Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/128137
題名: 非傳統安全觀點下之暗網市場初探:以五個主要成功打擊暗網交易市場之各國政府行動為例
An Exploratory Research of Darknet Marketplaces under the Non-Traditional Security Scope: An Example of Five Major Successful Operations against Darknet Marketplaces by Governments
作者: 王灝元
Wang, Hao-Yuan
貢獻者: 薛健吾<br>陳秉逵
Hsueh, Chien-Wu<br>Chen, Ping-Kuei
王灝元
Wang, Hao-Yuan
關鍵詞: 非傳統安全
暗網
暗網交易市場
暗網打擊行動
國際合作理論
新自由制度主義
霸權穩定論
non-traditional security
Darknet
Darknet marketplaces
Darknet operations
international cooperation theories
neoliberal institutionalism
hegemonic stability theory
日期: 2019
上傳時間: 3-Jan-2020
摘要: 暗網作為一個能提供用戶匿名與隱私的特殊網路空間,存在著許多交易市場網站,進行以毒品與詐欺等多種非法物品與服務的跨國交易。針對暗網市場所帶來的挑戰,本研究討論以下三個議題:一為暗網交易市場網站所帶給當今國家的非傳統安全意義,二為國家能夠成功打擊暗網交易市場的原因,三為各國際合作理論中何者更能符合國家打擊暗網交易市場經驗。本研究分別有以下發現:第一,暗網交易市場綜合洋蔥路由暗網(The Onion Router)本身的加密與中繼連線機制以及市場網站所採用之交易與安全機制,驅動暗網上不法交易成長,進而對國家社會與經濟層面造成衝擊,成為非傳統安全威脅來源之一。第二,在成功打擊行動分析與比較上,國家依循著獲知市場負責人真實身分以及網站伺服器位址兩種途徑,並主要仰賴人為操作疏失或漏洞等機緣來獲得線索。第三,在理論適用方面,打擊行動經驗除了與新自由制度主義理論觀點相符外,更因為有美國執法機關關鍵性的技術資源投入,使霸權穩定論得以與新自由制度主義兼容並蓄。本研究因此認為,在新興的資訊議題上,「科技力」能補充過去霸權穩定論較為重視的經濟與軍事力量,成為未來相關學者所需重視的權力型態。
As a cyberspace that provides anonymity and privacy, Darknet enables worldwide transactions of various illicit goods and services, particularly drugs and fraud, to flourish on the marketplace websites. In response to the challenges brought by Darknet marketplaces, this thesis aims to explore the following issues: (1) the non-traditional security threat implication of Darknet marketplaces, (2) the success factors in past operations against Darknet marketplaces, (3) to find out which international cooperation theory best matches the experiences of past operations against Darknet marketplaces. The findings are as follows: (1) The Onion Router’s employment of encryption and relays, combined with the transaction and security mechanisms of marketplace websites, are the drives behind the growing illicit transactions on Darknet. (2) In terms of the success factors, the operations against Darknet marketplaces mainly rely upon the element of opportunities, such as ineffective operational security and vulnerabilities. (3) On theory application, the experiences of the examined operations are overall consistent with the perspective of neoliberal institutionalism. More importantly, this thesis also recognizes the critical input of technological resources from the USA law enforcement agencies in these operations, which is strongly supported by the hegemonic stability theory, thus indicating a harmony with neoliberal institutionalism. This study, therefore, suggests that in the face of emerging technology issues, the “technological power” should be a form of power worthy of future security studies’ attention that complements the hegemonic stability theory’s existing emphasis on economic and military powers.
參考文獻: 外文部分\n\nAcharya, A. (2001). Constructing A Security Community in Southeast Asia: ASEAN and the Problem of Regional. New York, N.Y.: Routledge.\n\nAfilipoaie, A., & Shortis, P. (2015, January). A year since the closure of Silk Road:a snapshot of evolved Dark Net drug markets (October–November 2014). Retrieved August 1, 2019, from Swansea University: https://www.swansea.ac.uk/media/A-year-since-the-closure-of-Silk-Road-Snapshot-of-evolved-Dark-Net-drug-markets.pdf\n\nAldridge, J., & Décary-Hétu, D. (2014). Not an ‘Ebay for Drugs’: The Cryptomarket ‘Silk Road’ as a Paradigm Shifting Criminal Innovation. Working Paper.\n\nAlphaBay Takedown. (2017, July 20). Retrieved May 12, 2019, from FBI: https://www.fbi.gov/news/stories/alphabay-takedown\n\nAmbrose, S. (2015, November 25). Russia sues company for failing to reveal anonymous Internet users. Retrieved from The Daily Caller: https://dailycaller.com/2015/11/25/russia-sues-company-for-failing-to-reveal-anonymous-internet-users/\n\nAppelbaum, J. (2011, August 1). Tor, Anonymity, and the Arab Spring. (I. Zahorsky, Interviewer)\n\nArquilla, J. (2012). Rebuttal: Cyberwar is Already upon Us. Foreign Policy(192), 84-85.\n\nBall, J., Schneier, B., & Greenwald, G. (2013, October 4). NSA and GCHQ target Tor network that protects anonymity of web users. Retrieved from The Guardian: https://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption\n\nBaraniuk, C. (2017, July 20). AlphaBay and Hansa dark web markets shut down. Retrieved May 17, 2019, from BBC: https://www.bbc.com/news/technology-40670010\n\nBarrett, S. (2010). Why Cooperate?: The Incentive to Supply Global Public Goods. Oxford University Press.\n\nBerkman, F. (2013, December 30). New Dread Pirate Roberts abandons ship on Silk Road 2.0. Retrieved May 26, 2019, from Mashable: https://mashable.com/2013/12/29/silk-road-2-0-reopens/\n\nBetz, D. (2012). Cyberpower in Strategic Affairs: Neither Unthinkable nor Blessed. Journal of Strategic Studies, 35(5), 689-711.\n\nBetz, D., & Stevens, T. (2011). Cyberspace and the State: Toward a Strategy for Cyber-Power. New York: Routledge.\n\nBiryukov, A., Pustogarov, I., Thill, F., & Weinmann, R. (2014). Content and Popularity Analysis of Tor Hidden Services. Proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (pp. 188-193). Washington DC, USA: IEEE Computer Society.\n\nBitcoin Cash Price Chart. (2011). Retrieved May 22, 2019, from Bitcoin: https://charts.bitcoin.com/bch/chart/price\n\nBlake Benthall-Register no.20045-111. (n.d.). Retrieved from Federal Bureau of Prisons: https://www.bop.gov/inmateloc/\n\nBlake, A. (2019, April 12). Thomas White sentenced to over 5 years in ‘Silk Road 2.0’ case. Retrieved May 28, 2019, from The Washington Times: https://www.washingtontimes.com/news/2019/apr/12/silk-road-20-leader-thomas-white-sentenced-to-more/\n\nBradbury, D. (2013, October 3). Silk Road fell due to a catalogue of errors by owner Ross Ulbricht. Retrieved May 24, 2019, from Coindesk: https://www.coindesk.com/ross-ulbrichts-silk-road-head-smacking-rookie-errors\n\nBreithut, J. (2019, March 15). Paragraf würde Bürgerrechte sehr stark einschränken. Retrieved May 17, 2019, from Spiegel: https://www.spiegel.de/netzwelt/netzpolitik/darknet-darum-geht-es-freitag-in-der-abstimmung-im-bundesrat-a-1257867.html\n\nBundesrat. (2019, March 15). Entwurf eines Strafrechtsänderungsgesetzes - Einführung einer eigenständigen Strafbarkeit für das Betreiben von internetbasierten Handelsplattformen für illegale Waren und Dienstleistungen. Retrieved from Bundesrat: https://www.bundesrat.de/SharedDocs/TO/975/erl/10.pdf?__blob=publicationFile&v=1\n\nBuxton, J., & Bingham, T. (2015). The Rise and Challenge of Dark Net Drug Markets. Swansea: Global Drug Policy Observatory.\n\nBuzan, B. (1983). People, States and Fear: The National Security Problem in International Relations. Sussex: The University of North Carolina Press.\n\nBuzan, B., & Hansen, L. (2009). The Evolution of International Security Studies. Cambridge University Press.\n\nBuzan, B., & Waever, O. (2003). Regions and Powers: The Structure of International Security. Cambridge University Press.\n\nCaballero-Anthony, M. (2016). An Introduction to Non-Traditional Security Studies:A Transnational Approach. London, UK: SAGE Publications Ltd.\n\nChayes, A., & Chayes, A. H. (1993, March). On Compliance. International Organization, 47(2), 175-205.\n\nChen, A. (2011, June 1). The Underground Website Where You Can Buy Any Drug Imaginable. Retrieved May 22, 2019, from Gawker: https://gawker.com/the-underground-website-where-you-can-buy-any-drug-imag-30818160\n\nChertoff, M., & Simon, T. (2015). The Impact of the Dark Web on Internet Governance and Cyber Security. Centre for International Governance Innovation.\n\nChristin, N. (2012). Traveling the Silk Road: A measurement analysis [Working Paper]. Carnegie Mellon INI/CyLab.\n\nCimpanu, C. (2017, July 14). AlphaBay Dark Web market taken down after law enforcement raids. Retrieved May 29, 2019, from Bleeping Computer: https://www.bleepingcomputer.com/news/security/alphabay-dark-web-market-taken-down-after-law-enforcement-raids/\n\nClark, R., & Knake, R. (2010). Cyber War: The Next Threat to National Security and What to Do about It. New York, NY: HarperCollins.\n\nClemmitt, M. (2016). The Dark Web. Retrieved May 17, 2019, from CQ Researcher Online: http://library.cqpress.com/cqresearcher/document.php?id=cqresrre2016011500\n\nContents of Silkkitie web server seized by Finnish Customs – major breakthrough against the anonymous Tor network [Press Release]. (2019, May 3). Retrieved May 31, 2019, from Tulli: https://tulli.fi/en/article/-/asset_publisher/suomen-tulli-takavarikoi-silkkitien-verkkopalvelimen-sisallon-merkittava-onnistuminen-anonyymissa-tor-verkossa\n\nCorfield, G. (2019, January 29). I helped catch Silk Road boss Ross Ulbricht: Undercover agent tells all. Retrieved May 23, 2019, from The Register: https://www.theregister.co.uk/2019/01/29/how_i_caught_silk_road_mastermind/\n\nCox, J. (2014, December 13). Tracking cirrus: is this the Silk Road 2.0 mole? Retrieved May 26, 2019, from Vice: https://www.vice.com/en_us/article/gvywzm/tracking-cirrus-is-this-the-silk-road-20-mole\n\nCox, J. (2015a, July 28). The questionable numbers around Europol’s Dark Net crackdown. Retrieved May 28, 2019, from The Daily Dot: https://www.dailydot.com/crime/europol-dark-net-silk-road-operation-onymous/\n\nCox, J. (2015b, November 12). Court docs show a university helped FBI bust Silk Road 2, child porn suspects. Retrieved May 28, 2019, from Vice: https://www.vice.com/en_us/article/gv5x4q/court-docs-show-a-university-helped-fbi-bust-silk-road-2-child-porn-suspects\n\nCox, J. (2016, Febrary 24). Confirmed: Carnegie Mellon University Attacked Tor, Was Subpoenaed By Feds. Retrieved May 17, 2019, from Vice: https://www.vice.com/en_us/article/d7yp5a/carnegie-mellon-university-attacked-tor-was-subpoenaed-by-feds\n\nCox, J. (2017a, July 20). The Dark Web Gun Trade May Be Bigger Than You Think. Retrieved May 12, 2019, from Vice: https://www.vice.com/en_us/article/j5qnbg/dark-web-gun-trade-study-rand\n\nCox, J. (2017b, August 25). This is how cops trick Dark-Web criminals into unmasking themselves. Retrieved May 31, 2019, from Daily Beast: https://www.thedailybeast.com/this-is-how-cops-trick-dark-web-drug-dealers-into-unmasking-themselves\n\nCox, J. (2019, May 30). Silk Road 2.0 admin may only be prosecuted for tax crimes after cooperating with Feds. Retrieved June 14, 2019, from Vice: https://www.vice.com/en_us/article/nea4kw/silk-road-2-admin-defcon-blake-benthall-tax-crimes-cooperate\n\nCronk, T. (2018, September 21). White House Releases First National Cyber Strategy in 15 Years. Retrieved May 17, 2019, from Department of Defense: https://dod.defense.gov/News/Article/Article/1641969/white-house-releases-first-national-cyber-strategy-in-15-years/\n\nDaniel, S., Bashroush, R., & Julie, W. (2017). Towards a More Representative Definition of Cyber Security. Journal of Digital Forensics, Security and Law, 12(2), 53-74.\n\nDannreuther, R. (2013). International Security: The Contemporary Agenda (2nd ed.). Maldan, MA: Polity.\n\nDark Web Market List. (2019, May 9). Retrieved May 9, 2019, from Dark Web News: https://darkwebnews.com/dark-web-market-list/\n\nDarknet hidden services facing large scale DDoS attacks. (2017, October 25). Retrieved June 14, 2019, from\nDarkOwl: https://www.darkowl.com/blog/2017/darknet-hidden-services-facing-large-scale-ddos-attacks\n\nDarknet users face major inconveniences through phishing sites. (2019, April 1). Retrieved June 14, 2019, from Dark Web Link: https://www.darkweblink.com/darknet-users-face-major-inconveniences-through-phishing-sites/\n\nDécary-Hétu, D., & Giommoni, L. (2016). Do Police Crackdowns Disrupt Drug Cryptomarkets? A Longitudinal Analysis of the Effects of Operation Onymous. Crime, Law and Social Change, 67(1), 55-75.\n\nDécary-Hétu, D., Broséus, J., Rhumorbarbe, D., Mireault, C., Ouellette, V., & Crispino, F. (2016, July). Studying illicit drug trafficking on Darknet markets: Structure and organisation from a Canadian perspective. Forensic Science International, 264, 7-14.\n\nDeclaration of Christopher Tarbell. (2014, September 5). Retrieved May 23, 2019, from Scribd: https://www.scribd.com/document/238844570/FBI-Explanation-of-Silk-Road-vulnerability#fullscreen&from_embed\n\nDeibert, R., & Rohozinski, R. (2010). Risking Security: Policies and Paradoxes of Cyberspace Security. International Political Sociology, 4(1), 15-32.\n\nDeutsch, K. (1957). Political Community and the North Atlantic Area: International Organization in the Light of Historical Experience. Princeton, N.J.: Princeton University Press.\n\nDeutsch, K. (1961). Security Communities. In International Politics and Foreign Policy (pp. 98-105). New York, N.Y.: Free Press.\n\nDifferent types of Darknet markets. (2016, May 31). Retrieved April 30, 2019, from Russian Anonymous Marketplace (R.A.M.P.): https://russiananonymousmarketplace.com/different-types-of-darknet-markets/\n\nDigital Citizens Alliance. (2014a, April). Busted, but not broken:The state of Silk Road and the Darknet marketplaces. Retrieved May 28, 2019, from https://web.archive.org/web/20190217084859/https://media.gractions.com/314A5A5A9ABBBBC5E3BD824CF47C46EF4B9D3A76/5f8d4168-c36a-4f78-b048-f5d48b18dc0a.pdf\n\nDigital Citizens Alliance. (2014b, December 17). Darknet marketplace watch - Monitoring sales of illegal drugs on the Darknet. Retrieved from https://web.archive.org/web/20141230210413/http://www.digitalcitizensalliance.org/cac/alliance/content.aspx?page=Darknet\n\nDingledine, R., Syverson, P., & Mathewson, N. (2004). Tor: The Second-generation Onion Router. Proceedings of the 13th Conference on USENIX Security Symposium. 13, pp. 21-21. San Diego, CA: USENIX Association.\n\nDoJ Office of Public Affairs. (2014, November 7). More than 400 .Onion addresses, including dozens of ‘Dark Market’ sites, targeted as part of global enforcement action on Tor network [Press Release]. Retrieved May 24, 2019, from FBI: https://www.fbi.gov/news/pressrel/press-releases/more-than-400-.onion-addresses-including-dozens-of-dark-market-sites-targeted-as-part-of-global-enforcement-action-on-tor-network\n\nDozens of online “Dark Markets” seized pursuant to forfeiture complaint filed in Manhattan Federal Court in conjunction with the arrest of the Operator Of Silk Road 2.0 [Press Release]. (2014, November 7). Retrieved May 28, 2019, from Department of Justice: https://www.justice.gov/usao-sdny/pr/dozens-online-dark-markets-seized-pursuant-forfeiture-complaint-filed-manhattan-federal\n\nDuncan, I. (2013, November 18). Fall of online drug bazaar Silk Road began with tip to Md. agents. Retrieved May 24, 2019, from The Baltimore Sun: https://www.baltimoresun.com/news/maryland/baltimore-city/bs-md-ci-inside-silk-road-20131118-story.html\n\nDunn-Cavelty, M. (2010). Cyber-Security. In A. Collins, Contemporary Security Studies. Oxford: Oxford University Press.\n\nEgan, M. (2019, January 30). Thinking of venturing on to the Dark Web? You might want to change your mind. Retrieved April 26, 2019, from Tech Advisor: https://www.techadvisor.co.uk/how-to/internet/dark-web-3593569/\n\nEMCDDA & Europol. (2017, November 28). Drugs and the darknet: perspectives for enforcement, research and policy. Retrieved June 13, 2019, from Europol: https://www.europol.europa.eu/sites/default/files/documents/drugs_and_the_darknet_-_td0417834enn.pdf\n\nEmpire Market: A Clone of AlphaBay Market Launched. (2018, March 9). Retrieved April 1, 2019, from Dark Web News: https://darkwebnews.com/darknet-markets/empire-market-alphabay-clone/\n\nEriksson, J., & Giacomello, G. (2014). International Relations, Cybersecurity, and Content Analysis: A\n\nConstructivist Approach. In M. Mayer, M. Carpes, & R. Knoblich, The Global Politics of Science and Technology (Vol. 2, pp. 205-219). Springer.\n\nEuropol. (2014, November 7). Global action against dark markets on Tor network [Press Release]. Retrieved May 24, 2019, from Europol: https://www.europol.europa.eu/newsroom/news/global-action-against-dark-markets-tor-network\n\nEuropol. (2017, July 20). Massive blow to criminal Dark Web activities after globally coordinated operation [Press Release]. Retrieved May 31, 2019, from Europol: https://www.europol.europa.eu/newsroom/news/massive-blow-to-criminal-dark-web-activities-after-globally-coordinated-operation\n\nEuropol. (2018, May 29). Crime on the dark web: law enforcement coordination is the only cure. Retrieved May 17, 2019, from Europol: https://www.europol.europa.eu/newsroom/news/crime-dark-web-law-enforcement-coordination-only-cure\n\nEuropol. (2019, May 3). Double blow to dark web marketplaces [Press Release]. Retrieved May 31, 2019, from\nEuropol: https://www.europol.europa.eu/newsroom/news/double-blow-to-dark-web-marketplaces\n\nGilpin, R. (1987). The Political Economy of International Relations. Princeton, N.J.: Princeton University Press.\n\nGold, S. (2014, November 19). Operation Onymous - are the FBI’s claims transparent enough? Retrieved May 28, 2019, from SC Media UK: https://www.scmagazineuk.com/operation-onymous-fbis-claims-transparent-enough/article/1480901\n\nGreenberg, A. (2013, April 29). Collected Quotations Of The Dread Pirate Roberts, Founder Of Underground Drug Site Silk Road And Radical Libertarian. Retrieved from Forbes: https://www.forbes.com/sites/andygreenberg/2013/04/29/collected-quotations-of-the-dread-pirate-roberts-founder-of-the-drug-site-silk-road-and-radical-libertarian/#680927bf1b0c\n\nGreenberg, A. (2014, November 7). Global web crackdown arrests 17, seizes hundreds of Dark Net domains. Retrieved May 25, 2019, from WIRED: https://www.wired.com/2014/11/operation-onymous-dark-web-arrests/\n\nGreenberg, A. (2015, August 26). Agora, the Dark Web’s biggest drug market, is going down. Retrieved May 29, 2019, from WIRED: https://www.wired.com/2015/08/agora-dark-webs-biggest-drug-market-going-offline/\n\nGreenberg, A. (2017, July 20). Global police spring a trap on thousands of darkweb users. Retrieved June 20, 2019, from WIRED: https://www.wired.com/story/alphabay-hansa-takedown-dark-web-trap/\n\nGreenberg, A. (2018, March 8). Operation Bayonet: inside the sting that hijacked an entire Dark Web drug market. Retrieved May 30, 2019, from WIRED: https://www.wired.com/story/hansa-dutch-police-sting-operation/\n\nHaas, B. (1958). The Uniting of Europe: Political, Social, and Economic Forces, 1950-1957. Stanford, C.A.: Stanford University Press.\n\nHacking Communities in the Deep Web. (2019, January 15). Retrieved May 12, 2019, from Infosec: https://resources.infosecinstitute.com/hacking-communities-in-the-deep-web/\n\nHansa market capture detailed in-depth analysis. (2017, July 25). Retrieved May 31, 2019, from Stemmit: https://steemit.com/darkweb/@nutela/hansa-market-capture-detailed-in-depth-analysis\n\nHansen, L., & Niessenbaum, H. (2009). Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 1155-1175.\n\nHern, A. (2013, October 3). Five stupid things Dread Pirate Roberts did to get arrested. Retrieved from The Guardian: https://www.theguardian.com/technology/2013/oct/03/five-stupid-things-dread-pirate-roberts-did-to-get-arrested\n\nHolt, T., Copeland, C., & Wallin, M. (2019). Assessing the Practices and Products of Darkweb. Deviant Behavior, 1-20.\n\nHugBunter. (2017, July 13). AlphaBay: Some info from your friendly neighbourhood Spider-man. Retrieved from\nhttp://web.archive.org/web/20170721082829/https://www.reddit.com/r/DarkNetMarkets/comments/6n144w/alphabay_some_info_from_your_friendly/\n\nHullinger, J. (2016, January 7). Do People Really Buy Guns On The Dark Web? Retrieved May 12, 2019, from FastCompany: https://www.fastcompany.com/3055187/do-people-really-buy-guns-on-the-dark-web\n\nICE. (2017, November 15). ICE investigators expose Darknet criminals to the light. Retrieved May 23, 2019, from U.S. Immigration and Customs Enforcement: https://www.ice.gov/features/darknet\n\nIkenberry, G. (1989). Rethinking the Origins of American Hegemony. Political Science, 104(3), 375-400.\n\nIlascu, I. (2019, May 4). Dark Web’s Wall Street Market & Valhalla seized, six arrested. Retrieved September 4, 2019, from Bleeping Computer: https://www.bleepingcomputer.com/news/security/dark-web-s-wall-street-market-and-valhalla-seized-six-arrested/\n\nInternational law enforcement deals major blow to dark web markets. (2014, November 7). Retrieved from https://web.archive.org/web/20150416193853/http://www.nationalcrimeagency.gov.uk/news/news-listings/483-international-law-enforcement-deals-major-blow-to-dark-web-markets\n\nInterview with AlphaBay Market admin. (2015, April 20). Retrieved from https://web.archive.org/web/20170129180947/https://www.deepdotweb.com/2015/04/20/interview-with-alphabay-admin/\n\nIpsos. (2016). Seven in Ten (71%) Global Citizens say the “Dark Net” should be Shut Down; Three in Ten (29%) Disagree. Centre for International Governance Innovation.\n\nIT pro needed for venture backed bitcoin startup. (2011, October 11). Retrieved May 24, 2019, from Bitcointalk: https://bitcointalk.org/index.php?topic=47811.0\n\nJardine, E. (2015). The Dark Web Dilemma: Tor, Anonymity and Online Policing. Centre for International Governance Innovation.\n\nJarmon, J., & Yannakogeorgos, P. (2018). The Cyber Threat and Globalization: The Impact on U.S. National and International Security. Lanham, MD: Rowman & Littlefield.\n\nKelly, J. (2015, September 20). DARPA Memex: How It Works and What It’s Up To — Really. Retrieved May 17, 2019, from aNewDomain: http://anewdomain.net/pentagon-plummets-darknet-memex/\n\nKeohane, R. (1984). After Hegemony: Cooperation and Discord in the World Political Economy. Princeton, N.J.: Princeton University Press.\n\nKim, V. (2014, September 3). Dutch national pleads guilty to running online marketplace for drugs. Retrieved June 20, 2019, from Los Angeles Times: https://www.latimes.com/local/la-me-online-drug-marketplace-20140904-story.html\n\nKindleberger, C. (1973). The World in Depression, 1929-1939. Berkeley, CA: University of California Press.\n\nKindleberger, C. (1981). Dominance and Leadership in the International Economy: Exploitation, Public Goods, and Free Rides. International Studies, 25(2), 242-254.\n\nKing, G., Pan, J., & Roberts, M. (2013, May). How Censorship in China Allows Government Criticism but Silences Collective Expression. American Political Science Review, 107(2), 326-343.\n\nKlimburg, A. (2011). Mobilising Cyber Power. Survival, 53(1), 41-60.\n\nKlotz, A., & Lynch, C. (2007). Strategies for Research in Constructivist International Relations. New York: Routledge.\n\nKucik, J., & Reinhardt, E. (2008). Does Flexibility Promote Cooperation? An Application to the Global Trade Regime. International Organization, 62(3), 477-505.\n\nLaursen, F. (2010). Regional Integration: Some Introductory Reflections. In F. Laursen, Comparative Regional Integration: Europe and Beyond (pp. 6–7). Burlington, V.T.: Ashgate.\n\nLawrence, D. (2014, January 24). The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built. Retrieved November 12, 2019, from Bloomberg: https://www.bloomberg.com/news/articles/2014-01-23/tor-anonymity-software-vs-dot-the-national-security-agency\n\nLee, D. (2014, November 10). Dark net raids were ‘overblown’ by police, says Tor Project. Retrieved May 28, 2019, from BBC: https://www.bbc.com/news/technology-29987379\n\nLevine, Y. (2014, July 16). Almost Everyone Involved in Developing Tor was (or is) Funded by the US Government. Retrieved April 26, 2019, from Pando: https://pando.com/2014/07/16/tor-spooks/\n\nLloyd, T. (2019, April 23). Exit scam: Suspicion grows over Dark-Web market’s $30 million crypto theft. Retrieved May 31, 2019, from CCN: https://www.ccn.com/exit-scam-ark-web-market-30-million-theft\n\nMaurer, T., & Hinck, G. (2018, December 21). Russia’s Cyber Strategy. Retrieved May 17, 2019, from https://www.ispionline.it/en/pubblicazione/russias-cyber-strategy-21835\n\nMcClean, W. (2010, September 24). UPDATE 2-Cyber attack appears to target Iran-tech firms. Retrieved May 17, 2019, from Reuters: https://www.reuters.com/article/security-cyber-iran/update-2-cyber-attack-appears-to-target-iran-tech-firms-idUSLDE68N1OI20100924\n\nMcmillan, R., & Viswanatha, A. (2017, July 13). llegal-goods website AlphaBay shut following law-enforcement action. Retrieved May 30, 2019, from The Wall Street Journal: https://www.wsj.com/articles/illegal-goods-website-alphabay-shut-following-law-enforcement-action-1499968444?mod=rsswn\n\nMearsheimer, J. (1994). The False Promise of International Institutions. International Security, 19(3), 5-49.\n\nMearsheimer, J. (2001). The Tragedy of Great Power Politics. New York, N.Y.: W.W. Norton & Company.\n\nMiltenburg, O. v. (2019, May 3). Duitse recherche neemt WSM-darknetmarktplaats over met hulp Nederlandse politie. Retrieved May 31, 2019, from Tweakers: https://tweakers.net/nieuws/152360/duitse-recherche-neemt-wsm-darknetmarktplaats-over-met-hulp-nederlandse-politie.html\n\nMitrany, D. (1948). The Functional Approach to World Organization. International Affairs, 24(3), 350–363.\n\nModderkolk, H., & Kreling, T. (2016a, June 7). De dealer die in de Amerikaanse val werd gelokt. Retrieved July 31, 2019, from de Volkskrant: https://www.volkskrant.nl/nieuws-achtergrond/de-dealer-die-in-de-amerikaanse-val-werd-gelokt~b3d90c14/\n\nModderkolk, H., & Kreling, T. (2016b, June 7). Nederland werkte mee aan uitlokking door VS, Kamer onjuist geïnformeerd. Retrieved July 31, 2019, from de Volkskrant: https://www.volkskrant.nl/nieuws-achtergrond/nederland-werkte-mee-aan-uitlokking-door-vs-kamer-onjuist-geinformeerd~bb584ff5/\n\nMoore, D., & Rid, T. (2016, February 1). Cryptopolitik and the Darknet. Survival, 58(1), 7-38.\n\nMoravcsik, A. (1998). The Choice for Europe: Social Purpose and State Power from Messina to\nMaastricht. Ithaca, N.Y.: Cornell University Press.\n\nMorozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom. Cambridge, MA: Perseus Books.\n\nMullin, J. (2015, January 15). At Silk Road trial, federal agent explains how he trapped Ulbricht. Retrieved May 24, 2019, from Ars Technica: https://arstechnica.com/tech-policy/2015/01/silk-road-trial-federal-agent-explains-how-he-trapped-ulbricht/\n\nNewsroom of Sen. Joe Manchin. (2011, June 6). Manchin Urges Federal Law Enforcement to Shut Down Online Black Market for Illegal Drugs [Press Release]. Retrieved May 22, 2019, from U.S. Senator Joe Manchin of West Virginia: https://www.manchin.senate.gov/newsroom/press-releases/manchin-urges-federal-law-enforcement-to-shut-down-online-black-market-for-illegal-drugs\n\nNICCS. (2018, November 28). Explore Terms: A Glossary of Common Cybersecurity Terminology. Retrieved May 17, 2019, from NICCS: https://niccs.us-cert.gov/about-niccs/glossary#C\n\nNye, J. S. (2011). The Future of Power: Its Changing Nature and Use in the 21st Century. New York, NY: Public Affairs.\n\nO’Connell, J. (2016, June 30). Yes, You Can Still Buy Guns On The Interwebs. Retrieved May 12, 2019, from MerryJane: https://merryjane.com/news/yes-you-can-still-buy-guns-on-the-interwebs\n\nO’Neill, P. (2015, July 12). The real problem with Tor’s security. Retrieved May 23, 2019, from The Kernel: https://kernelmag.dailydot.com/issue-sections/features-issue-sections/13606/tor-arrest-history/\n\nOnline drugs dealer has US jail term cut by Dutch judges. (2016, June 22). Retrieved June 20, 2019, from Dutch News: https://www.dutchnews.nl/news/2016/06/online-drugs-dealer-has-us-jail-term-cut-by-dutch-judges/\n\nOrmsby, E. (2014). Silk Road. Sydney, Australia: Macmillan Publishers.\nOwen, G., & Savage, N. (2015). The Tor Dark Net. Centre for International Governance Innovation.\n\nOye, K. (1985). Explaining Cooperation under Anarchy: Hypotheses and Strategies. World Politics, 38(1), 1-24.\n\nParadyme, P. (2016, September 11). Tales from a dead man: Curtis Green on Silk Road, Ulbricht. Retrieved May 24, 2019, from Bitcoin: https://news.bitcoin.com/dead-man-curtis-green-silk-road/\nParis, R. (2001). Human Security: Paradigm Shift or Hot Air? International Security, 26(2), 87-102.\n\nPaul. (2017, July 21). This hidden site has been seized: The details on the darknet market takedowns. Retrieved May 31, 2019, from Invizbox: https://www.invizbox.com/details-darknet-market-takedowns/\n\nPeters, J. (2016, May 25). Top Dark Web markets: AlphaBay and stolen credentials. Retrieved May 29, 2019, from SurfWatch Labs: https://blog.surfwatchlabs.com/2016/05/25/top-dark-web-markets-alphabay-and-stolen-credentials/\n\nPhelps, A., & Watt, A. (2014, December). I shop online – recreationally! Internet anonymity and Silk Road enabling drug use in Australia. Digital Investigation, 11(4), 261-272.\n\nPictured: The Utah grandfather who lived a double life as a drug dealer working for the online black market Silk Road... before its founder ‘tried to have him killed for $80,000’. (2013, November 10). Retrieved May 23, 2019, from Daily Mail: https://www.dailymail.co.uk/news/article-2496874/Pictured-The-Utah-grandfather-lived-double-life-drug-dealer-online-black-market-Silk-Road-founder-tried-killed-80K.html\n\nPolitie Landelijke Eenheid. (2017, July 20). Persconferentie ontmanteling Hansa Market. Retrieved May 31, 2019, from Facebook: https://www.facebook.com/LandelijkeEenheid/videos/1101248416685149/\n\nPopper, N. (2015, December 25). The tax sleuth who took down a drug lord. Retrieved May 24, 2019, from The New York Times: https://www.nytimes.com/2015/12/27/business/dealbook/the-unsung-tax-agent-who-put-a-face-on-the-silk-road.html\n\nPopper, N. (2017, July 6). AlphaBay, biggest online drug bazaar, goes dark, and questions swirl. Retrieved May 29, 2019, from The New York Times: https://www.nytimes.com/2017/07/06/business/dealbook/alphabay-online-drug-bazaar-goes-dark.html\n\nPower, M. (2015, May 30). Life after Silk Road: how the darknet drugs market is booming. Retrieved August 1, 2019, from The Guardian: https://www.theguardian.com/technology/2014/may/30/life-after-silk-road-how-the-darknet-drugs-market-is-booming\n\nPower, M. (2019, April 10). The world’s biggest Dark Net market has shut down—What’s next? Retrieved September 6, 2019, from Vice: https://www.vice.com/en_us/article/wjmw3w/the-worlds-biggest-dark-net-market-has-shut-downwhats-next-1\n\nPress invitation: results of international investigation. (2017, July 20). Retrieved May 31, 2019, from Politie: https://www.politie.nl/en/news/2017/july/20/press-invitation.html\n\nPrice, R. (2017, July 6). One of the biggest dark web drug marketplaces went down, causing chaos for customers. Retrieved May 30, 2019, from Business Insider: https://www.businessinsider.com/dark-net-market-alphabay-down-exit-scam-accusations-2017-7\n\nProbleme du virus “esta foto so touyo” su [Fermé]. (2008, December 3). Retrieved from http://web.archive.org/web/20081210172820/http://www.commentcamarche.net/forum/affich-8982604-probleme-du-virus-esta-foto-so-touyo-su#12\n\nProtect your privacy. (n.d.). Retrieved June 14, 2019, from Bitcoin: https://bitcoin.org/en/protect-your-privacy\n\nRapoza, K. (2013, June 22). U.S. Hacked China Universities, Mobile Phones, Snowden Tells China Press. Retrieved May 17, 2019, from Forbes: https://www.forbes.com/sites/kenrapoza/2013/06/22/u-s-hacked-china-universities-mobile-phones-snowden-tells-china-press/#a132b1e53405\n\nRCMP’s ‘Dark Web’ investigation leads to searches in Montreal, Trois-Rivières. (2017, July 5). Retrieved May 30, 2019, from Montreal Gazatte: https://montrealgazette.com/news/local-news/rcmps-dark-web-investigation-leads-to-searches-in-montreal-trois-rivieres\n\nRe: a heroin store. (2011, January 29). Retrieved May 24, 2019, from Bitcointalk: https://bitcointalk.org/index.php?topic=175.msg42670#msg42670\n\nRhysider, J. (2018, October 15). Ep 24: Operation Bayonet. Retrieved May 29, 2019, from Darknet Diaries: https://darknetdiaries.com/episode/24/\n\nRid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 35(1), 5-32.\nSchlagenhauf, W. (2019, April 11). Dream Market will shut down at the end of April. What does that mean? Retrieved September 6, 2019, from The Hustle: https://thehustle.co/dream-market-sting-operation-global/\n\nSchneider, C. (2017). The Political Economy of Regional Integration. Annual Review of Political Science, 20(1), 231-234.\n\nSchumer pushes to shut down online drug marketplace. (2011, June 5). Retrieved May 22, 2019, from NBC Network: https://www.nbcnewyork.com/news/local/Schumer-Calls-on-Feds-to-Shut-Down-Online-Drug-Marketplace-123187958.html\n\nSchwartz, M. (2019, May 3). Darknet disruption: ‘Wall Street Market’ closed for business. Retrieved May 31, 2019, from iSMG: https://www.bankinfosecurity.com/darknet-disruption-wall-street-market-closed-for-business-a-12446\n\nSearch warrant affidavit for Brian Richard Farrell. (2015, January 7). Retrieved May 28, 2019, from Internet Archive: https://ia802601.us.archive.org/16/items/pdfy-lZxmjPaT0dNo6j58/2015-01-07-kingcountysuperiorcourt-brianfarrel-searchwarrantaffidavit.pdf\n\nSedgwick, K. (2019, April 6). Darknet buyers flock to Wall Street as Dream winds down. Retrieved May 31, 2019, from Bitcoin.com: https://news.bitcoin.com/darknet-buyers-flock-to-wall-street-as-dream-winds-down/\n\nSilk Road: anonymous marketplace. Feedback requested. (2011, March 1). Retrieved May 22, 2019, from Bitcointalk: https://bitcointalk.org/index.php?topic=3984.0\nSnidal, D. (1985). The Limits of Hegemonic Stability Theory. International Organization, 39(4), 579-614.\n\nSolingen, E. (2001). Mapping Internationalization: Domestic and Regional Impacts. International Studies, 45(4), 517-555.\n\nSoska, K., & Christin, N. (2015). Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. Proceedings of the 24th USENIX Security Symposium (pp. 33-48). Washington, D.C.: USENIX.\n\nStockley, M. (2015, July 1). Hundreds of Dark Web sites cloned and “booby trapped”. Retrieved June 14, 2019, from Naked Security by Sophos: https://nakedsecurity.sophos.com/2015/07/01/hundreds-of-dark-web-sites-cloned-and-booby-trapped/\n\nStudent behind $100m dark web site jailed for 5 years 4 months. (2019). Retrieved May 28, 2019, from National Crime Agency: https://nationalcrimeagency.gov.uk/news/student-behind-100m-dark-web-site-jailed-for-5-years-4-months\n\nSwenson, K. (2017, July 18). Suspected AlphaBay founder dies in Bangkok jail after shutdown of online black market. Retrieved May 31, 2019, from The Washington Post: https://www.washingtonpost.com/news/morning-mix/wp/2017/07/18/suspected-alphabay-founder-dies-in-bangkok-jail-while-online-black-market-remains-closed/?utm_term=.6f857f25acf6\n\nTarantola, A. (2015, August 18). Hackers dump stolen Ashley Madison data onto the Dark Web. Retrieved from Engadget: https://www.engadget.com/2015/08/18/ashley-madison-data-dumped-onto-dark-web/\n\nTerbium Labs. (2017, February 10). Economics of the Dark Web: Let it Be, Let it Be. Retrieved April 30, 2019, from Cybrary: https://www.cybrary.it/channelcontent/economics-of-the-dark-web-let-it-be-let-it-be/\n\nThe arrest of alleged persons responsible for the world’s second largest illegal online marketplace in the Darknet “Wall Street market” [Press Invitation]. (2019, May 3). Retrieved May 31, 2019, from BKA: https://www.bka.de/DE/Presse/Listenseite_Pressemitteilungen/2019/Presse2019/190503_WallStreetMarket.html;jsessionid=B9263CD8A38588520F76B599D79B35DC.live0612\n\nTitanium Project. (n.d.). Titanium Project-FAQ. Retrieved May 17, 2019, from Titanium Project: https://titanium-project.eu/faq/index.html\n\nTop 5 crypto exchanges–identity verification procedures. (2018, March 29). Retrieved June 14, 2019, from Trulioo: https://www.trulioo.com/blog/top-5-crypto-exchanges/\n\nTor Metrics: Relay Users. (2013). Retrieved April 26, 2019, from Tor Metrics: https://metrics.torproject.org/userstats-relay-country.html?start=2013-01-01&end=2013-12-31&country=all&events=off\n\nTor Metrics: Relay Users. (2018). Retrieved May 17, 2019, from Tor Project: https://metrics.torproject.org/userstats-relay-country.html?start=2018-01-01&end=2018-12-31&country=all&events=off\n\nTor onion service protocol. (n.d.). Retrieved June 10, 2019, from Tor Project: https://www.torproject.org/docs/onion-services.html.en\n\nTor security advisory: “relay early” traffic confirmation attack. (2014, July 30). Retrieved May 28, 2019, from Tor Project: https://blog.torproject.org/tor-security-advisory-relay-early-traffic-confirmation-attack\n\nTosbotn, R. (2016). NATO and Cyber Security: Critical Junctures as Catalysts for Change. Leiden University MA International Relations.\n\nTsing, W. (2019, April 29). Wall Street Market reported to have exit scammed. Retrieved May 31, 2019, from Malwarebytes: https://blog.malwarebytes.com/cybercrime/2019/04/wall-street-market-reported-to-have-exit-scammed/\n\nTwo of the biggest dark-web markets have been shut down. (2017, July 21). Retrieved May 29, 2019, from The Economist: https://www.economist.com/graphic-detail/2017/07/21/two-of-the-biggest-dark-web-markets-have-been-shut-down\n\nU.S. Attorney’s Office for the Central District of California. (2012, April 16). Creators and operators of on-line narcotics marketplace on the TOR network arrested on first of its kind Federal indictment charging drug trafficking in 34 Countries and 50 States [Press Release]. Retrieved from https://web.archive.org/web/20150402124027/http://www.justice.gov/usao/cac/Pressroom/2012/045.html\n\nU.S. Attorney’s Office for the Central District of California. (2014, September 3). Creator of on-line drug bazaar pleads guilty to Federal drug, money laundering charges for distributing narcotics around the world. Retrieved July 31, 2019, from U.S. Department of Justice: https://www.justice.gov/usao-cdca/pr/creator-line-drug-bazaar-pleads-guilty-federal-drug-money-laundering-charges\n\nU.S. Attorney’s Office for the Central District of California. (2019, May 3). 3 Germans who allegedly operated Dark Web marketplace with over 1 Million users face U.S. narcotics and money laundering charges [Press Release]. Retrieved May 31, 2019, from Department of Justice: https://www.justice.gov/usao-cdca/pr/3-germans-who-allegedly-operated-dark-web-marketplace-over-1-million-users-face-us\n\nU.S. Attorney’s Office for the Southern District of New York. (2013, October 25). Manhattan U.S. attorney announces seizure of additional $28 million worth of Bitcoins belonging to Ross William Ulbricht, alleged owner and operator of “Silk Road” website [Press Release]. Retrieved May 17, 2019, from FBI: https://archives.fbi.gov/archives/newyork/press-releases/2013/manhattan-u.s.-attorney-announces-seizure-of-additional-28-million-worth-of-bitcoins-belonging-to-ross-william-ulbricht-alleged-owner-and-operator-of-silk-road-website\n\nU.S. Attorney’s Office for the Southern District of New York. (2013, December 20). Manhattan U.S. Attorney announces charges against three individuals In Virginia, Ireland, and Australia for their roles in running the “Silk Road” website [Press Release]. Retrieved May 26, 2019, from Department of Justice: https://www.justice.gov/usao-sdny/pr/manhattan-us-attorney-announces-charges-against-three-individuals-virginia-ireland-and\n\nU.S. Attorney’s Office for the Southern District of New York. (2014, November 6). Operator of “Silk Road 2.0” website charged in Manhattan Federal Court [Press Release]. Retrieved May 26, 2019, from Department of Justice: https://www.justice.gov/usao-sdny/pr/operator-silk-road-20-website-charged-manhattan-federal-court\n\nU.S. Attorney’s Office for the Western District of Wisconsin. (2019, January 18). Man sentenced to 12 years for distributing fentanyl analogue that killed Florida man [Press Release]. Retrieved September 4, 2019, from Department of Justice: https://www.justice.gov/usao-wdwi/pr/man-sentenced-12-years-distributing-fentanyl-analogue-killed-florida-man\n\nUnited States v. Alexandre Cazes-Verified complaint for forfeiture in rem. (2017, July 19). Retrieved May 29, 2019, from Department of Justice: https://www.justice.gov/opa/press-release/file/982821/download\n\nUnited States v. Benthall-sealed complaint. (2014, October 29). Retrieved May 26, 2019, from Court Listener: https://www.courtlistener.com/docket/4522990/1/united-states-v-benthall/\n\nUnited States v. Farrell-order on defendant`s motion to compel. (2016, February 23). Retrieved May 28, 2019, from Court Listener: https://www.courtlistener.com/docket/4411538/58/united-states-v-farrell/\n\nUnited States v. Lousee, Frost, and Kalla-criminal complaint. (2019, May). Retrieved May 31, 2019, from Department of Justice: https://www.justice.gov/opa/press-release/file/1159706/download\n\nUnited States v. Marc Peter Willems et al. 2011 WL 7711663 (C.D.Cal.). (2011). Retrieved June 20, 2019, from WIRED: https://www.wired.com/images_blogs/threatlevel/2012/04/WILLEMSIndictment-FILED.045.pdf\n\nUnited States v. Marc Peter Willems-judgment and commitment. (2014, December 10). Retrieved June 20, 2019, from Court Listener: https://www.courtlistener.com/docket/4147864/334/united-states-v-willems/\n\nUnited States v. Marcos Paulo de Olivera-Annibale. (2019, May 2). Retrieved from Department of Justice: https://www.justice.gov/opa/press-release/file/1159711/download\n\nUnited States v. Ross William Ulbricht 2015 WL 495543 (S.D.N.Y.). (2015). Retrieved May 24, 2019, from Docket Alarm: https://www.docketalarm.com/cases/New_York_Southern_District_Court/1--14-cr-00068/USA_v._Ulbricht/183/\n\nUnited States v. Ross William Ulbricht- dropped superseding indictment. (2013, October 1). Retrieved May 17, 2019, from Publicintelligence: https://info.publicintelligence.net/SilkRoadIndictment.pdf\n\nUnited States v. Ross William Ulbricht-sealed complaint. (2013). Retrieved from Document Cloud: https://www.documentcloud.org/documents/801103-172770276-ulbricht-criminal-complaint.html\n\nUnited States v. Sheldon Kennedy-criminal complaint. (2014, January 31). Retrieved May 23, 2019, from antilop.cc: https://https://antilop.cc/sr/files/sheldon_kennedy_criminal_complaint.pdf/sr/files/sheldon_kennedy_criminal_complaint.pdf\n\nUutela, A. (2001). Drugs: Illicit Use and Prevention. In N. Smelser, & P. Baltes, International Encyclopedia of the Social & Behavioral Sciences (pp. 3877-3881). Elsevier.\n\nValhalla Market Review. (2018, July). Retrieved September 6, 2019, from Darknet Markets Link: https://darknetmarketslink.com/valhalla-market-review/\n\nVinton, K. (2014, November 7). So far Feds have only confirmed seizing 27 “dark market” sites In Operation Onymous. Retrieved May 24, 2019, from Forbes: https://www.forbes.com/sites/katevinton/2014/11/07/operation-onymous-dark-markets/#20b5d6202fcf\n\nWaever, O. (1995). Securitization and Desecuritization. In R. Lipschutz, On Security (pp. 46-87). New York: Columbia University Press.\n\nWalt, S. (1987). Origins of Alliances. Ithaca: Cornell University Press.\n\nWaltz, K. (1979). Theory of International Politics. Reading, M.A.: Addison-Wesley.\n\nWeimann, G. (2016). Terrorist Migration to the Dark Web. Perspectives on Terrorism, 10(3), 40-44.\n\nWendt, A. (1999). Social Theory of International Politics. Cambridge University Press.\n\nWilliams, C. (2019, February 11). 620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts. Retrieved May 17, 2019, from The Register: https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/\n\nWinstock, A. (2015). The Global Drug Survey 2015 findings. Retrieved August 1, 2019, from Global Drug Survey: http://www.globaldrugsurvey.com/the-global-drug-survey-2015-findings/\n\nWirdum, A. (2019, May 3). Major Darknet marketplace Wall Street Market shuttered by law enforcement. Retrieved September 6, 2019, from Bitcoin Magazine: https://bitcoinmagazine.com/articles/major-darknet-marketplace-wall-street-market-shuttered-law-enforcement\n\nWoolf, N. (2015, March 18). Bitcoin ‘exit scam’: deep-web market operators disappear with $12m. Retrieved May 29, 2019, from The Guardian: https://www.theguardian.com/technology/2015/mar/18/bitcoin-deep-web-evolution-exit-scam-12-million-dollars\n\nZetter, K. (2013, November 18). How the Feds took down the Silk Road drug wonderland. Retrieved May 23, 2019, from WIRED: https://www.wired.com/2013/11/silk-road/\n\nZetter, K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. New York: Crown.\n\n\n中文部分\n\nMonero-隱私的守護者(2019年六月3日)。2019年六月14日 擷取自 桑幣筆記: https://zombit.info/coin-monero/\n\n中國知名連鎖酒店集團 驚傳5億筆客戶個資外洩 (2018年八月29日)。2019年May月17日 擷取自 自由時報: https://news.ltn.com.tw/news/world/breakingnews/2535122\n\n王崑義 (2010)。非傳統安全與台灣軍事戰略的變革。台灣國際研究季刊, 6(2), 1-43。\n\n方天賜等 (2018)。臺灣與非傳統安全 (第 二 版)。臺北市: 五南出版社。\n\n李淑雲 (2004)。非傳統安全的根源與趨勢。社會科學輯刊, 6, 30-33。\n\n李超, 周瑛, & 魏星 (2018)。基於暗網的反恐情報分析研究。情報雜誌, 37(6) 。\n\n余瀟楓 (2007)。非傳統安全與公共危機治理。杭州: 浙江大學出版社。\n\n陸忠偉 (2003)。非傳統安全論。北京: 時事出版社。\n\n孫國祥 (2010)。非傳統安全視角的毒品問題與實證毒品政策之探討。2010非傳統安全--反洗錢、不正常人口移\n動、毒品、擴散學術研討會。桃園龜山: 中央警察大學。\n\n陳欣之 (2003年七月1日)。國際安全研究之理論變遷與挑戰。遠景基金會季刊, 4(3), 頁 1-40。\n\n秦嗣葵 (2017)。中國網絡強國戰略研究。新北市: 淡江大學國際事務與戰略研究所碩士在職專班碩士論文。\n\n張錫模 (2004)。非傳統性安全威脅的總合分析架構。臺北市: 國家安全局。\n\n喬金鷗 (2011)。非傳統安全概論。臺北市: 黎明文化。\n\n劉學成 (2004)。非傳統安全的基本特性及其應對。國際問題研究(1), 28-29。\n\n齊琳 (2005)。國內非傳統安全研究述評。國際關係學院學報(1), 27-32。\n\n薛健吾 (2019)。「一帶一路」的挑戰:國際合作理論與「一帶一路」在東南亞和南亞國家的實際運作經驗。展望與探索, 17(3), 63-87。
描述: 碩士
國立政治大學
外交學系
104253014
資料來源: http://thesis.lib.nccu.edu.tw/record/#G1042530146
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File SizeFormat
014601.pdf2.48 MBAdobe PDF2View/Open
Show full item record

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.