 Temporal Activity Analysis: Time-Zone Fingerprinting

  1. Christin, N. (2013).
    Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
    WWW Conference.

  2. Décary-Hétu, D., et al. (2016).
    Analyzing Darknet Markets.
    International Journal of Drug Policy.

  3. Holt, T. J. (2013).
    Exploring the Social Organisation and Structure of Dark Web Forums.
    Global Crime.

  4. Ablon, L., Libicki, M., Golay, A. (2014).
    Markets for Cybercrime Tools and Stolen Data.
    RAND Corporation.

  5. Europol IOCTA Reports (temporal and behavioral analysis sections).

  6. Anderson, R. (2008).
    Security Engineering.
    Wiley.

5.5 Cluster Mapping Hidden Service Families

  1. Christin, N. (2013).
    Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
    WWW Conference.

  2. Décary-Hétu, D., et al. (2016).
    Analyzing Darknet Markets.
    International Journal of Drug Policy.

  3. Ablon, L., Libicki, M., Golay, A. (2014).
    Markets for Cybercrime Tools and Stolen Data.
    RAND Corporation.

  4. Holt, T. J., Smirnova, O. (2016).
    Examining the Structure of Cybercrime Markets.
    Deviant Behavior.

  5. Europol IOCTA Reports (marketplace lineage and clustering sections).

  6. Van Wegberg, R., et al. (2018).
    The Lifecycle of Cryptomarkets.
    Crime Science.

5.6 Darknet Scam Ecology: Identifying Pattern Families

  • Décary-Hétu, D., Giommoni, L. (2017).
    Do Police Crackdowns Disrupt Drug Cryptomarkets?
    International Journal of Drug Policy.

  • Van Wegberg, R., et al. (2018).
    The Lifecycle of Cryptomarkets.
    Crime Science.

  • Christin, N. (2013).
    Traveling the Silk Road.
    WWW Conference.

  • Ablon, L., Libicki, M., Golay, A. (2014).
    Markets for Cybercrime Tools and Stolen Data.
    RAND Corporation.

  • Holt, T. J., Smirnova, O. (2016).
    Examining the Structure of Cybercrime Markets.
    Deviant Behavior.

  • Europol IOCTA Reports (scam typologies and marketplace fraud).

5.7 Life Cycle of Darknet Communities (Anthropological Overview)

  1. Christin, N. (2013).
    Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
    WWW Conference.

  2. Van Wegberg, R., et al. (2018).
    The Lifecycle of Cryptomarkets.
    Crime Science.

  3. Décary-Hétu, D., Giommoni, L. (2017).
    Do Police Crackdowns Disrupt Drug Cryptomarkets?
    International Journal of Drug Policy.

  4. Holt, T. J. (2013).
    Exploring the Social Organisation and Structure of Dark Web Forums.
    Global Crime.

  5. Ablon, L., Libicki, M., Golay, A. (2014).
    Markets for Cybercrime Tools and Stolen Data.
    RAND Corporation.

  6. Anderson, R. (2008).
    Security Engineering.
    Wiley.

  7. Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy.
    Verso.


 


MODULE 6 — Governance, Law & Geopolitics

6.1 The Global Jurisdiction Puzzle of Darknets

  • Brenner, S. (2011).
    Cybercrime: Criminal Threats from Cyberspace.
    Praeger.

  • Goldsmith, J., Wu, T. (2006).
    Who Controls the Internet?
    Oxford University Press.

  • Council of Europe.
    Budapest Convention on Cybercrime.

  • UNODC.
    Comprehensive Study on Cybercrime.

  • Lessig, L. (2006).
    Code and Other Laws of Cyberspace.
    Basic Books.

  • Tor Project — Legal FAQ and Policy Documents.

6.2 International Law Enforcement Collaboration Mechanisms

  • Council of Europe (2001).
    Convention on Cybercrime (Budapest Convention).

  • UNODC.
    Comprehensive Study on Cybercrime.

  • Brenner, S. (2011).
    Cybercrime: Criminal Threats from Cyberspace.
    Praeger.

  • Europol — IOCTA Reports and JIT Documentation.

  • INTERPOL — Cybercrime Cooperation Frameworks.

  • Goldsmith, J., Wu, T. (2006).
    Who Controls the Internet?
    Oxford University Press.

6.3 Nation-State Response Models (China, Russia, US, EU)

  • Goldsmith, J., Wu, T. (2006).
    Who Controls the Internet?
    Oxford University Press.

  • Deibert, R. (2015).
    Black Code: Surveillance, Privacy, and the Dark Side of the Internet.
    Signal / McClelland & Stewart.

  • UNODC.
    Comprehensive Study on Cybercrime.

  • Council of Europe.
    Budapest Convention & Policy Commentary.

  • European Union Charter of Fundamental Rights.

  • Chinese Cybersecurity Law & Cyberspace Administration Policy Papers.

  • Russian Information Security Doctrine.

  • US DOJ Cybercrime and Darknet Prosecution Reports.

6.4 Ethical Frameworks for Darknet Research

  1. Belmont Report (1979).
    Ethical Principles and Guidelines for the Protection of Human Subjects of Research.

  2. Association of Internet Researchers (AoIR).
    Ethical Guidelines for Internet Research.

  3. Décary-Hétu, D., et al. (2016).
    Analyzing Darknet Markets.
    International Journal of Drug Policy.

  4. Nissenbaum, H. (2010).
    Privacy in Context.
    Stanford University Press.

  5. Floridi, L., Taddeo, M. (2016).
    What Is Data Ethics?
    Philosophical Transactions of the Royal Society A.

  6. UNESCO.
    Ethics of Artificial Intelligence and Data.

6.5 Surveillance Technology Arms Race

  • Deibert, R. (2015).
    Black Code: Surveillance, Privacy, and the Dark Side of the Internet.
    Signal.

  • Zuboff, S. (2019).
    The Age of Surveillance Capitalism.
    PublicAffairs.

  • Greenwald, G. (2014).
    No Place to Hide.
    Metropolitan Books.

  • Lyon, D. (2018).
    The Culture of Surveillance.
    Polity.

  • UN Special Rapporteur on the Right to Privacy — Reports.

  • European Court of Human Rights — Surveillance Jurisprudence.

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

6.6 Censorship Circumvention Technology in Authoritarian Regimes

  • Deibert, R., et al. (2010).
    Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace.
    MIT Press.

  • Deibert, R. (2015).
    Black Code.
    Signal.

  • Freedom House.
    Freedom on the Net Reports.

  • OpenNet Initiative.
    Global Internet Filtering Studies.

  • UN Special Rapporteur on Freedom of Expression — Reports.

  • Clayton, R., Murdoch, S. J., Watson, R. (2006).
    Ignoring the Great Firewall of China.
    PETS.

  • Roberts, M. (2018).
    Censored: Distraction and Diversion Inside China’s Great Firewall.
    Princeton University Press.

6.7 Case Studies of Major Operations (Silk Road, Hansa, Alphabay) — Forensics Perspective Only

  • United States v. Ulbricht — Court Records and DOJ Filings.

  • Europol (2017).
    Operation Bayonet / Hansa Takedown Reports.

  • Christin, N. (2013).
    Traveling the Silk Road.
    WWW Conference.

  • Van Wegberg, R., et al. (2018).
    The Lifecycle of Cryptomarkets.
    Crime Science.

  • Décary-Hétu, D., Giommoni, L. (2017).
    Do Police Crackdowns Disrupt Drug Cryptomarkets?
    International Journal of Drug Policy.

  • Europol IOCTA Reports (case study sections).

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

6.8 Implications for Human Rights & Whistleblowing

  • United Nations.
    Universal Declaration of Human Rights.

  • International Covenant on Civil and Political Rights (ICCPR).

  • *European Court of Human Rights — Case Law on Source Protection.

  • UN Special Rapporteur on Freedom of Expression — Reports.

  • Reporters Without Borders (RSF).
    World Press Freedom Index.

  • Privacy International — Surveillance and Human Rights Reports.

  • Nissenbaum, H. (2010).
    Privacy in Context.
    Stanford University Press.

  • Greenwald, G. (2014).
    No Place to Hide.
    Metropolitan Books.

 


MODULE 7 — Social Structures of the Dark Web

7.1 Darknet Community Sociology

  • Holt, T. J. (2013).
    Exploring the Social Organisation and Structure of Dark Web Forums.
    Global Crime.

  • Décary-Hétu, D., et al. (2016).
    Analyzing Darknet Markets.
    International Journal of Drug Policy.

  • Christin, N. (2013).
    Traveling the Silk Road.
    WWW Conference.

  • Goffman, E. (1959).
    The Presentation of Self in Everyday Life.
    Anchor Books.

  • Durkheim, E. (1893).
    The Division of Labor in Society.
    (Applied conceptually).

  • Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy.
    Verso.

7.2 Reputation Systems & Trustless Cooperation

  • Christin, N. (2013).
    Traveling the Silk Road.
    WWW Conference.

  • Décary-Hétu, D., et al. (2016).
    Analyzing Darknet Markets.
    International Journal of Drug Policy.

  • Akerlof, G. (1970).
    The Market for Lemons.
    Quarterly Journal of Economics.

  • Axelrod, R. (1984).
    The Evolution of Cooperation.
    Basic Books.

  • Resnick, P., et al. (2000).
    Reputation Systems.
    Communications of the ACM.

  • Holt, T. J. (2013).
    Exploring the Social Organisation of Dark Web Forums.
    Global Crime.

7.3 Underground Ideology Ecosystems

  • Borum, R. (2011).
    Radicalization into Violent Extremism.
    Journal of Strategic Security.

  • Holt, T. J. (2013).
    Exploring the Social Organisation of Dark Web Forums.
    Global Crime.

  • Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy.
    Verso.

  • Sunstein, C. (2009).
    Going to Extremes: How Like Minds Unite and Divide.
    Oxford University Press.

  • Neumann, P. (2013).
    The Trouble with Radicalization.
    International Affairs.

  • Van Wegberg, R., et al. (2018).
    The Lifecycle of Cryptomarkets.
    Crime Science.

7.4 Tribal Identity Formation in Anonymous Groups

  • Tajfel, H., Turner, J. (1979).
    An Integrative Theory of Intergroup Conflict.
    In The Social Psychology of Intergroup Relations.

  • Holt, T. J. (2013).
    Exploring the Social Organisation of Dark Web Forums.
    Global Crime.

  • Durkheim, E. (1912).
    The Elementary Forms of Religious Life.
    (Applied conceptually).

  • Sunstein, C. (2009).
    Going to Extremes.
    Oxford University Press.

  • Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy.
    Verso.

  • Van Wegberg, R., et al. (2018).
    The Lifecycle of Cryptomarkets.
    Crime Science.

7.5 The Psychology of Hidden Social Networks

  • Suler, J. (2004).
    The Online Disinhibition Effect.
    CyberPsychology & Behavior.

  • Festinger, L. (1957).
    A Theory of Cognitive Dissonance.
    Stanford University Press.

  • Bandura, A. (1999).
    Moral Disengagement in the Perpetration of Inhumanities.
    Personality and Social Psychology Review.

  • Sunstein, C. (2009).
    Going to Extremes.
    Oxford University Press.

  • Holt, T. J. (2013).
    Exploring the Social Organisation of Dark Web Forums.
    Global Crime.

  • Décary-Hétu, D., et al. (2016).
    Analyzing Darknet Markets.
    International Journal of Drug Policy.

7.6 The Linguistic Evolution of Darknet Jargon

  1. Labov, W. (1972).
    Sociolinguistic Patterns.
    University of Pennsylvania Press.

  2. Eckert, P. (2000).
    Linguistic Variation as Social Practice.
    Blackwell.

  3. Holt, T. J. (2013).
    Exploring the Social Organisation of Dark Web Forums.
    Global Crime.

  4. Androutsopoulos, J. (2014).
    Mediatization and Sociolinguistic Change.
    De Gruyter.

  5. Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy.
    Verso.

  6. Van Wegberg, R., et al. (2018).
    The Lifecycle of Cryptomarkets.
    Crime Science.

7.7 The Role of Humor, Memes & Symbolism in Hidden Cultures

  • Douglas, M. (1968).
    The Social Control of Cognition: Some Factors in Joke Perception.
    Man.

  • Freud, S. (1905).
    Jokes and Their Relation to the Unconscious.
    (Psychological framing).

  • Shifman, L. (2014).
    Memes in Digital Culture.
    MIT Press.

  • Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy.
    Verso.

  • Holt, T. J. (2013).
    Exploring the Social Organisation of Dark Web Forums.
    Global Crime.

  • Durkheim, E. (1912).
    The Elementary Forms of Religious Life.
    (Symbolism applied conceptually).

7.8 “Nomadic Markets”: Why Markets Jump, Fork, Rebrand

  1. Van Wegberg, R., et al. (2018).
    The Lifecycle of Cryptomarkets.
    Crime Science.

  2. Christin, N. (2013).
    Traveling the Silk Road.
    WWW Conference.

  3. Décary-Hétu, D., Giommoni, L. (2017).
    Do Police Crackdowns Disrupt Drug Cryptomarkets?
    International Journal of Drug Policy.

  4. Holt, T. J. (2013).
    Exploring the Social Organisation of Dark Web Forums.
    Global Crime.

  5. Powell, W., DiMaggio, P. (1991).
    The New Institutionalism in Organizational Analysis.
    University of Chicago Press.

  6. Tilly, C. (2004).
    Social Movements, 1768–2004.
    Paradigm Publishers.

 


8.1 Understanding Incentive Structures Without Focusing on Illicit Trades

  • North, D. (1990).
    Institutions, Institutional Change and Economic Performance.
    Cambridge University Press.

  • Axelrod, R. (1984).
    The Evolution of Cooperation.
    Basic Books.

  • Akerlof, G. (1970).
    The Market for Lemons.
    Quarterly Journal of Economics.

  • Christin, N. (2013).
    Traveling the Silk Road.
    WWW Conference.

  • Décary-Hétu, D., et al. (2016).
    Analyzing Darknet Markets.
    International Journal of Drug Policy.

  • Williamson, O. (1985).
    The Economic Institutions of Capitalism.
    Free Press.

8.2 Cryptocurrencies as Socioeconomic Infrastructure

  1. Nakamoto, S. (2008).
    Bitcoin: A Peer-to-Peer Electronic Cash System.

  2. Narayanan, A., et al. (2016).
    Bitcoin and Cryptocurrency Technologies.
    Princeton University Press.

  3. Böhme, R., et al. (2015).
    Bitcoin: Economics, Technology, and Governance.
    Journal of Economic Perspectives.

  4. Yermack, D. (2017).
    Corporate Governance and Blockchains.
    Review of Finance.

  5. Scott, B. (2016).
    How Can Cryptocurrency and Blockchain Technology Play a Role in Building Social and Solidarity Finance?
    UNRISD.

  6. North, D. (1990).
    Institutions, Institutional Change and Economic Performance.
    Cambridge University Press.

8.3 Privacy Coins: Monero, Zcash, and Their Scientific Designs

  • Nakamoto, S. (2008).
    Bitcoin: A Peer-to-Peer Electronic Cash System.

  • van Saberhagen, N. (2013).
    CryptoNote v2.0.

  • Miers, I., et al. (2013).
    Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
    IEEE Symposium on Security and Privacy.

  • Ben-Sasson, E., et al. (2014).
    SNARKs for C: Verifying Program Executions Succinctly.
    Cryptology ePrint Archive.

  • Böhme, R., et al. (2015).
    Bitcoin: Economics, Technology, and Governance.
    Journal of Economic Perspectives.

  • Kahn Academy / Princeton Cryptocurrency Course Materials (privacy sections).

8.4 Mixing, Tumbling & Decoy Transaction Theory

  • Chaum, D. (1981).
    Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
    Communications of the ACM.

  • Serjantov, A., Danezis, G. (2003).
    Towards an Information-Theoretic Metric for Anonymity.
    PETS.

  • Bonneau, J., et al. (2015).
    SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
    IEEE Symposium on Security and Privacy.

  • Meiklejohn, S., et al. (2013).
    A Fistful of Bitcoins.
    IMC.

  • Narayanan, A., et al. (2016).
    Bitcoin and Cryptocurrency Technologies.
    Princeton University Press.

  • Danezis, G., et al. (2010).
    Statistical Disclosure Control for Anonymous Communications.
    PETS.

8.5 Reputation-Based Economic Systems in Anonymous Markets

  • Akerlof, G. (1970).
    The Market for Lemons.
    Quarterly Journal of Economics.

  • Resnick, P., et al. (2000).
    Reputation Systems.
    Communications of the ACM.

  • Axelrod, R. (1984).
    The Evolution of Cooperation.
    Basic Books.

  • Christin, N. (2013).
    Traveling the Silk Road.
    WWW Conference.

  • Décary-Hétu, D., et al. (2016).
    Analyzing Darknet Markets.
    International Journal of Drug Policy.

  • Williamson, O. (1985).
    The Economic Institutions of Capitalism.
    Free Press.

8.6 Logistics Models of Hidden Online Ecosystems

  • Powell, W., DiMaggio, P. (1991).
    The New Institutionalism in Organizational Analysis.
    University of Chicago Press.

  • Perrow, C. (1984).
    Normal Accidents.
    Basic Books.

  • Taleb, N. N. (2012).
    Antifragile.
    Random House.

  • Christin, N. (2013).
    Traveling the Silk Road.
    WWW Conference.

  • Décary-Hétu, D., et al. (2016).
    Analyzing Darknet Markets.
    International Journal of Drug Policy.

  • Weick, K. (1995).
    Sensemaking in Organizations.
    Sage.

8.7 How Researchers Analyze Market Data Without Participating

  • Christin, N. (2013).
    Traveling the Silk Road.
    WWW Conference.

  • Décary-Hétu, D., Aldridge, J. (2015).
    Sifting Through the Net: Monitoring Darknet Markets.
    European Review of Organised Crime.

  • Van Wegberg, R., et al. (2018).
    The Lifecycle of Cryptomarkets.
    Crime Science.

  • Buchanan, E., Zimmer, M. (2016).
    Internet Research Ethics.
    Stanford Encyclopedia of Philosophy.

  • Association of Internet Researchers (AoIR).
    Ethical Guidelines for Internet Research.

  • Narayanan, A., et al. (2016).
    Bitcoin and Cryptocurrency Technologies.
    Princeton University Press.

 


MODULE 9 — Forensic Science & Digital Investigation on Darknets

9.1 Tor Forensics: What Can Actually Be Recovered

  • Tor Project.
    Tor Design Paper & Threat Model.

  • Murdoch, S. J., Danezis, G. (2005).
    Low-Cost Traffic Analysis of Tor.
    IEEE Symposium on Security and Privacy.

  • Johnson, A., et al. (2013).
    Users Get Routed: Traffic Correlation on Tor.
    CCS.

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

  • US DOJ Court Filings — Expert Testimony on Tor (various cases).

  • ENISA Reports on Anonymity Networks.

9.2 Blockchain Forensics & Behavioral Clustering

  • Meiklejohn, S., et al. (2013).
    A Fistful of Bitcoins.
    Internet Measurement Conference (IMC).

  • Ron, D., Shamir, A. (2013).
    Quantitative Analysis of the Full Bitcoin Transaction Graph.
    Financial Cryptography.

  • Androulaki, E., et al. (2013).
    Evaluating User Privacy in Bitcoin.
    Financial Cryptography.

  • Narayanan, A., et al. (2016).
    Bitcoin and Cryptocurrency Technologies.
    Princeton University Press.

  • Bonneau, J., et al. (2015).
    SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
    IEEE S&P.

  • US DOJ & Europol — Blockchain Forensic Expert Testimony (multiple cases).

9.3 Memory Analysis Techniques in Hidden Service Hosts

  • Ligh, M., et al. (2014).
    The Art of Memory Forensics.
    Wiley.

  • Casey, E. (2011).
    Digital Evidence and Computer Crime.
    Academic Press.

  • Schatz, B., Cohen, M. (2017).
    Digital Forensics in the Cloud.
    Elsevier.

  • ENISA.
    Memory Forensics and Volatile Data Analysis Reports.

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

  • US DOJ Expert Testimony — Volatile Memory Evidence (multiple cases).

9.4 Host Fingerprinting Through Subtle Misconfigurations

  • Zalewski, M. (2012).
    Silence on the Wire.
    No Starch Press.

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

  • Paxson, V. (1999).
    Bro: A System for Detecting Network Intruders.
    Computer Networks.

  • Casey, E. (2011).
    Digital Evidence and Computer Crime.
    Academic Press.

  • ENISA.
    Technical Guidelines on Digital Forensics.

  • US & EU Court Filings — Infrastructure Correlation Evidence (various cases).

9.5 Metadata Leaks in Hosting Environments

  • Casey, E. (2011).
    Digital Evidence and Computer Crime.
    Academic Press.

  • Zuboff, S. (2019).
    The Age of Surveillance Capitalism.
    PublicAffairs. (Metadata theory framing)

  • ENISA.
    Cloud Forensics and Metadata Analysis Reports.

  • Behl, A., Behl, K. (2017).
    Cyberwar and Information Warfare.
    Oxford University Press.

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

  • US & EU Court Decisions referencing metadata evidence (various).

9.6 Detecting Botnets in Hidden Networks

  • Sanatinia, A., Noubir, G. (2015).
    On the Feasibility of Botnet Command and Control Using Tor.
    USENIX Workshop on Offensive Technologies (WOOT).

  • Biryukov, A., Pustogarov, I. (2012).
    Tor-based Botnets: Analysis and Countermeasures.
    NDSS.

  • Afroz, S., et al. (2014).
    Doppelgänger Botnets: Exploring the Ecosystem.
    USENIX Security.

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

  • ENISA.
    Botnet Threat Assessment Reports.

  • Casey, E. (2011).
    Digital Evidence and Computer Crime.
    Academic Press.

9.7 Correlating Hidden Service Behavior With Clearnet Artifacts

  • Casey, E. (2011).
    Digital Evidence and Computer Crime.
    Academic Press.

  • Van Wegberg, R., et al. (2018).
    The Lifecycle of Cryptomarkets.
    Crime Science.

  • Narayanan, A., et al. (2016).
    Bitcoin and Cryptocurrency Technologies.
    Princeton University Press.

  • Buchanan, E., Zimmer, M. (2016).
    Internet Research Ethics.
    Stanford Encyclopedia of Philosophy.

  • ENISA.
    Digital Forensics Correlation Techniques Reports.

  • US & EU Court Opinions referencing timeline and behavioral correlation evidence.

9.8 Intelligence Linking Through Linguistic Stylometry

  • Stamatatos, E. (2009).
    A Survey of Modern Authorship Attribution Methods.
    Journal of the American Society for Information Science and Technology.

  • Juola, P. (2006).
    Authorship Attribution.
    Foundations and Trends in Information Retrieval.

  • Koppel, M., Schler, J., Argamon, S. (2009).
    Computational Methods in Authorship Attribution.
    Journal of the American Society for Information Science.

  • Grant, T. (2010).
    Textual Analysis in Forensic Linguistics.
    International Journal of Speech, Language & the Law.

  • Casey, E. (2011).
    Digital Evidence and Computer Crime.
    Academic Press.

  • ENISA.
    Cyber Forensics and Behavioral Analysis Reports.

 


MODULE 10 — Infrastructure Engineering for Secure Research

10.1 Building a Legally Compliant Research Workstation

  • Association of Internet Researchers (AoIR).
    Ethical Guidelines for Internet Research.

  • Buchanan, E., Zimmer, M. (2016).
    Internet Research Ethics.
    Stanford Encyclopedia of Philosophy.

  • Casey, E. (2011).
    Digital Evidence and Computer Crime.
    Academic Press.

  • ENISA.
    Good Practices for Security Research.

  • OECD (2015).
    Digital Security Risk Management for Economic and Social Prosperity.

10.2 Air-gapped Architectures

  • NIST SP 800-53 & SP 800-171
    System and Information Integrity & Isolation Controls.

  • ENISA.
    Good Practices for Isolated and High-Security Systems.

  • Casey, E. (2011).
    Digital Evidence and Computer Crime.
    Academic Press.

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

  • OECD (2015).
    Digital Security Risk Management.

10.3 Hardware Fingerprint Minimization

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

  • Casey, E. (2011).
    Digital Evidence and Computer Crime.
    Academic Press.

  • NIST SP 800-53.
    System Integrity and Risk Management Controls.

  • ENISA.
    Security-by-Design and Risk Reduction Guidelines.

  • Saltzer, J., Schroeder, M. (1975).
    The Protection of Information in Computer Systems.
    IEEE.

10.4 Virtualization, Sandbox Layers & Network Compartmentalization

  • Saltzer, J., Schroeder, M. (1975).
    The Protection of Information in Computer Systems.
    IEEE.

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

  • NIST SP 800-53.
    System and Communications Protection.

  • ENISA.
    Virtualisation Security and Best Practices.

  • Casey, E. (2011).
    Digital Evidence and Computer Crime.
    Academic Press.

10.5 Secure Environment Logging Without Identity Exposure

  • NIST SP 800-92.
    Guide to Computer Security Log Management.

  • ISO/IEC 27001 & 27002.
    Information Security Logging and Monitoring Controls.

  • Casey, E. (2011).
    Digital Evidence and Computer Crime.
    Academic Press.

  • OECD (2013).
    Privacy Guidelines & Purpose Limitation Principles.

  • Association of Internet Researchers (AoIR).
    Ethical Guidelines for Internet Research.

10.6 How Researchers Prevent Contamination of Personal Identity

  • Association of Internet Researchers (AoIR).
    Ethical Guidelines for Internet Research.

  • Buchanan, E., Zimmer, M. (2016).
    Internet Research Ethics.
    Stanford Encyclopedia of Philosophy.

  • Casey, E. (2011).
    Digital Evidence and Computer Crime.
    Academic Press.

  • OECD (2015).
    Digital Security Risk Management.

  • ISO/IEC 27001.
    Information Security Management Systems.

10.7 Ethical Honeypots: Structure, Purpose, Limitations

  1. Spitzner, L. (2003).
    Honeypots: Tracking Hackers.
    Addison-Wesley.

  2. ENISA.
    Honeypots and Honeynets: Security and Legal Considerations.

  3. Bishop, M., et al. (2011).
    Legal and Ethical Issues in Honeypot Deployment.
    IEEE Security & Privacy.

  4. Association of Internet Researchers (AoIR).
    Ethical Guidelines for Internet Research.

  5. OECD (2015).
    Digital Security Risk Management.

 


MODULE 11 — Anthropology of Hidden Subcultures

11.1 Archetypes of Darknet Actors (Non-criminological, sociological)

  • Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy.
    Verso.

  • Nissenbaum, H. (2010).
    Privacy in Context.
    Stanford University Press.

  • Turkle, S. (1995).
    Life on the Screen.
    MIT Press.

  • boyd, d. (2014).
    It’s Complicated: The Social Lives of Networked Teens.
    Yale University Press.

  • Geertz, C. (1973).
    The Interpretation of Cultures.
    Basic Books.

11.2 Insider vs Outsider Dynamics

  • Goffman, E. (1959).
    The Presentation of Self in Everyday Life.
    Anchor Books.

  • Geertz, C. (1973).
    The Interpretation of Cultures.
    Basic Books.

  • Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy.
    Verso.

  • Bourdieu, P. (1984).
    Distinction: A Social Critique of the Judgement of Taste.
    Harvard University Press.

  • boyd, d. (2014).
    It’s Complicated.
    Yale University Press.

11.3 Rituals, Initiation, Status Symbols

  • Turner, V. (1969).
    The Ritual Process.
    Aldine.

  • Bourdieu, P. (1986).
    The Forms of Capital.
    Greenwood.

  • Geertz, C. (1973).
    The Interpretation of Cultures.
    Basic Books.

  • Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy.
    Verso.

  • Goffman, E. (1967).
    Interaction Ritual.
    Anchor Books.

11.4 The Semiotics (Sign Systems) of Darknet Communities

  • Geertz, C. (1973).
    The Interpretation of Cultures.
    Basic Books.

  • Saussure, F. de (1916).
    Course in General Linguistics.

  • Barthes, R. (1972).
    Mythologies.
    Hill and Wang.

  • Eco, U. (1976).
    A Theory of Semiotics.
    Indiana University Press.

  • Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy.
    Verso.

11.5 Humor, Trolling, and Identity Masking

  • Bakhtin, M. (1968).
    Rabelais and His World.
    MIT Press.

  • Goffman, E. (1959).
    The Presentation of Self in Everyday Life.
    Anchor Books.

  • Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy.
    Verso.

  • Phillips, W. (2015).
    This Is Why We Can’t Have Nice Things.
    MIT Press.

  • Douglas, M. (1968).
    The Social Control of Cognition.
    Routledge.

11.6 How Online Anonymity Shapes Morality

  • Zimbardo, P. (1969).
    The Human Choice: Individuation, Reason, and Order vs Deindividuation.
    Nebraska Symposium on Motivation.

  • Suler, J. (2004).
    The Online Disinhibition Effect.
    CyberPsychology & Behavior.

  • Bauman, Z. (1993).
    Postmodern Ethics.
    Blackwell.

  • Turkle, S. (1995).
    Life on the Screen.
    MIT Press.

  • Durkheim, É. (1893).
    The Division of Labor in Society.

11.7 Comparative Study: Deep-Web Communities vs Regular Internet Subcultures

  • boyd, d. (2014).
    It’s Complicated: The Social Lives of Networked Teens.
    Yale University Press.

  • Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy.
    Verso.

  • Turkle, S. (1995).
    Life on the Screen.
    MIT Press.

  • Geertz, C. (1973).
    The Interpretation of Cultures.
    Basic Books.

  • Durkheim, É. (1895).
    The Rules of Sociological Method.

 


MODULE 12 — Content Delivery & Hidden Service Mechanics

12.1 Data Caching in Anonymous Networks

  • Tor Project.
    Tor Design Paper & Threat Model.

  • Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium.

  • Goldberg, I. (2002).
    Privacy-Enhancing Technologies.
    Springer.

  • Anderson, R. (2008).
    Security Engineering.
    Wiley.

  • ENISA.
    Anonymity Networks and Traffic Analysis Resistance.

12.2 Why Darknet Sites Are Slow: Root Causes

  • Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router. USENIX.

  • Tor Project.
    Tor Network Performance Metrics & Design Documentation.

  • Anderson, R. (2008).
    Security Engineering. Wiley.

  • Goldberg, I., et al. (2012).
    Privacy-Enhancing Technologies. Springer.

  • ENISA.
    Traffic Analysis and Anonymity Networks.

12.3 The Architecture of Onion Mirrors

  • Tor Project.
    Onion Services Design Documentation.

  • Dingledine, R., Syverson, P. (2004).
    Tor Design and Threat Model. USENIX.

  • Anderson, R. (2008).
    Security Engineering. Wiley.

  • ENISA.
    Resilience and Availability in Anonymous Networks.

  • Goldberg, I. (2010).
    Privacy-Enhancing Technologies. Springer.

12.4 Captchas & Abuse Prevention Under Anonymity Constraints

  • Tor Project.
    Tor Abuse Mitigation and Network Health Documentation.

  • Biryukov, A., et al. (2014).
    Content and Popularity Analysis in Tor Hidden Services.
    NDSS Symposium.

  • Dwork, C., Naor, M. (1992).
    Pricing via Processing or Combatting Junk Mail.
    CRYPTO.

  • Goldberg, I. (2002).
    Privacy-Enhancing Technologies. Springer.

  • ENISA.
    Abuse and Misuse in Anonymity Networks.

12.5 Darknet Search Engines: How They Crawl Hidden Services

  • Biryukov, A., et al. (2014).
    Content and Popularity Analysis of Tor Hidden Services. NDSS.

  • Tor Project.
    Onion Services and Discovery Documentation.

  • Anderson, R. (2008).
    Security Engineering. Wiley.

  • Goldberg, I. (2002).
    Privacy-Enhancing Technologies. Springer.

  • ENISA.
    Anonymity Networks: Discovery and Metadata Risks.

12.6 Protocol-Level Challenges of Hosting Anonymous Media

  • Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router. USENIX.

  • Tor Project.
    Tor Network Performance and Design Documentation.

  • Anderson, R. (2008).
    Security Engineering. Wiley.

  • Goldberg, I. (2010).
    Privacy-Enhancing Technologies. Springer.

  • ENISA.
    Traffic Analysis and Bandwidth Abuse in Anonymity Networks.

12.7 The Rise of Decentralized Hidden Host Networks

  • Anderson, R. (2008).
    Security Engineering. Wiley.

  • Dingledine, R., Syverson, P.
    Tor Design and Threat Model.

  • Stoica, I., et al. (2001).
    Chord: A Scalable Peer-to-Peer Lookup Service. SIGCOMM.

  • Goldberg, I. (2010).
    Privacy-Enhancing Technologies. Springer.

  • ENISA.
    Decentralisation, Resilience, and Anonymity Networks.

 


MODULE 13 — Metadata Science

13.1 The Science of Metadata in Anonymous Systems

  • Mayer, J., & Mitchell, J. (2012).
    Third-Party Web Tracking: Policy and Technology. IEEE.

  • Dingledine, R., Mathewson, N., Syverson, P. (2004).
    Tor: The Second-Generation Onion Router. USENIX.

  • Narayanan, A., Shmatikov, V. (2009).
    De-anonymizing Social Networks. IEEE Symposium on Security & Privacy.

  • Greenwald, G. (2014).
    No Place to Hide. Metropolitan Books.

  • ENISA.
    Metadata and Traffic Analysis Risks in Anonymity Networks.

13.2 Behavioral Metadata: Timing, Frequency, Patterns

  • Narayanan, A., & Shmatikov, V. (2009).
    De-anonymizing Social Networks. IEEE Symposium on Security & Privacy.

  • Danezis, G., & Clayton, R. (2006).
    Introducing Traffic Analysis. Digital Privacy.

  • Suler, J. (2004).
    The Online Disinhibition Effect. CyberPsychology & Behavior.

  • ENISA.
    Behavioral and Traffic Analysis in Anonymity Networks.

  • Barabási, A.-L. (2010).
    Bursts: The Hidden Pattern Behind Everything We Do. Penguin.

13.3 Machine Learning Models for Activity Typing

  • Herrmann, D., Wendolsky, R., & Federrath, H. (2009).
    Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies. CCS.

  • Panchenko, A., et al. (2016).
    Website Fingerprinting at Internet Scale. NDSS.

  • Danezis, G. (2010).
    Traffic Analysis of the Tor Network. PETS.

  • Bishop, C. M. (2006).
    Pattern Recognition and Machine Learning. Springer.

  • ENISA.
    Machine Learning and Traffic Analysis in Privacy Networks.

13.4 Ethical Boundaries for Metadata Collection

  • Belmont Report (1979).
    Ethical Principles and Guidelines for the Protection of Human Subjects of Research.

  • Narayanan, A., & Shmatikov, V. (2009).
    De-anonymizing Social Networks. IEEE S&P.

  • Ohm, P. (2010).
    Broken Promises of Privacy. UCLA Law Review.

  • ENISA.
    Ethical Considerations of Metadata and Traffic Analysis.

  • Floridi, L., & Taddeo, M. (2016).
    What Is Data Ethics? Philosophical Transactions of the Royal Society A.

13.5 Advanced Fingerprinting Methods in Academic Literature

  • Herrmann, D., Wendolsky, R., & Federrath, H. (2009).
    Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies. CCS.

  • Panchenko, A., et al. (2016).
    Website Fingerprinting at Internet Scale. NDSS.

  • Juarez, M., et al. (2014).
    A Critical Evaluation of Website Fingerprinting Attacks. CCS.

  • Danezis, G. (2010).
    Traffic Analysis of the Tor Network. PETS.

  • Tor Project.
    Research on Traffic Analysis Resistance.

13.6 Hidden Markov Models for Traffic Flow Analysis

  • Rabiner, L. R. (1989).
    A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of the IEEE.

  • Danezis, G., & Clayton, R. (2006).
    Introducing Traffic Analysis. Digital Privacy.

  • Shalizi, C. R., & Crutchfield, J. P. (2001).
    Computational Mechanics: Pattern and Prediction. Journal of Statistical Physics.

  • Bishop, C. M. (2006).
    Pattern Recognition and Machine Learning. Springer.

  • ENISA.
    Sequential Traffic Analysis Models in Anonymity Networks.

13.7 Noise Injection Models & Anti-Fingerprinting Techniques

  • Danezis, G., & Clayton, R. (2006).
    Route Fingerprinting in Anonymous Communications. PETS.

  • Juarez, M., et al. (2014).
    Toward an Efficient Website Fingerprinting Defense. ESORICS.

  • Shmatikov, V., & Wang, M.-H. (2006).
    Timing Analysis in Low-Latency Mix Networks. ESORICS.

  • Bishop, C. M. (2006).
    Pattern Recognition and Machine Learning. Springer.

  • ENISA.
    Traffic Obfuscation and Noise-Based Privacy Defenses.

 


MODULE 14 — The Future of Darknets

14.1 Post-Quantum Darknet Proposals

  • Bernstein, D. J., Buchmann, J., Dahmen, E. (2009).
    Post-Quantum Cryptography. Springer.

  • NIST.
    Post-Quantum Cryptography Standardization Project.

  • Alagic, G., et al. (2020).
    Status Report on the Second Round of the NIST PQC Process.

  • Tor Project Research Team.
    Cryptographic Agility and Post-Quantum Considerations.

  • Mosca, M. (2018).
    Cybersecurity in an Era with Quantum Computers. IEEE Security & Privacy.

14.2 AI-Assisted Privacy Tools

  • Juarez, M., et al. (2014).
    Toward an Efficient Website Fingerprinting Defense. ESORICS.

  • Abadi, M., et al. (2016).
    Deep Learning with Differential Privacy. CCS.

  • Papernot, N., et al. (2017).
    Semi-Supervised Knowledge Transfer for Deep Learning from Private Training Data. ICLR.

  • Tor Project Research Team.
    Machine Learning and Anonymity Defense Research.

  • ENISA.
    Artificial Intelligence and Privacy-Enhancing Technologies.

14.3 Meritocratic & DAO-Style Hidden Communities

  • Ostrom, E. (1990).
    Governing the Commons. Cambridge University Press.

  • Buterin, V. (2014).
    DAOs, DACs, DAs and More. Ethereum Blog.

  • Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy. Verso.

  • De Filippi, P., & Wright, A. (2018).
    Blockchain and the Law. Harvard University Press.

  • ENISA.
    Decentralized Governance and Trust Models.

14.4 Darknets in Space: Mesh Networks in LEO Satellite Constellations

  • Handley, M. (2018).
    Delay is Not an Option: Low Latency Routing in Space. ACM SIGCOMM.

  • Bhattacherjee, D., et al. (2020).
    Gearing Up for the 21st Century Space Race. HotNets.

  • Kassing, S., et al. (2022).
    Routing in Mega-Constellations. IEEE/ACM TON.

  • Cerf, V., et al. (2015).
    Delay-Tolerant Networking Architecture. RFC 4838.

  • ENISA.
    Satellite Communications and Network Security.

14.5 Decentralized Identity & Anonymous Credentials

  • Chaum, D. (1985).
    Security Without Identification: Transaction Systems to Make Big Brother Obsolete. CACM.

  • Camenisch, J., & Lysyanskaya, A. (2001).
    An Efficient System for Non-transferable Anonymous Credentials. EUROCRYPT.

  • Boneh, D., et al. (2019).
    Zexe: Enabling Decentralized Private Computation. IEEE S&P.

  • W3C.
    Decentralized Identifiers (DIDs) Specification.

  • ENISA.
    Privacy-Preserving Identity Management Systems.

14.6 Next-Generation Mixnets

  • Chaum, D. (1981).
    Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. CACM.

  • Danezis, G., & Sassaman, L. (2003).
    Heartbeat Traffic to Counter (n−1) Attacks. PETS.

  • Danezis, G., et al. (2015).
    Sphinx: A Compact and Provably Secure Mix Format. IEEE S&P.

  • Loopix Project.
    Mix Network Design for Low-Latency Messaging.

  • ENISA.
    Mix Networks and Traffic Analysis Resistance.

14.7 Predictions for the 2030–2040 Hidden Internet Landscape

  • Dingledine, R., et al.
    Tor: Design, Threat Models, and Future Directions.

  • Narayanan, A., et al. (2020).
    Limits of Privacy and the Future of Anonymity. Princeton CITP.

  • Green & Smith (2016).
    The Cryptopals Crypto Challenges and Real-World Cryptography.

  • ENISA.
    Future Trends in Privacy-Enhancing Technologies.

  • Solove, D. J. (2021).
    Privacy and Power. Harvard Law Review.

 


MODULE 15 — The Philosophy & Ethics of Hidden Systems

15.1 The Paradox of Anonymity: Freedom vs Abuse

  • United Nations (1948).
    Universal Declaration of Human Rights, Article 12.

  • United Nations (1966).
    International Covenant on Civil and Political Rights, Article 17.

  • European Court of Human Rights.
    Article 8 Jurisprudence.

  • Westin, A. F. (1967).
    Privacy and Freedom. Atheneum.

  • Solove, D. J. (2008).
    Understanding Privacy. Harvard University Press.

15.2 Privacy as a Human Right

  • United Nations (1948).
    Universal Declaration of Human Rights, Article 12.

  • United Nations (1966).
    International Covenant on Civil and Political Rights, Article 17.

  • European Court of Human Rights.
    Article 8 Jurisprudence.

  • Westin, A. F. (1967).
    Privacy and Freedom. Atheneum.

  • Solove, D. J. (2008).
    Understanding Privacy. Harvard University Press.

15.3 The Moral Structures of Non-Attributed Societies

  • Zimbardo, P. (1969).
    The Human Choice: Individuation, Reason, and Order vs. Deindividuation, Impulse, and Chaos.

  • Suler, J. (2004).
    The Online Disinhibition Effect. CyberPsychology & Behavior.

  • Bandura, A. (1999).
    Moral Disengagement in the Perpetration of Inhumanities. Personality and Social Psychology Review.

  • Kahneman, D. (2011).
    Thinking, Fast and Slow. Farrar, Straus and Giroux.

  • Nissenbaum, H. (2010).
    Privacy in Context. Stanford University Press.

15.4 How Hidden Systems Shape Human Behavior

  • Arendt, H. (1958).
    The Human Condition. University of Chicago Press.

  • Arendt, H. (1971).
    The Origins of Totalitarianism. Harcourt Brace.

  • Foucault, M. (1975).
    Discipline and Punish. Vintage Books.

  • Ellul, J. (1964).
    The Technological Society. Vintage Books.

  • Lyon, D. (2007).
    Surveillance Studies. Polity Press.

15.5 Philosophers on Secrecy (Arendt, Foucault, Ellul)

  • Belmont Report (1979).
    Ethical Principles and Guidelines for the Protection of Human Subjects of Research.

  • Association of Internet Researchers (AoIR).
    Ethical Decision-Making and Internet Research.

  • Zuboff, S. (2019).
    The Age of Surveillance Capitalism. PublicAffairs.

  • ENISA.
    Ethics in Cybersecurity Research.

  • Greenwald, G. (2014).
    No Place to Hide. Metropolitan Books.

15.6 Ethical Darknet Journalism & Research Methodologies

  • Arendt, H. (1958).
    The Human Condition. University of Chicago Press.

  • Nissenbaum, H. (2010).
    Privacy in Context. Stanford University Press.

  • Solove, D. J. (2021).
    Privacy and Power. Harvard Law Review.

  • Floridi, L. (2014).
    The Ethics of Information. Oxford University Press.

  • ENISA.
    Principles for Privacy-Enhancing Technologies.

15.7 Building a Better Anonymous Internet

  • Creswell, J. W. (2014).
    Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage.

  • Yin, R. K. (2018).
    Case Study Research and Applications. Sage.

  • Floridi, L. (2014).
    The Ethics of Information. Oxford University Press.

  • ENISA.
    Research Ethics in Cybersecurity and Privacy Studies.

  • Association of Internet Researchers (AoIR).
    Ethical Decision-Making and Internet Research.

 


MODULE 16 — Capstone Research Projects

16.1 Multidisciplinary Analysis Project

  • Danezis, G., & Diaz, C. (2008).
    A Survey of Anonymous Communication Channels. Technical Report, KU Leuven.

  • Murdoch, S. J., & Danezis, G. (2005).
    Low-Cost Traffic Analysis of Tor. IEEE Symposium on Security & Privacy.

  • Shalizi, C. R. (2006).
    Methods and Techniques of Complex Systems Science. Santa Fe Institute.

  • Creswell, J. W. (2014).
    Research Design. Sage Publications.

  • ENISA.
    Ethical Experimentation in Cybersecurity Research.

16.2 Technical Research: Build a Model Darknet Simulator

  • Geertz, C. (1973).
    The Interpretation of Cultures. Basic Books.

  • Hammersley, M., & Atkinson, P. (2007).
    Ethnography: Principles in Practice. Routledge.

  • Association of Internet Researchers (AoIR).
    Ethical Decision-Making and Internet Research.

  • Coleman, G. (2014).
    Hacker, Hoaxer, Whistleblower, Spy. Verso.

  • ENISA.
    Ethics in Sociotechnical Security Research.

16.3 Sociological Field-Study Report (Non-participatory)

  • Tufte, E. R. (2001).
    The Visual Display of Quantitative Information. Graphics Press.

  • Cairo, A. (2016).
    The Truthful Art. New Riders.

  • Munzner, T. (2014).
    Visualization Analysis and Design. CRC Press.

  • Narayanan, A., & Shmatikov, V. (2009).
    De-anonymizing Social Networks. IEEE S&P.

  • ENISA.
    Ethical Visualization of Security and Privacy Data.

16.4 Metadata Visualization Dashboard

  • Belmont Report (1979).
    Ethical Principles and Guidelines for the Protection of Human Subjects of Research.

  • Floridi, L. (2014).
    The Ethics of Information. Oxford University Press.

  • Association of Internet Researchers (AoIR).
    Ethical Decision-Making and Internet Research.

  • ENISA.
    Research Ethics and Secure Methodologies in Cybersecurity.

  • Creswell, J. W. (2014).
    Research Design. Sage Publications.

16.5 Secure Research Methodology Paper

  • National Academies of Sciences (2017).
    Dual Use Research of Concern in the Life Sciences.

  • ENISA.
    Responsible Disclosure and Publication in Security Research.

  • Floridi, L., & Taddeo, M. (2016).
    What Is Data Ethics? Philosophical Transactions of the Royal Society A.

  • COPE (Committee on Publication Ethics).
    Guidelines on Good Publication Practice.

  • Resnik, D. B. (2011).
    What Is Ethics in Research & Why Is It Important? NIH.

16.6 Panel Review & Publication Preparation

  • National Academies of Sciences (2017).
    Dual Use Research of Concern in the Life Sciences.

  • ENISA.
    Responsible Disclosure and Publication in Security Research.

  • Floridi, L., & Taddeo, M. (2016).
    What Is Data Ethics? Philosophical Transactions of the Royal Society A.

  • COPE (Committee on Publication Ethics).
    Guidelines on Good Publication Practice.

  • Resnik, D. B. (2011).
    What Is Ethics in Research & Why Is It Important? NIH.

 

docs