Any views expressed within media held on this service are those of the contributors, should not be taken as approved or endorsed by the University, and do not necessarily reflect the views of the University in respect of any particular issue.
As Olivia Rodrigo so wisely said ‘it’s brutal out there’. But we are never so brutal as with ourselves.
Apply widely and be adaptable – you can fit into more posts and get something from them than you may realise. Recognise what they are looking for.
Aim high and value yourself – even if you do not get it you will get on people’s radar.
Show ambition for yourself and them – it is exciting to think how you might energise a place.
Before you begin think through why you want the job, what you will do with the post and where it will take you. That last step is the most important. Every job leads somewhere. Think ahead to where you will be in a year or two if you were to take up the post, what you would have liked to have made happen in it, and put that in the your cover letter. Talk over with a more senior colleague/your PhD supervisor about what the post is asking for and how it fits with your goals. Look at the job requirements and be strict with yourself. Is there anything missing and what can you do about it? As an example: many lecture jobs ask for experience of course leadership which is hard to obtain as a PhD student. Something you can do to bridge that gap is design a course that would be taught if you get the post, lay out the curriculum, course themes and so on. You do not need to actually do it, just show that you have potential. For your research, show your publication plan and your intentions as well as what you have done. Demonstrate you recognise and can meet the demands of the post even if you might not have met them all yet.
Some specific advice about your application:
Write your cover letter for the job you are applying for. When applying for a teaching position do not write an epic 4+ page cover letter detailing your interesting research and then have half a paragraph at the end about your teaching. It makes it seem like you do not really care about the job. Put that bit up front.
ALSO do not write epic 4+ page cover letters. Cover letters should be 2 sides maximum. Try and hit all the requirements in the job specification. Tell your story about your take on the post, what you want to bring with it and do with it. You are a whole package, so show that. Use the language of the job specification in the letter.
Structure your cover letter as a 3-step: Here is why I want the job, and why I am the best fit for it, here are a few examples of why that is the case and here is what I would do if I got the job. The cover letter should show the challenges you met and what happened as a result of the fabulous work you did. Do not rely on anything to speak for itself. For example:
“One of the big challenges in higher education is giving students feedback they value. I asked the students I was tutoring what they did with their feedback and most were not using it. I scheduled a session where we read our feedback together. I then held a session for other tutors and lecturers showing how this improved student satisfaction with their feedback”. This example shows: your ability to think about the bigger picture, to recognise a problem and address it, and show leadership in bringing your solution to others. It could be done as one of the ‘fill in’ examples I mention above. If you are a tutor you could easily do that in preparation for your job applications to show your nascent leadership skills. Then you can show how the job might allow you scale that up into something more ambitious.
Teaching qualifications are really starting to matter, both in themselves and because they help you reflect on your teaching in the way described above. So do take the Edinburgh Teaching Award or equivalent Advance HE qualification. Look at the Advance HE professional standards framework and draw on that language in your application. Again show how this helped you, where it took you. Applications should be forward looking.
Rule 3.5 They have to want you. But you also have to want them. Do not flay yourself for a job that is not for you.
In my quest to expose the writing process I have structured this paper using named paragraphs. Each paragraph has a title showing the purpose it performs as part of the overall paper structure. This should help putting the paper together as a coherent argument, showing how each bit adds to the whole. Here we go:
A crime script analysis of vendor of forged US dollars and their community
Abstract
This article presents a crime script analysis of a darknet cryptomarket based counterfeit currency vendor and their community, putting the script into a technical-material context. It outlines the two interlinked crime scripts covering the last two stages of the counterfeit currency distribution system, for the currency vendor and middleman, ‘Benjamin’, and the buyer who will use the currency. The discussion forum allows each script to be fine tuned and creates feedback for the vendor on the quality and effectiveness of the notes. The online community is critical to the distribution of the notes and to their effective use.
Introduction: Community developed modus operandi
What the study does: This paper describes the final stages of a counterfeit currency distribution network operating using a Tor darknet cryptomarket, covering the phase from secondary distribution to retail use. The cryptomarket is shown to function as the ‘last mile’ distributor (Dittus, Wright, and Graham 2017) of counterfeit currency to buyers who will use it in the field, either individually or in tandem with an organised group. The case shows an example of a functioning supply chain from producer to final user and demonstrates how the darknet functions as both a distribution mechanism for the product and a learning environment for distributor and users, where they share user defined crime scripts for the successful use of counterfeit currency. The paper focuses mainly on the process by which users develop and test effective crime scripts, what it tells about their priorities, their accounts of motive, and how they position themselves in relation to the wider illicit economy.
Suggest an audience: Counterfeiting is tackled by a range of bodies including the specialist policing taskforces such as the UK National Crime Agency Central Office for the Suppression of Counterfeit Currency and Protected Coins, central banks, and retailer/banking business organisations . Why it matters: Forged currency involves immediate risks to those handling the notes and longer term potential harms in damaging trust in the cash economy. There is a concentration of harm among frontline staff and smaller businesses. Cashiers or waiting staff who unwittingly handle fake notes might have their wages docked or be prosecuted. Smaller businesses which handle more cash will likewise be more at risk. It damages trust and costs are socialised to the rest of the economy. The most cash depending demographic in society is also the part of the population that has least access to banking systems and credit and are most reliant on cash for paying and being paid. As economies become more digitised and cash is steadily squeezed out of mainstream payment processes the harm of counterfeiting is increasingly concentrated among the more marginalized groups. Concerted efforts to tackle counterfeiting by reducing dependence on cash and actively targeting counterfeiting does not improve their position nor create alternative routes to finance for them. In fact it may have a damaging effect on the unbanked swathe of society, particularly in developing country contexts (Wang 2020).
Get this in proportion: Currency counterfeiting is relatively uncommon in the West. In 2003 the US Federal Reserve estimated that less than 1 in 10000 currency notes were counterfeit (Judson and Porter 2003), a result also reported for the Canadian dollar (Chant 2004) and estimated at 1 in 40,000 for the UK Pound Sterling (Bank of England 2022) and 1 in 14000 for the Mexican peso [Bank of Mexico]. Counterfeiting of the Indian Rupee is more common and appears to be rising significantly from 2019 (Reserve Bank of India 2019, 2022). Money laundering through electronic means and crimes such as cheque fraud and card-not-present fraud are much more significant in terms of loss and harmful in spreading corruption and funding the activities of organised criminal groups. Changes in the era of debt led/credit fueled capitalism have further limited the opportunities for counterfeiting currency when more lucrative rewards lie in defrauding the banking sector (Kahn and Roberds 2008). Improved detection of fakes and improved note design have increased the technical demands on counterfeiters. Despite that there is still enough of an incentive for the practice to persist and even grow among some currencies such as the rupee, while there has in contrast been a decline in counterfeit euro circulation.
We should still care: Despite the challenges presented to counterfeiters, money forgery persists. It evolves and shifts with the value put on various cash types and denominations, and the security/detection technology employed by central banks. Increasingly banknotes are designed as one element of a technological whole which encompasses processing and detection technologies. The rise of automated processing points such as supermarket autopay terminals changes the process away from human detection. Machines can be designed to be more sensitive to particular aspects of the note such as precise weight or shape. These changed technological assemblages shift common understandings of what cash is in symbolic and practical terms, for example, from a store of capital to an object of value that can vary independently of its stated face value (Lemon 1998).
Hinge – it’s a niche but an interesting one: Much research and intervention focuses on electronic money laundering and large scale counterfeiting. The growth in currency during 2020/21 also makes it likely that there are more opportunities for counterfeiting. Narrative justification: Forgery may be beginning to matter more. At November 2021, US currency in circulation amounted to 2,116.4 US$ billion in seasonally adjusted figures, 9.9% of the M2 money supply (Board of Governors of the Federal Reserve 2021). Up to two thirds of the cash dollar supply is held outwith the USA [find another reference]. Despite the general move to digital payments, the cash supply has steadily grown throughout 2020/21 along with a broad increase in the money supply. The growth reflects central banks’ intervention in the economy under the Covid-19 pandemic. Counterfeit seizure rates have also fallen dramatically.
A theoretical postulate shows my contribution: The role of counterfeiting the crime business model. The main problem in maintaining the counterfeit currency economy is that to have any use value notes must circulate into the real economy quickly and in so doing are effectively nullified. They are detected and eliminated or become in any case useless to criminals. Criminals depend on that to wash fake notes into real money or goods. As a result the counterfeit economy is inherently parasitic on both the legal and illegal economies and is no way self sustaining. Furthermore there a tension in the business model. To make the most counterfeit notes need to be of high value ($50 and $100) which are likely to attract more scrutiny when used. The largest value is in these denominations and the largest number of notes in circulation are $100. Many more transactions will have to take place to put them into use, raising the time and labour cost. All that makes it difficult to keep a counterfeit currency business going.
The topic in techno-social history: Digital crime is a technosocial construct. It is a hybrid of different systems and exploits. Technological demand/affordances matter. Counterfeit currency is characterised by many embedded techno-material factors such as the advent of desktop publishing and laser printing. The US Federal Reserve in 2003 note the cost of creating plausible counterfeits (Judson and Porter 2003). However distributed digitally enabled manufacturing appears to have brought some of the startup/fixed capital costs down (Li and Rocheteau 2011) and offset lithography can produce quality notes rapidly (NCA). Distribution is still very costly as they must be widely spread in order to be successful used. That may be an area where things have changed given the expansion in money mule and other distributed money laundering activity which lends itself more easily to counterfeit currency distribution.
Introduce the conceptual construct: the criminal community shares and tests the crime script against real world practice. Scripts are not wholly evolved and are going to be adapted all the time. The community closes the loop on that. The crime script consists of three basic stages prepare/pre-empt, doing/actualizing, end state/reset. It has to function as a whole set, a failure in one element cause the script to cease functioning. The crime script encapsulates the conditions for the act to occur, the preparation, entry/action and exit requirements and the post-condition. Dividing the script into its strategic and tactical components allows interventions to be planned which disrupt the criminal opportunity.
Second contribution I make: I analyse the technology used in material terms rather than as the crime medium. Beyond tech as a modality/fabric for crime (Van Nguyen 2021) and onto tech as a material context constitutive of actors. Given how embedded technology is in everyday life (Hine 2015) and the rise of crime as a service we can move past the idea of technology as a quality existing on a scale, from cyber-assisted through cyber-enabled to cyber-dependent. As technology is now so embedded we have to move past that and think of tech as part of the material matrix. Consider a phone scam that’s highly centralised, using phone lists, combines high and low tech. A helpline fraud might use largely the same setup and be fairly low tech given the tools they use are basic – hence the high level of hacking back against them. So tech is mostly too mixed and crime is too mixed skill to make this determination. [analysis should reflect this – be sensitive to different types of action/interaction]. Embedded security features in currency – polymer notes, holograms and other design features. These features also work as part of a whole system so that tellers can spot fakes.
Show direction: This article will examine the micro-process of last mile distribution and the interface between user purchase and practice. Research Questions this paper addresses:
What crime scripts are used by currency vendors and buyers?
How do counterfeit vendor and user make use of the technical/material qualities of the notes?
How does the social structure of the vendor-user relationship work with or against the CS?
How does counterfeit currency operate as part of its own technical assemblage
Method
The field make an effective case study because: Cryptomarkets are open, anonymous markets hosted using the Tor onion hosting service. Combined with bitcoin or another cryptocurrency payment system they allow goods to be sold in relative anonymity and without buyer and seller meeting. The seller posts a product listing and the buyer pays using a decentralised cryptocurrency which is held in market escrow. The drug package is sent to them through postal service, courier or dead drop. On receipt, or after a certain amount of time has elapsed, the payment is released to the seller. At least in theory that is the process, however increasingly sellers requirement payments immediately, showing that the power lies in the market with them. The process was adapted for sellers of counterfeit dollars.
How the large case set links to the concept: Cryptomarkets are a place of ‘offender convergence’ (Felson 2006) characterized by ‘extended co-offending’ (Felson 2009), and they have some unique qualities as criminogenic spaces. Offenders can liaise and share intelligence and material without meeting. They provide a quality feedback loop where buyers discuss and compare products. They can be a testing ground for new products and new criminal business models. The particular cryptomarket hosting Benjamin is an open model. Anyone can join. Most goods and services can be offered, other than child pornography. Vendors may restrict customers according to location, willingness to spend, or a preexisting relationship.
The research design is constrained by the data: The project uses a single case study of a discussion between counterfeit dollar vendor and their customers. The discussion takes place over a long time period, allowing the evolving practice of both vendor and users to be followed. Mapping vendor and user crime scripts allowed me to systematise my understanding of their practice and develop a generalised outline of each players’ approach to executing their crime.
The paper makes a methodological contribution: Methodologically, the paper addresses a challenge of criminological research with dispersed entities, non-synchronous interactions, non-human. Draw on existing social research such as ethnography of infrastructures, multi-sited ethnography, hybrid ethnography ‘Material’ = : I analyse the technology used in material terms rather than as the crime medium. Beyond tech as a modality/fabric for crime and onto tech as a material context constitutive of actors.
Outline the general processof how I got here: Crime script analysis is a sequence analysis method of criminal knowledge formation. It follows four broad stages: Preparation – identification of opportunity and means. Assembly – putting the criminal into place, assembling the necessary precursors. Commission – the crime commission itself. Post-activity – getting away, extracting value, other necessary end states to reset the sequence (Chainey and Alonso Berbotto 2021). Each stage can be broken down into further elements depending on need. Dehghanniri and Borrion (2016) model the process to produce the crime script. The first step defines the problem, such as wage theft or dumping waste in the environment. It also shows what the crime script is intended to do which guides the analyst to the level of detail needed. An analysis that will be used in deploying surveillance will have different needs to one which seeks to change compliance rules. The second step elaborates the information requirements which flow from that: the analyst might be interested more in how this crime is committed, who is involved, and/or what facilitates it. The narrative analysis was key to allowing me to understand much more about how the script was developed and finessed by the group.
The specific process, neatly: The discussion was first open coded and then recoded according to the crime script stages for both the vendor and currency users as in table 1. Critical stages, cast and conditions for each process, vendor and user, were identified as detailed by Thompson and Chainey (2011). Contextualisation codes such as ‘Deference to community’ were also created. Context codes were in part derived from the existing literature, for example, the importance of claims to ‘insider’ roles and knowledge (Holt and Lee 2020). This was done in order to place the CSA in a material context. Matrix coding was then conducted cross tabulating the contextualizing codes with the CSA codes. These codes fed into the crime script coding, for example, technical features were coded and then distributed according to their function in the precondition/actualisation parts of the script. That exposed the technical, stealth, performative and organisational features at different stages of the CS execution. Cases were created for each contributor to the forum and the attribute function was used to record their role/stance. Text was coded to every contributor. Possible roles were: vendor, valid buyer, sock puppet. The forum has 72 cases of which x were xx. Vignettes were created for each participant, providing a sketch of their participation, for example, whether they changed position or left over time. Open data principles have been applied. The dataset is available and archived by the University of Edinburgh.
Findings
Meta criminal context: Benjamin (gender unknown) is a re-seller for the supplier Willy.Clock who had developed a public profile at the time and was known to the other members of the forum, and who was supported by another distributor, Mr. Mouse (Krebs 2014). Willy.clock is a Uganda based counterfeiter, Ryan Andrew Gustafson who was arrested in 2014 and who pled guilty in 2018 to charges of counterfeiting.
There is a network of sites validating each other so participants do not take anything on trust: Another onion site hosted support for note users and was used to validate the identities of distributors as a basic authenticity check. There was a well known distribution logic at work: The NCA states that criminal networks operate by breaking bulk production into smaller units that can be distributed and used by lower level criminals, so this appears to be a case of that being done. Benjamin introduces themselves in what becomes a long thread where buyers return to critique their product and debate how it should be used. Benjamin responds by defending the product, saying that buyers are using it improperly, and eventually agreeing that the counterfeit notes are not what they were.
Define the process in stages: The process is one of a spiral where the notes are tested in real world use and refined. The scrip derived from Benjamin and friends is therefore part of a meta-crime script involving the testing and innovation of the production process. Benjamin’s second stage role meant they could palm off some of the responsibility for poor quality product onto the supplier. The discussion was characterised by in depth explorations of the technical features of the notes, their consistency and reliability. Some participants appeared to be much closer to Benjamin and interacted with them outside the forum via a messaging service. Contributors ranged from these close accomplices to more casual users of the notes who were much less committed to the crime script.
The group context: To an extent the group as a whole worked on developing their crime script through comparing different experiences with using the notes, their opinions on their technical qualities, and advice about how to successfully use them without being detected. In this way what mattered to them became apparent. The technical qualities of the notes were a means to an end: their ability to use them successfully and then use the knowledge gained to buy more. Successful repeat use was
The interactional context: the forum allows for critique and requires a level of commitment from Benjamin. Benjamin introduces themselves as a known quantity, with feedback from another cryptomarket, the Black Market. They set out the security features of the product they are selling. It is claimed to be single ply, a security strip on the $100 dollar note, the ability to pass the pen test, a watermark, accurate colour using offset lithography, colour shifting ink, microprinting, a believable physical texture and resilience when dunked in water. The product seems to be high quality. Benjamin immediately adds a caveat. The bills do not contain magnetic ink, ferrofluid added to the bill to give it a distinct magnetic signature. That allows machines to distinguish between denominations and to reject fakes. Benjamin begins with a clear statement: any problems in passing the currency off as real are due to the failure of the buyer to adhere to an effective protocol.
Narrative breakdown: the thread begins positively. It all began so well – the golden period: sales and feedback are good. Benjamin begins with $100 notes and teases customers with the prospect of $50s and $20s. Early on after the thread begins they claim to have sold 300 $100 notes, for a face value of $30,000. Amounts purchased ranged up to 100 notes, $10,000 face value. They charge 50% of the face value of the notes though bulk buyers can obtain a larger discount. Buyers express excitement and anticipation for Benjamin receiving new stocks to pass onto them. The first bat h is well received. The second batch Benjamin sends out much less so. The quality of the notes deteriorates and users become disgruntled. A back and forth happens with one critic called out as a shill, and gradually disgruntlement builds as other users who had previously praised the notes now begin to question them. At this point the forum starts to divide. Users who have success with the notes allege that it is buyer failure to use them properly that is responsible for any problems.
If anybody finds their notes so atrocious, dunk them in water and wash all of the pen treatment off. It won’t pass the pen test, but it will sure as hell feel like real money … Alternatively, read through the forums and pay attention to what others to do give them their own touch. I’m not into replying to this negative BS, but I’ll manage to give you these few pointers.” Benjamin
One instance of a general phenomenon: As with other illicit and legal markets, there is a tendency towards bulking up sales following initial success. Benjamin decides to set a five note minimum order. Some buyers respond that this freezes them out. Note quality starts to decline:
“Lastly, and this is what is everyones biggest complain/concern so far, is the feel. Unless the clerk is wearing gloves I don’t know how they wouldn’t notice most of the bills waxy feel in comparison to the real notes. So that would be a dead give away to people who handle money regularly.”
Narrative turn with some colour: There then begins a conflictual phase in which Benjamin alternatively defends themselves and disappears for a time, stating they are working on fixing the problems with the notes that buyers have started to identify. Some participants sought to defend the operation from criticism. In one section, the discussion focused on security researcher Krebs (link) was sent counterfeit notes which he described as not being of very good quality. Several participants explained this away as a fakeout by Willy.Clock, the producer:
I think it was an inside operation by WC and Mouse if I had to guess, and ya thousands and thousands of retailers use Krebs and even catch up with him on Twitter, and everything seen on Krebs gets instantly passed down to loads of other websites and news sites too, if you google Mr Mouse counterfeits he’s all over the place thanks to Krebs.
The aim, they allege, was for the producer to spread misinformation to retailers about what they should look for in counterfeit notes.Complaints pile up on the forum. Orders do not arrive on time, quality suffers and communication with Benjamin becomes patchy. Benjamin stalls for time, promising refunds if the deliveries do not appear, which annoys customers whose money Benjamin has. Benjamin blames the market’s administrative system for problems and asks buyers to contact them directly and pay in bitcoin, triggering another round of criticism as this process gives the buyers no guarantees. The tone of the forum changes. Previous supportive members write long, highly critical posts. Benjamin struggles with justifying the perceived declining quality of the notes and promising improvements. They claim that the loss of quality is a matter of perception, that initial enthusiasm for the notes inflated expectations, and admits to some lower quality notes being shipped due to the influx of new orders limiting their quality control processes. Benjamin is suspended for a time by his supplier for failing to communicate well with their clients, and for not properly prepping the notes before sale, as the supplier begins to worry about the blowback from negative experiences with the notes Benjamin sells.
Benjamin complains about his relationship with the forum and sometimes the supplier, Willy.Clock. There is some suspicion that starting with good stock is a strategy to then switch buyers to less convincing notes. Some buyers acknowledge that they are on the lowest point on the food chain, and are unlikely to be offered supernotes which sell for much more and go to better invested users. Buyers argue with Benjamin and each other about the work they needed to do to the notes to make them look and feel more plausible.
I also went and just tried to play around with a note myself and I sprayed it with acrylic matte spray after putting it in water and drying it off and pressed it in the pages of a book and put a table leg on that. Now it’s fantastic! If the paper is good the rest of the note is great!!
Narrative closure: Benjamin in response goes on sabbatical in order to address the problems with the notes that buyers have identified, returning with what are claimed as notes that pass the pen test and feel close to the real thing. Enthusiasm resumes as these notes are distributed. As this wave of enthusiasm builds, the supplier is arrested, bringing the thread to an end.
Now about the context, the forum is a social space: Benjamin enjoys support from thread participants who advise on fine tuning note design and use. Benjamin had a number of buyers who were very positive about the product. As problems emerged they were accused of being sock puppet accounts. These acolytes proposed that if people were finding problems getting the notes accepted they were doing it wrong. They were following the wrong strategy, or were inherently suspicious individuals who invited greater scrutiny. Benjamin endorses these readings. Although one can never be sure, it did appear that these were genuine accounts who had made purchases through the system. Tell us why we now need to know about crime scripts: The business logic required a supporting chorus of satisfied buyers who could validate the quality of the notes and how they were used, in the form of a shared crime script.
Using the crime script
Start with a basic taxonomy: Participants had various roles: structuring, supporting, guiding, questioning, and various degrees of investment in Benjamin’s success. Some were highly critical of the entire process and said that passing of fake currency was only good for people who could not make it as drug dealers. Others saw their role as validating the genuineness of Benjamin’s efforts. One user, thisoldman, became critical in guiding buyers through the crime script, and users reported success with guidance from them. Thisoldman offered a guide for purchase to passing notes which could be bought through the site. They passed out tips on how to improve the passability of the notes by altering their appearance and feel.
The two separate scripts for Benjamin and their customers are set out side by side in Table 1. There was more information on the customers’ script as they participated much more in the discussion which involved troubleshooting their use of the notes. I have included both as they both centre around the forum in different ways. The forum was crucial to both scripts in different ways.
Table 1 Crime Script
Benjamin
Buyer
Entry
Set up cryptomarket account
Target scoping
Precondition
Bulk order from supplier
Reputation
Receive currency
Choose high traffic setting
Work notes
Selection
Market/sales/advertise
Select/stealth person/car
Select young cashier/busy time
Instrumental initiation
Receive orders from buyers
Pricing and divide up note ‘packs’
Identify high value/good return good
Instrumental actualisation
Process orders, select consumer/delivery
Buy goods/swap out cash
Continuation
After sales support/manage reputation/expectations on forum
Recycle bad product into good notes
Post condition
Close the feedback loop with supplier
Transfer legit cash
Exit/reset
Cash out/repost
Return to thread/leave
Showing there is more than a technical function/aptitude needed: From the point of view of Benjamin, creating a plausible cryptomarket identity was the first technical step. Then they needed to satisfy two reputational requirements. They needed to be in good standing with their supplier in order to secure a large enough order of notes to make redistribution profitable, and to appear both plausible and reliable to the users of the crytpomarket. Buyers were taking a risk buying the notes as they had little recourse if they turned out to be unusable. Throughout the process Benjamin had to calibrate their expectations of what they have, do the technical work of processing and sending orders, review users experience in the forum, send feedback to the supplier and cash out. Engagement with the forum was needed to manage the customer base and keep them involved:
My supplier has just informed me that a rather LARGE shipment is in DHL processing now, and should be coming out of customs shortly. Keep your fingers crossed people!”,,
A notable aspect of this was Benjamin’s willingness to expose their own process. A key instrumental precondition was prepping and batching notes for distribution and Benjamin wrote often about the process of preparing the notes, showing how the process might go wrong and acknowledging the uncertanties:
It means that MrMouse and I among other retailers are having to treat notes ourselves with makeshift methods from the boss, and we aren’t artists like Willy, so we struggle. We don’t have access to the chemicals that Willy does on his end for proper treatment. We get the job done (as in your notes will definitely pass the pen test), but recouping the pure authentic feel has been a challenge.
Closing the feedback loop with the supplier was necessary to continue the script. Benjamin had to give feedback to Willy.Clock and inform the forum of how the notes were changing in response.
Benjamin and some key contributors maintained a modus operandi document, effectively their own literal crime script, to guide users through the process. The document involved ensuring users did not try too high and invite suspicion, for example, by buying a one dollar item with a one hundred dollar note.
Showing how the findings are structured: The relationship between Benjamin and their buyers was one where Benjamin acted as an avatar for the notes. From the point of view of the user the central elements of the process were identifying a point to swap out fake notes for real ones, turn the counterfeit into goods that can be used or returned for cash or otherwise realise real money from the fake notes. That could involve working with an insider at a bank or a retail outlet where there would be considerable cash flow. Most contributors however used them at retail level by selecting a plausible target and time of day to buy small value items with a large note. Users selected targets according to their judgment on whether the note would be accepted. Some split targets by denomination, using $20s and $50s in busy outlets, or buying more $100s when they were confident the note quality and the target merited it. In their discussion the buyers mentioned how they slipped the counterfeits into the supply chain. Their varied tactics were aimed at laundering bad notes into good. Buying a small value item with $50 or $100 notes and obtaining change would do that. However there was a risk that cashiers would be more likely to scrutinise or refuse large value notes for small value items. Another route to actualisation was buying easily cashable tokens such as money cards.
A labour structure was in evidence in some cases. Most buyers used the notes as individuals. One buyer claimed to be running a larger operation with a team who would spend the notes. There was a sense that these were not major players and would be buying small amounts to use in ways that would not attract attention.
They discussed various failures and how to exit the scene after notes were rejected. None reported the police being called in response to an attempt to use fake notes.
Give a feel for the process: A skill promoted was the ability to work the notes into a consistent product, using the inevitably variable supply provided by Benjamin to produce something consistently workable:
My only issue now is that this batch was different then the last one, not because of quality but because Ink clearly did something wrong to the paper, personally I shut the fuck up and just fixed it myself by putting them in water like I said before, but some people just think they should get supernotes in the mail and not have to touch anything because they are really petty customers, so in your best interest Ink we think you should fix
Linking both ends together: Material skills were in evidence. Working the notes showed how the physical qualities of the notes were seen as features that had to be enacted in practice, through a combination of the ability of the buyer to work the notes into plausible currency, select the right target and approach in the right way. The combination of technique and technology came together to enact the counterfeit currency as a technology applied to a specific situation. In that sense the currency is only enacted in place.
Discussion
Remind the reader of the context: Distribution of counterfeit currency in this way is an example of a hybrid crime combining online distribution of the product and offline implementation of the crime, actually using the notes in a fraudulent way. The script required understanding the meta-criminal context in which Benjamin and the users operated. Benjamin was a secondary vendor for a primary note producer. Therefore they had to manage both their supply and manage expectations within the darknet community about the effectiveness of the notes. Benjamin’s second stage role meant they could palm off some of the responsibility for poor quality product onto the supplier but still needed to maintain a reasonably high hit rate among their customers. It was vital in order to keep selling the notes that users reported success with them. This is not an unusual element of digital crime. Some organisations have guides and helplines for both associates and victims in order to ensure the script goes smoothly, allowing for negation between victim and offender (Hernandez-Castro, Cartwright, and Stepanova 2017). A further analysis is invited which treats the counterfeit notes as part of a criminal assemblage. In this perspective the discourse around it, the production and distribution system, is part of a set of practices that produce the product as a workable entity.
Fit it into the literature: Though cryptomarkets focus on drug distribution some attempt to branch out into sales of weapons, counterfeit cigarettes and other goods such as counterfeit currency. This example shows that the system can be adapted so that the cryptomarket takes over the last mile of counterfeit distribution, and also the problems adapting the cryptomarket verification and quality control systems to a very different product. The community had great difficulty verifying the quality of the notes and had a single point of failure in the person of Benjamin, making it much less resilient than the section of the cryptomarket dealing in illicit drugs.
Size the issue: Overall the counterfeit trade in the cryptomarkets is fragile compared to the drug trade, as many participants recognised in their discussions. Another reason for the lack of resilience was the limited profit to be gained. Notes sell for 50% of face value. Therefore most profit is made in the production/distribution phases. When users take into account risk and the expense of crime commission the likely profit is much less than the theoretical profit of using counterfeit notes. Profits are further reduced if the user needs to employ others and share profits as part of their business model.
Talking about limits shows how the findings can be adapted in other contexts: The context limits some inferences that can be drawn. Participants do not disclose their country of operation. The darknet can be accessed from many countries, though it is difficult to access it from China. Data show most darknet use takes place in European, North America and Australia and the language/tone of the participants indicate they are based in the USA. References to the Federal Reserve and the fact they are using dollars in retail transactions indicates they are American. What is missing? There are a number of dark players in the cryptomarkets. The administrators and moderators govern who gets to create an account. They can ban accounts though a persistent hostile user can easily recreate another. Benjamin’s crime script is oriented towards his or her actions in the forum and there is a missing part to it, their relationship with their supplier.
What’s new/different? The cryptomarket provides a space for discussion and a hub for distribution. The counterfeit vendors/users employ an adaptable crime script. There is more variation in the buyers’ script. Benjamin’s script is constrained by the quality of the product available and the willingness of the buyers to pay for and use it. To an extent the group as a whole worked on developing their crime script through comparing different experiences with using the notes, their opinions on their technical qualities, and advice about how to successfully use them without being detected. In this way what mattered to them became apparent. The technical qualities of the notes were a means to an end: their ability to use them successfully and then use the knowledge gained to buy more. Successful repeat use was vital in order to make any kind of return, which was why consistent supply was so important to them. New context: insertion of market forum into crime script development and adaption. Discussion forums are critical in criminal evolution and innovation and we can also include other media such as Telegram channels in this. Users hybridise different modes to produce a workable modus operandi.
Why technology matters in one sense: The forum has certain technological affordances that matter. It is an example of a self-generated hierarchy. Why technology matters in another sense, and why we need to modify what we understand by crimetech: the notes have to be worked in different stages to make them plausible to different audiences, from the buyer to the target. That goes from batching to distribution, prepared for use and then distributed. Both Benjamin and the buyers treated the notes they received. Crime is embodied as craft work, recognising the personal, emotional labour that has to be involved in crime commission.
Finesse existing theory: The organisational context and the character of the criminal relationship is quite limited as Bejnamin has no control over the buyers so this relationship is voluntary. In comparison money mules are sometimes coerced through threats or debt relationships [ref]. The character of the crime is one of mutual exchange. It can be understood in terms of an dapted rational choice theory, but with added recognition of positionality/identity as motivating factors, materiality. Both vendor and buyer morally orient themselves to each other and the crime itself. ‘Rational’ is often drawn narrowly in terms of interests and should include the person’s identification of their own moral positioning in relation to the criminal activity, their motivation.
What can I infer? Both Ink and the buyers engage in innovation and fine tuning of their crime scripts. For Ink, reputation management and playing the role of the vendor willing to learn and respond to their critics is a key part of maintaining their status. For the buyers, they discuss how to successfully make use of the currency, avoid incurring legal liability while adapting to potential surveillance conditions.
Conclusion
What are the consequences of this paper (and I’d better rethink the title now): I have argued that understanding the crime script in this context is something supported by the community as a social organization and also as a material structure enacted through craft practices. As a consequence, intervention might consider taking place at the level of craft labour. There is a great degree of tacit knowledge involved in criminal enterprises. Crime script analysis tends to focus on the technical steps which foregrounds a rational choice approach when it comes to attacking the incentive structure. This analysis shows how reputation and plausibility are crucial elements at different stages, and the labour needed to achieve them.
Acknowledgements
For the purpose of open access, the author has applied a Creative Commons Attribution (CC BY) licence to any Author Accepted Manuscript version arising from this submission.
References
Bank of England. 2022. ‘Counterfeit Banknotes’. Retrieved 7 June 2022 (https://www.bankofengland.co.uk/banknotes/counterfeit-banknotes).
Board of Governors of the Federal Reserve. 2021. The Fed – Money Stock Measures – H.6 Release – December 28, 2021. Washington, D.C.: The Federal Reserve Board of Governors in Washington DC.
Chainey, Spencer P., and Arantza Alonso Berbotto. 2021. ‘A Structured Methodical Process for Populating a Crime Script of Organized Crime Activity Using OSINT’. Trends in Organized Crime. doi: 10.1007/s12117-021-09428-9.
Chant, John F. 2004. ‘The Canadian Experience with Counterfeiting’. 14.
Dehghanniri, Hashem, and Hervé Borrion. 2016. ‘Toward a More Structured Crime Scripting Method’. Pp. 94–97 in 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).
Dittus, Martin, Joss Wright, and Mark Graham. 2017. ‘Platform Criminalism: The “Last-Mile” Geography of the Darknet Market Supply Chain’. Pp. 277–86 in WWW ’18: Proceedings of the 2018 World Wide Web Conference. Geneva: International World Wide Web Conferences Steering Committee.
Felson, Marcus. 2006. ‘THE ECOSYSTEM FOR ORGANIZED CRIME’. P. 20 in HEUNI 25th Anniversary Lecture. Helsinki.
Felson, Marcus. 2009. ‘The Natural History of Extended Co-Offending’. Trends in Organized Crime 12(2):159–65. doi: 10.1007/s12117-008-9056-7.
Hernandez-Castro, Julio, Edward Cartwright, and Anna Stepanova. 2017. ‘Economic Analysis of Ransomware’. ArXiv:1703.06660 [Cs].
Hine, Christine. 2015. Ethnography for the Internet: Embedded, Embodied and Everyday. London: Bloomsbury Academic.
Holt, Thomas J., and Jin R. Lee. 2020. ‘A Crime Script Analysis of Counterfeit Identity Document Procurement Online’. Deviant Behavior 1–18. doi: 10.1080/01639625.2020.1825915.
Judson, Ruth, and Richard Porter. 2003. Estimating the Worldwide Volume of Counterfeit U.S. Currency: Data and Extrapolation. Washington, D.C.: Division of Monetary Affairs Board of Governors of the Federal Reserve System.
Kahn, Charles M., and William Roberds. 2008. ‘Credit and Identity Theft’. Journal of Monetary Economics 55(2):251–64.
Krebs. 2014. ‘Fun With Funny Money – Krebs on Security’. Retrieved 27 January 2022 (https://krebsonsecurity.com/2014/09/fun-with-funny-money/).
Lemon, Alaina. 1998. ‘“Your Eyes Are Green like Dollars”: Counterfeit Cash, National Substance, and Currency Apartheid in 1990s Russia’. Cultural Anthropology 13(1):22–55. doi: 10.1525/can.1998.13.1.22.
Li, Yiting, and Guillaume Rocheteau. 2011. ‘On the Threat of Counterfeiting’. Macroeconomic Dynamics 15(S1):10–41.
Reserve Bank of India. 2019. Annual Report 2019. Delhi.
Reserve Bank of India. 2022. Annual Report 2022.
Tompson, Lisa, and Spencer Chainey. 2011. ‘Profiling Illegal Waste Activity: Using Crime Scripts as a Data Collection and Analytical Strategy’. European Journal on Criminal Policy and Research 17(3):179–201. doi: http://dx.doi.org/10.1007/s10610-011-9146-y.
Van Nguyen, Trong. 2021. ‘The Modus Operandi of Transnational Computer Fraud: A Crime Script Analysis in Vietnam’. Trends in Organized Crime 1–22. doi: 10.1007/s12117-021-09422-1.
Wang, Yujie. 2020. ‘Effect of Demonetization on India’s Financial Sector’. Pp. 308–11 in. Atlantis Press.
Cultural accounts of illicit markets and criminal activities are the best way to develop a feel for them. Here are my recommendations:
Podcasts
Some of the most insightful sociology is done in economics, so Planet Money is my go to for understanding how the economy shapes our lives. Episodes on illegal markets in avocados, sand, eco-crimes and various other shady stuff, as well as the bigger picture on supply chains, blockchains, and the effects of the financialisation of everything. The show as a whole offers mind shifting insights into why the world fits together in the way it does.
The Cryptoqueen is an engaging documentary about a cryptocurrency scam/MLM scheme. It doesn’t skimp on describing the harms caused .
Criminal, a podcast that covers all different stories related to crime and justice, many involving OCGs
Season 9 of Command Line heroes examines the origins of malware in an insightful social-technological history.
Vice’s Cyber covers dark and manipulative goings on from the harms of algorithmic capitalism to the wily tricks of malware operators.
Dr. Death – for those who think white collar crime is harmless. A podcast about a doctor who bamboozled the hospital and healthcare system into committing 33 acts of criminal malpractice on patients, causing lifelong suffering. It also discusses the sociological effects of his scam, including distrust in the Texas hospital system. It is a good study of how some people can become plausible in the eyes of others.
Documentary
Netflix
Cartel Land – the drug trade, violence and community resistance on the US/Mexico border.
Don’t F**k with Cats: Hunting an Internet Killer – how the attention economy may create an incentive to worse behaviour
Narco Cultura – contrasts the glamour of high value criminal operations with the harsh reality of everyday violence
The Making of a Murderer – somewhat off our topic but a good examination of how the criminal justice system ‘produces’ offenders
Vice
Leaving the Yakuza – a documentary about redundant members of the Japanese crime syndicate trying to find their way
Fiction
I’ve selected TV shows that are about the experience of being involved in criminal activity or being victimised:
Breaking Bad – a good contrast to the romanticised vision of organised crime and trafficking often shown by Hollywood
Better Call Saul – another show that’s heavy on moral decline and life in a the neoliberal warzone
The Night of – though not very close to course themes it captures the brutal indifference of the criminal justice system well
The Sopranos – what’s not to love about combining the mafia, domestic drama and therapy
The Wire – the most sociologically informed crime drama, whose writers drew a lot on social science research
Hannibal – famous American TV show that is fictional (and brutal), but shows behaviour analysis, particularly motive and modus operandi, very well)
Top Boy – thanks Abby – conflict and exploitation in the UK drug trade, drawing on County Lines research.
Film
The film Traffic (2000) and the TV series Traffik (1989) are effective studies of the drug trade from the perspective of different participants. You can find Traffik on Channel 4’s catchup service
I want to engage with a type of argument that is self-undermining. The months after Al-Qaeda’s attacks on New York and Washington in 2001 birthed an immoral decision. The USA at the highest level began publicly legitimising torture as a means to an end in the War on Terror. As opposed to having the decency to pretend not to. Opponents would often use a two step argument. First they would lay out why torture was repugnant. It harms the tortured, stains the torturer, and degrades the society that permits it. Second, they would add as a final flourish ‘torture doesn’t even work!’. Torture produces bad, unreliable intel. That’s lucky, I thought. What if it did work? Any argument where morality is reliant on pragmatism is going to risk the equation changing against it. Where do you stand then?
The same argument tends to bubble up over AI. In my work outlandish claims are often made about police AI by those developing the systems. These are private solutions offered by companies promising to use data integration to be able to predict where crime will happen so that police resources can be distributed accordingly. In response critics rehearse the damage to democracy when decisions are taken beyond any possible oversight, the danger to human autonomy, and then we say, ‘And it doesn’t even work’! Critics are usually right. These systems over promise and deliver little more than a beat cop’s common sense (crime happens where lots of young males hang out, where there are targets, and little oversight). We also point to the biases being worked in here so that systems without any explicit racial categorisation element will still faithfully reproduce racial biases in their effects.
If someone then designed a workable pre-crime system, one that did not simply replicate existing biases in the datasets, then what? These arguments do not go away, and we should continue to critique the effect as well as the principle, but the problem is that the pragmatic argument is a dodge. It is a way of avoiding the claim morality places on us, that we have to take decisions against our own interests and convenience. That there are paths we should not follow. A workable pre-crime system is something that should never be developed because it removes any notion of culpability and effectively end runs due process. Systems cease to have any hope of having democratic oversight, and they shift power from communities to states and remote techbrotopia corporations.
On the other hand that argument might be too purist. It is through their practical effects that we approach technologies and policies, and therefore leading with the in-context pragmatism is not a bad move to make. Further, we should not assume pragmatism is downstream of morality. Mostly we reason in the other direction. We say ‘how does this affect me … how does it affect my context … and maybe after a bit, how does it affect the world I will come to live in’. The two are more closely bound in than presented as we see in eg the ‘effects’ of bitcoin. Therefore the role of sociology is to interject at that point, where human visions of a moral life intersect with human realities about how once can live well.
One of the annoying things academic competition does is push us to develop elaborate ways of not quite saying what is staring us in the face. There is a tendency to produce theoretical solutions to problems that only exist because there is something we want to avoid saying, in this case, that some entities are objectively real, graspable and obdurate. Assemblage theory is one of these. We known that social constructionism is not satisfactory, because material reality makes a mockery of it. So we have to come up with a way of accepting the predominant fact of material reality without saying so, by arguing that things are actants in networks.
To roll back a bit. Social constructionism is seen as old hat and research concluding that ‘phenomena x is a social construct’ is not going to be seen as very interesting. Like, duh! You have to say it is rhizomatic or somesuch. Social constructionism itself has been flattened into something bland and common sensical. To say something is socially constructed means making a set of claims which are not the same. There is a spectrum of social construction from at the one end identifying constructs that are active, and somewhat conspiratorial , to the other those that are practiced and are about the way of life we have in common.
On the active end the best example is the invention of tradition (Hobsbawm and Ranger 20212). The upshot of those studies was that states create public rituals to bind the communities they claim to represent. Perfect examples are those ‘ancient’ traditions securing the British monarchy, which turn out to be modern inventions which were deliberately put in place to support the legitimacy of the house of Hanover and by extension the new British state. Race science is another good one. All the stuff that goes on in the House of Commons did not emerge from a mystical past but were created for a purpose, usually to say: we are here, we mean to stay, and we are so powerful we can call someone Black Rod and you have to pretend that is not an extremely funny job title. In them have a direct connection to power’s shifting claims upon our minds.
At the other end we have ground level constructs which are diffused throughout society, are are about how we live and what we value. They draw on some of these more active constructs but are combined and reworked with others. They are less intentional. The reason that social constructionism is unsatisfactory here is that we have to understand not just that they exist, but what they are doing. For example, we can hypothesis that the heterosexual family that came into being in the form it did to service the demands of the capitalist labour market. In the early capitalist period, the family would be a group hire – factories employed whole families as labour groups. Later comes a stronger domestic/public division in some places, for some of the labour aristocracy and the middle class. Different family forms for different times, and more variation in practice than you would think from looking at common cultural representations. But the next step is to ask why a family exists at all as a social form, one that is recognisable between these very different periods. If your immediate answer is ‘it’s the best way to bring up children’, then that is a perfectly plausible but not a social constructionist explanation.
We have to pay attention to that last/first step because answers to other questions matter or make more sense in the light of it. Factory owners might have got more productivity from their employees if they just stuck them all in big dormitories. Some tried. They found that things generally did not work as they hoped. Intensive, industrial work is only bearable if people have a life away from it. Families exist because society cannot work without them. Society cannot work without them because there is no other reliable way to secure reproduction, and the human organism collapses or endures great damage without intensive personal contact. The human organism needs intensive personal contact because we need to cooperate in any resource constrained environment. We need to cooperate because we need to reproduce. Therefore the constructs we identify – the particular arrangements of people, things and habits – only make sense as answers to that deeper question, of how to live fruitfully.
Hobsbawm, Eric, and Terence Ranger, eds. The invention of tradition. Cambridge University Press, 2012.
Crime is behaviour that is intentional, measurable and directly harmful. The only reason to care about crime is that it gets in the way of the good life. Ignore anything about obeying the law for its own sake because otherwise our moral sphere will crumble. Unless the person proposing that position really does never get drunk in a pub. Also when considering this contextual dimension, please ignore any pleas in mitigation that reduce the moral agency of the person doing the deed. Helps nobody.
A lot of people get punished for behaviour that is not crime in that sense, like girls and women seeking abortion, or in the UK folk posting rap lyrics containing the n-word on social media or in Scotland, football fans singing football songs perceived as likely to rile the opposition (I thought that was what football chants were for). And a lot of people never get punished for behaviour that is within that definition, such as invading and mangling sovereign nations, toxifying drinking water and encouraging others to do harm. All the legal ins and outs – the learned exhuming of precedent, the self satisfied blather about a rules based international order or European solidarity – merely describes temporary states of convenience that match what some people and states want. The Republican Party in the USA did not want to overturn Roe because it disagrees with the Warren Court’s interpretation of the 14th or because it has a weird need to control ‘pregnant people’. It wants women to be prevented from having abortions.
So the context of crime is targeted harm. There are many factors involved which I say can be boiled down to a small set of five underlying, partly hierarchal realities – its social facts. Here they are. Top one comes first and last:
Some people are literally psychopathic and are able to act accordingly. They will never stop and they need either watching or consequences. There are not many but the harm they cause is vastly disproportionate to their numbers.
Some people are poorly socialised/well socialised into a harmful moral universe. You can design out some of this crime with changes to incentives.
Some people live in a context where it is impossible to avoid morally gray behaviour. You can design out some of this crime by shifting the opportunity structure and giving people better options.
Some people get excitement from transgression. You can ensure crime is mostly dull and unrewarding through target hardening.
People gather in ways that increase opportunities for crime. This can be resolved by increasing guardianship.
There is an oversupply of young males. Give them something to do or get them paired off or in a monastery. That fact should give you a clue to the characteristics of the ‘people’ mentioned in the first five factors.
Crime is mostly a male problem. At heart every aspect of criminology boils down to this seldom spoken biological fact. It holds true across culture and history. Grappling with this we often frame it in terms of masculinity as a construct, which is relevant but also avoids the issue of why we have to start there in the first place.
Men might be more risk taking, might be socialised into a harmful masculine role, might be more inclined to use violence to secure status-dominance, but they are these things as men. Culture mediates biology. The problem then becomes what we mean by biology. There are plenty of biological factors at play which can be isolated: resting heart rate, testosterone levels and the rest, but they are not causes, and do not explain what biology is and why it would be linked to crime, a fundamentally social act.
Perhaps it is simply that the relative capacity to do harm gives a proportion of men the power to do that. However that does not quite do it. Men certainly have the physical and psychological capacity to harm women, boys and girls, more than the reverse, but we also have the capacity to harm each other, which is well used. Men do not act as a class interest in that sense (Filser at al 2020). In some cases I suspect the harm men cause to women is an offshoot of inter-male competition. That does not bring us closer to a mechanism or a sense of why it matters in the way it does. We must look at why men have this capacity at all.
Filser A, Barclay K, Beckley A, et al. (2021) Are skewed sex ratios associated with violent crime? A longitudinal analysis using Swedish register data. Evolution and Human Behavior 42(3): 212–222. DOI: 10.1016/j.evolhumbehav.2020.10.001.
Never ask me ‘do you think this is fence electrified? Are these berries poisonous? Is this knife super-sharp?’ Or somesuch. I know only one path to knowledge and am the sort of person who likes to find out what something is by jabbing it with my finger/licking or eating it or otherwise interacting in the way most likely to lead to immediate and non reversible consequences. An empiricist. We need to be governed by the research ethics process because we are very murky people indeed.
Research ethics is frequently presented as evolving due to a sequence of errors, cruelties and catastrophic misjudgements. Social researchers look with wistful envy … er, abject horror, back to a time when you could lock a bunch of students up, tell some of them they were ‘warders’ and some ‘prisoners’ and see if the former decided to beat the daylights out of the latter. Ethics is frequently and effectively taught as of a series of pitfalls to avoid which are wholly tied to questions of empirical research because that is where the pain is.
However, there is another kind of scholar. These people, wordcels and shape rotators both, stare unblinking at the sun of pure thought. They can work effects out from first principles. They use the British Library. They are theorists, and research ethics does not touch them. We seldom ask if you need ethical approval for a non-empirical study. Indeed how very dare you, sir, for proposing that question. Only vulgar empiricists who would gull their subjects into pretend electric shock experiments given half a chance need the stern oversight of the ethics board. Theory takes place in the realm of pure ideas, each one as unsullied as a summer’s day of childhood memory. The thought experiment is their realm. These are imaginative stories which you will often see philosophers, scientists and theorists deploy to work out some problem or illustrate an argument. They are often mocked as the ‘we have chosen to assume that each horse is a perfect circle’ response to some real world problem. Thought experiments get a bad name but they have their uses.
Types of thought experiment, of varying usefulness:
Let’s see if we can break our theory, or someone else’s. Maxwell’s Demon and that quantum-cat box thing that does not mean what everyone thinks.
Explain how we got here. The tragedy of the commons, most origin stories in mainstream economics – it’s worse than the MCU for multiple competing origin stories.
This is how humans work, other things being equal. Malthusian resource dilemma (we are pretty much screwed). Habermas’ social configurations and communicative rationality (no we are not). People who don’t play enough Civilization.
The ones about resource competition are often rhetorically persuasive but ineffective because they are about how we think things work rather than how they really work. The tragedy of the commons is the claim that if you have any communal property, it becomes over fished, over grazed, or over used to depletion because everyone has an incentive to maximise what they take from it. Hence, private property and land enclosure to the rescue. A scan of the historical record shows it does not work like that at all. Enclosure of common land was a state-driven process enacted in order to serve the interests of landowners. It was not some naturally occurring event. Overexploitation was regulated because other people would notice if it was happening. The malthusian population growth crisis never happened. Communicative rationality turns out to be a cover for serving our interests while feeling smug about it. Useless thought experiments have become real world common sense and they have damaging real world consequences.
On the other hand, some of these thought experiments show the power of thinking where some observations might take you. Free thought is dangerous to power, which is why in the current environment several governments are trying so hard to regulate it and punish people for erring, usually in the name of something nice. Perhaps thought experiments should also be governed. Theorists could be required to submit an ethical review before starting any thinking. The danger is that ideas could easily leak from the University’s containment field into real life where they can cause untold harm. The University could become liable if any of this thinking has damaging effects, such as causing people to act in unpredictable ways, question their social roles or despair at the futility of existence. A simple form would suffice. We could ask: will you be thinking about vulnerable groups and sensitive topics? E.g. University vice chancellors and principals and government policies. What steps have you taken to ensure they are not harmed by your thinking? That should tie up the pesky cogitators and leave the field open to us morlocks.
… or possibly it will make you feel very much worse. Not sure. But I think you need to know this.
Discussing with research students about the many troubles of PhD life we often come back to a disagreement or misunderstanding about what a PhD is. So I want to fix that now:
A PhD is a series of research or real world problems and hypotheses around a central theme that you want to live with and examine. It starts and ends with the questions: What is this topic/thing, what happens with it, why does it matter, and to what/whom?
These are the only questions ever studied in academia. Every other research question ever asked is a take on one of these. So as long as you have or will end up with some kind of answer to each of those, you will be fine. The rest of your academic career can be elaborating on those and that is a very nice, happy way to live out your life. Academic discussion involves asking the same question in many different ways.
To be accepted as a PhD the thesis and viva need to meet the following challenges as laid out in the University regulations which I’m sure we have all read:
‘Grounds for the Award of Doctoral and MPhil Research Degrees: Demonstration by Thesis and Oral Exam for the Award of PhD
The student must demonstrate by the presentation of a thesis and/or portfolio, and by performance at an oral examination: • capability of pursuing original research making a significant contribution to knowledge or understanding in the field of study; • adequate knowledge of the field of study and relevant literature; • exercise of critical judgement with regard to both the student’s work and that of other scholars in the same general field, relating particular research projects to the general body of knowledge in the field; and • the ability to present the results of the research in a critical and scholarly way. The thesis must: • represent a coherent body of work; and • contain a significant amount of material worthy of publication or public presentation.’ (italics are mine)
As above, these questions are all angles on the same central question: is the PhD an original work of scholarship with an identifiable contribution to make. Reading the above it sounds like a tall order. But look closely at some of the language which I have italicised. When I examine a PhD I look for the capability of pursuing original research and making a significant contribution. I look for whether there is material that is worthy of being published. I do not ask that the PhD has made a significant contribution already, or that you have published already. If you have published or are nearing publication by the time of the viva, that’s awesome – box ticked, I won’t even have to read the thing now. Score. All of these questions are about showing potential in the PhD – the potential for good research, good scholarship, showing where you belong in the academic mind map.
Now follows some top secret info which you must guard with your very life. You do not have to meet all of these criteria immediately on submission of the thesis. Plenty of PhDs that go on to be awarded and that are of a high standard have weaknesses or uncertainties around one or more of these questions. That is why we have a viva, so we can question whether you recognise that and if you are likely to go and fix it. After the viva we give recommendations on work that needs to be done to correct any problems identified, as long as it looks like you recognise the issue and are likely to have a good go at correcting it.
So your research/work plan should be structured around the words I have highlighted above.
Show the capability of pursuing original research and material worthy of publication. Where do you learn about and show you can use methods during your PhD? What is the research material, the stuff that you gather, which could make it into a published paper – that could be data, it might be theorising about an issue, it could be a review of methods? Out of the many ways you could have researched this topic, what led you to choose these ones?
Produce adequate knowledge about the field of study. What research and theory are you reviewing, what questions are you asking and what conclusions are you drawing? One question is ‘how do academics talk about and define my thing?’. Like many other ontological questions I don’t even think there is a ‘best’ or ‘final’ definition, because the object being defined is itself contingent, changeable etc. You just have to show you know how they discuss it.
Where in the PhD are you exercising critical judgement and about what? What baseline assumptions are made by yourself and others that need to be put into play? Where do you talk about the limits of yours and others’ perspectives on the issue?
In your writing how do you show the ability to present the results and represent a coherent body of work. The best way to do this is to actually present the results and show how those other questions – What is this topic/thing, what happens with it, why does it matter, and to what/whom? – link up in your imagination.
The best way to meet these challenges is to show you have done them by producing a coherent body of work with original research. A PhD is a map of the potential contained in the topic, in you. That is all we want. That potential is boundless. Never be afraid to show it on your own terms. And if you want, to be the world shattering magnum opus it deserves to be.
This post is inspired by an invitation from Andreas Hackl to a workshop organised by himself and Margie Cheesman on The risks of working online: refugees in the internet economy, supported by the UNHCR.
The digital society has various used for refugees beyond the usual. Digital traces might be used to support an asylum claim. Money transfers, distance communications and work opportunities become especially salient, and especially vulnerable. Trust technology could be used to distribute aid and track support needs. A number of risks are apparent. Hostile state and non-state actors can use the surveillance opportunities to target the person seeking asylum and their friends, family and loved ones. Digital verification can close the useful ambiguous spaces and conditions that refugees sometimes have to make use of. The UK Home Office’s hostile environment policy is an example here. The move away from cash payments increases some opportunities but also increases surveillance and tracing threats. Refugees often have to choose between adherence to the law and survival. They may be particularly vulnerable to cyberthreats and cybercrime.
There are many contexts in which refugees might face threats and barriers to digital inclusion. Work with Alex Wafer of Wits University in South Africa has looked at how migrants use digital labour in informal economies. Many are forced to use unreliable and insecure methods of payment and have to use platforms like Uber as jury-rigged trust technologies. This is in the context of significant unemployment and political racism directed at them.
So let’s sort out some principles and see how we can think about how to create resilience:
Continuity and capacity: there are many domains where continuity is disrupted and where digital means can help support it. I work in education so my mind immediately went to how refugees can be integrated into education and credentialing systems. There are loads of places where that might break down and impose extra costs. How can language qualifications be recognised? How do credentials maintain validity for employment or study? Are there challenges posed by different academic cultures? Various capacities are limited by the digital divide – different kinds of literacy might come into play alongside access.
Connectivity and convergence: the mobile internet is a vital resource, and existing and new infrastructures can be investigated for the support they provide, from Starlink to cafe wifi. Various risks arise from this such as the need to share insecure connections or devices. Some risks are baked into the design. For example, iOS devices do not normally allow multiple user accounts making privacy harder to maintain. These simple features or lack of them have iterative effects in terms of risk. We should also not lose sight of the way in which existing risks or disadvantages are made sharper or mitigated, for example, gender and ethnic vulnerabilities play out in very different ways in precarious situations. Refugees are a financial resource subject to a process of data extractive capitalism, technological/system experimentation and convergence (Madianou, 2019). That has effects on their autonomy and agency in the face of powerful humanitarian bodies and state agencies.
A counterpoint is that several of these principles might be inherently risky, or at least in tension, in the lives of refugees, especially that of continuity. Strategic opacity might be a useful goal, and this is where the possibilities of hidden hosting and communications, and decentralised payments could come into play. Generally for each technical solution proposed however there is also the corresponding problem of how to maintain it within a viable community. Nothing is automatic, and crypto et al does not work without a significant investment of time and labour. Therefore we might want to look first not directly at how refugees’ trajectories might be supported, but at how supportive networks can be brought into being and maintained using some of these security and trust technologies. The real questions then are the big ones of what principles inform our software and hardware design, how design can be community led and ethically protective.
Questions remain about the affordances of particular combinations of technology and the way in particular technological solutions are likely to evolve (Cheesman, 2022b). Something we should consider in future is the effect of the fracturing internet and the emergency of distinct and sometimes hostile digital infrastructures. An ethnography of infrastructure approach could work here (Leigh Starr, 1999). Refugees must move across and within these infrastructures, interleave different platforms, and balance the need for opacity with the need to maintain a digital identity and keep contact with home and receiving communities. Cheesman (2022a) frames these challenges and tensions in dimensions of subjectivities, timescapes and materialities. We should always be aware of the uses of tech for social closure and exclusion, and the political risk facing refugees from new xenophobic movements as we see in South Africa and elsewhere at the moment.
Cheesman M (2022a) Infrastructure Justice and Humanitarianism: Blockchain’s Promises in Practice. Oxford.
Cheesman M (2022b) Self-Sovereignty for Refugees? The Contested Horizons of Digital Identity. Geopolitics 27(1): 134–159. DOI: 10.1080/14650045.2020.1823836.
Leigh Star S (1999) The ethnography of infrastructure. American Behavioral Scientist 43(3): 377–391.
Madianou M (2019) The Biometric Assemblage: Surveillance, Experimentation, Profit, and the Measuring of Refugee Bodies. Television & New Media 20(6). SAGE Publications: 581–599. DOI: 10.1177/1527476419857682.
Weitzberg K, Cheesman M, Martin A, et al. (2021) Between surveillance and recognition: Rethinking digital identity in aid. Big Data & Society 8(1). SAGE Publications Ltd: 20539517211006744. DOI: 10.1177/20539517211006744.
This is the draft of a paper I am presenting at the International Forum on Drug Policy, hosted by the International Center for Drug Policy Studies at Shanghai University. The theme of the forum is ‘The Fentanyl and Other Synthetic Opioids Crises: New Challenges and New Responses’.
Introduction: the present and future of illicit opioids in digital markets
Drug supply and drug culture has evolved rapidly. 10–15 years ago most people buying illicit drugs would do it from a known contact, arranged by telephone, and paid by handing over cash in person. Now a deal typically is arranged by social media, sometimes through the open web or darknet, dropped by delivery and paid for electronically, including by cryptocurrency. It need not involve any interaction at all, and the buying and selling parties can be unknown to each other. The drugs being bought would often be the big 6, heroin, cocaine, ecstasy, LSD, amphetamines and cannabis. Now the classic illegal drugs mix with opioids, pharmaceuticals, enhancement and lifestyle drugs, and a vast array of novel psychoactive drugs which come in many different forms for consumption (Lim et al., 2020). The emergence of digital drug selling also changes the fundamental nature of the market. In the face to face drug selling work there two markets – one public, open and risky, the other private, closed and somewhat more predictable. Digital methods allow markets to be in theory both private and open (Bakken et al., 2018).
Therefore the emergence of digital drug selling platforms and methods alters the logic and underlying rationalities of drug markets. The paper takes that as its theme, and hypothesises that these developments shape both what is sold and alter the cultural framing of drugs as meaningful commodities. To do that it examines the emergence of synthetic opioids in darknet drug markets and the ways in which they reshape supply chain relationships and drug users’ subjectivity. It uses the case of opioid buyers in darknet cryptomarket to examine the relationship between market processes and drug culture.
Taking a material culture perspective the paper discusses what aspects of opioids are sought after and how the drugs themselves are calibrated to reflect market conditions and users’ experiences and expectations. It discusses users’ presentation as hyper-modern, risk reflexive consumers. Increasingly we are seeing self-efficacy being used as the measure of a substance’s potency, a new development which points towards a novel understanding of the relationship between self and intoxication. Features of the digital marketplace design plug into this subjectivity, promoting a rational consumer ethic through its feedback features. The paper examines how fentanyl emerges as a product within the digital supply chain and how users treat it as both a threat and sometimes useful part of their psychoactive repertoire. It ends with some critical thoughts on how the ‘rational market’ design makes some features of the commodity chain transparent while obscuring others, and some suggestions about the future direction of the digital drug markets. This has implications for policing, public health and harm reduction.
What are cryptomarkets
Illicit drug supply has become more globally integrated and technology driven in multiple ways. One of the most striking is the development of digitally located specialised drug markets, or cryptomarkets (Martin, 2014). Cryptomarkets are anonymous platforms that allow buyers and sellers to exchange goods using decentralised payment systems. The first viable cryptomarket was the Silk Road, launched in 2011. Silk Road introduced two qualities that were previously mutually exclusive in drug markets: it was open – in the sense that anyone could enter, given a basic level of technical knowledge, and it was private, in the sense that people could participate without detection (Aldridge and Décary-Hétu, 2016). It was the prototype for new paradigm of illicit drug exchange that was then copied and reproduced elsewhere (Aldridge and Décary-Hétu, 2014; Bakken, 2020; Demant et al., 2019). Silk Road was eventually closed down by law enforcement. That operation did not reduce interest in the cryptomarkets. It was the start of a continuing process of innovation and disruption as market administrators tried to stay ahead of their rivals and law enforcement (Afilipoaie and Shortis, 2018). Various social, legal and economic disruptions tended to show the resilience the overall market ecosystem even as they exposed technical or organisational failings in some of them (Décary-Hétu and Giommoni, 2017). Over time however the market has been reconfigured away from large, centralised cryptomarkets to smaller ‘shopfronts’ (Martin et al., 2019). Though sometimes depersonalised they are evolving and also provide the basis of dealer to buyer direct dealing (Childs, Coomber, Bull, et al., 2020).
Cryptomarkets are a small but influential proportion of the overall drug trade. Respondents to the Global Drug Survey obtaining at least some of their drugs from darknet sites in the previous 12 months rose from 4.7% in 2014 to 15% in 2020 (Winstock, 2021). The demographic balance tends towards the ‘psychonaut’ user profile (Cunliffe et al., 2019). Alongside that there are many self-identified dependent and addicted users who find the predictability, professionalism and stability of supply a significant benefit (Bancroft, 2019).
Cryptomarkets are hosted on the Tor darknet. A darknet is any system that isolates and obfuscates internet traffic through a combination of hardware and software. Facebook has some features of a darknet. It does separate itself from the web and obfuscates users from each other depending on a combination of user-controlled and system controlled settings. Ultimately users are entirely exposed to the system so there is no hope of privacy. ‘The’ darknet is the Tor darknet which is a different proposition. Along with other darknets like i2p and Freenet, it creates an anonymising layer over internet traffic using a combination of encryption and signal routing. Users operate with a degree of anonymity that is not possible with normal internet and web use, which has been compared to living in the Big Brother house in terms of privacy. Tor and the other darknets are part of a class of privacy promoting systems and products that include remailers, cryptocurrencies and VPNs. They differ in the degree of control and knowledge users have over the systems. Tor offers another ability which is that of private or hidden hosting. Services can be offered from anonymous servers. That ability opens up a whole host of uses, from criminal markets to encrypted chat and private discussion. It offers new qualities for commodity exchange and social interaction which is of interest to sociologists, criminologists, economists and privacy focused activists.
Cryptomarkets are a valuable data source for researchers. Researchers have developed digital trace methods to follow changes in supply and understanding price/buying dynamics (Décary-Hétu and Aldridge, 2013). These innovations allow for early confirmation of market changes such as the emergence of fentanyl and other novel synthetic opioids (Bunting et al., 2021; Lamy et al., 2020, 2021) and new drug delivery systems such as e-cigarettes and vaping (Lim et al., 2020). These changes can indicate wider developments in the illicit drug market overall.
Cryptomarkets are often presented as a fully formed, self contained system. However they are best understood as one particularly well integrated part of a larger, flexible digital market ecosystem. That system is composed of social media apps, encrypted messaging systems, decentralised discussion servers and other communication forms (Moyle et al., 2019; Saidashev and Meylakhs, 2021). Drug sellers and buyers move around within this landscape depending on the changing supply availability and their specific requirements.
Illicit digital hybridity, market habitus and the global supply chain
Drug selling takes place in the penumbra of digital life and the digital economy. There is also a growing acknowledgment of the disruptive potential of technologies – notably the digital – to transform illicit drug markets and future use patterns (Barratt et al., 2022). That has implications for what is sold, how, where and by whom. For a long time, researchers, policymakers and law enforcement have referred to ‘the drug market’ as a generic term for aggregated global drug production, trafficking and distribution systems. This approach is useful as it allows us to understand how disparate individuals and places are connected without an organised or cartel arrangement at work. It cannot be left at that though as markets create and normalise effects that are specific to them. They change the ‘market habitus’, the dispositions dealers and buyers have towards the drug exchange process, their expectations of value and quality, and their fears of exploitation and predation (Aldridge, 1998).
In a straightforward sense we should not be surprised at the infiltration of technology and drug markets. All markets involve technologies, and in another sense, are technologies. An accounting spreadsheet is a technology. Even if these technologies are not tangible, they exist and have effects: adding and subtracting mentally is a technology, amortising debt is a technology. Technologies channel, reproduce and extend human capacities. In another sense, markets conduct specific technological functions, epistemological and ontological. Illicit markets are somewhat distinct in that they are the products of other platforms (Breger Bush, 2020).
Digital drug markets are techno-social hybrids. They are novel combinations of existing technologies that create a new interactional dynamic and which expands the reach and availability of illicit drugs. They are force multipliers in the illicit drug field. Any finished – though seldom ‘complete’ – technological interface or device is a combination of other systems, however the uniqueness of drug market hybrids is their frequent non-intentional evolution. Over time, the purpose built darknet cryptomarkets have adapted into new forms combining on and offline activity, often in response to changed consumer demand, market reorganisation and competition or law enforcement successes (Childs, Coomber, Bull, et al., 2020). They might retain the same interface and technological infrastructure while being fundamentally different sites of social encounter and organisation. Illicit digital hybridity then is a process that reaches across ontological boundaries, between on and offline, face to face and remote, virtual and material.
Markets are very effective hybridising systems that connect, automate, flatten and rationalise; and also reorganise, reshape their participants’ habitus, create hierarchies, and reputations (Appel, 2016; Beckert, 2017). Classical economics seeks to treat the market as an abstract, unifying, disembedding whole, while sociology looks at how it is encountered as a material, cultural entity. Both perspectives capture a reality of how markets operate and the impact they have. In this paper I take material culture perspective which examines how technologies are taken up and used in different market cultures. I treat digital drug markets as places with their own localised cultures which promote varying market habituses.
There are also different markets overlaying each other which drug users and sellers encounter in different senses. There is the abstract market as a set of operating concepts, promoting types of rationality and self-directed action (Childs, Coomber and Bull, 2020; Hall et al., 2013). There is the material market as the connected set of different exchanges which may not be directly in touch with each other. Finally there is the material implementation of specific market contexts, whether a street market, or a darknet cryptomarket. Mirroring developments in capitalist societies, I recently observed the emergence of what might be called conscious markets, where drug sellers and buyers have a distinct understanding of themselves as operating within and according to market principles. In these spaces they see themselves as and expected to behave as service providers and consumers. That has implications for drug normalisation, access, pricing, quality, product diversity and availability (Barratt, Coney, Aldridge, Larisssa J. Maier, et al., 2017; Barratt et al., 2014).
Drug markets then work as both sorting and identification systems and as epistemological devices. They define what drug quality means, assign value to labour and risk (Bancroft, 2019). They assemble knowledge from different sources and also destroy or fragment some kinds of knowledge. From example, those that conduct drug testing and in so doing make only those qualities of the drug ‘speakable’. They define some use types and users as rational consumption, and others as deviant ‘rubbish’ consumers (Bancroft et al., 2020).
Market participation is also about positioning. For example, many sellers use strategic pricing, as became clear during the COVID pandemic (European Monitoring Centre for Drugs and Drug Addiction, 2020). Some kept prices stable in order to maintain their client base or market position. Price therefore is entity which does not necessarily signify the harmony of supply and demand, but also includes other needs like the status and trajectory of the buyer and seller. Pricing can be used methodologically as both a signal telling on the general health of the drug market, and a positioning move made by drug sellers.
As well as normalising a market habitus, digital drug selling shapes how drugs are normalised. The growing availability of a range of drugs through online sources at the same source promotes a psychoactive repertoire (Barratt, Coney, Aldridge, Larissa J Maier, et al., 2017; Measham and Moore, 2009). That is where users incorporate a range of substances for specific context based effects. These elements come together in relation to opioid and fentanyl distribution and consumption.
This paper makes several critical propositions:
The integration of the digital economy with the illicit drug market has led to more rapid innovation in drug types
That process has shifted power in the supply chain, with dealers having more opportunity to introduce new substances which may be more powerful and more harmful, such as fentanyl and its derivatives, and benzodiazepines
We can measure the consequences in terms of incidences of overdose and drug related death
The consequence is that current harm reduction advice and practice may need to acknowledge and work with that, in particular recognising greater uncertainty in terms of dose and response
Furthermore, buying and consumption can be more individualised and informed by medical cultures rather than subcultural drug use cultures
Literature review: Opioids and fentanyl as an NPS category
The EMCCDA and others (Duke, 2019; European Monitoring Centre for Drugs and Drug Addiction, 2019) have highlighted the rise of novel psychoactive substances (NPS) and one dimension of this upsurge in new drugs, previously little known drugs, and drugs previously largely restricted to medicinal use, is the rise of artificial opioids, fentanyl and its derivatives and benzodiazepines (‘benzos’). These drugs are frequently highly potent, and though sometimes are claimed and marketed as mimicking the effects of established drugs are often not analogous to them. Many are initially unknown in drug using cultures and must be adapted to shared cultural norms and understandings. That process puts them on a trajectory which can begin with initial interest and novelty, and later recognising the drug’s harms and side effects, redefining it as a dangerous drug of abuse (Bilgrei, 2016).
NPSs are defined as a public health threat in various ways, as a regulatory problem (Duke, 2019), and a contaminant in existing drug use cultures (Measham, 2020). We should not automatically accept that it does it exist as a coherent category (Potter and Chatwin, 2017) and in fact consist of several distinct types which combine into different effects. There are performance and image enhancing drugs, recreational NPSs, and opioids and their derivatives. I separate these out as ‘power categories’ because they involve different demographics of users, different forms and pharmacokinetics of the drugs, and different modes of distribution and consumption contexts. Opioids and fentanyl are similarly new and not new. What is novel is the way they exist as a new power category, which locks down the multivarious ways opium functions into a narrow set of effects (Breger Bush, 2020). Ultimately the impact of opioids and fentanyl is to separate this new category from its supposed origin, the opium poppy. Though opioids mimic some of the analgesic qualities of opium, and operate on the same brain receptors, they have become a distinct ontological category marked by concerns about potency and addiction. Historically we can see the category come into being with the emergence of pain medicine during the 1970s. This was a concerted shift in the focus of medicine and of medical science which came to treat pain as an object which could be worked on and managed as part of medical practice (Bonica, 1991). New journals were founded, new directions for medical science and education were proposed, and new ideas of what pain was were proposed. A whole system of pain management emerged as medical practice and system of governance (Sherman, 2017).
Part of that history was the rise of pharmacological solutions, promoted fiercely by drug companies like Purdue (Quinones, 2016). Oxycontin came to be a default solution to pain – both physical and psychic – and the trigger for a new wave of addiction and drug related death that swept through North America (Hansen and Skinner, 2012). The drug came to be a part of white working class life and trauma, and once again changed its status as a political object. It was bound up with a number of existential threats – economic, social, and racial – which fundamentally altered the meaning and trajectory of white working class life in North America. As with other drug related panics this new regime misses out or diminishes the experiences of users who do not fit this discourse, who belong to other ethnic groups and/or are suburban or urban based (King, 2014).
In a literal sense they are a power category, as in, one which is especially potent in the mind and body of the user, and one which emphasises potency in discourse and use (Kennedy and Coelho, 2020). Potency has a double meaning: both positively powerful and because of that risky and dangerous. The ability of a drug to inscribe its history on the users’ body is a signal of its long term potency (Dennis, 2019). I argue that as opioids have come into the illicit drug market they have brought this meaning with them, and have shifted focus from users’ intoxicant experience with the drug to an emphasis on the drug as powerful and challenging. The drugs’ potency introduces new challenges: it becomes unstable, and is hard to titrate into a predictable dose (Broadhurst et al., 2020). The language around it reflects that: it is estimated to be orders of magnitude stronger that heroin or morphine, and has a high fatality risk.
Method
The aim of this study was to conduct a visual ethnographic cultural analysis of how fentanyl and opioids are represented in digital drug markets. Research for this paper used searches on current darknet drug markets using the Ahmia tool https://ahmia.fi/ maintained by Juha Nurmi. Ahmia indexes cryptomarkets and provides a common interface for searching them. Common search terms were used covering opioids and known derivatives. Listings were downloaded and analysed according to thematic codes covering their visual and textual content.
Findings
The predominant opioids for sale on the darknet are oxycodone (aka OxyContin), heroin, hydrocodone, methadone, morphine and opium. Fentanyl is sometimes sold in the ‘other’ category and sometimes bracketed out into its own. Fentanyl is sold on the darknet in a range of forms: as pills, patches and powder. A typical listing is illustrated below, from Venus Marketplace.
Fentanyl was framed in different ways throughout the markets. It was presented as a contaminant in some listings for heroin. One said ‘Our heroin is uncut and comes directly to you. There is no fentanyl, or any other active cut’ (from Black Market). Another was at pains to say their ketamine was ‘TESTED AND FENTANYL-FREE. WE ENCOURAGE ALL OUR BUYERS TO TEST THEIR PRODUCT FOR THEIR OWN SAFETY’ (Helsinki Market, Ketamine). They also offered fentanyl testing strips free with a purchase.
Fentanyl in these listings is presented as a potential contaminant, a risky and unwanted substance. In some opioid listings it was presented as a dark other, a hyper dangerous drug which the opioid being sold was a softer, gentler version of. An oxycodone listing said of the product for sale:
These Oxycodone are a well known type of pill and are considered as the most wanted oxycodone pill on the market. They are made with an opiate which is alternative to fentanyl as fentanyl is considered dangerous and can be harmful for the user. (The Hidden Market, 10x m30 oxycodone mallinckrodt pharmaceuticals)
Fentanyl sellers presented an alternative narrative, one that focused on fentanyl as a powerful drug. A counter narrative presentation by sellers was one centered around pain treatment and that presented fentanyl as superior to other opioids
Fentanyl is an extremely potent synthetic opioid prescribed for the treatment of acute and chronic pain, usually in patients already tolerant to high doses of less powerful opioids such as morphine or oxycodone. Fentanyl is approximately 100 times more potent than morphine and 20 – 50 times more potent than heroin. (Deepshop, listing ‘Buy Fentanyl Powder Online)
Top of Form
Fentanyl listings validated the product through reference to its physical form. Sales offering it in powder form noted the relative rarity of this type and referred to it as ‘laboratory type’. Derivates such as acetyl fentanyl were often listed as ‘Research Chemicals’ when sold. As part of this pharmaceutical representation side effects were listed, which was unusual in comparison to more established drugs such as cocaine.
As a μ-opioid receptor agonist, acetyl fentanyl may serve as a direct substitute for heroin or other opioids. Side effects of fentanyl analogues are similar to those of fentanyl itself, which include pruritus, nausea and potentially severe respiratory depression. (CJ Market, Buy Fentanyl Powder Online Buy Acetyl Fentanyl Powder Online. Cheap and Trusted Supplier with Top Stealth USA, UK Canada, Australia and worldwide)
Sellers offering fentanyl itself were also not entirely positive about the drug. They often acknowledged the risk of overdose and death, describing it as a powerful painkiller with restricted use.
Opioids were presented in terms of their material characteristics. Most were sold in pill form and the sellers were at pains to say that the pills would behave as expected. They tried to demonstrate that they were professionally produced and would not break apart while being used. Sellers were aware that their customers would often want to transform their product into a more consumable form, one pill sellers saying that their customers liked to snort or inject the product. Customers’ responses focused on the potency and compared the product to others:
Pills are very weak, no tolerance barely felt a huge amount off of 1x pill. Similar to roughly 20mg of Morphine or so? This was taken orally how I would expect to take Oxycodone. Needed to take 3 for any decent effect, only problem with this, the high only lasts about 2 hours and then your tolerance is too high to take more so it becomes a waste. (feedback on The Hidden Market)
Opioids such as OxyContin were sold according to some of their pharmacological characteristics such as extended release versions. Overall then we can see how an illicit drug is both a pharmaceutical existing within a medical culture, and an illicit drug existing within a drug use subculture.
Discussion
It was apparent throughout the study how much substances were represented in terms of purity and potency. Potency could appear as something desired, and risky at the same time. In other research I have noted how potency becomes a distinct aspect of the opioid experience (Bancroft, 2020). It is striking how in these listings the drugs are recognised as dangerous for this reason. Potency has a complex position in the accounts of drug users. An unexpectedly potent effect can be reassuring, or thrilling. It tells them they are still able to feel pleasure, to experience risk and that their drug use is not wholly defined by addiction.
Sellers focused a great deal on the drugs’ distinct material characteristics, and these clearly separated them out from other drugs for sale such as cocaine, ecstasy and cannabis. Listings for those drugs focused on the drug effect, on the intoxicant effect it would have on the user. Opioid listings focused more on what the drug was. In a sense the drug became its own powerful ‘actor’ over which the seller presented themselves as having limited control.
The markets and the vendors presented tools to make the drug buying and consumption process transparent. More complex markets display ratings to support a rational approach to drug consumption. Testing was promoted to create an objective sense of what the drug was as a substance, and to show that what was being sold was uncontaminated. The ability of users to manage their use effectively was both supported and limited by this. The relative transparency about the products’ pharmaceutical qualities exposed the limits of users’ and vendors’ abilities to manage and limit pharmaceutical risks. To some extent this could be a fiction. Adulteration could be introduced further up the supply chain so it became impossible to avoid consuming unwanted adulterants. Although the markets were designed to get around supply chain risks they often highlighted and reproduced them. Problems arose when the supply chain was seen to introduce invasive substances (Mars et al., 2019) which fentanyl was often presented as.
Pain was unexpectedly central to the narrative. The power fentanyl had over pain was reiterated as evidence of the drug’s serious purpose and its strength. Much of this rhetoric was recycled from statements by pharmaceutical companies themselves. Many darknet market listings focused on pain medications, and this was a growing theme with several markets dedicated largely to pain relief.
Some of the shift in the drug market towards benzos, opioids and fentanyl is driven by changing demographics, by the emergency of integrated supply chain operations, and the political economy of the illicit drug market. Drug businesses operating in this way integrate different principles from those of sellers of established drugs. They demonstrate aptitudes in chemical-industrial processes, rather than for example, subcultural cultural nous, or involvement in drug subcultures. A contrast is sellers of psychedelics on the darknet, who show themselves as embedded in the principles of psychedelic culture, including a measure of altruism and a concern for harm reduction. Harms can be driven by supply chain needs such as fentanyl displacing heroin/opioids (Lamy et al., 2020). This has implications for policing, public health and harm reduction. Sellers of opioids and fentanyl recognise the drug as inherently dangerous, and therefore resistant to the common harm reduction advice to ‘start low and go slow’.
The generalisation of markets as a mode for illicit distribution and organisation has had wide ranging effects on how drug users obtain and consume drugs. As has happened more broadly in capitalist societies we have seen an expansion in the conscious use of market forms for identity formation, self-creation and expression. Market principles value certain qualities in both products and users: professionalism, the capacity to make objective judgements, to act as self directed, accountable agents, and invite drug users to express themselves as instrumental, reflexively hedonistic consumers. That extends even to drug cultures which are not seen to priories instrumental hedonism, such as those surround opioids. One worrisome effect of this is atomisation: consumption takes place outwith any kind of supportive network.
A further effect of markets is commodification and commoditisation. Drug markets are not immune from that, and one factor in the rise of opioids and benzos is that they are immediately commoditisable. The implications of commodification extend beyond what is sold to the nature of drug businesses themselves. Early trends we can observe are the replacement of the core/distributor model of drug business operation with integrated lab to user operations.
Conclusion
In capitalist societies markets are often presented as naturally occurring creations, places where people with something to sell and buy, and meet others with a need to fulfil meet in mutual exchange. Digital drug markets can promote and embed norms of destigmatisation and harm reduction but there are risks in where foregrounding of a market focused engagement with drug distribution can lead us. It may concentrate market power, promote bulk purchase, create supply chain risks and ultimately increase seller power. The rise of opioids can be seen as part of that process.
Bibliography
Afilipoaie A and Shortis P (2018) Crypto-Market Enforcement – New Strategy and Tactics. Swansea: Global Drug Policy Observatory.
Aldridge A (1998) Habitus and Cultural Capital in the Field of Personal Finance. The Sociological Review 46(1): 1–23. DOI: 10.1111/1467-954X.00087.
Aldridge J and Décary-Hétu D (2014) Not an “e-Bay for Drugs”: The Cryptomarket “Silk Road” as a Paradigm Shifting Criminal Innovation. Rochester, NY: Social Science Research Network.
Aldridge J and Décary-Hétu D (2016) Hidden Wholesale: The drug diffusing capacity of online drug cryptomarkets. International Journal of Drug Policy 35: 7–15. DOI: 10.1016/j.drugpo.2016.04.020.
Appel H (2016) Speculative Markets: Drug Circuits and Derivative Life in Nigeria, by Kristin Peterson. Journal of Cultural Economy 9(5). Routledge: 513–519. DOI: 10.1080/17530350.2016.1142888.
Bakken SA (2020) Drug dealers gone digital: using signalling theory to analyse criminal online personas and trust. Global Crime 0(0). Routledge: 1–23. DOI: 10.1080/17440572.2020.1806826.
Bakken SA, Moeller K and Sandberg S (2018) Coordination problems in cryptomarkets: Changes in cooperation, competition and valuation. European Journal of Criminology 15(4): 442–460. DOI: 10.1177/1477370817749177.
Bancroft A (2019) The Darknet and Smarter Crime: Methods for Investigating Criminal Entrepreneurs and the Illicit Drug Economy. Springer Nature.
Bancroft A (2020) Illicit Drugs and Intoxication. In: Hutton F (ed.) Cultures of Intoxication: Key Issues and Debates. Cham: Springer International Publishing, pp. 67–86. DOI: 10.1007/978-3-030-35284-4_4.
Bancroft A, Squirrell T, Zaunseder, A, et al. (2020) Producing trust among illicit actors: a techno-social approach to an online illicit market. Sociological Research Online 25(3): 456–472.
Barratt MJ, Allen M and Lenton S (2014) “PMA Sounds Fun”: Negotiating Drug Discourses Online. Substance Use & Misuse 49(8): 987–998. DOI: 10.3109/10826084.2013.852584.
Barratt MJ, Coney L, Aldridge J, Maier Larissa J, et al. (2017) An exploration of how cryptomarket emergence might increase the population prevalence of drug use: Initiation, widened repertoires and diffusion into regular supply. In: International Society for the Study of Drug Policy, Aarhus, 2017.
Barratt MJ, Coney L, Aldridge J, Maier Larisssa J., et al. (2017) Who initiates drug use through cryptomarkets? In: The 11th International Society for the Study of Drug Policy, 1 January 2017. Available at: https://espace.library.uq.edu.au/view/UQ:690040 (accessed 16 November 2017).
Barratt MJ, Lamy FR, Engel L, et al. (2022) Exploring Televend, an innovative combination of cryptomarket and messaging app technologies for trading prohibited drugs. Drug and Alcohol Dependence 231: 109243. DOI: 10.1016/j.drugalcdep.2021.109243.
Beckert J (2017) The Architecture of Illegal Markets: Towards an Economic Sociology of Illegality in the Economy.
Bilgrei OR (2016) From “herbal highs” to the “heroin of cannabis”: Exploring the evolving discourse on synthetic cannabinoid use in a Norwegian Internet drug forum. International Journal of Drug Policy 29: 1–8. DOI: 10.1016/j.drugpo.2016.01.011.
Bonica JJ (1991) History of pain concepts and pain therapy. The Mount Sinai journal of medicine, New York 58(3): 191–202.
Breger Bush S (2020) Opioid Ontopolitics: Industrial Capitalism, Metabolic Rift, and the Power of Things. International Journal of Drug Policy 82: 102794. DOI: 10.1016/j.drugpo.2020.102794.
Broadhurst R, Ball M, Trivedi H, et al. (2020) Fentanyl Availability on Darknet Markets. Available at: https://nla.gov.au/nla.obj-2478366826 (accessed 10 March 2020).
Bunting AM, Frank D, Arshonsky J, et al. (2021) Socially-supportive norms and mutual aid of people who use opioids: An analysis of Reddit during the initial COVID-19 pandemic. Drug and Alcohol Dependence 222: 108672. DOI: 10.1016/j.drugalcdep.2021.108672.
Childs A, Coomber R and Bull M (2020) Do Online Illicit Drug Market Exchanges Afford Rationality?: Contemporary Drug Problems. SAGE PublicationsSage CA: Los Angeles, CA. DOI: 10.1177/0091450920934186.
Childs A, Coomber R, Bull M, et al. (2020) Evolving and Diversifying Selling Practices on Drug Cryptomarkets: An Exploration of Off-Platform “Direct Dealing.” Journal of Drug Issues: 0022042619897425. DOI: 10.1177/0022042619897425.
Cunliffe J, Décary-Hêtu D and Pollak TA (2019) Nonmedical prescription psychiatric drug use and the darknet: A cryptomarket analysis. International Journal of Drug Policy. DOI: 10.1016/j.drugpo.2019.01.016.
Décary-Hétu D and Aldridge J (2013) DATACRYPTO: The dark net crawler and scraper. Software program.
Décary-Hétu D and Giommoni L (2017) Do police crackdowns disrupt drug cryptomarkets? A longitudinal analysis of the effects of Operation Onymous. Crime, Law and Social Change 67(1): 55–75. DOI: 10.1007/s10611-016-9644-4.
Demant J, Bakken SA, Oksanen A, et al. (2019) Drug dealing on Facebook, Snapchat and Instagram: A qualitative analysis of novel drug markets in the Nordic countries. Drug and Alcohol Review 38(4): 377–385. DOI: 10.1111/dar.12932.
Dennis F (2019) Injecting Bodies in More-than-Human Worlds. London: Routledge. DOI: 10.4324/9780429466137.
Duke K (2019) Producing the ‘problem’ of new psychoactive substances (NPS) in English prisons. International Journal of Drug Policy. DOI: 10.1016/j.drugpo.2019.05.022.
European Monitoring Centre for Drugs and Drug Addiction (2019) European Drug Report. Trends and Developments. 2019.
European Monitoring Centre for Drugs and Drug Addiction (2020) COVID-19 and Drugs Drug Supply via Darknet Markets. Available at: https://www.emcdda.europa.eu/system/files/publications/13042/EMCDDA-report_COVID19-darknet-final.pdf (accessed 20 July 2021).
Hall S, Winlow S and Ancrum C (2013) Criminal Identities and Consumer Culture: Crime, Exclusion and the New Culture of Narcissism. Willan.
Hansen H and Skinner ME (2012) From White Bullets to Black Markets and Greened Medicine: The Neuroeconomics and Neuroracial Politics of Opioid Pharmaceuticals. Annals of Anthropological Practice 36(1): 167–182. DOI: 10.1111/j.2153-9588.2012.01098.x.
Kennedy L and Coelho M (2020) “Absolutely the worst drug I’ve ever seen”: Risk, governance, and the construction of the illicit fentanyl “crisis.” Theoretical Criminology 24(4). SAGE Publications Ltd: 612–632. DOI: 10.1177/1362480619841907.
King S (2014) OxyContin in Ontario: The multiple materialities of prescription painkillers. International Journal of Drug Policy 25(3): 486–493. DOI: 10.1016/j.drugpo.2013.12.016.
Lamy FR, Daniulaityte R, Barratt MJ, et al. (2020) Listed for sale: analyzing data on fentanyl, fentanyl analogs and other novel synthetic opioids on one cryptomarket. Drug and Alcohol Dependence: 108115. DOI: 10.1016/j.drugalcdep.2020.108115.
Lamy FR, Daniulaityte R, Barratt MJ, et al. (2021) “Etazene, safer than heroin and fentanyl”: Non-fentanyl novel synthetic opioid listings on one darknet market. Drug and Alcohol Dependence 225: 108790. DOI: 10.1016/j.drugalcdep.2021.108790.
Lim CCW, Leung JKY, Connor JP, et al. (2020) Availability of substances for use in personal vaporisers on three online cryptomarkets. Drug and Alcohol Dependence 217: 108254. DOI: 10.1016/j.drugalcdep.2020.108254.
Mars SG, Rosenblum D and Ciccarone D (2019) Illicit fentanyls in the opioid street market: desired or imposed? Addiction 114(5): 774–780. DOI: 10.1111/add.14474.
Martin J (2014) Drugs on the Dark Net: How Cryptomarkets Are Transforming the Global Trade in Illicit Drugs. London: Palgrave Macmillan.
Martin J, Cunliffe J and Munksgaard R (2019) Cryptomarkets: A Research Companion. Bingley: Emerald. Available at: http://ebookcentral.proquest.com/lib/ed/detail.action?docID=5942788 (accessed 11 January 2021).
Measham F (2020) The NPS imposters, merging and emerging drug markets and the contribution of drug checking. In: Research Handbook on International Drug Policy. Edward Elgar Publishing, pp. 341–354. DOI: 10.4337/9781788117067.00030.
Measham F and Moore K (2009) Repertoires of distinction: Exploring patterns of weekend polydrug use within local leisure scenes across the English night time economy. Criminology & Criminal Justice 9(4): 437–464.
Moyle L, Childs A, Coomber R, et al. (2019) #Drugsforsale: An exploration of the use of social media and encrypted messaging apps to supply and access drugs. International Journal of Drug Policy 63: 101–110. DOI: 10.1016/j.drugpo.2018.08.005.
Potter GR and Chatwin C (2017) Not particularly special: critiquing ‘NPS’ as a category of drugs. Drugs: Education, Prevention and Policy 0(0): 1–8. DOI: 10.1080/09687637.2017.1411885.
Quinones S (2016) Dreamland: The True Tale of America’s Opiate Epidemic. Reprint edition. New York: Bloomsbury Press.
Saidashev R and Meylakhs A (2021) A qualitative analysis of the Russian cryptomarket Hydra. 53: 169–185. DOI: 10.3262/KJ2103169.
Sherman M (2017) Opiates for the masses: constructing a market for prescription (pain)killers. Journal of Cultural Economy 10(6). Routledge: 485–497. DOI: 10.1080/17530350.2017.1352010.
Winstock PAR (2021) Global Drug Survey 2020 Key Findings. London: Global Drug Survey.