We study the Evolution cryptomarket, a dataset with more than half a million posts and over four thousand vendors. It is moreover one of the few cryptomarkets that recorded sales information. However, many cryptomarkets do not record sales information and at best provide a label to vendors independent of their success. Furthermore, it is nearly impossible to identify those vendors whose success is yet to come. Yet, if law enforcement wishes to disrupt future sales, it is exactly these future successful vendors that they would need to identify in order to dissuade them from continued participation in the cryptomarket. Therefore, in this paper we focus on identifying key players in the form of both current and future successful vendors.
Benzodiazepines: Increasing Visibility/dominance Of Alprazolam Over Time
Markets like Perico represent the next wave — safer for vendors, harder for law enforcement to trace, and accessible only to privacy-savvy users. For cybersecurity professionals, journalists, and policymakers, understanding how these systems evolve is crucial to monitoring and mitigating the impact of underground economies. The largest component of the S2S network of U2U transactions between sellers for each year with the respective number of nodes (N).

This minimizes fraud risks, as funds release only after buyers verify product quality. Markets employ multi-signature wallets, adding an extra layer of security. Vendors with high completion rates gain trust, reflected in detailed review sections. PageRank computes the probability that a random walker, that follows one of the available neighboring edges or jumps to a random node with a particular probability, ends up at a given node. For the directed variant the choice of edge is restricted to following the direction of the edges and adding weights impacts the odds of following any given edge. Similar as for betweenness centrality, we report the results for the variant taking both direction and weighting into account as this provides the random walker with more context.
Darknet Markets – Dark Web Links
Modern lists also include vendor scorecards, linking directly to market profiles. This eliminates guesswork, as buyers can verify a vendor’s history before entering the market. The combination of updated links and transparent metrics streamlines the entire purchasing process. These features create a reliable environment, encouraging repeat business. The integration of Monero alongside Bitcoin enhances privacy, appealing to cautious users. Darknet markets evolve by mimicking mainstream platforms, focusing on convenience without compromising anonymity.

Conventional Vs Online Drug Distribution Networks
- The finding that multisellers and, in specific cases, multibuyers play a central role in connecting the ecosystem, thus contributing to its resilience, may illuminate how to better target future law enforcement operations.
- Then, after operation Bayonet, the number of sellers in all categories and multisellers significantly drops, as shown in Fig.
- Further details on the computation and interpretation of the measures is provided in the “Methods” section.
- The multihomers play a crucial role in the ecosystem because they act as edges between markets.
- Encryption technologies allow vendors to communicate with customers and receive payments anonymously.
Even so, it is unknown how the topics that are responsible for forming the edges that make up the connecting paths are related. They may originate from the same or a highly similar topic, increasing the odds of being visible, or they may differ greatly, making it unlikely that these connections truly form a meaningful path. As such, a high closeness centrality does not intuitively imply a successful vendor. Regardless, closeness centrality has often proven to capture users at important positions in a network6,36; its incorporation of global network information in a substantially different manner than betweenness, convinced us that it should be included in our analyses. Unlike incoming edges used for in-degree, outgoing edges do not imply visibility of the user to the neighbors these edges connect to, since those neighbors posted before the user. Furthermore, in-degree combines the visibility of responses with the visibility of starting topics.
Law enforcement aims to disrupt criminal activity conducted through these markets by targeting key players vital to the market’s existence and success. We particularly focus on detecting successful vendors responsible for the majority of illegal trade. Our methodology aims to uncover whether the task of key player identification should center around plainly measuring user and forum activity, or that it requires leveraging specific patterns of user communication. We focus on a large-scale dataset from the Evolution cryptomarket, which we model as an evolving communication network. Results indicate that user and forum activity, measured through topic engagement, is best able to identify successful vendors. Interestingly, considering users with higher betweenness centrality in the communication network further improves performance, also identifying successful vendors with moderate activity on the forum.
Author & Researcher Services
To assess this, we looked at the relative difference scores between the top percentile and all vendors (Fig. 2a, b) and between the top and sub-top percentile (Fig. 2c, d) for both current and future success. Figure 2a shows that for all measures the currently most successful vendors have on average higher network centralities and activity indicators. After the first month and with the exception of July and August 2014 for betweenness centrality, Fig. 2c demonstrates this also holds when comparing the top with the sub-top percentile. Interestingly, trend changes for most measures follow cryptomarket developments.

Network Structure Of Transactions
For bidirectional harmonic closeness centrality, the shortest paths can be determined following edges regardless of their direction. However, for incoming and outgoing harmonic closeness centrality the paths may follow edges only in one direction, either following the direction of the edges (outgoing) or going against the direction of the edges (incoming). The weighted variants of these measures use the inverse of the edge weights during shortest distance computation, such that stronger connections equate to shorter distances. One of the central76 discussion forums was Reddit’s /r/DarkNetMarkets/,777879 which has been the subject of legal investigation, as well as the Tor-based discussion forum, The Hub. Cryptomarkets emerged in 2011 with the launch of Silk Road on the Tor network. Silk Road’s openness and anonymity signalled the arrival of a new type of drug diffusion 13.
Distinguishing Vendors And Their Level Of Success
To analyse the connectivity of the whole ecosystem, i.e., how markets are connected with each other, we consider sellers and buyers that are simultaneously active on multiple platforms. In particular, multihomers that are sellers in multiple markets are multisellers, and similarly for buyers we have the multibuyers. Specifically, to be classified as a multiseller, a user must be classified as a seller in at least two markets simultaneously. The multihomers play a crucial role in the ecosystem because they act as edges between markets.
Why Are All The Darknet Markets Down

Transactional commercial supply in contrast emphasises profits and market-mediated relationships, and sometimes validates predation and exploitation 2. Digital modes of drug distribution reshape both these distribution forms. The internet is a modern bazaar 3 of drug-selling modes, expanded psychoactive repertoires 4 and places of community harm reduction, which revise dominant narratives of drug use and PWUD 5. These are specialised markets hosted anonymously using the Tor darknet 6. Tor is an internet service which protects those who use it from monitoring and promotes anonymity through data routing and encryption. It also permits services to be hosted anonymously, using what are called onion or location-hidden services.
2a, where the overall ecosystem volume quickly recovers after market closures. This is an outcome of the ecosystem’s resilience, largely supported by the migration of users15. Correspondingly, the multihoming activity is a mechanism that contributes to the ecosystem’s resilience.
Detecting Vendors In The User Base
However, the rise of the use of message encryption in criminal communication, calls for the development of methods not reliant on knowledge of message content. In this work, we aim to develop a method to identify key players based on the temporal structure of their communication network alone; thus, ignoring message content entirely. Despite consistent results, this study has limitations that may be addressed in future work. First, while the dataset is preprocessed with state-of-the-art methods, there is no ground truth for validation, and this uncertainty propagates to our findings.
To summarise, topic engagement provides the best single measure recall performance. Meanwhile, betweenness centrality identifies the greatest share of vendors that do not score high for any of the activity indicators. Additionally, betweenness centrality detects the most vendors of all network measures. As such, betweenness centrality is the network measure most likely to be of use to law enforcement for detecting vendors in the user base. Furthermore, betweenness centrality uniquely finds relatively more successful vendors among those with moderate activity. Notably, this effect is stronger for future success, further demonstrating its potential as an early warning signal.