Exchange Relations On Craigslist, Ebay, And Silk Road
-
Upload
khangminh22 -
Category
Documents
-
view
0 -
download
0
Transcript of Exchange Relations On Craigslist, Ebay, And Silk Road
University of Pennsylvania University of Pennsylvania
ScholarlyCommons ScholarlyCommons
Publicly Accessible Penn Dissertations
2018
Internet Markets: Exchange Relations On Craigslist, Ebay, And Silk Internet Markets: Exchange Relations On Craigslist, Ebay, And Silk
Road Road
Jonathan Pace University of Pennsylvania, [email protected]
Follow this and additional works at: https://repository.upenn.edu/edissertations
Part of the Communication Commons, and the Databases and Information Systems Commons
Recommended Citation Recommended Citation Pace, Jonathan, "Internet Markets: Exchange Relations On Craigslist, Ebay, And Silk Road" (2018). Publicly Accessible Penn Dissertations. 3050. https://repository.upenn.edu/edissertations/3050
This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/3050 For more information, please contact [email protected].
Internet Markets: Exchange Relations On Craigslist, Ebay, And Silk Road Internet Markets: Exchange Relations On Craigslist, Ebay, And Silk Road
Abstract Abstract Cyberlibertarianism is a dominant ideology in the technology industry. Internet markets represent cyberlibertarianism ideals put into practice. According to cyberlibertarianism, internet markets should be self-regulating, but problems of fraud nevertheless emerge. On internet markets, fraud occurs through the manipulation of platform protocols that are designed to replace regulations. Actors take various steps to mitigate concerns of fraud and control the commercial process. These steps rely on website infrastructure, platform culture, and state, commercial, and domestic institutions — factors that are supposed to be external to electronic commerce. Users develop social customs that rely on website infrastructure, platform culture, and state institutions. Vendors perform practices that are also connected to website infrastructure, platform culture, and state institutions, but in ways that reflect their goal of selling goods. State, commercial, and domestic institutions figure centrally in the circulation of market objects, which often enter digital exchange in places where institutional control falls short. Far from being a story of self-regulation, exchange on internet markets is a story of regulatory endeavors, as individual and institutional actors aim (and sometimes fail) to control the process of electronic commerce. This tells us that cyberlibertarianism overlooks the role of regulations and institutions on the internet. As venues that embody cyberlibertarian principles, internet markets are among the most productive case studies of the digital ideology. By meeting the radical conditions demanded by cyberlibertarianism, internet markets are experiments in the digital ideology that decisively disprove its hypotheses. If the predictions of cyberlibertarianism cannot be realized in the free digital market, then they likely cannot be realized anywhere. Moving forward, they may serve as a counterpoint to the claim that an internet equilibrium is just one regulatory removal away.
Degree Type Degree Type Dissertation
Degree Name Degree Name Doctor of Philosophy (PhD)
Graduate Group Graduate Group Communication
First Advisor First Advisor Sharrona Pearl
Keywords Keywords Cyberlibertarianism, Digital media, Electronic commerce, Exchange, Internet markets, Peer to peer
Subject Categories Subject Categories Communication | Databases and Information Systems
This dissertation is available at ScholarlyCommons: https://repository.upenn.edu/edissertations/3050
INTERNET MARKETS:
EXCHANGE RELATIONS ON CRAIGSLIST, EBAY, AND SILK ROAD
Jonathan Pace
A DISSERTATION
in
Communication
Presented to the Faculties of the University of Pennsylvania
in
Partial Fulfillment of the Requirements for the
Degree of Doctor of Philosophy
2018
Supervisor of Dissertation
——————————
Dr. Sharrona Pearl
Assistant Professor of Communication
Graduate Group Chairperson
——————————
Dr. Joseph Turow, Robert Lewis Shayon Professor of Communication
Dissertation Committee
Dr. Barbie Zelizer, Raymond Williams Professor of Communication
Dr. Victor Pickard, Associate Professor of Communication
Dr. Jessa Lingel, Assistant Professor of Communication
ii
ABSTRACT
INTERNET MARKETS:
EXCHANGE RELATIONS ON CRAIGSLIST, EBAY, AND SILK ROAD
Jonathan Pace
Dr. Sharrona Pearl
Cyberlibertarianism is a dominant ideology in the technology industry. Internet markets
represent cyberlibertarianism ideals put into practice. According to cyberlibertarianism,
internet markets should be self-regulating, but problems of fraud nevertheless emerge. On
internet markets, fraud occurs through the manipulation of platform protocols that are
designed to replace regulations. Actors take various steps to mitigate concerns of fraud
and control the commercial process. These steps rely on website infrastructure, platform
culture, and state, commercial, and domestic institutions — factors that are supposed to
be external to electronic commerce. Users develop social customs that rely on website
infrastructure, platform culture, and state institutions. Vendors perform practices that are
also connected to website infrastructure, platform culture, and state institutions, but in
ways that reflect their goal of selling goods. State, commercial, and domestic institutions
figure centrally in the circulation of market objects, which often enter digital exchange in
places where institutional control falls short. Far from being a story of self-regulation,
exchange on internet markets is a story of regulatory endeavors, as individual and
institutional actors aim (and sometimes fail) to control the process of electronic
commerce. This tells us that cyberlibertarianism overlooks the role of regulations and
institutions on the internet. As venues that embody cyberlibertarian principles, internet
iii
markets are among the most productive case studies of the digital ideology. By meeting
the radical conditions demanded by cyberlibertarianism, internet markets are experiments
in the digital ideology that decisively disprove its hypotheses. If the predictions of
cyberlibertarianism cannot be realized in the free digital market, then they likely cannot
be realized anywhere. Moving forward, they may serve as a counterpoint to the claim that
an internet equilibrium is just one regulatory removal away.
iv
TABLE OF CONTENTS
ABSTRACT ................................................................................................................... ii
INTRODUCTION: CYBERLIBERTARIANISM AS DIGITAL IDEOLOGY ................ 1
CHAPTER 1: HOW TO GET AWAY WITH INTERNET FRAUD .............................. 25
CHAPTER 2: ROADS TO COMMERCE ..................................................................... 64
CHAPTER 3: MONEY ON THE SIDE ........................................................................ 93
CHAPTER 4: THINGS FOR SALE ON THE INTERNET ......................................... 120
CONCLUSION: BEYOND CYBERLIBERTARIANISM .......................................... 144
APPENDICES ............................................................................................................ 155
REFERENCES .......................................................................................................... 203
1
INTRODUCTION
CYBERLIBERTARIANISM AS DIGITAL IDEOLOGY
Overture: Why Exchange?
Internet markets are major centers of online activity. Exchange platforms, such as
Craigslist, eBay, and Silk Road are exceptionally popular, with consistently high levels of
internet traffic,1 exceptionally innovative, with roots in the early days of their respective
webs,2 and exceptionally profitable, with hundreds of millions of dollars passing through
these powerhouses of the digital economy each year.3 One in five Americans sells
something on the internet every year, making these exceptional cases also quite ordinary.4
Exchange platforms are new media with traces of the old, replicating and transforming
the local market, the antique market, and the black market. As electronic spheres of
commercial and interpersonal exchange, they are host to a vibrant interplay of economic,
social, and technological dynamics.
1 "How Popular is Craigslist?" Alexa, published 2017, http://www.alexa.com/siteinfo/ craigslist.org. "How Popular Is eBay?" Alexa, published 2017, http://www.alexa.com/ siteinfo/ebay.com. Nichols Christin, "Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace,” International World Wide Web Conference Committee Proceedings (May 2013): no pagination, ACM 978-1-4503-2035-1/13/05. 2 See the discussion of Craigslist, eBay, and Silk Road histories later in this introduction. 3 "eBay's Annual Net Revenue in the United States from 2013 to 2016,” Statista, published 2016, https://www.statista.com/statistics/221854/ebays-annual-net-revenue-in-the-united-states/ "Leading Shopping and Classified websites in the United States, based on market share of visits,” Statista, published 2014, https://www.statista.com/statistics/266203/us-market-share-of-leading-shopping-classifieds-websites. Nichols Christin, ""Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.” 4 Aaron Smith, "Gig Work, Online Selling, and Home Sharing,” Pew Research Center, published November 2016, http://www.pewinternet.org/2016/11/17/gig-work-online-selling-and-home-sharing.
2
Despite their popularity and novelty, internet markets are neglected objects of
inquiry in digital media studies. Contemporary literature on electronic commerce largely
foregrounds the trading of informational objects rather than material ones. This is the
case in studies of platforms and studies of networks. In studies of platforms, the
reproducibility of information becomes a point of departure for digital gift economies and
their concomitant systems of reciprocity and status.5 Trade is here understood in broad
terms: every online contribution is a discrete economic transaction, leading some to
jettison the very distinction between the social and the economic within digital culture.6
In studies of networks, the management of information becomes a competitive business
5 Dave Elder-Vass, Profit and Gift in the Digital Economy (Cambridge: Cambridge University Press, 2016). Julia Velkova, "Open Cultural Production and the Online Gift Economy: The Case of Blender,” First Monday 21, no. 10 (2016): no pagination, http://firstmonday.org/ojs/index.php/fm/article/view/6944. Vili Lehdonvirta and Edward Castronova, Virtual Economies (Cambridge: MIT Press, 2014). Etienne Pelaprat and Barry Brown, "Reciprocity: Understanding Online Social Relations,” First Monday 17, no. 10 (2012): no pagination, http://firstmonday.org/ojs/index.php/fm/article/view/3324. Erika Pearson, "Digital Gifts: Participation and Gift Exchange in LiveJournal Communities,” First Monday 12, no. 5 (2007): no pagination, http://firstmonday.org/article/view/1835/1719. Matei Ripeanu et al., "Gifting Technologies: A BitTorrent Case Study,” First Monday 11, no. 11 (2006): no pagination, http://firstmonday.org/ojs/index.php/fm/article/view/1412/1330. Kevin McGee and Jörgen Skågeby, "Gifting Technologies,” First Monday 9, no. 12 (2004): no pagination, http://firstmonday.org/article/view/1192/1112. Kylie Veale, "Internet Gifting Economies: Voluntary Payment Schemes as Tangible Reciprocity,” First Monday 8, no. 12 (2003): no pagination, http://firstmonday.org/ojs/index.php/fm/article/view/1101/1021. Hillary Bays and Miranda Mowbray, "Cookies, Gifting, and the Internet,” First Monday 4, no. 11 (1999): no pagination, http://firstmonday.org/ojs/index.php/fm/article/view/700/610. Richard Barbrook, "The Hi-tech Gift Economy,” First Monday 3, no. 12 (1998): no pagination, http://firstmonday.org/ojs/index.php/fm/article/view/631/552. 6 Kylie Jarrett and D.E. Wittkower, "Economies of the Internet,” First Monday 21, no. 10 (2016): no pagination, http://firstmonday.org/ojs/index.php/fm/article/view/6939/5624. Tiziana Terranova, "Free Labor: Producing Culture for the Digital Economy,” Social Text 18, no. 2 (2000): 33-58. Göran Bolin, Value and the Media: Cultural Production and Consumption in Digital Markets (Farnham: Ashgate Press, 2011).
3
advantage, to be leveraged through financial instruments or logistical apparatuses.7 Trade
is again understood in broad terms: every piece of information becomes a commodity,
leading some to jettison the distinction between informational and material regulation.8
Even studies of internet retailers and craft sites, such as Amazon and Etsy, display a
preference for informational systems of status and recommendation over material systems
of goods and payment.9 Research is still catching up with Facebook Marketplace, an
exchange platform that was launched in October 2016 as an internal part of the social
media giant.10
The neglect of exchange is symptomatic of broader trends within digital media
studies. In the context of digital media, political economy tends to focus on production
7 Christopher Westland et al., Global Electronic Commerce (Cambridge: MIT Press, 1999). Hassan Masum and Mark Tovey, eds. The Reputation Society (Cambridge: MIT Press, 2011). Eric Brousseau and Nicolas Curien, eds., Internet and Digital Economics (Cambridge: Cambridge University Press, 2007). Yochai Benkler, The Wealth of Networks (New Haven: Yale University Press, 2006). Manuel Castells, The Rise of the Network Society (Hoboken: Wiley & Blackwell, 2000). 8 Hassan Masum an Mark Tovey, eds. The Reputation Society. 9 Dave Elder-Vass, "Lifeworld and Systems in the Digital Economy,” European Journal of Social Theory 21, no. 2 (2018): 227-244, doi: 10.1177/1368431017709703. Regina Connolly, "Trust in Commercial and Personal Transactions in the Digital Age,” in The Oxford Handbook of Internet Studies, ed. William H. Dutton (Oxford: Oxford University Press, 2013): 165-192. Jonathan Zittrain, The Future of the Internet and How to Stop It (New Haven: Yale University Press). Michelle White, Producing Women: The Internet, Traditional Femininity, Queerness, and Creativity (New York: Routledge, 2015). Brian J. Hracs and Doreen Jakob, "Selling the Stage: Exploring the Spatial and Temporal Dimensions of Interactive Cultural Experiences,” in Spatial Dynamics in the Experience Economy, eds. Anne Lorentzen et al. (New York: Routledge, 2015): 71-87. Tara Liss-Marino, "Sell (It) Yourself: Marketing Pleasure in Digital DIY" (doctoral dissertation, University of Pennsylvania, 2014). Susan Luckman, Craft and the Creative Economy (New York: Palgrave McMillan, 2015). 10 Facebook, "Introducing Marketplace,” published October 2016, http://newsroom.fb.com/news/2016/10/introducing-marketplace-buy-and-sell-with-your-local-community. Stanislav Mamonov and Raquel Benbunan-Fich, "Exploring Factors Affecting Social E-Commerce Service Adoption: The Case of Facebook Gifts,” International Journal of Information Management 37, no. 6 (December 2017): 590-600.
4
and ownership, and cultural studies tends to focus on consumption and signification.11
Hence, many political-economic studies of social media sites center on the commercial
valorization of user data.12 Meanwhile, many cultural studies of these same sites focus on
the signification of identity and the transformation of language.13 For instance, digital
studies of eBay situate the platform within political-economic configurations of new
media labor14 and cultural formations of online community15. In this respect, the
11 This is not to reduce political economy or cultural studies to production and consumption, respectively, but to highlight a general tendency in order to understand the lacuna of exchange. To be sure, even when political economy and cultural studies fit these tendencies, they incorporate a variety of additional factors into analysis. 12 Christian Fuchs, Social Media: A Critical Introduction (Thousand Oaks: Sage, 2017). Nick Srnicek, Platform Capitalism (Cambridge: Polity Press, 2017). Sebastian Sevignani, Privacy and Capitalism in the Age of Social Media (New York: Routledge, 2016). Ganaele Langlois et al., Compromised Data: From Social Media to Big Data (New York: Bloomsury Academic, 2015). Lee McGuigan and Vincent Manzerolle, eds., The Audience Commodity in a Digital Age: Revisiting a Critical Theory of Commercial Media (New York: Peter Lang, 2014). Christian Fuchs et al., Internet and Surveillance: The Challenges of Web 2.0 and Social Media (New York: Routledge, 2012). Daniel Trottier, Social Media as Surveillance (New York: Routledge, 2012). Nicole Cohen, "The Valorization of Surveillance: Towards a Political Economy of Facebook,” Democratic Communiqué 22, no. 1 (2008): 5-22. 13 John Cheney-Lippold, We Are Data (New York: NYU Press, 2017). Patrick Davison "The Language of Internet Memes," in The Social Media Reader, ed. Michael Mandiberg (New York: New York University Press, 2012): 120-135. Christopher Pullen and Margaret Cooper, eds., LGBT Identity and Online New Media (New York: Routledge, 2010). David Crystal et al., Language and the Internet (Cambridge: Cambridge University Press, 2006). danah boyd, "Friends, Friendsters, and Myspace Top 8: Writing Community into Being on Social Network Sites," First Monday 11 (2006): no pagination. 14 Janice Denegri-Knott and Detlev Zwick. Tracking Prosumption Work on eBay: Reproduction of Desire and the Challenge of Slow Re-McDonaldization,” American Behavioral Scientist 56, no. 4 (2012): 439-459, doi: 10.1177/0002764211429360. Mary Calkins, "My Reputation Always Had More Fun Than Me: The Failure of eBay's Feedback Model to Effectively Prevent Online Auction Fraud,” Richmond Journal of Law and Technology (Spring 2001). 15 Michelle White, Buy It Now: Lessons from eBay (Durham: Duke University Press, 2012). Josh Boyd, "In Community We Trust: Online Security Communication at eBay,” Journal of Computer-Mediated Communication 7, no. 3 (2002): no pagination, 10.1111/j.1083-6101.2002.tb00147.x.
5
methodological dichotomy reflects the critical-theoretical division of the social totality
into an economic base and a cultural superstructure.16 Exchange occupies an awkward
position within this theoretical edifice: the circulation of commodities exceeds the hidden
abode of production, proper to political economy, but precedes the conspicuous realm of
consumption, proper to cultural studies.
Given the neglect of internet markets in digital media studies, this research project
examines three exchange platforms — Craigslist, eBay, and Silk Road — in order to
understand exchange on internet markets. My argument runs as follows.
Cyberlibertarianism is a dominant ideology in the technology industry (introduction).
Internet markets represent cyberlibertarianism ideals put into practice. According to
cyberlibertarianism, internet markets should be self-regulating, but problems of fraud
nevertheless emerge. On internet markets, fraud occurs through the manipulation of
platform protocols. This matters, because protocols are supposed to replace regulations
on internet markets (chapter 1). Actors take various steps to mitigate concerns of fraud
and control the commercial process. These steps rely on website infrastructure, platform
16 Raymond Williams, "Base and Superstructure in Marxist Cultural Theory,” New Left Review 1, no. 82 (November 1973), https://newleftreview.org/article/1568. Janice Peck, "Why We Shouldn't Be Bored with the Political Economy versus Cultural Studies Debate,” Cultural Critique 64 (2006): 92-126, http://www.jstor.org/stable/4489259. Larry Grossberg, "Cultural Studies versus Political Economy: Is Anyone Else Bored with this Debate?,” Critical Studies in Media Communication 12, no. 1 (1995): 72-81. Larry Grossberg, "Toward a Genealogy of the State of Cultural Studies: The Discipline of Communication and the Reception of Cultural Studies in the United States,” in Disciplinarity and Dissent in Cultural Studies, eds. Cary Nelson and Dikip Parameshwar Goankar (New York: Routledge, 1996): 131-147. Timothy Havens et al., "Critical Media Industry Studies: A Research Approach,” Communication, Culture, and Critique 2 (2009): 234-253. Stuart Hall, "The Rediscovery of 'Ideology': Return of the Repressed in Media Studies," in Culture, Society, and the Media, ed. Michael Gurevitch et al. (New York: Routledge 1982): 52-86.
6
culture, and state, commercial, and domestic institutions. This matters, because internet
markets are supposed to be self-contained, yet digital exchange implicates factors that are
external to electronic commerce, especially the state institutions that cyberlibertarianism
claims to obviate. For instance, users develop social customs that rely on website
infrastructure, platform culture, and state institutions (chapter 2). Vendors perform
practices that are also connected to website infrastructure, platform culture, and state
institutions, but in ways that reflect their goal of selling goods (chapter 3). State,
commercial, and domestic institutions figure centrally in the circulation of market
objects, which often enter digital exchange in places where institutional control falls short
(chapter 4). Far from being a story of self-regulation, exchange on internet markets is a
story of regulatory endeavors, as users, vendors, and institutions aim (and sometimes fail)
to control the process of electronic commerce. This tells us that cyberlibertarianism
overlooks the role of regulations and institutions on the internet. In turn, this suggests that
actors outside of the technology industry should insist on the reality of regulations and
institutions in order to create a fair and cooperative internet (conclusion).
As venues that embody cyberlibertarian principles, internet markets are among
the most productive case studies of the digital ideology. By meeting the radical
conditions demanded by cyberlibertarianism, internet markets are experiments in the
digital ideology that decisively disprove its hypotheses. If the predictions of
cyberlibertarianism cannot be realized in the free digital market, then they likely cannot
be realized anywhere. Internet markets are valuable objects of research, because they
uniquely actualize the tenets of cyberlibertarianism and, in so doing, demonstrate
7
significant flaws in the dominant paradigm. Moving forward, they may serve as a
counterpoint to the claim that an internet equilibrium is just one regulatory removal away.
Cyberlibertarianism
Cyberlibertarianism is a particular way of thinking about digital technology and a
dominant ideology in Silicon Valley. It is important to understand cyberlibertarianism,
because the paradigm informs the principles of industry leaders, the practices of major
firms, and the sensibilities of high-technology workers. This has consequences beyond
the Valley, insofar as these figures and firms are the ones who invent and design popular
digital technologies, influence governmental policies related to the internet, and play an
outsized role in public debates surrounding technology and society. Further, as I argue in
the body of this project, cyberlibertarianism shares key assumptions with other paradigms
for understanding digital media: electronic reputation studies, free labor theory, accounts
of the digital economy and digital labor, and internet commodity studies. This means that
even scholars can operate under the assumptions of cyberlibertarianism.
Conceptually, cyberlibertarianism combines the market theory of libertarianism
with the system theory of cybernetics. For libertarianism and cybernetics, economic and
technological systems tend toward equilibrium through the independent decisions of their
constituent actors. Both discourses construe regulation as unnecessary, even
counterproductive. The key thinkers of libertarianism and cybernetics — Friedrich Hayek
and Norbert Weiner — follow remarkably similar logic in their respective arguments.17
17 Friedrich von Hayek, The Fatal Conceit, ed. William Warren Bartley (Chicago: University of Chicago Press, 1989). Norbert Wiener, Cybernetics (New York: Wiley, 1948).
8
For Hayek, regulation undermines the spontaneous order of the economic market. For
Weiner, regulation hinders the self-regulating capacity of the technological system. Both
discourses cast institutional intervention as impractical, even hazardous. For Hayek, the
state should never attempt to manage economic markets; for Weiner, the state should
never attempt to police technological systems. Both discourses position cooperation as
the foundation of social life, upon which economic markets and technological systems
are built. Libertarianism and cybernetics have been subject to widespread criticism in the
economic and social sciences throughout the twentieth century.18 As it turns out,
regulations can be productive, institutions can be equitable, and conflict can be inevitable
in economic and technological systems. Yet libertarianism and cybernetics make a stealth
comeback in the way that Silicon Valley understands the technologies that it produces.
According to cyberlibertarianism, the internet is a self-regulating system that is
incompatible with external regulations. Cyberlibertarianism can operate on the level of
internet firms (don't regulate the technology industry), internet networks (don't regulate
cable traffic), and internet platforms (don't regulate website content). In this line of
thought, external regulations, including state regulations, are not only unnecessary but
actually detrimental to the internet as a self-contained system. At the heart of
cyberlibertarianism is the vision of an internet in perpetual equilibrium. As in
libertarianism, every attempt to manipulate the system ultimately backfires: the
regulation of internet activity ends up undermining the vitality of online exchange. As in
18 Joseph E. Stiglitz, The Economic Role of the State (Oxford: Wiley-Blackwell, 1989). Maurice Merleau-Ponty, "Eye and Mind," trans. Carleton Dallery, in The Primacy of Perception: And Other Essays on Phenomenological Psychology, ed. James M. Edie (Evanston: Northwestern University Press, 1964): 159-192. See the discussion of libertarianism and cyberneticism in the introduction.
9
cybernetics, every flaw in the system is ultimately incorporated into its superlative
functioning: the system ends up neutralizing and integrating errors, dysfunctions, and
interruptions. I follow several others in referring to this conceptual framework as
cyberlibertarianism.19 To be sure, not everyone in Silicon Valley is a cyberlibertarian,
and not every cyberlibertarian believes in the paradigm whole. However,
cyberlibertarianism is an influential way of thinking about technology in the place where
many technologies are created. In order to demonstrate the existence of
cyberlibertarianism as a dominant ideology in Silicon Valley, I highlight traces of the
paradigm in the beliefs of industry leaders; the practices of technology firms; and the
books, magazines, manifestos, conferences, and think tanks that populate the Valley.
In the early 1990s, many technology workers began to think of the economy as a
self-regulating system. In his 1990 book Bionomics, Michael Rothschild put forward an
elegantly simple thesis that affirmed the self-regulating nature of the market: "the
economy is a rainforest".20 So compelling was this notion in Silicon Valley that an annual
Bionomics conference was established — organized by die-hard libertarians from 1993 to
1996 and then by the Cato Institute from 1997 to 1999 — and attended by technology
19 Langdon Winner, "Technology Today: Utopia or Dystopia?" Social Research 64, no. 3 (Fall 1997): 989-1017, http://www.jstor.org/stable/40971195. Richard Barbrook and Andy Cameron, "The California Ideology," Science as Culture 6, no. 1 (1996): 44-72, https://doi.org/10.1080/ 09505439609526455. The concept of cyberlibertarianism has a tangled genealogy. Langdon Winner coined the term in 1997, but Richard Barbrook and Andy Cameron established its conceptual foundations in a famous essay on "the California ideology" the previous year. For Winner, Barbrook, and Cameron, cyberlibertarianism positions individual freedom at the core of digital technology. I accept this core premise, even as I develop my own definition of the term. 20 Michael L. Rothschild, Bionomics (New York: H. Holt, 1990).
10
heavyweights, such Larry Ellison, CEO of Oracle, and Scott Cook, CEO of Intuit.21 The
Cato Institute is a longstanding libertarian think tank that received a major influx of
funding by conservative industry leaders, such as the Koch brothers, in the 1980s; and its
interest in Silicon Valley attests to the region's libertarian sensibility early on.22 Outside
of conferences, Wired magazine began to speak the language of cyberlibertarianism,
starting with its founding in 1993, when it ran the headline "Big Brother Wants To Look
Inside Your Bank Account (Anytime It Pleases)"23. Along with the suspicion of state
power came a distaste for state regulations. A 1994 Wired piece proclaimed, "Regulation
was the last concern of the highway builders."24 Paulina Borsook, who worked at the
magazine in the 1990s, observed, "The magazine almost never ran anything that was
anything that was other than laudatory of technology or other than libertarian in
outlook."25 In 1994, a Berkeley professor observed that Silicon Valley engineers
"[assumed] that the dynamism of free markets would be self-perpetuating and self-
governing" and therefore "saw no need to attend to the institutional foundations of their
vitality."26
21 Paul Krugnman, "The Power of Biobabble", Slate, October 24, 1997, http://www.slate.com/articles/business/the_dismal_science/1997/10/the_power_of_biobabble. 22 Jane Mayer, Dark Money: The Hidden History of the Billionaires Behind the Rise of the Radical Right (New York: Anchor, 2017). 23 Wired Staff, "Big Brother Wants To Look Inside Your Bank Account (Anytime It Pleases)", Wired, December 1993. 24 Wired Staff, "There Will Be No Information Superhighway," Wired, February 1994. 25 Paulina Borsook, Cyberselfish, (New York: Public Affairs, 2000), 128. 26 Anna Lee Saxenian, Regional Advantage (Cambridge: Harvard University Press, 1994).
11
Two years later, Andy Grove, the CEO of Intel, referred to the PC as an "organic
phenomenon" that should not be manipulated by the state.27 Around this time, as the Cato
Institute took a greater interest in the emergent technology industry, T.J. Rogers, Cato's
west coast emissary, created a petition to decrease corporate taxes by ending corporate
subsidies; the document was signed by a collection of technology CEOs and venture
capital firms in Silicon Valley.28 By the end of the decade, many were speaking about
technology in ecological and anti-statist terms. Richard Dawkins, with his social-
evolutionary approach to intelligence and innovation, graced the cover of Wired in
1998.29 In her 1998 book, The Future and Its Enemies, Virginia Postrel followed Hayek
and cast technological society as a conflict between the forces of dynamism, marked by
free exploration, and the forces of statism, marked by state planning.30 Libertarianism
was plainly in the Bay Area ether at this time, as a San Francisco Recorder headline read,
"California's Tech Elite Remains Stubbornly Libertarian".31
The 2000s witnessed the increasing popularity and profitability of the internet, as
well as the instrumentalization of cyberlibertarianism by major technology figures and
their firms. These figures, in the words Noam Cohen, "propose a society in which
personal freedoms are near absolute and government regulations wither away, where bold
entrepreneurs amass billions of dollars from their innovations and the rest of us struggle
in a hypercompetitive market without unions, governmental regulations, or social-welfare
27 Daniel Gross, "Greatest Businessmen of All Time," Forbes, October 1996. 28 T. J. Rogers, "Silicon Valley versus Corporate Welfare," Cato Institute Briefing Paper no. 37, April 27, 1998. 29 Wired Staff, "Bad Boy Evolutionist," Wired, May 1998. 30 Virginia Postrel, The Future and Its Enemies (New York: Touchstone, 1998). 31 George Craw, " California's Tech Elite Remains Stubbornly Libertarian" San Francisco Recorder, June 1998.
12
to protect us"32. Their actions also highlight a paradox of cyberlibertarianism: a
simultaneous rejection of the state and courtship of the state. These figures draw less on
the ecological language of cybernetics and more on the self-regulating language of
libertarianism. Peter Thiel, a founder of Paypal turned venture capitalist, is the likely
most outspoken libertarian in the Valley, claiming he built Paypal "because he wanted to
create a currency that could circumvent government control"33. Thiel funds the
Seasteading Institute, which aims to create a free libertarian society on a manufactured
island, beyond the jurisdiction of governments; and he famously paid twenty-four
students to not attend college, which he considers an outdated institution.34 At the same
time, Thiel's data mining company, Palantir, relied on the CIA as an early investor,
contradicting his principled opposition to the state.35 Jeff Bezos, founder and CEO of
Amazon, is also ambivalent toward state power. On the one hand, Bezos is comfortable
pushing the limits of occupational safety regulations: following a New York Times story
on the poor working conditions of Amazon fulfillment centers, Bezos insisted that the
labor market was self-regulating, such that any of his workers could leave if they
pleased.36 “I strongly believe," he wrote in a letter to employees, "that anyone working in
32 Noam Cohen, The Know It Alls (New York: The New Press, 2017), 4. 33 George Packer, "No Death, No Taxes," The New Yorker, November 28, 2011, https://www.newyorker.com/magazine/2011/11/28/no-death-no-taxes. 34 China Mievelle, "Floating Utopias," In These Times, September 28, 2007, http://inthesetimes.com/article/3328/floating_utopias. Ben Wieder, "Thiel Fellowship Pays 24 Talented Students $100,000 To Not Attend College," The Chronicle of Higher Education, May 25, 2011, https://www.chronicle.com/article/Thiel-Fellowship-Pays-24/127622. 35 Jonathan Taplin, Move Fast and Break Things (New York: Little Brown & Co., 2017). 36 Jodi Kantor and David Streitfield, "Inside Amazon: Wrestling Big Ideas in a Bruising Workplace," The New York Times, August 16, 2015, https://www.nytimes.com/2015/08/16/technology/inside-amazon-wrestling-big-ideas-in-a-bruising-workplace.html.
13
a company that really is like the one described in the NYT would be crazy to stay."37 On
the other hand, Bezos directly lobbied for the Internet Tax Freedom Act of 1998, which
prevents governmental bodies from imposing internet-specific taxes; and he persuaded
the US Justice Department to sue Apple's Tiny eBookstore for anti-trust violations.38 For
Bezos, the state is only legitimate when conveniently so.
Likewise, Google is formally opposed to state regulations, as when it opposed the
Stop Online Piracy Act of 2012, a bill crafted to stop copyright infringement on search
engines like Google.39 Yet the company relies on the state to protect itself against foreign
regulations: it is likely that Google's $15 million lobbying efforts led members of
Congress to defend Google against EU regulatory bodies.40 There is also evidence of a
"revolving door" between Google and the United States government, as workers regularly
move from one to the other, suggesting a certain level of regulatory capture, or an
instance when regulators are controlled by the industries they are designed to regulate.41
Here, governmental regulations are problematic, unless they are crafted by industry
actors themselves. Similarly, as founder and CEO of Facebook, Mark Zuckerberg
oversees his company's extensive lobbying efforts. Along with Amazon and Google,
37 John Cook, "Jeff Bezos Responds to New York Times Story," Geek Wire, August 16, 2015, https://www.geekwire.com/2015/full-memo-jeff-bezos-responds-to-cutting-nyt-expose-says-tolerance-for-lack-of-empathy-needs-to-be-zero. 38 Jonathan Taplin, Move Fast and Break Things. 39 Washington Post Staff, "SOPA Bill Shelved After Global Protests from Google, Wikipedia and Others," The Washington Post, January 20, 2012, https://www.washingtonpost.com/business/economy/sopa-bill-shelved-after-global-protests-from-google-wikipedia-and-others/2012/01/20/gIQAN5JdEQ_story.html. 40 Jonathan Taplin, "Why is Google Spending Record Sums on Lobbying Washington?" The Guardian, July 30, 2017, https://www.theguardian.com/technology/2017/jul/30/google-silicon-valley-corporate-lobbying-washington-dc-politics. 41 Jonathan Taplin, Move Fast and Break Things.
14
Facebook used its lobbying power to influence the crafting of an anti-human-trafficking
bill that, in an early version, would have increased the legal liability of platform
companies.42 Zuckerberg is staunchly opposed to such governmental regulation and
positions users and engineers as superlative regulators. In 2010, when asked if Facebook
should be regulated like other utilities, he replied, "I mean, in terms of regulation, we get
regulated by users, right?"43 During his appearance in front of Congress in 2018,
Zuckerberg insisted that automated technologies would be better regulators than
governmental bodies. When Congressman David McKinley asked about Facebook's
accountability for preventing misinformation, Zuckerberg replied, "What we need to do is
build more A.I. tools that can proactively find that content."44 Here, the decisions of users
and the designs of engineers are the only regulations necessary for the social media giant.
Where these industry leaders are concerned with the regulation of internet firms and
internet platforms, internet service providers (ISPs) are concerned with the regulation of
internet networks. In 2018, Ajit Pai, chairman of the FCC, framed net neutrality
provisions — state mandates that ensure that all internet network traffic is treated the
same by ISPs — as "heavy-handed" regulations by an overbearing state.45 He even
42 Tony Romm, "Tech Companies Fear Repercussions from a New Bill in the U.S. Congress to Combat Human Trafficking," Recode, August 1, 2017, https://www.recode.net/2017/8/1/16074808/facebook-google-amazon-sex-human-trafficking-congress-section-230. 43 David Kirkpatrick, The Facebook Effect 44 "Transcript of Zuckerberg’s Appearance Before House Committee," The Washington Post, April 11, 2018, https://www.washingtonpost.com/news/the-switch/wp/2018/04/11/transcript-of-zuckerbergs-appearance-before-house-committee. 45 Laurel Wamsley, "FCC's Pai: 'Heavy-Handed' Net Neutrality Rules Are Stifling The Internet," NPR, November 22, 2017, https://www.npr.org/sections/thetwo-way/2017/11/22/565962178/fccs-pai-heavy-handed-net-neutrality-rules-are-stifling-the-internet.
15
causally connected the vitality of the internet to the absence of regulatory controls; as he
explained in an interview, "We saw companies like Facebook, and Amazon and Google
become global powerhouses, precisely because we had light-touch rules that applied to
this internet."46 In all of these cases, the internet is a self-contained system, beyond the
messy realities of regulations and institutions.
This brief account of cyberlibertarianism highlights the paradoxical and flexible
nature of the digital ideology. In cyberlibertarianism, external regulations are detrimental
to the internet — unless those regulations benefit technology firms. The formal agenda of
regulatory resistance includes an exception when regulatory capture is necessary. In
addition to being paradoxical, cyberlibertarianism is highly flexible. It can operate on the
level of industry, as when technology firms resist regulation in the form of taxation and
oversight by the state. It can operate on the level of websites, as when platform
companies resist regulation in the form of legal liability over content. It can operate on
the level of networks, as when internet service providers resist regulation in the form of
net neutrality provisions. Each of these components of the internet may be positioned as
an ecological system that risks damage by artificial institutions, unless those institutions
can offer strategic leverage.
Needless to say, the role of the state in creating and maintaining the internet goes
unrecognized in this framework, and cyberlibertarianism neatly lines up with the
economic interests of technology firms — regulations are only legitimate when
strategically valuable. However partial and motivated, cyberlibertarianism is an
46 Ajit Pai, "FCC Chairman Defends Repeal of Net Neutrality,” interview with Rachel Martin, Morning Edition, NPR, November 22, 2017, https://www.npr.org/2017/11/22/.../fcc-chairman-defends-repeal-of-net-neutrality.
16
influential way of thinking about technology, and it informs the beliefs of industry
figures, the practices of major firms, and the sensibilities of high-technology workers. It
is the dominant narrative against which alternative accounts are positioned. In the
following chapters, I show that internet markets offer an alternative account of
technology, one that recognizes the role of regulation in electronic commerce. First, I
review the research methods employed in this study and provide an overview of the case
studies in question.
Method
Given the state of electronic commerce research, I began with the following
question: what is the nature of exchange relations on internet markets? I understand
internet markets as internet sites where a significant volume of exchange occurs between
individual peers, and where peers generally do not manufacture the goods that they sell.
By contrast, internet retailers are internet sites where a significant volume of exchange
occurs between users and firms. In terms of digital architecture, internet markets are peer-
to-peer or distributed platforms where users primarily encounter one another, while
internet retailers are hierarchical or centralized platforms where users primarily encounter
business organizations. Further, internet retail sales have an implied warranty, or a legal
assurance that product claims are accurate.47 By contrast, internet markets need not
guarantee the accuracy of user claims, enjoying an exemption from implied warranty
47 Avery W. Katz, "Economic Foundations of Contract Law,” in Philosophical Foundations of Contract Law, eds. Gregory Klass et al. (Oxford University Press, 2014): 171-192. Stephen A. Smith, "Remedies for Breach of Contract: One Principle or Two," in Philosophical Foundations of Contract Law, eds. Gregory Klass et al. (Oxford University Press, 2014): 341-361.
17
under telecommunications law.48 Moreover, internet markets are distinct from online
craft markets, where individuals themselves manufacture the goods that they sell, and
where production and circulation are consequently interwoven. Internet markets are
oriented around exchange, even as exchange carries within itself a collection of other
phenomena.
Having set the boundaries and the framework of the study, I selected three cases
on conceptual and methodological grounds.49 Craigslist, eBay, and Silk Road fit the
definition of internet market outlined above. Their central function is peer-to-peer
exchange — without the implied warranties of internet retail markets, without the micro-
production of craft markets, and, as we'll see, without the regulations of conventional
local, antique, and black markets. Absent such processes that mediate commerce, these
internet markets isolate exchange as a conceptual object. As comparative case studies,
Craigslist, eBay, and Silk Road are similar enough to demonstrate trends but different
enough to illuminate nuances. That is, comparison helps distinguish between general
features (shared by internet markets) and particular features (unique to each platform).
Following the definitions laid out by Jeasik Cho and Allen Trent, I employed a paradigm
of constructivist transactional validity,50 This means I was seeking accurate claims about
internet markets that are grounded in evidence and that reflect an empirical reality.
48 Communications Decency Act of 1996, 47 U.S.C. § 230 (1996). 49 Matthew B. Miles and A. Michael Huberman, Qualitative Data Analysis, 2nd ed. (Thousand Oaks: Sage, 1994). 50 Jeasik Cho and Allen Trent, "Validity in Qualitative Research Revisited,” Qualitative Research 6, no. 3 (2006), 320, 10.1177/1468794106065006.
18
Consequently, I worked to confirm my research findings as accurate through
triangulation, a process of verifying facts through multiple data sources.51
Web crawls of six discussion boards constitute the first major source of research
data (see Appendix I). These discussion boards offered a breadth of data related to
patterns in user activity. Craigslist, eBay, and Silk Road each feature an internal
discussion board on their respective web domains, as well as auxiliary discussion boards
on the Reddit web domain. In order to identify trends in user activity on internet markets,
I ran a total of eighteen web crawls — three on each of the six discussion boards. I used
an iterative criterion sample to guide my data collection during the web crawls. 52 That is,
I sampled discussion board data based on a criterion (the inclusion of certain keywords)
and ran multiple iterations of web crawls based on the findings of the preceding crawl(s).
After developing a corpus of posts, I pattern-coded the parsed data with themes that
emerged progressively during the initial review.53 Following collection, I employed a
critical, interpretive approach to these case samples. Drawing on textual analysis, I
sought to identify patterns in user activity, understood as a triplex of user experience, user
practice, and user attitude.54
Twenty-seven semi-structured interviews with internet merchants constitute the
second major source of research data (see Appendix II). I followed IRB protocol at each
stage of interview research, from contacting participants to storing data, and I received
51 Cho and Trent, "Validity in Qualitative Research Revisited,” 322. 52 Miles and Huberman, Qualitative Data Analysis. 53 Miles and Huberman, Qualitative Data Analysis. 54 Fürsich, "In Defense of Textual Analysis."
19
IRB approval from the University of Pennsylvania.55 Where the discussion boards offered
a breadth of data related to user activity, the interviews offered a depth of data related to
user activity. I selected interview participants first through a theoretical sample and then
through a sequentially-driven conceptual sample.56 In the theoretical sample, I sought out
experienced users of internet markets, understood as users who had been on Craigslist or
eBay for over seven years. In the sequentially-driven conceptual sample, I sought
interview participants who would reflect a variety of perspectives in terms of experience,
age, and gender.57. Following recruitment, I conducted text-only internet interviews that
occurred in private chat rooms over Cyph, a peer-to-peer online messaging system.58 In
creating an interview template, I followed Herbert Rubin and Irene Rubin in thinking of
interviews as "structured conversations"59 designed to cover research problems, which the
interviewer develops beforehand, and to explore organic themes, which arise during the
course of the interview. In analyzing the interviews, I pattern-coded the data with themes
that emerged progressively during review. Following coding, I employed a critical,
interpretive approach to the interview data.
Legal and governmental records constitute my third source of research data (see
Appendix III). These records offered a breadth of data related to patterns in institutional
activity. My goal in looking at these records was to understand the legal and
governmental systems within which internet markets operate. In analyzing the data, I
55 "Online Interviews with Craigslist and eBay Users,” approved by the Institutional Review Board, University of Pennsylvania. 56 Miles and Huberman, Qualitative Data Analysis. 57 Herbert Rubin and Irene Rubin, Qualitative Interviewing, 2nd ed. (Thousand Oaks: Sage, 2012). 58 "About Cyph,” Cyph, retrieved July 22, 2017, https://www.cyph.com/about. 59 Rubin and Rubin, Qualitative Interviewing, 129.
20
pattern coded the material according to themes that emerged during review. In
interpreting the documents, I continued to employ a critical, interpretive approach,
drawing on textual analysis to identify patterns in the systems surrounding internet
markets. Here, however, I foregrounded the institutional context of their production. In
addition to drawing on textual analysis, I drew on political-economic analysis in seeing
states as actors with material and symbolic resources, as well as strong incentives to
protect and maintain those resources.
Platform documents produced by internet markets constitute my fourth major
source of research (see Appendix IV). These offered a depth of data related to patterns in
platform activity. This allowed me to hone in on the proximate context and deliberate
decisions of platforms, as they relate to institutional and user activity. These included
user agreements, terms of use, user guidelines, market policies, and promotional
materials. I pattern-coded this data with themes that emerged progressively through
review, and some of these overlapped with themes that developed from other research
sources. In interpreting these documents, I drew on textual analysis to identify patterns in
platform activity. More notably, I drew on political-economic analysis to consider how
the material interests of platforms inform their user documentation. This includes, for
instance, how user agreements enable platform companies to control economic resources
or evade legal liabilities. Finally, a variety of journalistic reports constitute the final
source of my research (see Appendix V). These were selected on the grounds of
relevance, mostly direct but sometimes direct, to the case studies.
Case Studies
21
A brief word on the case studies (see Appendix VI for a full primer). It should be
noted at the outset that each of these platforms is an unstable conceptual object:
architectures, protocols, functionalities, interfaces, and policies change over time. This
means that accounts of platform activity are chronologically situated, and they should be
taken as snapshots of fluid sites rather than as conclusive accounts.
Craigslist is a local internet market with over seven hundred internet domains (or
addresses) serving seventy countries.60 Each month, Craigslist users post over eighty
million classified advertisements, directed at physically proximate individuals within
their neighborhood, city, region, state, or country.61 This is the reason for the plurality of
internet domains: Craigslist addresses are location-based, meaning users in different
geographical regions navigate to different website domains in order to conduct local
commerce. In this respect, Craigslist is something of an umbrella term for the variety of
local Craigslist domains, as there is no centralized market designed to reach the
geographically distributed userbase in one fell swoop. This userbase is expansive:
Craigslist is the fifteenth most visited website in the United States.62 These market
participants post advertisements in a broad range of section categories: goods for sale and
goods wanted, rentals and real estate, job opportunities and services for hire, community
events and announcements, and a variety of discussion boards. There was previously a
personals sections, which went through several incarnations before being removed
entirely in 2018, following the passage of internet legislation that reduced platform
60 In this project, I use Craigslist (capitalized) rather than the stylized craigslist (lower case). "About,” Craigslist, retrieved March 2017, https://www.craigslist.org/about. 61 "About,” Craigslist. 62 "craigslist Traffic Statistics,” Alexa, http://www.alexa.com/siteinfo/craigslist.org.
22
immunity from criminal liability.63 Merchants meet one another in person to conduct the
final transaction. In recent years, Craigslist has generated upwards of $700 million in
revenue.64 With a small staff of forty people and minimal operating costs,65 plus a
userbase of millions, the company enjoys a profit margin of 80%, making it the most
profitable classified advertising site in the world.66 Despite increasing competition from
similar (if not copycat) sites, such as Offer Up, Internet Yard Sale, and (as of 2016)
Facebook Marketplace, Craigslist continues to dominate the field of peer-to-peer markets.
eBay is an online auction market with an expansive global presence.67 There are
over 150 million active eBay users68 and 25 million active eBay sellers69 around the
world, and the platform is ranked in the top ten for internet traffic in the United States
and the top hundred in China, Japan, Canada, and Russia.70 In contrast to Craigslist users
who are balkanized in local jurisdictions, eBay users meet in a common market, where
they exchange upwards of a hundred billion dollars in merchandise each year.71 Given the
size of the market, eBay is neatly (if not compulsively) divided into sections and
63 See the discussion of the Craigslist personals section in chapter 4. 64 AIM Group, Global Classified Advertising Annual, published online November 2016, http://www.aimgroup.com/reports. 65 Ryan Mac, "Craig Newmark Founded Craigslist To Give Back, Now He's A Billionaire,” Forbes, May 3, 2017, https://www.forbes.com/sites/ryanmac/2017/05/03/how-does-craigslist-make-money. 66 AIM Group, "Craigslist Revenue Soars Again,” published online November 2016, http://www.aimgroup.com/2016/11/29/craigslist-revenue-soars-again. 67 "How Popular Is eBay?,” Alexa. 68 "eBay Statistics and Facts,” Statista, published online 2018, https://www.statista.com/ topics/2181/ebay. 69 "Our New Logo,” eBay, published online 2016, https://pages.ebay.com/np/en-us/announcements/new/index.html?article. 70 "How Popular Is eBay?,” Alexa. 71 "eBay Inc. Reports Fourth Quarter and Full Year 2017 Results,” eBay Inc., January 31, 2018, https://www.ebayinc.com/stories/news/ebay-inc-reports-fourth-quarter-and-full-year-2017-results.
23
subsections: collectibles, fashion, electronics, cars, home and garden, sporting goods, and
others. These sections are Russian dolls with multiple nested subsections. Collectibles,
for example, divides into antiques, coins, and comics, which may then be filtered
according to era, brand, and condition. eBay began as an online antique market, and, after
going public in 1998, expanded its product selection and acquired dozens of electronic
commerce sites in the wake of the Web 2.0 boom.72 Significantly, in 2004, eBay took a
28% stake in Craigslist when it bought out a disgruntled shareholder, but the relationship
ended in 2008, when eBay sued Craigslist for diluting its stake in the company to 24%
and thereby removing its board seat; Craigslist ultimately bought back to the minority
stake.73
Silk Road was one of the first dark web markets74 and among the most active
during its run from 2011 to 201375. The site dealt predominately in drugs, firearms, fake
IDs, hacking manuals, criminal guidebooks, bootlegged software, and money laundering
services. Although buyers hailed from over a hundred countries worldwide, sellers tended
to be based in the Western world, especially North America and Europe.76 Over the
72 Crunchbase Staff, "eBay Acquisitions," last updated February 2018, https://www.crunchbase.com/organization/ebay/acquisitions/acquisitions_list#section-acquisitions. 73 Ryan Mac, "eBay Ends Ties With Craigslist, Sells Minority Stake Back To Craigslist," Forbes, June 19, 2015, https://www.forbes.com/sites/ryanmac/2015/06/19/ebay-ends-ties-with-craigslist-sells-minority-stake-back-to-craigslist. 74 Jamie Bartlett, The Dark Net, (London: William Heinemann of Random House, 2014). 75 Digital Citizens Alliance, "Busted, But Not Broken: The State of Silk Road and the Darknet Marketplaces,” published online 2014, http://digitalcitizensalliance.org. 76 These trends, gleaned from the evidence in United States v. Ulbricht roughly reflect the worldwide distribution of Tor users, as outlined by the Oxford Internet Institute. Of course, Tor activity and dark web activity should not be equated, insofar as Tor serves a variety of purposes outside of dark web access, including identity protection for political dissidents and victims of domestic abuse. These trends also reflect Jamie Bartlett's claim that Silk Road vendors tend to be based in the United States, the UK, and Australia.
24
course of its tenure, Silk Road generated over two hundred million dollars in sales, and
its owner, Ross William Ulbricht, collected over eighteen million dollars in commission
therefrom.77 The U.S. Federal Bureau of Investigation (FBI) shut down the site in 2013
following a two-year investigation into its operation and ownership, leading a federal
judge to sentence Ulbricht to life in prison without parole during a 2014 trial.78
United States of America v. Ross William Ulbricht, 31 F. Supp. 3d 540 (S.D.N.Y., 2014), Goverment Exhibit 703b. Mark Graham and Stefano De Sabbata, "The Anonymous Internet,” Oxford Internet Institute, published online 2014, http://geography.oii.ox.ac.uk. Jamie Bartlett, The Dark Net. 77 United States of America v. Ross William Ulbricht, Government Sentencing Submission. 78 United States of America v. Ross William Ulbricht, Sentencing Decision.
25
CHAPTER 1
HOW TO GET AWAY WITH INTERNET FRAUD
EXPLOITING DIGITAL PROTOCOLS
Internet markets represent cyberlibertarian ideals put into practice. As free digital
markets, they embody the laissez faire principles championed by cyberlibertarianism.
Craigslist, eBay, and Silk Road each draw on cyberlibertarianism to characterize their
platforms as self-regulating. By these accounts, internet markets should be perfect. Yet
problems of fraud, deception, manipulation, and coercion emerge on these platforms, and
institutions make sporadic appearances in economic conflicts. In such cases, users pursue
their economic self-interest through the manipulation of platform protocols. This is
significant, because protocols are designed to replace regulations in the context of digital
exchange. Not only are internet markets far from self-regulating, but the digital protocols
that are supposed to make regulations obsolete end up being the very tools by which
internet actors defraud and deceive one another. So much for digital equilibrium.
Platform Cyberlibertarianism
In the introduction, I noted that cyberlibertarianism operates on the level of firms,
networks, and platforms. Internet markets fall under the aegis of platform
cyberlibertarianism, according to which internet websites are self-regulating. Several
authors describe how the discourse of cyberlibertarianism operates on the level of
platforms, although they use different terms to characterize that discourse. Tarleton
Gillespie considers how platform companies draw on cyberlibertarianism to position their
26
websites as neutral venues of exchange.79 Gillespie argues that the very term "platform"
connotes an impartial foundation upon which free association rests. A platform is not an
active participant on the internet but a "mere facilitator, supporter, host" whose central
function is "the neutral provision of content".80 As neutral venues of internet exchange,
platforms are not responsible for the actions of users, and they need not institute
regulations to control user behavior. Similarly, for Trevor Scholz, the term "Web 2.0"
implies that internet platforms are beyond regulation, governed by peer-to-peer
agreement rather than hierarchical authority.81 José Van Dijck and David Nieborg
relatedly observe that electronic commerce manifestos position user activity as
fundamentally cooperative.82 Here, platform regulations are unnecessary, because
voluntary participation is at the center of internet exchange.
Silk Road, eBay, and Craigslist each draw on cyberlibertarianism to characterize
their platforms as self-regulating and to justify their laissez faire regulatory regimes. This
is evident in their public presentation, legal strategy, and platform policy — even as it is
sometimes contradicted by their cooperation with state institutions. As a black market set
in opposition to state power, Silk Road most dramatically embodies cyberlibertarian
ideals. Ross William Ulbricht, Silk Road's architect and executive operator, saw Silk
Road as a principled libertarian sphere of exchange. His logic ran as follows: trade is
79 Tarleton Gillespie, "The Politics of 'Platforms',” New Media & Society 12, no. 3. (2010): 347-364, doi: 10.1177/1461444809342738. 80 Gillespie, "The Politics of 'Platforms',” 353. 81 Trevor Sholz, "Market Ideology and the Myths of Web 2.0,” First Monday 13, no. 3. (2008): no pagination, http://firstmonday.org/article/view/2138/1945. 82 José van Dijk and David Nieborg, "Wikinomics and Its Discontents: A Critical Analysis of Web 2.0 Business Manifestos,” New Media & Society 11, no. 5 (2009): 855-874. doi: 10.1177/1461444809105356.
27
inherently cooperative; the state is inherently coercive; when the state ceases to regulate
trade, actors will come together to form mutually beneficial economic relationships. In
his LinkedIn profile, Ulbricht directly contrasted economic cooperation and political
compulsion:
I want to use economic theory as a means to abolish the use of coercion and
agression [sic] amongst mankind. Just as slavery has been abolished most
everywhere, I believe violence, coercion and all forms of force by one person
over another can come to an end. The most widespread and systemic use of force
is amongst institutions and governments, so this is my current point of effort. The
best way to change a government is to change the minds of the governed,
however. To that end, I am creating an economic simulation to give people a first-
hand experience of what it would be like to live in a world without the systemic
use of force.83
For Ulbricht, Silk Road was an "economic simulation" of a libertarian society, in which
the invisible hand of the free market underwrote economic cooperation. Absent state
economic regulation, nonviolent agreement among self-interested actors would become
the salient principle of economic relationality.
Further, Ulbricht saw economic cooperation on Silk Road as a means of eroding
state power. In a discussion board post on the Silk Road forums from September 2012, he
positioned the popular agora of Silk Road in opposition to the coercive apparatus of the
state: "Every single transaction that takes places outside the nexus of state control is a
83 Ross William Ulbricht, "Ross William Ulbricht,” LinkedIn, accessed February 1, 2015. https://www.linkedin.com/in/rossulbricht.
28
victory for those individuals taking part in the transaction. So there are thousands of
victories here each week and each one makes a difference, strengthens the agora, and
weakens the state."84 Here, Ulbricht subscribed to a market-centric version of
libertarianism (agorism) and a repressive theory of state power, in which governments
"limit people's access" to commodities that would otherwise circulate freely in the
market. He saw each transaction on Silk Road as a countervailing actualization of
negative liberty, specifically the freedom to trade "outside the nexus of state control". As
economic freedom in civil society expanded, he reasoned, political authority in state
structures would diminish. Exchange relations — cooperative, consensual, and egalitarian
— would make obsolete centralized state power and a fortiori state economic regulation.
After his arrest in October 2013, Ulbricht continued to defend his actions on
principled libertarian grounds. In his pre-sentencing submission to the court, Ulbricht
wrote, "I believed at the time [of creating Silk Road] that people should have the right to
buy and sell whatever they wanted to long as they weren't hurting anyone else... Silk
Road was supposed to be about giving people the freedom to make their own choices, to
pursue their own happiness, however they individually saw fit."85 Even the popular press
branded Ulbricht has a kind of entrepreneurial cyberpirate. The Economist, a flagship of
economic liberalism, noted that product quality on Silk Road was higher than in the street
84 Gwern Branwen et al., "Dark Net Market Archives, 2011-2015,” Gwern, accessed December 10, 2014, https://www.gwern.net/DNM-archives. Dread Pirate Roberts, "Silk Road discussion / Re: chat,” Silk Road Forums, archived September 23, 2012. http://dkn255hz262ypmii.onion. In the federal case against Ross Ulbricht, the prosecution convinced the jury that Dread Pirate Roberts was Ulbricht's username. See the disucssion of United States of America v. Ross William Ulbricht in the introduction. 85 United States of America v. Ross William Ulbricht, 31 F. Supp. 3d 540 (S.D.N.Y., 2014). Sentencing Submission.
29
trade, a fact that ostensibly demonstrated the self-regulating capacity of the free market.86
Forbes highlighted the political nature of Ulbricht's black market experiment, likening
him to "Julian Assange with a hypodermic needle".87 The libertarian celebration of the
site was not limited to the fiscally conservative press, however. When Gawker published
the first major exposé of Silk Road in June 2011, a staff writer declared that Silk Road
made "buying and selling drugs as easy as buying used electronics" and embodied a
"dream of a distributed digital economy outside the law, where money flows across
borders as free as bits".88
Where Ulbricht positioned Silk Road as a extrastate market utopia, eBay positions
itself as a cooperative consumer arcade. As a publicly traded company, eBay is less
dramatically cyberlibertarian than Silk Road, but it nevertheless draws on the discourse
of self-regulation in several arenas. In their promotional materials, eBay is "the perfect
store": the platform circulates superlative commodities among a collaborative group of
users, scattered around the country and the world.89 Customers purchase goods at low
prices, and vendors sell them at high prices — an evidently contradictory claim that is
meant to attract buyers and sellers alike, both of whom are said to contribute to a thriving
86 The Economist Staff, "Amazons of the Dark Net,” The Economist, November 1, 2013. https://www.economist.com/news/international/21629417-business-thriving-anonymous-internet-despite-efforts-law-enforcers. 87 Andy Greenberg, "Meet the Dread Pirate Roberts, the Man Behind Booming Black Market Drug Website Silk Road,” Forbes, August 14, 2013. https://www.forbes.com/sites/ andygreenberg/2013/08/14/meet-the-dread-pirate-roberts-the-man-behind-booming-black-market-drug-website-silk-road. 88 Adrian Chen, "The Underground Website Where You Can Buy Any Drug Imaginable,” Gawker, June 1, 2011. http://gawker.com/the-underground-website-where-you-can-buy-any-drug-imag-30818160. 89 Adam Cohen, The Perfect Store: Inside eBay (Boston: Little, Brown and Company, 2002).
30
and idiosyncratic online marketplace. eBay's origin story features an emblematic mix of
merchant cooperation and market serendipity. As related by eBay's public relations
manager in 1997, the story runs as follows. Pierre Omidyar, eBay's founder, created the
site to help his fiancée locate a rare Pez dispenser. As antique dealers began to populate
the platform, Omidyar spoke with knowledgeable merchants, learned about the
collectibles trade, and followed scattered leads until he found the treasured piece of
plastic. The tale is a colorful combination of market acumen, digital crowdsourcing, free
association, commodity culture, and romantic tropes, all in one fell swoop. It is also a lie:
as Adam Cohen revealed several years later, the story was entirely fabricated by eBay's
public relations manager to create a compelling narrative for the press.90 Despite being
factually incorrect, the origin story captures the cooperative ethos of the company's
public presentation, an ethos that lives on in its colorful television commercials and print
advertisements. eBay's 2017 Fill Your Cart With Color commercial features a
concatenation of eccentric figures, each exhilarated by a recent purchase, and asks,
"When did shopping get so beige?"91
In its legal claims, eBay affirms a wide-ranging immunity from state regulations.
Under Section 230 of the Communications Decency Act, as well as the 4th circuit ruling
in Zeran v. American Online, Inc., internet platforms are largely immune from liability as
speakers, publishers, or distributors of third-party content.92 That is, they cannot be held
legally responsible for the behavior of users on their platform. eBay asserts and extends
90 Adam Cohen, The Perfect Store. 91 eBay Inc., "Fill Your Cart With Color,” television advertisement, directed by Bridget Savage Cole, Josh Nussbaum, and Director X. 92 John Larkin, "Criminal and Civil Liability For User Generated Content: Craigslist, A Case Study,” Journal of Technology, Law and Policy 15 (2010): 85-112.
31
its legal immunity in its terms of use. The agreement exempts the platform from damages
in a variety of commercial circumstances: "eBay has no control over and does not
guarantee the existence, quality, safety or legality of items advertised; the truth or
accuracy of users' content or listings; the ability of sellers to sell items; the ability of
buyers to pay for items; or that a buyer or seller will actually complete a transaction or
return an item."93 Users cannot hold the platform responsible for "loss of money,
goodwill or reputation, profits, other intangible losses, or any special, indirect,
consequential damages"94, even in cases of property destruction or malicious software
infection.
eBay's team of litigators has relied on these legal protections to thwart damage
claims in a number of contested cases. In 2004, an eBay user, Roger Grace, sued the
company after another user posted negative feedback on his page.95 Claiming that the
negative feedback constituted defamation and injured his commercial reputation, Grace
sought damages from eBay in California court. The court ruled in eBay's favor, citing
Section 230 of the Communications Decency Act and eBay's terms of use in determining
that the platform was not responsible for the user's loss of commercial reputation. In
2008, eBay took on a bigger fish: Tiffany & Co., a publicly traded luxury jewelry
business. Tiffany & Co. sued eBay for false advertising, trademark infringement, and
trademark dilution, pointing to the sale of counterfeit Tiffany & Co. items on the platform
93 "User Agreement,” eBay, last modified April 3, 2018. https://www.ebay.com/help/policies/ member-behaviour-policies/user-agreement?id=4259. 94 User Agreement." 95 Grace v. eBay, Inc, 16 Cal.Rptr.3d 192 (California Ct. App. 2004).
32
and the presence of the company logo in eBay's promotional materials.96 The court again
ruled in eBay's favor, citing Section 230 of the Communications Decency Act and the
principle of nominative fair use. As a host of third-party content, eBay was not
responsible for the sale of counterfeit goods on the site.
At the same time, the Tiffany & Co. lawsuit demonstrates that eBay is willing to
cooperate with state institutions. During the case, eBay revealed that companies who find
counterfeit versions of their products in the auction market may request the takedown of
those items through a copyright violation functionality. Hence, even as eBay resists state
regulation, it follows state directives over copyright law, incorporating those directives
into platform infrastructure. The cyberlibertarian paradox of the state is evident here, as
eBay moves between regulatory evasion and regulatory abidance. eBay's status as a
publicly traded company figures largely into this picture: the platform wants to minimize
the economic costs associated with platform regulation, as well as the political costs that
would accompany state violations.
Craigslist draws on cyberlibertarianism to present itself as a local neighborhood
market governed by countercultural reciprocity. As a venue that regularly cooperates with
the state, Craigslist is the least dramatic case of cyberlibertarianism, but it draws on the
discourse in multiple contexts. Despite being a multimillion-dollar company, Craigslist
regularly presents itself with minimal fanfare, ostensibly the embodiment of a laid-back
and user-friendly digital platform. Though rarely advertised, the platform enjoys a word-
of-mouth popularity, having leveraged its early web presence and sheer utility to become
an emblem of straightforward internet exchange. Its famously unassuming interface has
96 Tiffany (NJ) Inc. v. eBay, Inc, 576 F.Supp.2d 463 (S.D.N.Y. 2008).
33
remained virtually unaltered since the late 1990s, becoming a point of cheeky
contestation between minimalist users and their aesthete counterparts. (In a
characteristically ambivalent headline, Wired describes the interface as "ugly, janky, old-
school... and unbeatable".97) Its logo, also unchanged since the late 1990s, is the company
name, stylized in all lowercase, in purple, Times New Roman font, sometimes preceded
by a small peace sign. CEO Jim Buckmaster designates himself as "anti-establishment"
and "a socialist anarchist".98 At the 2013 Open Source Convention, the company's booth
consisted of a plain white backdrop and small, round table, draped in a tie dye cloth.99
Like eBay, Craigslist employs a team of litigators to defend its lax regulatory
regime. In 2008, after someone posted a racially discriminatory housing advertisement on
the site's Chicago portal, a group of civil rights lawyers sued the platform for violating
nondiscrimination statutes.100 The court ruled that Craigslist was not accountable for
discriminatory posts, relying on Section 230 to justify the platform's hands-off regulatory
regime. When the Sheriff of Cook County sued Craigslist for facilitating prostitution in
its (now deleted) Erotic Services section, the court ruled in favor of Craigslist on similar
grounds, noting in its verdict, "Craigslist does not 'provide' the [illegal] information, its
97 Justin Peters, "Craigslist is Ugly, Janky, Old School... and Unbeatable,” Wired, February 14, 2017, https://www.wired.com/2017/02/craigslist-is-ugly-janky-old-schooland-unbeatable. 98 "Jim Buckmaster,” About, Craigslist, accessed May 9, 2018, https://www.craigslist.org/ about/jim_buckmaster. 99 Jim Buckmaster, "CL at OSCON," craigslist blog, last modified July 13, 2013, http://blog.craigslist.org/2013/07/23/cl-at-oscon. 100 Chicago Lawyers Committee for Civil Rights Under Law v. craigslist, Inc., 519 F.3d 666 (7th Cir. 2008).
34
users do."101 In addition to its legal efforts, Craigslist encodes its combination of
executive authority and regulatory neutrality in its terms of use. There, the platform
affirms its exclusive discretion over platform moderation and its laissez-faire policies on
market regulation: "[W]e make no promise as to CL, its completeness, accuracy,
availability, timeliness, propriety, security, or reliability."102 Hence, in 2010, when the
internet company Naturemarket developed software to automatically post advertisements
on Craigslist, Craigslist won a permanent injunction suit against them.103 Here, the
Computer Fraud and Abuse Act underwrote the court's decision that the violation of
Craigslist's terms of use constituted a contract violation. This case, in turn, served as a
precedent for three subsequent cases, in which Craigslist successfully sued groups and
individuals who posted content on behalf of third parties,104 developed similar auto-post
software,105 or scraped Craigslist content for redistribution on other sites.106 In these
instances, Craigslist affirmed its executive authority over the platform and its legal
immunity from any misconduct transpiring therein.
At the same time, Craigslist regularly accommodates state institutions. The saga
of the Craigslist Personals section is a nice illustration of this paradoxical relationship.
For many years, the platform included an Erotic Services section, where sex workers
often posted advertisements. In 2009, the same year that Craigslist faced off with the
101 Thomas Dart, Sherriff of Cook County v. craigslist, Inc., 665 F. Supp. 2d 961 (N.D. Ill. 2009). 102 "Terms of Use,” Craigslist, last modified December 19, 2017, https://www.craigslist.org/ about/terms.of.use.en. 103 craigslist, Inc. v. Naturemarket, Inc., 694 F. Supp. 2d 1039 (N.D. Cal. 2010). 104 craigslist, Inc. v. John L. Stover et al., CV-11-03308 SBA (N.D. Cal. 2012). 105 craigslist, Inc. v. Alecksey Kerbel et al., C-11-3309 EMC (N.D. Cal. 2012). 106 craigslist, Inc. v. 3Taps, Inc., 3:12-CV-03816-CRB (N.C. Cal. 2015).
35
Sheriff of Cook County, platform executives met with attorney generals in multiple
states; and they ultimately replaced the Erotic Services section with an Adult Services
that was to be subject to manual review.107 A year later, after Craigslist executives were
called to testify in front of the House Judiciary Committee's Subcommittee on Crime,
Terrorism, and Homeland Security, the company shuttered the Adult Services section
entirely, releasing a statement that affirmed their cooperation with institutional actors: "In
Craigslist, law enforcement and NGO advocates have a highly responsive partner."108
More recently, Craigslist closed its Personals section, which became the de facto venue
for sex work in the wake of section shutdowns, in response to internet legislation
designed to fight human trafficking.109 This brief history demonstrates the ambivalence
toward the state operative in cyberlibertarianism: Craigslist evades state regulations, on
the one hand, and follows state directives, on the other.
Fraud, the Fatal Conceit
Internet markets embody the laissez-faire principles of cyberlibertarianism. They
are free markets, or spheres of economic exchange that are not subject to commercial
regulatory systems.. They feature no economic regulation in the form of contracts and
courts; and they feature no social regulation in the form of status codes and tight-knit
107 Alan Duke, "Official: Craigslist to Replace 'Blatant Internet Brothel,'" CNN, May 13, 2009, http://www.cnn.com/2009/TECH/05/13/craigslist.sex.ads 108 Caroline McCarty, "Craigslist: We Won't Open Adult Services Section", CNet, September 15, 2010, https://www.cnet.com/news/craigslist-we-wont-reopen-adult-services-section. 109 H.R. 1865 — 115th Congress: Allow States and Victims to Fight Online Sex Trafficking Act of 2017. Retrieved from https://www.govtrack.us/congress/bills/115/hr1865.
36
communities. Further, as free digital markets, they feature no stable identities, insofar
users may create and delete online avatars with relatively little effort and with relatively
little consequence. Internet markets are built upon the mutual association and voluntary
cooperation of independent traders. According to cyberlibertarianism, they should be
self-regulating centers of economic activity. Yet these platforms are host to fraud,
deception, manipulation, and coercion, which occur through the manipulation of platform
protocols designed to replace regulations. Far from self-regulating, internet markets
feature diverse forms of economic conflict, underwritten by the very protocols designed
that are supposed facilitate cooperative exchange.
Fraud is a form of economic or social gain that operates at the intersection of
deception (having others think what you want them to think) and manipulation (having
others do what you want them to do). Scams, or confidence schemes, are sophisticated
forms of fraud that exploit foibles of the human psyche, such as greed, vanity, or naïveté.
Fraud is a major criminal problem on the internet. According to the United States Federal
Bureau of Investigation (FBI), internet fraud is the single most commonly reported
internet crime in the US, with over 100,000 complaints each year.110 In addition to
personal anonymity and physical distance, the predominance of linguistic communication
online makes the internet an ideal venue for deception. Lies are generally more difficult
to detect in computer-mediated encounters than in face-to-face ones, mainly because the
110 As fraud investigators note, the number of reported cases is far below the actual rate of occurrence. This is because victims are often embarrassed at having been defrauded; because they lose small amounts of money or minimally valuable goods and do not want to involve investigators in seemingly trivial matters; and/or because they discover that reported cases of internet fraud are rarely solved. Internet Crime Complaint Center, "Internet Crime Report, 2017,” last modified January 15, 2018, https://pdf.ic3.gov/2016_IC3Report.pdf.
37
chief indicators of interpersonal deception — body language, facial expression, vocal
inflection, and conversational pauses — are absent in text-based, online interactions.111
Regulations typically safeguard merchants against fraud. There two major forms
of regulation that concern us here. There are economic regulations, or the formal legal
mechanisms by which institutions (including state institutions) intervene in trade relations
— the Federal Trade Commission, small claims courts, consumer protection agencies,
anti-trust laws, and so forth. In the sphere of exchange, the contract is the foundational
form of economic regulation, and the court system is the central enforcing authority.112
For instance, if a seller violates the terms of a contract, a buyer may seek institutional
recourse through legal arbitration in order to enforce the contract's terms.113 As Kojin
Karatani argues, economic regulations by the state help minimize the conflictual
dimension of capitalist market exchange.114 There are also social regulations, or informal
standards of appropriate conduct that indirectly mediate exchange relations — notions of
111 Jeffrey Hancock and Jamie Guillroy contest the idea that lies are more difficult to identify on the internet; but other work, including work by former intelligence officials, points a variety of physical behavior that can signal deception. Michail Tsikerdekis and Sherali Zeadally, "Detecting and Preventing Online Identity Deception in Social Networking Services,” IEEE Internet Computing 19, no. 3 (2015): 41-49, https://ieeexplore.ieee.org/document/7111875. Philip Houston et al., Spy the Lie: Former CIA Officers Teach You How To Detect Deception (New York: St. Martin's, 2012). Jeffrey T. Hancock and Jamie Guillroy, "Deception with Technology,” in The Handbook of the Psychology of Communication Technologies, ed. S. Shyam Sundar (New York: John Wiley & Sons, 2015): 270-289, https://doi.org/10.1002/9781118426456.ch12. 112 Avery W. Katz, "Economic Foundations of Contract Law,” in Gregory Klass, George Letsas, and Prince Saprai, eds., Philosophical Foundations of Contract Law (Oxford University Press, 2014): 171-192. 113 Stephen A. Smith, "Remedies for Breach of Contract: One Principle or Two,” in Gregory Klass, George Letsas, and Prince Saprai, eds., Philosophical Foundations of Contract Law (Oxford University Press, 2014): 341-361. 114 Kojin Karatani, The Structure of World History, trans. Michael K. Boudaghs (Durham: Duke University Press, 2014).
38
reputation, fidelity, decency, character, and good faith. In the sphere of exchange, status
codes are a common form of social regulation, and the community is a central enforcing
authority.115 Michael Aglietta notes that social regulations are particularly important in
the context of contemporary market exchange, where traders meet one another as abstract
actors rather than as community members.116 Economic and social regulations both rely
the known identities of actors, who may be bear the consequences of contract violations
and status injuries.
On the internet, there are a variety of mechanisms designed to control user
behavior and stabilize internet exchange.117 One of these mechanisms is the protocol, an
infrastructural rule of engagement that sets the groundwork for computational
operations.118 For example, payment protocols determine whether or not a user has
entered valid financial information or placed money in a website escrow. As basic rules
of computational engagement, protocols are grounded in programmed systems, and,
though they may be overseen by humans, they are largely automated.119 By contrast,
115 J. Davis, "Forms and Norms: The Economy of Social Relations,” Man 8, no. 2 (June 1973): 159-179, http://www.jstor.org/stable/2800844. 116 Michel Aglietta, A Theory of Capitalist Regulation: The US Experience (London: Verso, 2015). 117 James Grimmelman, "The Virtues of Moderation,” Yale Journal of Law and Technology 17, no. 1 (2015): 42-109, http://digitalcommons.law.yale.edu/yjolt/vol17/iss1/2. 118 Alexander Galloway, Protocol: How Control Exists After Decentralization (Cambridge: MIT Press, 2004). Meredith Broussard, Artificial Unintelligence (Cambridge: MIT Press, 2018). The relationship between protocols and automation is convoluted: protocols are often automated, but not all automation is protocological. For example, online payment protocols are automated and protocological (being computational mechanisms with little human oversight); but Youtube flags are automated but not protocological (being computational mechanisms with subsequent human oversight). 119 Ajay Agrawal et al., The Prediction Machine: The Simple Economics of Artificial Intelligence (Cambridge: Harvard Business Review, 2018).
39
regulations are grounded in jurisdictive institutions, such as courts and communities,
which can legitimately control human behavior through coercive measures, such as
contract violations and status injuries. Regulations are superstructural operations that rely
on judicious human arbitrations, while protocols are infrastructural operations that rely on
authenticating automated mechanisms.
Some studies of electronic commerce frame protocols as effective replacements
for regulations. These studies operate under the cyberlibertarian assumption that internet
exchange is fundamentally cooperative and that internet platforms are basically self-
regulating — with the caveat that automated protocols lay the foundation for self-
regulation. The idea that commerce can be fully automated, and thereby transcend the
vagaries of contract and state, is particularly evident in discussions of reputational
protocols. For instance, Eric Goldman argues that reputational protocols, or online
feedback systems, are effective replacements for market regulations.120 For Goldman,
reputational protocols ensure cooperation in online markets by exposing misbehaving
merchants through negative reviews. These protocols are "secondary invisible hands"121
that require no regulatory authorities, just as Adam Smith's invisible hand of price
determination requires no central institution to appraise the value of goods.122 Goldman
anticipates an objection to his argument: what if those feedback systems are themselves
120 Eric Goldman, "Regulating Reputation,” in The Reputation Society: How Online Opinions Are Shaping the Offline World, eds. Hassan Masum and Mark Tovey (Cambridge: MIT Press, 2011): 51-62. Most essays in the collection follow Goldman in celebrating reputation over regulation. 121 Goldman, "Regulating Reputation,” 53. 122 Adam Smith. The Wealth of Nations (New York: Bantam Classic, 2003).
40
unreliable, as when restaurant owners review their own businesses on Yelp123 or when
Amazon sellers use fake accounts to post feedback on their own wares124? Goldman
counters: to determine if reputation systems are reliable, users can furnish second-order
reputations systems that rate the quality of each feedback system. Goldman refers to this
meta-reputation system as the "tertiary invisible hand"125, a reputation system that
determines the reputation of another reputation system. For Goldman, the fraudulent
elements of exchange can always be mediated by a supplementary cooperative tool, and
the regulatory lacunae of internet platforms can always be replaced with automated
protocols.
Let's now turn to the internet markets under consideration. We'll begin with a
radically automated market (Silk Road), move onto a widely automated market (eBay),
and conclude with a minimally automated market (Craigslist).
Honor Among Thieves
Exchange relations on Silk Road were the most fraudulent and aggressive among
the internet markets under consideration, and they contradicted Ulbricht's cyberlibertarian
presentation of the platform as a principled libertarian sphere. As a free market, Silk
Road relied on a series of protocols in place of regulations. In place of status codes,
vendor pages featured a rating protocol through which buyers could assess the seller's
customer service, delivery time, and quality of purchased goods. In place of contracts,
123 Joel Grover and Amy Corral, "Don't Fall for Fake Reviews: I-Team Uncovers Them on Yelp, Facebook, Google,” NBC Los Angeles, September 25, 2017. 124 Elizabeth Dwoskin and Craig Timberg, "How Merchants Use Facebook to Flood Amazon with Fake Reviews,” The Washington Post, April 23, 2018. 125 Goldman, "Regulating Reputation,” 53.
41
transactions occurred through a payment protocol: when purchasing a product, buyers
placed their bitcoin in a site-supported escrow, which released the currency to the vendor
once the buyer confirmed receipt of the contraband. The escrow protocol also furnished
profits for the site executive, Ross William Ulbricht, who collected a commission from
each transaction, ranging from 10 to 20% of the sale price. In place of identities,
merchants used profile protocols. To create an account, users had to provide their bitcoin
wallet information and generate a unique username. Purchasing contraband on the site
also required buyers to provide a delivery address. Buyers alternately provided their own
home address, a postal office box, or a working mailbox at a nearby unoccupied home.
Anonymity distinguished Silk Road from the traditional black market, where face-to-face
interactions generally give rise to the status codes that the platform sought to automate.
126
Fraud, deception, manipulation, and coercion were significant problems on Silk
Road. In those cases, users pursued their economic self-interest by manipulating platform
protocols designed to replace regulations. In white-washing scams, vendors exploited the
rating, payment, and profile protocols in order to develop trust, acquire capital, and leave
the site without major consequence. During rating extortion schemes, vendors
manipulated the rating protocol and the profile protocol, leveraging customer information
and the specter of state power in order to boost their platform reputation and on-site sales.
Ulbricht himself was subject to extortion through the payment protocol, as blackmailers
demanded that he send website commission their way, lest they expose him to state
126 Letizia Paoli, Mafia brotherhoods: Organized Crime, Italian Style. (New York: Oxford University Press, 2003).
42
power. Ulbricht ultimately turned to brute force to counter these protocol exploits,
enacting the very violence that the site was designed to obviate.
Vendor scams on Silk Road occurred through the manipulation of payment,
rating, and profile protocols. The most prevalent scam on the site was known as
whitewashing: a vendor developed a high rating, accepted multiple payments in exchange
for contraband, persuaded buyers to immediately verify their transactions, collected the
escrow payments released thereby, and then closed her vendor account without sending
the purchased products. Ulbricht's records and correspondences, gleaned from his federal
trial, paint a picture of a digital black market beset by scams.127 Less than a year after
launching the site, Ulbricht noted to a friend that he was banning between one and three
vendors per week for engaging in whitewashing scams.128 In January 2013, Ulbricht
banned a vendor for "scamming many buyers with fake products"129, after which the
vendor returned to the site under a different username. As Ulbricht explained in his
business log, "He goes in stealth and then comes back and repeats."130 In April, a Silk
Road vendor developed a "quickbuy" program that lured new buyers with product
markdowns, only to disappear after accepting payments.131
The site's discussion board was filled with accounts of these whitewashing scams,
as well as strategies to avoid them. After ordering three thousand dollars worth of
narcotics, a buyer was stonewalled by her vendor: "Now he will not answer my emails. I
127 United States of America v. Ross William Ulbricht, 31 F. Supp. 3d 540 (S.D.N.Y., 2014). 128 United States of America v. Ross William Ulbricht, Exhibit DX 227A. 129 United States of America v. Ross William Ulbricht, Exhibit 242. 130 United States of America v. Ross William Ulbricht, Exhibit 242. 131 United States of America v. Ross William Ulbricht, Exhibit 242.
43
called his phone and he denied knowing who I was, even though I know his voice from
having spoken to him over the phone before." A discussion board poster noted that others
had complained about the same vendor, who "clearly built up his reputation and trust as a
vendor with small and medium sized orders" before "scamming people on his way out
with some big orders". One user maintained a list of Silk Road scammers on the
discussion board, and nearly sixty vendors were listed by the time the site was shut down.
Part of the problem of identifying scammers was the ease with which they could make
new accounts. After a reputable vendor, under the username tony76, executed the most
lucrative white-washing scam in the history of the site, users tried to identify his new
account through textual cross-analysis of his product advertisements. As one user noted,
"It's just so hard to punish scammers when everything is anonymous." One bitter user
complained that Silk Road was "nothing but scamming and hacking, disappearing
vendors and disappearing [bitcoin]". Another agreed, writing, "Out of the ~10 purchases I
have made, I have only NOT been ripped off on 1 order. Fuck [Silk Road]. Last time I
get ripped off."
The collection of buyer addresses for blackmailing purposes was quite common
among Silk Road vendors. Here, sellers exploited the rating protocol and the profile
protocol to leverage customer information and boost their platform reputation. Ulbricht's
correspondences reveal concerns over the practices of rating extortion. One user wrote
privately to Ulbricht in December 2011, warning him that a major vendor, Paperchasing,
was regularly extorting buyers for high vendor ratings: "Paperchasing is not only
blackmailing folks into 5/5's or face his wrath, he's also keeping addresses — or as he
says, he has a 'good memory' for them — so in spite of his 1000+ orders if someone
44
who's [sic] crossed his little feedback fetish tries to order under another name, he can
'remember' their addy [sic] from before."132 During his testimony in United States v.
Ulbricht, a Silk Road vendor by the name of Mr. Duch confessed to similar practices.
Responding to questions from the prosecution, Mr. Duch explained:
Q: What records did you keep?
A: Essentially, I created a spreadsheet that tracked all the business that I
conducted, all the drugs that I sold on Silk Road.
Q: Did you keep your customers' addresses?
A: Yes, I did.
Q: You weren't supposed to do that under Silk Road's rules, right?
A: No, I wasn't.133
Mr. Duch even forced buyers to grant him high ratings as a condition of sale. As he
explained on his vendor page, "YOU MAY NOT ORDER unless you agree to rate 5 out
of 5 no matter what happens, with the product, the packaging, delays or anything else!"134
In a private conversation, Ulbricht referred to this kind of forced feedback as among the
site's "major issues", along with scams and fake products.135
On the site's discussion board, many users complained about being subjected to
rating extortion. When a buyer left a vendor a negative review in March 2013, the vendor
demanded a revision to the feedback, threatening, "I'll hand over your info to the cops...
I've got your address, your purchasing stats, a list of what your ordered from me." One
132 United States of America v. Ross William Ulbricht, Exhibit F. 133 United States of America v. Ross William Ulbricht, 1526. 134 United States of America v. Ross William Ulbricht, Exhibit 700. 135 United States of America v. Ross William Ulbricht, Exhibit 227A.
45
discussion board poster noted, "Most vendors on here are stupid enough to keep a list of
addresses in a text document for blackmail purposes later." Another responded cheekily
to this claim, "Hey now... not always a text document. Some of them use an Excel
spreadsheet." When a buyer complained that forcing 5/5 ratings seemed "to defeat the
purpose of the review system", another responded, "It shouldn't be the norm, but it is."
The problem of address blackmail and feedback extortion lead some buyers to open a
P.O. box with false identifying information. This relieved their concern "about being
blackmailed" if they "worked with the wrong person". After a vendor offered free
samples of narcotics on the discussion board "to establish credibility", a buyer asked,
"How do we know you're not LE [law enforcement] or someone who is harvesting
addresses in order to blackmail people at a later date?" Similarly, in August 2013, a few
weeks before the site closed down, a discussion board poster asked, "What on EARTH is
there to prevent a vendor from turning into a blackmailer?"
Ulbricht himself was subject to extortion on numerous occasions, as blackmailers
exploited the payment protocol and the abeyant presence of state power to demand that
platform commission come their way. The executive kept track of these extortion
schemes in his personal records. In November 2012, he received a message from an
anonymous Silk Road user, who threatened to attack the site through a flaw in its
infrastructure: "I was able to exploit a vulnerability in one of the pages on silk road in a
way that will cause a DOS [denial-of-service] attack and SQLI [structured query
language injection] attack. Send 5k to [encrypted address] if you are satisfied with
WHAT I am doing. Send 15k to the same address to know HOW I am doing it."136
136 United States of America v. Ross William Ulbricht, Exhibit 227G.
46
Ulbricht apparently yielded and sent the ransom to prevent a shutdown. In May, Ulbricht
paid a steeper price to stop a similar attack, writing in his business log, "attacker agreed
to stop if I give him the first $100k of revenue and $50k per week thereafter."137 In
addition to the functionality of the site and its concomitant profitability, Ulbricht's
personal identity became an object of leverage during several extortion schemes. Shortly
before the attack in May, Ulbricht noted in his business log, "being blackmailed again.
someone says they have my ID, but hasn't proven it".138 By the next day, Ulbricht had
concluded that the blackmailer was a fraud: "guy blackmailing saying he has my id is
bogus".139
Ulbricht went to violent lengths to counter these threats and maintain his assets,
evading protocols altogether and employing the very coercion that the site was designed
to obviate. Ulbricht kept track of his revenge plans in his personal records. When a
vendor threatened to release thousands of buyer addresses in March 2013, Ulbricht hired
a hit man to identify, locate, and murder him.140 The hit man claimed to be associated
with The Hells Angels Motorcycle Club, as Ulbricht noted in his business log.141 Yet, as
the federal court case revealed, the hit man was actually a con artist — one who
ultimately cheated Ulbricht out of three hundred thousand dollars for a hit that never
transpired.142 A month later, Ulbricht hired the same hit man to execute a Silk Road
vendor who, in classic whitewashing style, "[made] selling accounts, [sold] for a while,
137 United States of America v. Ross William Ulbricht, Exhibit 247. 138 United States of America v. Ross William Ulbricht, Exhibit 241. 139 United States of America v. Ross William Ulbricht, Exhibit 241. 140 United States of America v. Ross William Ulbricht, Exhibit 926. 141 United States of America v. Ross William Ulbricht, Exhibit 241. 142 United States of America v. Ross William Ulbricht, Sentencing Submission, 15.
47
and then [pulled] a big scam and just [kept] creating new accounts after he [did] his
scams".143 The hit man encouraged Ulbricht to have him execute not only the scamming
vendor but also his three associates, who had "probably ripped off millions of $ at this
point".144 Ulbricht responded quite casually to the suggested four-person hit: "hmm... ok,
I'll defer to your better judgment and hope we can recover some assets from them."145
The prosecution highlighted this occurrence in arguing "Ulbricht was just as willing as a
traditional kingpin to use intimidation and violence in furtherance of his criminal
enterprise."146 Indeed.
All of these forms of economic conflict relied on the manipulation of platform
protocols. White-washing vendors exploited the rating protocol to develop a positive
reputation; the payment protocol to receive an early payment; and the profile protocol to
leave the site without major consequence. These protocols respectively failed to replace
status codes, economic contracts, and stable identities — the conventional basics of social
and economic regulations. In cases of rating extortion, vendors manipulated the rating
protocol and the profile protocol, leveraging the delivery details of buyer profiles and the
abeyant presence of state power to artificially inflate their reputation. This kind an
artificial inflation could only occur because platform reputations were formalized and
automated, in contrast to an interpersonal community, where status is informal and
interpersonal. Further, the executive extortion of Ulbricht occurred through the
exploitation of the payment protocol and the specter of state power, as blackmailers
143 United States of America v. Ross William Ulbricht, Exhibit 936. 144 United States of America v. Ross William Ulbricht, Exhibit 936. 145 United States of America v. Ross William Ulbricht, Exhibit 936. 146 United States of America v. Ross William Ulbricht, Sentencing Submission, 16.
48
threatened to shut down the site and expose Ulbricht to federal authorities, in order
collect platform revenue that flowed through the commission system. The state was
present in abeyance during rating extortion and executive extortion schemes, as the threat
of exposure to state power served as strategic leverage for blackmailers. At the same
time, the state was absent when Ulbricht needed it the most — as an institution to protect
his property rights over the platform. Without property rights, or even status claims,
Ulbricht had to rely on brute force to protect his ownership of the site, ultimately evading
protocols altogether and enacting physical violence.
The Perfect Store
Compared to Silk Road, exchange relations on eBay are far less fraudulent and
deceptive, but they stand in opposition to the platform's cyberlibertarian self-presentation
as a cooperative consumer arcade. As a free market, eBay relies on a series of protocols
in place of regulations. In place of status codes, the platform features a rating protocol
through which trading partners can assess their mutual experiences in conducting
commerce. After winning an auction for a product, buyers pay vendors through PayPal, a
payment protocol designed to replace contracts and commercial intermediaries. eBay
collects a commission on each transaction, ranging from ten to twenty percent of the
selling price, and charges a fee for vendors to post goods. In place of court arbitration, the
site maintains a dispute resolution center to resolve contested transactions, including
claims of fraud. The dispute resolution center is a largely automated economic protocol
that determines appropriate compensation through prescribed rules and algorithms.
49
Finally, in place of identities, merchants use profile protocols, which require only a
working email address and, in the case of vendor profiles, a valid credit card number.
The dispute protocol is key to fraudulent exchange on the site, and its intricacies
are worth noting. eBay is a publicly traded company with a fiduciary responsibility to to
its investors.147 Because eBay collects a commission on each transaction, and because the
platform hosts far more products than customers, the company is also committed to
widespread buyer satisfaction. To assuage buyer concerns about internet fraud, eBay
maintains a Money Back Guarantee policy, which ensures that buyers will be refunded if
they are unsatisfied with their purchase.148 Consequently, eBay's dispute resolution center
is decidedly biased in favor of the customer. When buyer and seller differ in their
accounts of an exchange, the dispute resolution center overwhelmingly favors the buyer's
account of events. Significantly, when a contested transaction concludes in the buyer's
favor, eBay automatically refunds the buyer by charging the vendor's credit card or
Paypal account (recall that vendor profiles require a credit card number). When this
happens, eBay also prevents the buyer and the seller from giving each other ratings, lest
harsh words scare the former away. In this respect, the company's commitment to the
maintenance of a customer base undermines the neutrality of its dispute resolution center.
Hence, the dispute resolution protocol is far removed from the independent adjudication
of contract disputes found in institutional court systems.
147 eBay shares are listed on NASDAQ under the symbol EBAY. The company went public in 1998. For more on the history of eBay, see Appendix VI. 148 "eBay Money Back Gaurantee,” Help, eBay, accessed December 2017, https://www.ebay.com/help/policies/ebay-money-back-guarantee-policy/ebay-money-back-guarantee-policy?id=4210. The policy was formerly known as Buyer Safety.
50
eBay plays host to fraud, deception, manipulation, and coercion. In such instance,
users pursue their economic self-interest through the manipulation of platform protocols.
During delivery scams and fake object scams, deceptive users exploit the dispute
resolution protocol, the payment protocol, and the profile protocol to obtain money or
objects without a reciprocal exchange of value and without significant consequence.
Intimidation tactics are likewise designed to occasion a one-way value transfer through
the manipulation of the dispute resolution protocol. State structures are less of a presence
on eBay than on Silk Road, furnishing the postal system through which auction items are
delivered without serving as an actual commercial intermediary. However, corporate
structures are more of a presence on eBay than on Silk Road, insofar as the platform's
financial organization informs the biases of the dispute resolution protocol — biases that
are exploited during fraudulent schemes. In all of these cases, eBay is far from self-
regulating; and digital protocols not only fail to replace regulations but contribute to the
economic conflict that regulations are designed to mediate.
Two scams are particularly common on eBay, and both rely on the manipulation
of the dispute resolution protocol and the payment protocol. In the delivery scam, a buyer
purchases a product from a vendor, claims that the received product is different from the
purchased one, demands a refund through eBay's dispute resolution center, and then
returns a different product entirely. This scam is effective, because there is no platform
intermediary who determines the accuracy of product description during exchange, and
because the dispute resolution center can be expected to grant buyer refunds. On the
discussion board, users relate their own experiences with delivery scams. Sellers, in
particular, bear the economic brunt of these fraudulent designs. After a seller auctioned
51
off a pack of print cartridges in 2015, the buyer claimed that the cartridges had a terrible
smell and demanded a refund. The dispute resolution center sided with the buyer,
removed the initial payment from the seller's PayPal account, and instructed the buyer to
return the items. When the seller opened the returned box, inside was one print cartridge
— from a entirely different printer. Later that year, a new user sold his collection of
South Park DVDs, which the buyer claimed were "illegally duplicated copies... not at all
authentic or officially licensed". When the seller received the returned box, it was filled
with illegal duplicated copies of the South Park DVDs. The eBay subreddit also features
accounts of delivery scams. As related in the peripheral discussion board, a user sold a
used laptop with a Windows 7 Enterprise operating system. After the buyer claimed the
product was damaged, eBay issued a refund upon return of the item. When the seller
received the laptop, the operating system "was erased, along with all the software".
Another reddit user described a delivery scam that occurred in the midst of Bitcoin's 2017
price inflation: the seller sold a premium graphics card, which a buyer purchased, utilized
to mine cryptocurrency for a month, and then returned as defective. eBay granted the
return under the Money Back Guarantee and removed the original payment from the
account of the seller, who was left with a burnt-out graphics card and no compensation.
Still, eBay's discussion board featured most accounts of high-stakes delivery
scams. In one expensive case, a vendor auctioned off a $11,500 Rolex watch, packed and
shipped the product, and then received a message from the buyer claiming that the box
was empty. eBay's dispute resolution center ultimately ruled in favor of the buyer,
leaving the vendor without the watch and without the initial payment. As the incensed
vendor explained on the discussion board, "Bottom line is it is incredibly easy to steal
52
tens of thousands of dollars from sellers on eBay. All you have to say it that it was an
empty box." Other vendors reported similar experiences in selling expensive platinum
rings, video game consoles, sets of dishes, vintage paper currency, and hardware tools.
Regular eBay users recognized the hazards of selling expensive goods on the platform.
One seller explained the ease with which buyers could defraud sellers, noting the
dysfunctional nature of the platform's feedback system:
Let's say you have a busted toaster. You can go on eBay and buy the same model,
brand new, and when the item arrives, you can open a case saying that the item
was defective and return your old broken toaster, and now the seller has to refund
your money PLUS shipping and give you a new toaster, FREE. No investigation,
no nothing. Seller policies mean nothing as long as the buyer rips you off within
30 days. The seller can't even leave negative feedback. This is a license to steal. It
has become so unethical, that I am now actively selling on Reverb.
Delivery scams are easy enough to execute and prevalent enough to send this merchant to
another exchange platform entirely.
On the other side of the exchange is the fake object scam, which exploits the
dispute resolution protocol, the payment protocol, and the profile protocol. In this
scheme, a vendor auctions off a product, purposefully sends the wrong object, and then
shuts down her account before the product arrives. This is similar to the whitewashing
scam on Silk Road, with one important exception: eBay's PayPal system issues a
payment to the vendor upon purchase agreement, rather than upon product delivery.
Consequently, vendors need not pressure buyers to verify the transaction in order to
receive an uncompensated payment. By the time the buyer receives the fake product, the
53
vendor has left the platform with an uncompensated payment, and the burden of equitable
reimbursement falls on the platform itself. The discussion board features many accounts
of fraudulent exchange that are alternately comical and disturbing. One buyer purchased
a Macintosh computer and received "a certified letter from Jesus" instead. Another user
bitterly recalled receiving "a broken item, a rock, a phonebook" in place of purchased
products over the years. Several buyers complained about receiving a photograph of the
object that they had purchased, rather than the object itself. A new user was relieved to
receive a flash drive in good condition, only to realize that the write-only technology
couldn't retrieve the data it had stored. One user purchased two bottles of Bio-Oil, a high-
end skincare product. The product had a strange smell, so the user took the bottle to her
university's chemistry lab, where she discovered that the product "contained a chemical
dye that could be damaging to the skin". Bemoaning the "decline" of eBay, another user
claimed that "some eighty percent" of the products she had purchased on the platform in
recent years were "cheap replicas, wrong colour, damaged, spoilt, and altogether nothing
to do with the description".
Counterfeit items are commonly sent to defrauded buyers during fake object
scams. On the discussion board, many user complain about receiving pieces of jewelry or
technical equipment that are of exceptionally low quality. One user purchased a David
Yurman ring and received a compelling counterfeit. By the time she spoke with
salespeople at the David Yurman store, the vendor had disappeared from the platform.
Another complained about ordering a gold ring with a gemstone, having realized the
gemstone was artificial and the gold was thinly plated. Indeed, it was common wisdom
on the discussion boards that jewelry was a risky purchase on the site, given the high
54
market price and relative ease of counterfeit. As already noted, Tiffany & Co. was willing
to sue eBay over the presence of knock-offs on the site. Permanently locked smart phones
are also common in fake object scams, revealing a link between the underground
economy of stolen goods and the online economy of auction sales. In those cases,
vendors sell dozens of phones at below-market prices and then leave the platform before
buyers realize they have been defrauded.
In certain instances, buyers harass, intimidate, and threaten sellers into sending
them additional products or providing them full refunds, exploiting the dispute resolution
protocol and leveraging the rating protocol. Regular eBay users refer to this as the bully
tactic: order a product, complain about its quality, and then threaten to demand a refund
through the dispute resolution protocol, unless the seller sends a supplementary gift. The
problem of intimidation is widely deliberated on the discussion board. After auctioning
off a flannel shirt, one seller received a threatening message from a buyer, who claimed
the fabric was not real flannel and threatened to demand a complete refund unless the
seller sent a gift to compensate. "What can I do?" the distraught seller asked on the
discussion board. "I feel like I'm being held hostage." The seller ultimately sent an
additional shirt in order to placate the buyer and avoid a full refund. A few days later, a
user replied to the original post, "Your buyer is using the bully tactic to get a freebie. It
usually works on small sellers with good accounts and little experience. They are usually
so afraid of getting a dispute that they will give the complainer a freebie to make the
problem go away." Abusive language is common during these intimidation schemes. One
seller gave his personal phone number to a buyer, only to be left with a hateful message
on his answering machine, in which he was called "a f---ing Arab" for allegedly sending
55
a different product than the one described. Another seller was threatened "with prayers
for divine intervention that would result in [her] complete and utter destruction. The
words 'fire and brimstone' were actually mentioned." She was not the only seller to
receive death threats. One woman received a message from a suspicious buyer with
whom she refused to trade, reading, "You'll pay for this, for ignoring and turning away
my offers. It won't be long." A longtime seller even left the platform when the "profanity,
hate speech, and threats" had become intolerable.
On eBay, economic conflict occurs through the exploitation of digital protocols.
In delivery scams, deceptive users manipulate the dispute resolution protocol and the
payment protocol in order to acquire goods without a reciprocal payment. Automated,
biased, and predictable, these protocols are easy to jockey, unlike conventional economic
regulations, which are grounded in contracts and courts. Fake object scams exploit the
payment protocol and the profile protocol, as vendors disappear from the platform
without economic consequence (contract violation) or social consequence (status injury).
Intimidation tactics also leverage the dispute resolution protocol to occasion a one-way
value transfer, combining digital tactics of protocol exploit with confidence-scheme
tactics of interpersonal pressure. The state is in the background of these economic
conflicts, delivering objects through a postal system without serving as a formal
regulatory intermediary. By contrast, eBay's corporate structure is in the foreground of
these scams, as the publicly traded company orients its protocols to maintain a loyal
customer base and an positive balance sheet. Like the black market on Silk Road, the
auction market on eBay market is in no state of equilibrium. Digital protocols are poor
56
proxies for conventional regulations, providing the raw material with which fraudulent
schemes are built.
The Social Conceit
Exchange relations on Craigslist are far less fraudulent and deceptive than those
on Silk Road and eBay. Still, the presence of fraud and deception on the local market
contradicts the platform's cyberlibertarian self-presentation as a casual sphere of
cooperative trade. As a free market, Craigslist relies on a series of protocols in place of
regulations. Site advertisements are published with a flag protocol, through which users
may report posts that appear suspicious.149 Advertisements are removed when they accrue
a certain number of flags, although that number is not publicly known. Craigslist utilizes
an auto-post protocol that prevents the posting of multiple identical advertisements.150
Users who wish to post advertisement are required to complete a profile protocol. This
consists of an email verification process, after which Craigslist furnishes a temporary
email account through which users can communicate with one another. The platform also
maintains a site manual for avoiding scams, which contains tactics for recognizing
deception, law enforcement resources, and examples of fraudulent messages.151 Craigslist
users meet in person to conduct commerce, at which point objects and money are
exchange.
149 Craigslist, "Flags and Community Moderation,” retrieved March 2017. https://www.craigslist.org/about/help/flags_and_community_moderation. 150 craigslist. Inc. v. Naturemarket, Inc. 694 F. Supp. 2d 1039 (N.D. Cal. 2010). 151 Craigslist, "Avoiding Scams,” About, last accessed 1 December 2017. https://www.craigslist.org/about/scams.
57
Problems of fraud, deception, manipulation, and coercion emerge on Craigslist. In
such cases, users pursue their economic self-interest through the manipulation of platform
protocols. In advanced fee scams, deceptive actors exploit the profile protocol and
outmaneuver the auto-post protocol, all while manipulating and coercing the victims of
their confidence schemes. These scams also rely on payment technologies and financial
institutions that exist outside of the platform, such as wire transfer payments through
Western Union. However, the Craigslist interpersonal encounter serves as a failsafe
against fraudulent exchange and deceptive communication. In face-to-face commerce,
false claims are difficult to uphold, and users cannot rely on platform protocols to defraud
and deceive one another. Still, Craigslist is far from self-regulating, and the exchange
process is in no state of equilibrium. Fraud occurs through the manipulation of digital
protocols, but, once users step outside of those protocols, the likelihood of deception
decreases.
The most common form of fraud on Craigslist is the advanced fee scam — a
confidence scheme designed to solicit payment without a reciprocal exchange of goods.
These are often variations on the now-classic Nigerian 419 email scam: an enthusiastic
seller with an elaborate backstory requires immediate payment before sending a valuable
or underpriced object. Because these scammers post unique advertisements, rather than a
barrage of identical messages, they are able to outmaneuver the auto-post protocol on
Craigslist. Once scammers have gained the attention and trust of their victims, they
request up-front payment through wire transfer and then disappear without sending the
promised good. Here, deceptive actors rely on external financial institutions to enact a
58
one-way value transfer, and they exploit the profile protocol to leave the platform without
consequence.
On the Craigslist discussion board, users relate their various encounters with
advanced fee scams, as fraudulent actors aim to convince users to wire money in
exchange for a variety of goods and services: housing rentals, real estate, cars, bicycles,
sex, firearms, and job opportunities. One San Francisco user received a fairly typical
scam email while looking for a housing rental in 2011. The email read, in part,
I am the owner of the place you want to rent and also want you to know that it
was due to my transfer that makes me and my husband to leave the house and also
want to give it out for rent and looking for a responsible person that can take very
good care of it , as we are not after the money for the rent but to be clean at all
time and the person that will rent it have to take absolute good care of it as if it
were its own. I and my Husband came over to Africa for a missionary work, so i
[sic] hope you will promise us to take very good care of the house. So get back to
me on how you could take care of our house or perhaps experience you have in
renting home. Hope you are okay with the price of US$1,300 (1 months first
payment) with internet,gas,water,micro wave,hydro,heat laundry facilities, air
condition and so on. I am looking forward hearing from you ASAP so that we can
proceed .feel free to fill in the rent application form below so we can proceed
asap.
This message combines a variety of common scam tactics: an attractive object (the cheap
rental), an exceptional circumstance (the owner is out of the country and not interested in
profits), a sympathetic figure (the missionary worker couple), and a request for financial
59
information (the rent application). As a paradigmatic confidence scheme, this email plays
on the vices of the human psyche — opportunistic greed for a cheap rental and emotional
benevolence toward a devout couple.
Rare and forbidden items regularly serve as bait during advanced fee scams — a
circumstance noted by many discussion board users, some of whom express anger over
the anarchic state of the local market. For instance, users report suspicious advertisements
for adopted children and nanny jobs, sports memorabilia and antiques, and vintage cars
and motorcycle parts. They also note the presence of forbidden items, which are formally
banned in the platform's terms of use, and which sometimes appear to be fraudulent
offers. One Vancouver user reported advertisements for "hookers, drugs, guns, other
prohibited weapons, sperm, pet breeding ads, overpriced pets... fireworks, tobacco,
alcohol, bootleggers, fake ID, counterfeit goods, just to name a few". Beyond rare and
forbidden items, Craigslist users on the discussion board widely recognize the presence
of advanced fee scams on the platform, variously referring to the site as "a cesspool of
deceit and thievery", "a tragedy of the commons", "a sewer of overposting and scam ads",
"a nest for vipers", and "a free-for-all flea market for the mindless and criminal elements
of the internet".
Scams are far less common when Craigslist users meet in person. The house of
cards of interpersonal deception often collapses when computer-mediated communication
gives way to material encounters. Several discussion board threads center on occasions
when scammers failed to their enact fraudulent schemes. Users who are angered by
scammers take particular pleasure in hearing stories of their botched plans. When a DC
woman posted a missed connection in 2011, she was thrilled when the man responded.
60
She was less thrilled when she met him in person: he was not the handsome man she had
fleetingly encountered, but he did offer her a job smuggling drugs into the country. In
2012, a Manhattanite traveled to Brooklyn to purchase an ergonomic office chair, which
promptly collapsed upon use. The seller then accused the prospective buyer of breaking
the chair and demanded immediate payment. True to form, the Manhattanite told the
seller "to go fuck himself". A Florida man purchased an engine for his 240SX in 2013,
only to discover that the a cylinder rod bear was "blown to oblivion" and the engine was
essentially "a giant paper weight". A Tokyo user met with a seller to purchase a
refrigerator and washer, described as "in excellent condition". The transaction did not
transpire: the refrigerator was filled with worms, "yes, small red worms", and the washer
secreted "long, stinky, black liquid". In the next chapter, we'll consider how the state
makes an appearance during these interpersonal encounters. For now, let's note that face-
to-face exchange occurs outside of platform protocols — those mechanisms of fraud and
deception in the digital free market.
On Craigslist, fraud, deception, manipulation, and coercion occur through the
exploitation of platform protocols. In advanced fee scams, users exploit the profile
protocol to defraud and deceive their victims without economic and social consequence;
they evade the auto-post protocol by posting singular advertisements; and they relay
financial institutions and wire technologies, external to the platform, in order to collect
payment at a distance. This dance of exploit, evasion, and externalization would be
unthinkable in context of economic contracts, status codes, and known identities. Unlike
Silk Road and eBay, Craigslist commerce features an interpersonal encounter. When
digital protocols give way to face-to-face agreements, the likelihood of fraud and
61
deception generally decreases. This underlines, through contrast, the importance of
protocols to fraudulent behavior in the digital free market, without which deception is a
matter of rhetorical skill rather than automated exploit. Host to a wide spectrum of
exchange relations, Craigslist is not the self-regulating platform imagined by
cyberlibertarianism, and its digital protocols end up being the vulnerable points of its
electronic commerce system.
Invisible Hand All The Way Down
As venues of fraud, deception, manipulation, and coercion, internet markets are
far from self-regulating centers of economic activity. They embody the laissez faire
principles celebrated by cyberlibertarianism, yet they deliver entirely different results
than those predicted by the digital ideology. Fraud undermines the narrative of economic
equilibrium, as does the presence of state, commercial, and financial institutions in
exchange. On internet markets, fraud and deception occur through the manipulation of
platform protocols designed to replace regulations. Not only are automated protocols
poor proxies for conventional regulations; but protocols end up furnishing the very forms
of economic conflict that regulations are supposed to mitigate. In short, protocols can
backfire. This state of affairs has broader consequences for understanding
cyberlibertarianism, electronic commerce, and digital free markets.
Cyberlibertarianism and electronic reputation studies share a vision of internet
exchange as fundamentally cooperative. The dream of a self-regulating internet finds a
natural counterpart in the dream of a fully automated interet market. Lovely are these
dreams, in which the cumbersome realities of contract, court, status, and community give
62
way to the streamlined protocols of payment, dispute, rating, and profile. The cooperative
bias of these paradigms underwrites a faith in automated mechanisms, despite their
significant flaws, and an animosity toward institutional bodies, despite their oblique
appearances. Indeed, if internet exchange is integrally cooperative, and if internet
platforms are basically self-regulating, then internet exchange platforms may be
automated and let loose without regulatory oversight or institutional interference. Eric
Goldman's insistence on an invisible hand "all the way down" — according to which the
conflictual dimension of exchange can always be alleviated by a supplementary rating
protocol — evinces an attachment to cooperation as a foundational principle of the digital
market. This account, in particular, overlooks the ways that rating protocols can become
mechanisms of user extortion, underwriting economic conflict rather than mitigating it.
The reproduction of cyberlibertarian assumptions in this scholarly account attests the
appeal of the digital ideology in broad conversations surrounding technology. It is not
only motivated actors who yearn to see internet exchange as basically self-regulating; it is
also scholarly observers.
Internet market companies also fail to account for the role of conflict in electronic
commerce. In casting their platforms as self-regulating, Craigslist, eBay, and Silk Road
underplay the reality of regulatory breakdown in the digital free market, as well as the
vulnerability of the digital protocols at the heart of their electronic systems. Insofar as
they position themselves as neutral internet venues (Gillespie) marked by peer-to-peer
agreement (Scholz) and voluntary participation (van Dijk and Nieborg), these internet
market companies side-step debates over platform accountability, even as they are
regularly accountable to state and commercial institutions. The paradoxes of
63
cyberlibertarianism are on display here. Internet market companies insist on freedom
from state regulations, yet they cooperate with state directives; and they insist on a free
digital market in perpetual equilibrium, yet they install protocols to prevent instability.
They want to have their regulatory cake and eat it too.
As sites of economic conflict, Craigslist, eBay, and Silk Road demonstrate that
the internet does not obviate critiques of the free market but makes those critiques all the
more poignant. As Kojin Karatani and Michael Aglietta argue, economic and social
regulations stabilize competitive capitalist exchange. Internet markets dramatize these
arguments by playing host to forms of economic conflict in the conspicuous absence of
regulations. Part of this drama is the absence of stable identities on internet markets —
the kind of identities that are necessary for conventional regulations to be effective.
Internet markets show us what happens when anonymous and self-interested actors
engage in unregulated electronic commerce. They are objectified counterproofs to the
cyberlibertarian notion that a less regulated internet is a better internet. They are also
objectified counterproofs to idea that automation can comprehensively eliminate conflict
in the context of electronic commerce. On internet markets, protocols are designed to
replace regulations, but without the jurisdictional authority that gives regulations their
power. These protocols can hardly be expected to perform the regulatory functions of
courts and communities, which are complex formations that cannot be easily automated
or reduced to an algorithm. In the absence of conventional regulations, and in the
presence of digital protocols designed to replace them, it is scandalously easy to get away
with internet fraud.
64
CHAPTER 2
ROADS TO COMMERCE
DEVELOPING SOCIAL CUSTOMS
On internet markets, actors take steps to mitigate concerns of fraud and control
the commercial process. Notably, users develop social customs that rely on website
infrastructure, platform culture, and state institutions. Although internet markets are
supposed to be self-contained, digital trade implicates factors that are external to
electronic commerce. Website infrastructure, platform culture, and state institutions enter
the exchange process in ways contrary to the assumptions of cyberlibertarianism. As
informal commercial practices, social customs help us understand how cooperative
exchange occurs in the digital free market.
Custom and Control
Social customs are loose sets of practices oriented toward a general purpose. They
are one way of controlling the commercial process in the absence of regulations. In "The
Comedy of the Commons", Carol Rose argues that social customs are relatively effective
ways of managing the behavior of actors, without regulations or regulatory institutions.152
In the nineteenth century, Rose notes, thoroughfares and waterways were organized
through customary "rules of the road", which served as "informal techniques" for
managing transportation infrastructure.153 These were voluntary strategies by which
152 Carol Rose, "The Comedy of the Commons: Custom, Commerce, and Inherently Public Property," The University of Chicago Law Review 53, no. 3 (Summer 1986): 711-781. 153 Rose, "The Comedy of the Commons," 744.
65
travelers abided in the absence of regulations, terms of use avant le lettre. Through social
customs, the commercial public "ordered its affairs authoritatively"154 — without a
centralized authority enforcing regulatory controls. Insofar as roads and waterways
underwrote the movement of goods to and from the market, social customs facilitated
economic exchange. And they did so without exclusion or penalty, as travelers of all
stripes were welcome on roads to commerce. One of Rose's central arguments is that the
sphere of commerce benefited from unbounded access to transportation infrastructure,
made possible by social customs. As Rose puts the matter: "The more people who
engage in trade, the greater the opportunities for all to make valuable exchanges; and the
more exchanges, the greater the opportunities for division of labor and the attendant
increase in wealth and productivity that Adam Smith told us about."155 Here, social
customs underwrite economic activity through common access.
Social customs are also a way of controlling internet exchange in the absence of
regulations. Writing from a legal perspective, Trotter Hardy asks how one establishes
rules among internet users who "do not have prior contracts, by-laws, or other
agreements"156. He notes that one possibility for the regulation of online conduct is social
customs. Social customs on the internet parallel historical merchant laws, or lex
mercatoria, which were "sets of customary practices that inured to the benefit of
merchants"157 and governed exchange relations in the Medieval Europe across legal
jurisdictions. Like merchant laws, social customs develop among interested parties
154 Rose, "The Comedy of the Commons," 742. 155 Rose, "The Comedy of the Commons," 770. 156 Trotter Hardy, "The Proper Legal Regime of Cyberspace," University of Pittsburgh Law Review 55 (1994): 993-1056. 157 Hardy, "The Proper Legal Regime of Cyberspace," 1020.
66
without "statute or other authoritative pronouncement"158. Hardy furthermore notes that
merchant laws were grounded in merchant courts. These alternative institutions arbitrated
trader disputes, and "their judges were drawn from the ranks of the merchant class itself
on the basis of experience and seniority"159. Similarly, Hardy argues, internet customs are
grounded in discussion groups, email, and other spheres of free association online. For
Hardy, these are "informal court systems,"160 where interested parties may resolve
disputes through customary rules in a common language. Drawing on Hardy's work,
David R. Johnson and David G. Post point to social customs on the internet as evidence
of the "self-regulatory efforts of cyberspace participants".161 Here, social customs are
ways of controlling internet exchange, enacted by users themselves.
Some see internet exchange as comprehensively economic, even in the presence
social customs. In her influential theory of free labor, Tiziana Terranova argues that
internet exchange is properly economic, because the collective labor of internet users is
central to the maintenance of digital technology.162 For instance, social media users "keep
a site alive through their labor, the cumulative hours of accessing the site (thus generating
advertising), writing messages, participating in conversations, and sometimes making the
158 Hardy, The Proper Legal Regime of Cyberspace," 1020. 159 Hardy, The Proper Legal Regime of Cyberspace," 1021. 160 Hardy, The Proper Legal Regime of Cyberspace," 1021. 161 David R. Johnson and David G. Post, "Law and Borders: The Rise of Law in Cyberspace," in Crypto Anarchy, Cyberstates, and Pirate Utopias, ed. Peter Ludlow (Cambridge: MIT Press, 2001): 143-195. 162 Tiziana Terranova, "Free Labor: Producing Culture for the Digital Economy,” Social Text 18, no. 2 (2000): 33-58.
67
jump to collaborators"163. Unlike thinkers in the anarchist tradition,164 she argues that the
social and communal quality of internet exchange is not so discrete from its economic
and capitalist quality. Technology companies, for example, regularly capitalize on the
collective labor of the open source software community, which can debug and improve
its products without monetary compensation. For Terranova, the open source software
community demonstrates "the overreliance of the digital economy as such on free labor,
both in the sense of not financially rewarded and freely given"165. The open source
software community may have an anarchist sensibility, but its products are central to the
business plans of privately owned technology firms. In this respect, Terranova sees social
exchange on the internet as internal to the capitalist economy, insofar as social exchange
is consistently monetized by platforms. For Terranova, internet exchange is
comprehensively economic, because "it is technically impossible to separate neatly the
digital economy of the Net from the larger network economy of late capitalism"166. In this
context, where Eric Goldman sees an invisible hand "all the way down", Terranova sees
economic relations "all the way down".
Exchange Customs
On internet markets, users mitigate concerns of fraud and control the commercial
process by developing social customs that rely on website infrastructure, platform
163 Terranova, "Free Labor," 49. 164 Richard Barbrook, "The Hi-tech Gift Economy,” First Monday 3, no. 12 (1998): no pagination. http://firstmonday.org/ojs/index.php/fm/article/view/631/552. Uri Gordon, Anarchy Alive (London: Pluto Press, 2008). 165 Terranova, "Free Labor," 51. 166 Terranova, "Free Labor," 51.
68
culture, and state institutions. On Silk Road, users formulated social customs related to
vendor profiles, discussion boards, libertarian cultures, outlaw sensibilities, and state
surveillance mechanisms. eBay users develop sets of social customs that depend on
message functionalities, auction pages, dispute resolution centers, and auction cultures.
On Craigslist, email relays, local cultures, and local law enforcement bodies inform the
development of social customs. This means that internet markets are not the self-
contained islands of cyberlibertarianism, nor the purely economic realms of free labor.
Rather, digital exchange involves factors — infrastructural, cultural, and institutional —
that are formally external to the internet economy. The road to commerce is long and
winding.
Thick As Thieves
To mitigate concerns of fraud and control the commercial process, Silk Road
users developed social customs related to website infrastructure, platform culture, and
state institutions. Users utilized website infrastructure to locate reliable merchants —
searching vendor profiles for timestamps, evaluating trading partners through logistical
conversations, and listing deceptive vendors on the platform discussion board. The
libertarian, drug-enthusiast, and cyberoutlaw culture of Silk Road also influenced the
social customs developed by users, marking longstanding members as trustworthy trading
partners. The abeyant presence of state power Silk Road not only underwrote a culture of
libertarian solidarity; it also informed the customs, developed by merchants, to evade
state detection on the internet on the internet and on the ground. Unlike eBay and
Craigslist, Silk Road as a platform did not respond to these social customs, likely because
69
the site was consistently profitable, because its tenure was relatively brief, and because
Ulbricht was evidently occupied with other site-related matters.167 This means that users
were free agents in the free digital market, and their social customs were particularly
important avenues to fair exchange. This also means that Silk Road was not a self-
contained island but an vast archipelago that covered infrastructural, cultural, and
institutional waters.
On the discussion board, Silk Road users formulated a variety of social customs.
Many of these customs concerned the location of honorable vendors, or sellers that would
honor trade agreements and avoid fraudulent behavior. The platform's Buyer Guide
offered few strategies for navigating the world of vendors, only an assurance that the
escrow protocol was designed "to prevent fraud on both the end of the seller and the
buyer".168 Users consequently developed a series of social customs to evaluate vendor
reliability. One custom relied on website infrastructure in the form of the rating protocol,
but not in the way envisioned by cyberlibertarianism or electronic reputation studies.
Users were to identify the length of time for which a potential vendor had been
conducting commerce on the platform. Users could determine the date at which
merchants started selling on the platform, by scrolling through customer ratings and
finding the date of the earliest feedback. As seasoned explained on the discussion board,
these timestamps were valuable proxies of merchant reliability: the longer the history, the
more trustworthy the merchant. This rule of thumb was partially grounded in the
platform's libertarian culture, which cast trade as an inherently egalitarian deed and Silk
167 See the discussion of Ulbricht and his federal trial in chapter 1. 168 United States of America v. Ross William Ulbricht, 31 F. Supp. 3d 540 (S.D.N.Y., 2014), Exhibit GX 119.
70
Road as a liberated outlaw economy. The political investment in Silk Road meant that
longstanding members were likely to engage in cooperative commerce on principle, as
acts of cooperation set against a coercive state. For instance, in response to discussion
board questions from a new buyer, a longstanding user advised all merchants to "read the
vendor info page to get a sense of their history" rather than "exclusively trust Silk Road
vendor reviews". Here, social customs reflected the commercial infrastructure of time
stamps and the platform culture of veteran traders. Users took seriously the possibility of
fraud and developed exchange customs that did not rely on good faith agreement or free
market equilibria.
As a consequence of this social custom, experienced vendors constituted a de
facto merchant elite, described by one discussion board users as "an old guard who has
been here since the beginning". These merchants generated social capital on the platform
through an enduring engagement with the dark web marketplace, and this allowed them
to generate economic capital, in turn. Silk Road witnessed the emergence of an informal
vendor hierarchy, of which sellers and buyers took notice. On the discussion board, a new
vendor complained about the difficulty of customer acquisition: "Unless you have a long-
established, respected, prior customer base to vouch for you, buyers just never know".
One buyer felt torn between the desire for new products and the assurances of established
vendors. "As much as I like to try out new vendors and their wares," the buyer explained,
"I'm almost to the point where I say fuck it and deal exclusively with the trusted vendors
I've established a relationship with. The only downside to that is I love to try new things.
Although knowing the transaction will be smooth as silk is a good feeling." Another user
was willing to sacrifice product variety for reliable commerce, exclusively conducting
71
exchange with a "tight group of highly trusted vendors" that had been on the platform
since its early days.
Another social custom was to evaluate potential vendors through private
conversations on the website's internal message infrastructure. According to discussion
board posters, trustworthy vendors were generally willing to go into detail about their
products, delivery plans, and commercial standards. One user articulated the metric of
vendor evaluation in question form: did the seller seem willing "do anything they can to
keep the customer happy", or were they "vague, weird, and noncommittal" when asked
questions about their commercial practices? Platform culture played a role in this
evaluation custom. Libertarians took trade seriously and could be expected to elaborate
on their commercial process, and drug enthusiasts took substances seriously and could be
expected to elaborate on their contraband wares. By contrast, fraudulent vendors could be
expected to evade major questions and hard-sell their goods. As one user put it on the
discussion board, deceptive vendors "pressure you into buying asap" by insisting "'I'm
almost out'" of whatever the buyer seeks to purchase. Deceptive vendors would also offer
elaborate stories to justify exchange practices that were forbidden in the platform
guidelines, such as paying vendors outside of platform escrow. One discussion board user
summarized this evaluation custom succinctly: "The more bizarre the story... the more
likely it's bullshit."
These evaluation customs were effectively formalized when one user took
advantage of website infrastructure and posted a list of scamming vendors on the site
discussion board. Merchants could check the list before purchasing from a certain vendor,
effectively crowdsourcing interpersonal vendor assessment. For many users, the list
72
represented the community's cooperative response to the problem of internet fraud, an act
of solidarity among cyberoutlaws. In response to the list, one discussion board participant
wrote, "Thanks for the hard work... we as a community need to be aware of the asshats
that are out there." The discussion board thread that hosted the list subsequently served as
a sounding board for evaluation customs. When a discussion board participant speculated
that the vendor 18kt was a scammer, another user responded, "I don't agree that 18kt is a
scammer himself: too much evidence that he is actually proud of this site, and likes being
on the libertarian forefront. He's like an underground hero, and if his site turns into just
another burn joint, it would distress him." In this cultural assessment, the vendor's history
on the platform and his commitment to libertarianism made him a trustworthy seller. By
contrast, suspicious behavior was a potential sign of fraudulent intent. On the same
thread, another user noted that the vendor Professortwak was "behaving strangely.
Logging on but not communicating with outstanding customers". In the spirit of
cooperation, the user added, "I'm sorry to be adding this if unfounded, but there is a
serious lack of communication on the sellers part [and] I don't want to see innocent
buyers for [whom] Finalizing Early is a necessity getting mugged. I will fully revoke all
inflammatory/negative comments if communications from this seller begin again." The
concerned user provided an update on the discussion board thread the next day: "OK, this
vendor has begun to communicate again, he may well have been having some
logistical/data handling issues at the end. Still be wary, but this is not a confirmed
Scammer and thus so his name should not be tarnished. However, as always. Exercise
caution." Two weeks later, the user provided a final appraisal on the discussion board
thread, writing,
73
Just to confirm. The Professor came through. He maintained communications,
provided me with a tracking number and even doubled my original order to make
up for the delay. I received my order 7 working days to the uk after he provided
the shipping details. I think he is a genuine good guy, just had some bad luck/
logistical issues at his end, which he is working hard to rectify. I hereby revoke
any negative comments previously posted.
Evident in this elaborate appraisal is a principled respect for commerce that attended Silk
Road's libertarian culture. In this culture, a merchant's honor was not something to be
casually besmirched, given the importance of long-standing membership in the digital
black market.
The state was not only a common enemy that informed Silk Road's cyberoutlaw
culture. It was also an institution with surveillance abilities and prosecutorial powers —
both of which needed to be avoided by black market participants. Silk Road vendors
developed social customs to avoid state detection, and these strategies were designed to
control the commercial process, albeit to avoid state detection rather than economic
fraud. The logistics of the drug trade garnered a great deal of attention on the discussion
board. Buyers and sellers alike would crowd-source contraband delivery strategies: how
to take drugs on a plane, in a car across the US, on a train in Europe. Packaging and
shipping were topics of great debate, as merchants spoke with their peers about delivery
methods that could evade customs detection. One users suggested that cocaine sellers
place their products "inside a snap lock smelly proof bag, crushed flat and wrapped again
in lavender scented tissue paper and mailed in a greeting card". Merchants offered a
plethora of tactics for shipping contraband within the United States and across
74
international borders, including hand-writing addresses and padding envelopes "by tri-
folding a few sheets of paper and taping the product to one of the sheets". Several
suggested decoy objects as a means of evading the watchful eye of customs: sealed
tampon boxes, potato chip bags, candy wrappers. One user reported receiving his cocaine
in a sealed Skittles bag. There was a substantive debate over how to check the delivery
status of mailed goods. When one user suggested tracking the Digital Customer
Notification (DCN) attached to packages, another user responded forcefully:
Don't check your DCN from Tor NOT MATTER what. The post office can tell
when DCN info for a particular package has been access through a Tor browser.
Though the post office can't track where you accessed the info from they can tell
the type of anonymous browser and that is a red flag. The post office will then
pay particular attention to your package because they know a person who does not
want to be known access the DCN info. Access the info from an internet cafe.
Another user contested this claim, stating that "nobody has ever provided concrete
evidence that the USPS [United States Postal Service] can even tell Tour is being used to
track packages. Do not believe this bullshit." The original commenter cheekily defended
his insider knowledge: "this is not a crypto-cyber-international-drug-smuggling-punk
urban legend, we have been told this by people who work in the postal services industry".
Social customs related to privacy strategies were also major points of debate on
the discussion board, and users exchanged their experiences with different anonymizing
services. In response to a discussion board question, merchants discussed Tor-supported
email services, including safe-mail.net and i2pmail, which added another layer of
anonymity on top of Tor relays. They also distinguished between degrees of online
75
anonymity and noted the limits of Tor concealment. One user explained the relationship
between the federal government and Tor, writing, "Also well known that the feds operate
large capacity exit nodes on Tor. The more they operate, and if they operate internal
relays (sure they do) the easier it is for them to correlate traffic." A related thread
centered on the best places for off-shore hosting of dark web sites, the consensus being
Ukraine or Russia. After someone asked the community "Which Security Setup Is Best?",
users offered explanations of Tails and PGP for anonymous internet navigation; Debian
and Ubuntu for disk encryption; CC cleaner, Secure Remove, File Shredder for disk
deletion; and Windows versus Linux versus OpenBSD for secure operating systems.
Another asked which burner phones were the most secure for drug dealing, which
sparked a debate on the strength of Android encryption. Stash spots were also widely
debated, from credit union safety deposit boxes to secure compartments inside walls.
Hundreds of posts centered on Bitcoin logistics: where to buy and store Bitcoin, how to
convert Bitcoin into dollars, and which wallets and institutions monitored the
cryptocurrency most carefully. Silk Road users carefully followed the 2012
Congressional Treasury Committee debates over the property status of Bitcoin, offering
libertarian commentary on the public proceedings.
On Silk Road, users developed social customs that were not only economic but
also infrastructural, cultural, and institutional. Website infrastructure did not automate the
commercial process, as cyberlibertarianism would expect, but offered informal
opportunities to evaluate trading partners. In particular, the rating protocol was not a
proxy of status but a series of traces to be "read" by users in their search for fair
exchange. Platform culture turned out to be a relatively dependable way of predicting
76
vendor behavior, even more so than the rating protocol designed to fill that exact
function. In addition to playing a role in extortion schemes, the abeyant state also played
a role in the social customs of users, serving as a common enemy in the platform's
libertarian culture and informing the commercial practices of digital contraband trade.
The digital black market was not an isolated libertarian economy but an embedded
economic system that implicated infrastructures, cultures, and institutions. Social customs
were a way of controlling the commercial process in the conspicuous absence of
regulations, in the potential presence of deceptive merchants, and in the looming
surveillance of state institutions. A winding road to commerce indeed.
Antiques Roadmap
eBay users also develop social customs to control the commercial process. These
customs leverage website infrastructure and platform culture in ways contrary to
cyberlibertarianism. In order to avoid deceptive merchants, users mark certain practices
as signs of potential fraud. For example, lucrative offers that take place outside of eBay
infrastructure may signal a merchant's desire to step outside platform jurisdiction and
enact fraudulent exchange. Users analyze merchant advertisements for signs of expertise,
jockeying the website infrastructure of auction pages and the platform culture of object
knowledge to ensure the legitimacy of prospective trading partners. They also analyze
merchant history, embedded in user profiles, in order to determine if an account has been
hacked, an increasingly common phenomenon in recent years. In cases when merchants
have already been defrauded, users develop customs to minimize commercial damage
through a careful engagement with the dispute resolution protocol. As a platform, eBay
77
sometimes enters the drama of social customs by formalizing them in infrastructure or
policy. Not state institutions but corporate institutions enter the exchange process in this
way, creating a tentative feedback loop between user and platform. In all of these cases,
the auction market is far from a self-contained island of economy activity. Rather, digital
exchange on the platform implicates factors that are infrastructural, cultural, and
institutional.
As on Silk Road, social customs on eBay often concern the selection of honorable
vendors. On the discussion board, eBay users note that certain practices are often signs of
fraudulent intent. For example, according to seasoned users, fraudulent merchants
sometimes make lucrative offers to vendors who post expensive items or to buyers who
bid on them — but in private messages outside of the eBay auction infrastructure. These
offers usually culminate in a delivery scam, in which a vendor sends an item but
ultimately receives no reciprocal payment, or fake object scams, in which a buyer sends a
payment but does not receive the advertised object.169 The evasion of eBay's commercial
infrastructure is meant to limit platform jurisdiction during the inevitable dispute: if
merchants conduct a private transaction without eBay exchange protocols, then the
platform has no authority over the exchange and no responsibility for its resolution. Of
course, eBay disavows any responsibility for fraudulent commerce in its user agreements,
even if merchants utilize platform exchange protocols, making interpersonal trade a
double-whammy of platform immunity.170 Platform guidelines formally forbid members
"to contact each other to buy or sell items outside of eBay" and warns that violators may
169 See the discussion of eBay scams in chapter 1. 170 eBay, "User Agreement,” last modified April 3, 2018. https://www.ebay.com/help/policies/
78
be subject to account suspension.171 Nevertheless, likely in response to the problem, eBay
briefly featured a Private Offer function, which allowed merchants to conclude auctions
in order to accept private offers, provided those offers were realized in platform payment
protocols. The function came and left in 2016, exemplifying a provisional feedback loop
between user and platform in a major internet market. In the case of private offers, a
social custom emerged in response to commercial infrastructure and platform guidelines.
The platform then attempted to make the custom unnecessary by incorporating private
offers into site infrastructure, thereby monetizing the interpersonal transactions against
which users warned.
Another social custom relies on the website infrastructure of profile protocols and
rating protocols, but not in the ways predicted by electronic reputation studies. On the
discussion board, users note that rating is not always a reliable metric of vendor honor,
but a complete absence of feedback marks a profile as suspicious; a merchant without
history on the platform has nothing to lose during a confidence scheme. Like Silk Road
users, eBay merchants generally distrust the rating system but trust the infrastructural
traces that the system leaves behind; and they tend to view platform longevity as an
imperfect proxy of commercial honor. Platform culture indirectly underwrites the
importance of longevity, as eBay's long internet history comes with veteran merchants
who respect exchange relations on the platform. In particular, antique culture on the
platform values commercial expertise and, by extension, the commercial experience
necessary to possess that expertise. Whatever their wares, merchants with economic and
171 eBay, "Offers to Buy or Sell Outside of eBay Policy," accessed February 18, 2018, https://www.ebay.com/help/policies/payment-policies/offers-buy-sell-outside-ebay-policy
79
cultural investments in the auction market are more likely to engage in cooperative
commerce. When a buyer on the discussion posted a story about being defrauded, a
seasoned user replied, "This is the type of thing that we see all the time. Buyer comes
here and is upset that a transaction went bad. Then we find out it was a transaction with a
zero-feedback, brand new seller..." Another buyer realized independently that purchasing
a bike from a new seller had been a bad idea. As related in a discussion board post, the
bike had been offered "at a price that was too good to be true, from a seller with no
feedback". When the package for the bike arrived, it was an empty envelope.
In another social custom, eBay users leverage website infrastructure and platform
culture when they analyze auction pages for signs of confusion or inexperience. Auction
pages, according to this custom, should generally exhibit expertise about the commodity
and familiarity about its market. Part of the exhibition of expertise is the ability to
communicate in clear and technical terms about an object. This includes the ability to
speak in relatively clear English — a standard inflected through the stereotype of
Nigerian scammers, the anxiety surrounding the rise of Chinese sellers on the site, and
the generalized xenophobia of Western culture.172 In 2017, a new seller received a
message that combined the signs of potential fraud covered so far: a lucrative offer, a
private transaction, a blank profile, and an inability to speak intelligibly about a product.
The seller posted the message on the discussion board:
I will like to offer you $400.00 for the Vintage Fostex x15 4 Track recorder. If my
offer is been accepted the payment will be made through check. I will send the
check via mail and my mover will only come over for pick up when you notify
172 See the discussion of Chinese sellers on eBay in chapter 3.
80
me that the check has been verified and cleared by your bank. Paying with check
will be easier for me on this transaction i haven't get chance to fund my PayPal
account recently due to the nature of my work here in Seattle and i really need to
buy this item for my business associate. Also due to the nature of my work i don't
have time to check my eBay messages.
The discussion board post prompted another user to explain why the sender of the
message should not be trusted. "It has so many scam markers," the user explained,
"offering more money than it's listed for, asking for your phone number for text
messages, vagueness — 'the nature of my work', can't check eBay messages". In eBay
parlance, "scam markers" are signs of potential fraud that distinguish certain practices as
suspicious. This jumbled message dramatically displays these scam markers and serves as
an object lesson for less experienced users.
Another social custom relies on the website infrastructure of profile protocols, but
not in the way anticipated by cyberlibertarianism. This custom concerns the identification
of hacked accounts, which are hijacked for the purpose of executing low-risk confidence
schemes. eBay accounts are not particularly difficult to hack, because username and
password are the only barriers to account access. However, as users point out, there are
relatively clear signs that an account has been compromised. Hacked accounts are usually
inactive for years and then suddenly hyperactive, making gaps and fluctuations in user
activity — which are visible in the profile protocol — potential marks of fraudulent
intent. On the discussion board, an experienced merchant listed the signs of a hacked
account for users new to the platform: "An account over 3 years old. Few if any feedback
as a seller, over a year old. Their buying feedback except for 2-3 recent feedback is all
81
over a year old." Another user added: hackers often post "too good to be true item
listings" that "sell out in under 4 hours". This helps hackers execute whitewashing
schemes quickly and reliably: once the auctions close, hackers accept multiple payments
in exchange for the listed goods, transfer the payments from a PayPal account to a private
bank account, and then leave the platform without sending the purchased goods.
A related social custom concerns the platform culture of commodities. Criminal
market logic means that expensive and in-demand products are highly attractive to
hackers, who want to maximize the payments they receive prior to exiting the platform.
On the discussion board, users referred to these in-demand products as "scam items":
electronics, including smart phones and laptops; luxury items, such as bags and
accessories; and rare goods, such as collectibles and vintage objects. In particular,
according to users, smart phones are exemplary magnets for fraudulent exchange,
"because they are small, there is huge demand, and they are relatively valuable". Hackers
might auction off ten cell phones, sell them at $300 a piece, and then leave the platform
with a $3000 in profits before buyers realized that they had been defrauded. In 2017,
eBay instituted a new policy —one neither named nor mentioned in platform guidelines
— to cancel transactions conducted by hacked accounts. Black-boxed is eBay's
determination procedure for hacked accounts, but an eBay merchant who I interviewed
related the following account. After auctioning off an item, this merchant received an
email with a subject line, "Unauthorized use of buyer account — Transaction(s)
cancelled". The email read:
We’re writing to let you know that we had to cancel the following transaction(s)
because the item(s) were purchased without the account owner's permission... If
82
you already sent the item(s) and they haven’t been delivered yet, please contact
your shipping carrier to find out if you can stop the shipment.
This merchant speculated that Russians had hacked the account, reflecting contemporary
anxieties surrounding Russian information warfare. That eBay is a corporate institution
likely played a role in its decision to monitor hacked account: the corporation may be
eager to avoid the public relations debacle that accompanies press reports of platform
infiltration. In the case of hacked accounts, social customs became formalized in website
policy, creating a feedback loop between users and platforms (and, perhaps, institutional
dynamics).
eBay merchants sometimes complete a transaction before realizing they have been
defrauded. In those cases, users develop social customs related to website infrastructure
in order to minimize commercial damage. Because users often come to the discussion
board in such moments, the arena of user debate is filled with strategies for negotiating
the dispute resolution protocol. According to one custom, the best way to deal with a
fraudulent buyer is to offer a partial refund on the object that they claim is "not as
described". The partial refund is a way to minimize the inevitable monetary losses
associated with the scam. Buyers have the upper hand in trade disputes,173 and the partial
refund decisively concludes those disputes and prevents the exchange from becoming a
one-way value transfer. This also forestalls any hostile encounters with buyers. eBay's
platform culture has a conflictual dimension, not just haggling and sniping but harassing
and coercing.174 Partial refunds offer a trap-door out of heated interactions with buyers.
173 See the discussion of eBay's dispute resolution protocol in chapter 1. 174 See the discussion of harassment and coercion on eBay in chapter 1.
83
As one user explained on the discussion board, vendors should offer "no explanations, no
defending yourself, ONLY the same answer": a partial refund. On the eBay subreddit, a
dedicated seller went so far as to create a decision tree that informed vendors how to
handle the dispute resolution protocol in cases of delivery scams. The opening question
— "What reason did the buyer select for the return? — branches out to a series of actions
designed to minimize commercial damage. For instance, if the vendor suspects a
fraudulent return, the decision tree suggests that the vendor message the buyer and "ask
leading questions to see if the customer will admit to buyer remorse or altering the
product". The admission may then become leverage during the dispute resolution process.
This social custom allows users to control a commercial process that has become unruly.
This is particularly helpful in the case of delivery scams executed against vendors, who
must navigate a dispute resolution protocol that is decisively biased against them.
On eBay, users social customs develop social customs to mitigate concerns of
fraud and control the commercial process. These social custom relate to platform culture
and website infrastructure, including infrastructural protocols, but in different ways than
imagined by cyberlibertarianism. A lucrative offer outside of eBay's infrastructure is a
potential sign of fraudulent intent, as is a failure to conform to the platform culture of
object expertise. Users determine if an account has been hacked through the traces left by
the profile protocol, and eBay, as corporate institution, quietly enters the drama of
criminal infiltration by detecting hacked accounts and notifying users accordingly. In
cases when fraudulent exchange has already occurred, users take steps to control the final
stages of the commercial process through social customs related to the dispute resolution
protocol. These social customs are infrastructural, cultural, and (sometimes) institutional,
84
extending well beyond the properly economic. eBay is not an autonomous sphere of
exchange but an embedded arena of economic activity, which implicates infrastructures,
cultures, and institutions.
Like A Good Neighbor
Craigslist users also develop social customs to avoid fraudulent exchange and
control the commercial process. These customs interface with website infrastructure,
platform culture, and state institutions. The state enters the exchange process most visibly
on Craigslist, compared to Silk Road and eBay, as users rely on local police stations to
ensure personal safety during face-to-face encounters. The website infrastructure of
advertisement solicitation and the platform culture of local commerce informs another
social custom, according to which merchants should conduct exchange in cash rather than
wire payment. Users respond to the website infrastructure of open exchange by
formulating social customs related to general market acumen. In all of these cases, social
customs help users manage local exchange, and they involve infrastructures, cultures, and
institutions that are beyond the economic as such. Craigslist is not an isolated sphere of
commercial activity but an entrenched arena of economic exchange that is infrastructural,
cultural, and institutional. Good fences might make good neighbors, but low fences make
good merchants.
A key social custom on Craigslist is to meet in person to conduct a transaction.
First and foremost, this custom is related to website infrastructure, which is designed to
furnish advertisements and connect merchants, but not to facilitate payment or delivery.
The interpersonal encounter helps mitigate concerns of fraud by reducing the ability of
85
merchants to deceive their trading partners through digital protocols. At the same time,
the interpersonal comes with the risk of physical harm, unevenly distributed across social
categories, including gender.175 In response to this risk, as related in discussion board
conversations, Craigslist users adopt the social custom of meeting their prospective
trading partners in a public place: a city square, a parking lot, or a local business.
Craigslist formalizes this policy in its official guidelines for avoiding scams. While the
precise language has shifted over the past decade, the guideline reads, "Deal locally, face-
to-face —follow this one rule and avoid 99% of scam attempts."176
Some users build on this foundational social custom by involving state institutions
in the interpersonal encounter. In particular, women take steps to ensure their safety
during face-to-face transactions. On the Craigslist subreddit, women users related a social
custom of meeting prospective trading partners in front of a local police station or in a
public setting. In 2017, a woman asked the Craigslist subreddit where "a female on
Craigslist" should meet a prospective buyer, and users of both genders proposed a local
police station in response. One woman suggested that the entire transaction be conducted
in an open public setting, explaining, "I always meet inside a Starbucks. I get there early,
order a coffee, and lug whatever I'm selling inside. Don't help them carry it to their car; If
you can carry it in by yourself then they can handle it on their own. This is a very public
transaction and definitely puts you in a stronger position if they are shady." For this user,
the risk of a suspicious or "shady" merchant informed the practices of exchange. When a
175 Judith Butler, Precarious Life: The Powers of Mourning and Violence (London: Verso, 2004). 176 "Avoiding Scams,” About, Craigslist, last accessed 1 December 2017, https://www.craigslist.org/about/scams.
86
presumptively male user asked, "What does your gender have to do with anything?" the
woman responsible for the post foregrounded the material dimension of interpersonal
exchange: "Well, I am much smaller than a dude I guess. About 90 lbs? I guess thinking
about it, if shit went down, I suppose it wouldn't matter. But I still don't have the physical
heft." When I interviewed a Los Angeles woman in her 20s, she explained that she took
her safety seriously during interpersonal encounters by bringing pepper spray and "a
friend or someone just to be on the safe side".
Still, for those without chemical agents or trusted confidantes, the local police
station is a trusted venue for the interpersonal encounter. When a user on the Craigslist
subreddit asked how to handle a face-to-face transaction, several users suggested local
law enforcement as a commercial resource. One user wrote, "If anything makes you
uncomfortable then ask to meet at a police station or someplace public." Another agreed
that it was wise to "meet at or across from a police station". The state is not always a
neutral venue in these contexts. Several police departments, including those in
Philadelphia, Virginia Beach, and Boca Raton, have responded to this social custom by
encouraging merchants to conduct commerce in the lobbies of law enforcement
offices.177 The police department in Columbia, Missouri even created a commercial for
177 Lily Hay Newman, "Police Stations Increasingly Offer Safe Haven for Craigslist Transactions," Slate, January 30, 2015, http://www.slate.com/blogs/future_tense/2015/01/30/ police_stations_offer_their_lobbies_as_safe_havens_for_craigslist_transactions.html. Robert Moran, "Online Exchanges Now Welcome In Philly Police Station Lobbies," Philly.com, March 6, 2017, http://www.philly.com/philly/news/Online-exchanges-now-welcome-in-Philly-police-station-lobbies.html.
87
public television that advertised its lobby as an Online Exchange Zone.178 Here, not only
users but also state institutions work to control the commercial process within their
jurisdictions.
A related social custom is rooted in the platform culture of local commerce and
the website infrastructure of email relays. On the discussion board, users encourages their
peers to conduct exchange in cash rather than through wire payment, personal check, or
Paypal charge. These latter payment technology could be exploited by fraudulent
merchants, who might accept wire payments before handing over goods, write personal
checks that cannot be cashed, or send fake Paypal confirmation emails. If one party
insists on writing a check, so the custom goes, then the other party should cash the
payment before finalizing the exchange. As one user summarized, "Cash is the ONLY
way to go," because paper currency cannot be easily counterfeited or time-lagged. For
this reason, Craigslist users also avoid conducting commerce with distance merchants,
who contact them through the Craigslist message system, built into website
infrastructure, and make appealing offers to have the product delivered by post. Craigslist
formalized this custom in September 2014, when they added to their guidelines, "Ignore
178 Matthew Patston, "Columbia Police Department Opens 'Online Exchange Zone' To Deter Violence," Columbia Business Times, February 12, 2015, http://columbiabusinesstimes.com/ 2015/02/12/columbia-police-department-opens-online-exchange-zone-to-deter-violence.
88
emails/texts from non-local persons"179 and, a month later, replaced that guideline with a
more specific one: "Do not extent payment to anyone you have not met in person."180
Craigslist users also follow broad social customs related to website infrastructure
in order to avoid fraudulent exchange. The absence of dispute protocols on Craigslist
means that users must fend for themselves in the digital free market. Part of this self-
defense is the knowledge of social customs related to market acumen. On the discussion
board, users refer to these customs as "due diligence" or simply "common sense". One
discussion board participant offered a set of questions to ask oneself before entering a
transaction: "Just be very careful. Ask yourself, 'Am I being caught up by greed or other
allure?' Ask, 'Can I afford the loss/hassle if this is a scam?'" Users cast greed as a
psychological trait that is easy to exploit, and they instruct their peers to beware of
listings that offer items well below their market value. When someone on the discussion
board reported a fraudulent car advertisement, a user replied, "Thieves get rich cheating
nitwits who think they can get something for nothing. NOBODY is going to sell a
beautiful 2008 Jetta with 77K miles for $2500. It is ALWAYS a scam." Another user
chimed in: "Scammers prey on cheapskates who think they can get something for
nothing." Cooperative exchange, according to many Craigslist users, was a matter of
psychological self-awareness. A seasoned platform merchant directly connected
179 "Avoiding Scams," About, Craigslist, updated September 21, 2014, retrieved from The Way Bakc Machine, https://web.archive.org/web/20140914121202/https://www.craigslist.org /about/scams. 180 "Avoiding Scams," About, Craigslist, updated October 20, 2014, retrieved from The Way Bakc Machine, https://web.archive.org/web/20141020025419/https://www.craigslist.org/ about/scams.
89
fraudulent exchange with improper conduct, insisting in a discussion board post, "You
can't be scammed unless you cooperate". Another discussion board participant from Fort
Collins elaborated on the relation between fraud and acumen: "You can be scammed in a
bank or supermarket or anywhere online. One must use common sense, and it helps if one
reads up on potential fraud and scams."
On Craigslist, users develop social customs to mitigate concerns of fraud and
control the commercial process. These customs relate to website infrastructure, platform
culture, and state institutions. The absence of payment and delivery protocols in
Craigslist infrastructure means that merchants must meet in person to conduct exchange.
With the interpersonal encounter comes a series of practices that jockey state institutions
and public spaces (and, sometimes, chemical agents) to ensure personal safety. The state
serves as a backdrop of commerce in some cases, as when commerce is conducted in
front of a police station; and functions as a direct actor in other cases, as when law
enforcement authorities encourage citizens to meet in the lobbies of their offices. Gender
also figures into the social customs surrounding interpersonal encounter, as women take
concrete steps to ensure their safety during unregulated exchange. Infrastructure and
culture intersect in the social custom of cash exchange, which eschews long-distance
commerce conducted over email relays in favor of local exchange conducted through
immediate payment. The loose set of social customs related to market acumen also
eschews infrastructural commerce for local exchange, proper to the platform's
neighborhood culture. In these diverse cases, Craigslist is not a fenced garden but an
overflowing lawn that implicates infrastructures, culture, and institutions in its greenery.
90
Here, electronic commerce is far from exclusively economic, as a variety of factors
external to exchange enter the commercial process for the benefit of users.
Hidden Abodes of Exchange
On Silk Road, eBay, and Craigslist, users take steps to control the commercial
process, developing social customs that rely on website infrastructure, platform culture,
and state institutions. This means that internet markets are not self-regulating, insofar as
users furnish de facto regulations in the absence of formal ones. This also means that
internet markets are not self-contained, as infrastructures, cultures, and institutions enter
the drama of exchange, either as passive or active players. Digital exchange is not purely
economic but also infrastructural, cultural, and institutional. Electronic commerce has
"hidden abodes", or external factors that inconspicuously facilitate exchange. Users are
well positioned to understand these discreet factors, because they take steps to manage
their exchange relations, drawing on available resources, both economic and non-
economic. The role of external factors within internet market exchange has consequences
for cyberlibertarianism, free labor, and electronic commerce.
Cyberlibertarianism and free labor share a view of internet exchange as
comprehensively economic. According to cyberlibertarian logic, if internet platforms are
self-contained islands of digital activity, then internet markets are self-contained islands
of economic activity. The digital ideology affirms the autonomy of these venues and the
importance of boundaries around them. This is part of how cyberlibertarianism justifies
the evasion of state regulations, understood as the unnecessary encroachment of these
boundaries. According to free labor logic, if internet activity is consistently monetized,
91
then internet platforms are comprehensively economic. This is how Terranova refutes the
argument that the internet is anarchocommunist. These paradigms arrive at the same
general way of thinking about the internet platform economy, albeit through entirely
different routes. In both accounts, internet platforms are comprehensively economic,
either because non-economic factors do not breach platform boundaries
(cyberlibertarianism), or because non-economic factors turn out to serve economic
purposes once inside those boundaries (free labor).
Contrary to the ideas of cyberlibertarianism, non-economic factors enter internet
market exchange through unexpected paths. Further, contrary to the ideas of free labor,
these factors cannot be characterized as purely economic: even though they facilitate
commerce, they exhibit their own infrastructural, cultural, and institutional dynamics. To
characterize website infrastructure, platform culture, and state institutions as purely
economic is to miss these situated dynamics — the ways infrastructures, cultures, and
institutions enter the commercial process, not as sources of direct monetization but as
touch-stones of user practices. Further, to characterize these factors as purely economic is
to forward a functionalist argument, in which economic, infrastructural, cultural, and
institutional factors are woven together so thoroughly that they cannot be analytically
distinguished. It's the economy all the way down. Not only does the functionalist
perspective fail to account for the unique qualities of infrastructures, cultures, and
institutions in the context of electronic commerce. It also falls victim to paraconsistent
logic: everything is either economic or non-economic, but the non-economic contributes
to the economic, so the non-economic is also the economic. In a formal contradiction, A
= A and not-A = A. Free labor theory ends up endorsing a self-contained internet
92
economy in much the same way that cyberlibertarianism endorses a self-contained
internet as such.
As venues of social customs, internet markets help us understand how users
control internet exchange in the absence of regulations. Unlike the merchant laws
mentioned by Trotter Hardy, social customs are not grounded in jurisdictive institutions.
Rather, they are grounded in the dynamics of infrastructures, cultures, and institutions
that are formally external to electronic commerce. These procedures can include the
traces left by website infrastructure, such as the feedback dates on Silk Road or user
activity logs on eBay; the sensibilities of platform culture, including the outlaw mentality
of Silk Road veterans or the local preferences of Craigslist users; or the functions of state
institutions, such as the surveillance function of the state on Silk Road on the protective
function of the state on Craigslist. These infrastructures, cultures, and institutions have
their own independent existence and operational procedures, but they are leveraged by
users aiming to control the commercial process nonetheless. Paradoxically, on internet
markets, the protocols that are formally designed to facilitate commerce become the
means of economic conflict, and the systems that have different formal purposes become
the raw materials of economic cooperation. If these digital free markets, which are meant
to be self-regulating and self-contained, implicate factors external to trade, then it is
likely that electronic commerce will always be more than electronic and more than
commercial — not an isolated island but a vast archipelago.
93
CHAPTER 3
MONEY ON THE SIDE
PERFORMING MERCHANT LABOR
On internet markets, actors take steps to manage exchange. In performing the
lion's share of platform work, vendors develop selling strategies to control the
commercial process, including its potential for fraud and its potential for profit. These
actors have a particularly vested interest in equitable exchange, given the resources they
outlay during online sales. Like the social customs developed by users generally, vendor
strategies are connected to website infrastructure, platform culture, and state and
commercial institutions, but in ways that reflect the vendor goal of selling goods. This
means that even the business side of internet markets is more than just business: sellers
with properly economic motives leverage infrastructures, cultures, and institutions to
realize those motives. This is important, because internet markets are supposed to be self-
regulating and self-contained, yet vendors employ de facto regulations in the form of
selling strategies, and internet markets turn out to be embedded spheres of economic
activity in the very place where they should be thoroughly economic — the area of digital
labor.
Just Business
Scholarly and popular accounts of the digital economy tend to focus on its
properly economic dimension. In their Wikinomics manifesto, Don Tapscott and Anthony
D. Williams advocate a digital business plan centered on the monetization of online user
94
activity and the ensuing minimization of overhead costs.181 Yochai Benkler, in The
Wealth of Networks, locates latent economic value in collaborative internet activity,
which he positions as constructively unregulated.182 Manuel Castells, during his
discussion of the digital economy in The Network Society, relates the structure of internet
networks to the global circulation of economic capital.183 The Four Hour Work Week by
Tim Ferris outlines an entrepreneurial strategy that leverages the distributed structure of
the internet to generate personal economic prosperity.184 Arun Sundararajan's The
Sharing Economy concerns the economic value of networks in the provision of on-
demand services.185 These studies of the digital economy ask: where are the economic
resources on the internet, and how should they be managed?
Critical accounts of digital labor likewise tend to focus on its properly economic
dimension, despite their focus on the production of value rather than its mere location.
Tiziana Terranova sees internet exchange as comprehensively economic, insofar as it is
monetized by technology firms.186 Christian Fuchs follows Terranova in highlighting the
181 Don Tapscott and Anththony D. Williams, Wikinomics: How Mass Collaboration Changes Everything (New York: Portfolio, 2006). 182 Yochai Benkler, The Wealth of Networks (New Haven: Yale University Press, 2006). The concept of social production has roots, unacknowledged by Benkler, in Italian Marxism and Marxist feminism. David Peter Palazzo, "The 'Social Factory' in Postwar Italian Radical Thought from Operaismo to Autonomia" (doctoral dissertation, City University of New York, 2014). Silvia Federici, Revolution at Point Zero (Oakland: PM Press, 2012). 183 Manuel Castells, The Rise of the Network Society (Hoboken: Wiley & Blackwell, 2000). 184 Tim Ferriss, The Four Hour Work Week (New York: Random House, 2007). 185 Arun Sundararajan, The Sharing Economy (Cambridge: MIT University Press, 2016). I draw on Sundararajan through the rest of this paragraph. 186 Tiziana Terranova, "Free Labor: Producing Culture for the Digital Economy," Social Text 18, no. 2 (Summer 2000): 33-58. See the discussion of Terranova in chapter 2.
95
economic value of user activity online.187 In line with Terranova and Fuchs, many
scholars argue that the surveillance of user activity is the skeleton-key to the extraction of
economic value on the internet; such that user activity, figured as a kind of digital labor,
sets the groundwork for a global industry in data.188 Lilly Irani analyzes the economic
bifurcation of digital labor into menial work and high-technology work.189 For Sarah
Roberts, content moderation is not just a user hobby but a legitimate micro-economy.190
These studies of digital labor ask: who provides the economic resources, and how does
that provision process work?
Despite their different perspectives and different objects, accounts of the digital
economy and accounts of digital labor are principally concerned with the economic
dimension of internet activity. When infrastructure enters the picture, it is an
infrastructure of capital circulation (Castells), monetized surveillance (Fuchs), or
outsourced task execution (Irani and Roberts). When culture enters the picture, it is a
187 Christian Fuchs, Digital Labor and Karl Marx (New York: Routledge, 2014). Christian Fuchs, "Dallas Smythe and Digital Labor," in The Routledge Companion to Labor and Media, ed. Richard Maxwell (New York: Routledge, 2016): 51-62. 188 Christian Fuchs et al., Internet and Surveillance: The Challenges of Web 2.0 and Social Media (New York: Routledge, 2012). Sebastian Sevignani, Privacy and Capitalism in the Age of Social Media (New York: Routledge, 2016). Daniel Trottier, Social Media as Surveillance (New York: Routledge, 2012). Nick Dyer-Witherford, Cyber-Marx: Cycles and Circuits of Struggle in High-Technology Capitalism (Urbana: University of Illinois Press, 1999). Ganaele Langlois et al., Compromised Data: From Social Media to Big Data (New York: Bloomsury Academic, 2015). Lee McGuigan and Vincent Manzerolle, eds., The Audience Commodity in a Digital Age. Jeffrey Pomerantz, Metadata. Frank Pasquale, The Black Box Society. Nick Srnicek, Platform Capitalism. Safiya Umoja Noble, Algorithms of Oppression. 189 Lilly Irani, "The Cultural Work of Microwork,” New Media & Society 15, no. 5 (2015): 720-739, 10.1177/1461444813511926. 190 Sarah T. Roberts, "Commercial Content Moderation: Digital Laborers' Dirty Work," in Intersectional Internet: Race, Sex, Class and Culture Online, ed Safiya Umoja Noble and Brendesha M. Tynes (New York: Peter Lang, 2016): 147-160.
96
culture of voluntary user participation (Benkler) to be widely monetized (Tapscott and
Williams) without user compensation (Terranova). When institutions enter the picture,
they are outdated commercial institution, such as taxis and hotels (Sundararajan), ready to
be disrupted (Ferris). In these accounts, infrastructures, cultures, and institutions occupy a
marginal position in the digital economy and in digital labor.
User Accounts
Internet markets tell a different story. On Craigslist, eBay, and Silk Road, vendors
develop selling strategies connected to website infrastructure, platform culture, and state
and commercial institutions — factors considered minor players in accounts of the digital
economy, accounts of digital labor, and accounts of self-contained platforms advanced by
cyberlibertarianism. These selling strategies help vendors control the commercial
process. In contrast to user customs, however, these strategies reflect the vendor goal of
selling goods, and they tend to relate to different elements of infrastructures, cultures, and
institutions — factors that are not only present on internet markets but flexibly so. On
eBay, vendors formulate selling strategies connected to the website infrastructure of
algorithms, seller fees, hacked profiles, and digital protocols; the platform culture of rival
sellers, object expertise, and visual conventions; and the commercial institutions of
conventional businesses, yard sales, and thrift stores. On Silk Road, sellers execute
selling strategies related to the website infrastructure of price displays and seller
blacklists; the platform culture of anonymous users and unsophisticated actors; and the
surveillance of state institutions. On Craigslist, vendors develop selling strategies that
interface with the website infrastructure of filter protocols, post expiration, and scam text
97
messages; the platform culture of casual buyers; and the state institutions of law
enforcement, as well as commercial institutions of retail stores. This is significant,
because digital labor is supposed to be an economic matter, and internet markets are
supposed to be self-contained spheres of economic activity. Yet even actors who treat
internet markets as business venues lean on infrastructures, cultures, and institutions
during digital exchange. Merchant labor on internet markets is more than just business.
The presentation of evidence in this chapter reflects the contextual nature of
selling strategies, or their connection to what, how, and why vendors are purveying
certain wares. Although I sometimes reference discussion board conversations, I
principally draw on the interviews I conducted with internet merchants in order to
provide a deep account of selling strategies.191 These are vendors portraits, which we will
consider one by one, with references to broader trends but a focus on individual user
accounts.
Practical Speculation
On eBay, vendors develop selling strategies to control the commercial process,
alleviating concerns of fraud and increasing profitable sales. These strategies are not only
economic but also infrastructural, cultural, and institutional. Vendors negotiate the
website infrastructure of market algorithms, which determine which products are
prominently displayed; seller fees, which inform the conditions under which sales are
profitable; hacked profiles, which are potential sources of fraudulent exchange; and
digital protocols, which inform what is technically possible on the site. Their selling
191 See the discussion of interview methods in Appendix II.
98
strategies are also related to the platform culture of rival sellers, who may seek to
manipulate them; as well as object expertise and visual conventions, which inform the
way objects are presented. They furthermore interface with commercial institutions,
including formal business, yard sales, and thrift store. Even as they position profit as their
principal goal, these vendors leverage non-economic factors in their pursuit of online
sales. Digital labor on eBay is more than "just business", and the auction market is far
from a self-contained sphere of economic exchange. Rather, infrastructures, cultures, and
institutions enter into the process of merchant labor — the very part of digital exchange
that should be most thoroughly economic. In what follows, I describe the selling practices
of five eBay vendors who I interviewed.
A Baton Rouge man in his early 40s uses selling strategies related to the website
infrastructure of market algorithms and the platform culture of rival sellers. As an owner
of a pawn shop, he uses eBay to sell "purses, wallets, sunglasses, watches, jewelery [sic],
giftcards, and small electronics", which he has in stock in his store and which he knows
"will sell for sure". An eBay user since the late 1990s, he relies on a calculated pricing
strategy to decide on a reasonable starting price for goods. His formalized pricing
mechanism reflects the relatively high stakes of his online sales, bound up in his
professional goals. It also reflects his attempt to stand out in the expansive auction
market. eBay controls the visibility of items through a market algorithm, about which
vendors know little. This vendor reasons that a good price will attract user attention; and
this will, in turn, help increase the visibility of the object within the secret operations of
the market algorithm. "I care about eBay showing my stuff to people," the vendor
explained, and pricing strategy is a potential way to increase visibility. Price also takes on
99
an increased importance from the perspective of eBay's history, a history to which this
vendor was witness over decades of platform involvement. In his recollection, Chinese
sellers flooded eBay with cheap electronics in the late 2000s, exploiting international
price differentials and crowding out pawn dealers like himself. These developments made
the market even more crowded and competitive, and they altered the platform culture by
shifting the kind of objects for sale on the site. Compared to the early days, he noted,
there are more technology vendors and "fewer average people selling off their junk". The
shift in object culture made his online sales more difficult, as eBay became increasingly
known for technological products rather than secondhand ones. More difficult than the
changes in platform culture, however, is the potential for fraudulent exchange on the site.
He recalled a recent incident, during which a buyer filed a return on a $1200 item just
days before the thirty-day cutoff for refunds. When he received the product, it had clearly
been used, but involving the dispute protocol was "not worth the mental effort", given its
bias in favor of the customer. Still, according to the vendor, the most frustrating part of
merchant labor is not the presence of fraudulent buyers but the platform culture of rival
sellers. "The most insidious people on eBay," he pined, "are the resellers who buy your
items because they think they are smarter than you." These are other vendors that will
purchase an item, leave a poor feedback as a form of vendor sabotage, and then attempt
to sell that item at a higher price. Rival sellers require that vendors remain attentive to
who is buying their products and why. Given the stakes of exchange, the Baton Rouge
develops selling strategies that are connected to these infrastructural and cultural
dynamics.
100
Not all sellers use eBay as extensions of their professional endeavors, but even
casual vendors develop selling strategies to control the commercial process. A Raleigh
woman in her 50s sells miscellaneous goods on eBay to generate small profits for side
money, and her selling strategies are connected to the platform culture of visual
conventions and the commercial institutions of yard sales. She attends these sales several
times a month, "every weekend in the summer", and she purchases "guitars, clothing,
cosmetics, beer mugs, auto parts, pretty much anything [she] can make a little money
on". In tailoring her advertisements to the platform's visual standards, she spends "up to
four hours" each week taking pictures of her goods and writing detailed listings for them.
This is a significant amount of work, which she breaks up into small segments. As she
explains, "I go in spells where I'll list a bunch of stuff, then I won't do anything for a
while." Like the Baton Rouge pawn dealer, she points to fraudulent exchange as a
difficulty of merchant labor, one that has gotten worse over time. As she explains, "I've
seen more and more people that get taken advantage of because they don't cross every I
and every T." Despite the necessary attention to detail, she remains committed to the
thrill of speculative commerce, the "fun of buying something really cheaply at a yard sale
and selling it for a decent profit" to "someone who has been looking for it". Although her
compensation is usually minimal, in one exciting case, she purchased at a yard sale "a
particular type of musical keyboard, very old, very rare" and resold the instrument for
$299 to an antique collector. Her selling strategies proved effective during this exchange,
as she leveraged the commercial institution of yard sales and the platform culture of
visual conventions to sell a product at a significant profit.
101
A New York man in his 60s, selling off his collectibles in retirement, likewise
takes steps to control the commercial process. These steps are connected to the website
infrastructure of digital protocols, as well as the platform culture of visual conventions
and object expertise. The vendor sells "mostly comics and magazines", as well as
"holograms, old games on CD, a small coin collection" that he has acquired over years of
collection. As a seller of collectibles, he puts great effort into the high-quality
presentation of his goods and the respectable presentation of himself. Responding to the
platform culture of visual conventions and object expertise, he explains, "I use sharp,
XXL photos/scans. Links to wikis and info. I position myself as an expert in the field." In
addition to presenting the objects according to platform conventions, the vendor stays up
to date on platform policies: "listing policies, branding, shipping times and policies,
return policies". The New Yorker repeated a common complaint about platform
protocols, mentioned by nearly all the vendors that I interviewed: sellers cannot leave
feedback on the profiles of deceptive buyers. The vendor referred to the feedback system
as "a total scam. Buyers can NEVER be negged [rated negatively]. Even the known
scammers have a 100% positive ratings." eBay's biased protocols, according to him,
make internet commerce feel like a typical job: "Ebay treats us like we work for it. Just
stocking it's shelves." Here, platform culture and website infrastructure inform the selling
strategies that are necessary in the auction market.
Meanwhile, a seasoned vendor in his 30s, based in the United Kingdom, uses
eBay as the principal sales venue for his computer hardware business. His selling
strategies interface with the platform culture of object expertise, as well as the website
infrastructure of digital protocols and hacked accounts. Given its relationship to his
102
formal work arrangement, merchant labor takes up a significant deal of his time. Further,
given the technical nature of his wares, the vendor spends a plurality of this time
presenting his goods in an expert manner, as well as "testing the items and detailing all
the potential issues a customer will complain about". In addition to cultural conventions,
hardware sales at a distance comes with regular correspondence with customers over
delivery, maintenance, and quality. As a percentage, few customers complain; but the
business has a large customer base, meaning that there are many complaints in real
numbers. The website infrastructure of dispute resolution protocols, biased toward the
buyer, means that complaints are best handled "before they escalate" into full-blown
contests. Further, the website infrastructure of hacked accounts means that bad actors
have a clear path to free goods — a path that is treacherous for the vendor, given the high
cost of hardware products and the professional stakes of his online sales. After the vendor
sold a computer over eBay, he received an email from the platform, informing him that
the sale had been cancelled, because the buyer account had been hacked. The email read,
"We’re writing to let you know that we had to cancel the following transaction(s) because
the item(s) were purchased without the account owner's permission." The vendor was
relieved that he did not send the expensive product, but he expressed concern over the
recent presence of hackers on the site. Hacked accounts were now another dimension of
website infrastructure that informed his selling strategies, along with dispute resolution
protocols and platform conventions.
Lastly, a Virginia man in his 20s develops selling strategies related to the
commercial institution of thrift stores and the platform culture of rival sellers. Twice
weekly, he travels to nearby thrift stores, purchases miscellaneous items he thinks are
103
valuable, and resells them for a profit in the auction market. These items include
"Gameboys, ink carts, old radios, fish finders, [and] curtains". He relishes this part of the
exchange process — the work of finding objects for resale, which he refers to as "a
treasure hunt, free money, ect. [sic]". But he finds the rest of the exchange process rather
tiresome. In particular, he finds frustrating the platform culture of rival sellers. One
vendor, he related, "bought a working radio, listed it on the same ebay account they
bought it with but several states from the original mailing address. While listed on their
ebay for sale, they opened a return claiming it didn't work, yet describing in their listing
that the radio was 'fully functional'." Nevertheless, he notes, navigating the platform
culture of rival sellers is worth the supplementary income that eBay furnishes. Despite
being oriented toward an economic end-game, his selling strategies are connected to
infrastructural and cultural dynamics.
On eBay, vendors develop selling strategies to control the commercial process
and execute successful sales. Even as they bear an economic purpose, these strategies
exceed the realm of the economic and implicate infrastructures, culture, and institutions.
Far from self-regulating, eBay relies on the de facto regulations of vendors, who work to
protect their assets in the free digital market. And, far from self-contained, eBay plays
host to non-economic factors, which figure importantly into the selling strategies of
vendors. The cyberlibertarian vision of an autonomous internet platform misses the ways
that digital exchange interfaces with factors that are formally external to electronic
commerce, even when digital exchange is treated as a business with properly economic
motives.
104
Dark Figures
Criminologists define "the dark figure" as the number of crimes that occur but are
not recorded by the state.192 In considering Silk Road vendors, we are in a world of dark
figures — individuals who are remiss to detail their illegal activities, especially if those
activities continue into the present. Because I did not formally interview any Silk Road
contraband dealers, I must rely on secondhand accounts to paint a portrait of merchant
labor in the digital black market. Fortuitously, in August 2013, an unidentified individual,
claiming to have been a vendor on Silk Road, posted on Reddit an Ask Me Anything
(AMA) thread.193 In Reddit culture, an AMA is a real-time, question-and-answer thread,
hosted by people with a particular expertise or experience, from industry leaders and
politicians to computer scientists and factory workers. In this case, there is evidence to
suggest that the individual claiming to be a former Silk Road vendor was being truthful.
He was familiar with the technical niceties of the dark web, cryptocurrency, and stealth
product delivery; the cultural dynamics of the Silk Road discussion board; and the
chemical standards of drug purity evaluation. Moreover, in theory, a former dealer would
be more willing to talk about their experiences than an active dealer, and neither would
have anything to gain through a public forum, making an ulterior motive unlikely. In all,
there are compelling reasons to believe in the legitimacy of this individual, and, for these
reasons, the AMA will be the core of the subsequent analysis. We will also hear from
192 Heidi Mork Lomell, "The Politics of Numbers: Crime Statistics as Source of Knowledge and Tool of Governance,” in International Handbook of Criminology, eds. Shlomo Giora Shoam et al. (Boca Raton: CRC Press, 2010): 117-151. 193 FormerSR, "I'm a former Silk Road drug dealer, AMA!" Reddit, r/Casualama, https:// www.reddit.com/r/casualiama/comments/1l0axd/im_a_former_silk_road_drug_dealer_ama
105
other vendors, through their comments on the discussion board, and these comments will
help us identify trends in merchant labor in the digital black market.
On Silk Road, sellers developed selling strategies to control the commercial
process — its potential for fraud, for profit, and for state detection. These strategies were
related to website infrastructure of market prices, which were important determinants of
sales, and seller blacklists, which helped vendors avoid deceptive users. Vendor practices
were also connected to the platform culture of anonymous and unwitting users, who took
advantage of their dark-web privacy or failed to perform their due diligence during illegal
commerce. Notably, selling strategies interfaced with state institutions, which posed a
legal threat at nearly every stage of black market exchange. This means that Silk Road
was not self-regulating, insofar as vendors took steps to informally regulate the
commercial process and execute their economic goals. This also means that Silk Road
was not self-contained, as the digital movement of contraband marshalled factors that
were external to electronic commerce.
The Silk Road vendor who hosted the AMA did not directly identify his age or
location, but he did mention that he had recently impregnated his girlfriend, suggesting
that he is a man or an individual with male anatomy. I will consequently use the
presumptive masculine pronoun to refer to this vendor. According to his account, he was
a dealer of LSD, MDMA, and hash, none of which he would "personally consider
harmful", and he made "upper six-figures" over a year of part-time dealing. He worked a
conventional 9-5 job during his tenure on the platform, and, despite the profitability of
drug sales, he "never made a business out of it". His merchant labor generated money on
the side, and a lot of it — the markup on his products, or the difference between their cost
106
of acquisition and their price of sale, ranged "anywhere from 40% to 300% depending on
the quantity". Perhaps unsurprisingly, given his capital gains, he characterized his vendor
experience as generally positive, stating, "I think the year or so I spent selling on SR was
one of the most satisfying things I've ever done." He also characterized the digital black
market as generally avant-garde, asserting, "SR is absolutely the future. Dealers are much
safer, customers can be assured of some level of quality control and there's little risk of
violence. Everybody wins."
In the first instance, his selling strategies were related to the website infrastructure
of market prices. Prices were listed alongside objects, and buyers could even sort objects
in ascending order of price. Of course, price is important in all markets. However,
because there were so many vendors for each kind of drug, price was a particularly
important way of capturing market activity. By listing items at an attractive price, and by
listing items that were in high demand, vendors could generate sales in a crowded black
market. For the AMA vendor, LSD was his best-selling product, because "it's very tough
to find in a lot of places so there's a big market for it". He often leveraged geospatial price
differentials through international orders, taking advantage of the economic circumstance
that "some things are much cheaper in some markets than others". Price and demand were
important market determinants, as vendors the discussion board noted. In May of 2012, a
Silk Road user began a discussion board thread entitled Getting Started as a Vendor,
seeking advice on creating a seller account. Recognizing the importance of platform
longevity, the poster asked how to jumpstart his commercial venture without a broad
platform reputation. One vendor assured him that a low price would help him stand out in
the market, writing that "sales will be slow at first but if the demand for your product is
107
there, people will buy it". Undercutting the competition was a dependable path to market
dominance, because, as the vendor continued to explain, "there are people on here, like
me, who are poor enough to care about that [price] difference".
Merchant labor on Silk Road required more than a strong pricing strategy,
however. As the AMA vendor explained, the work of packaging and shipping contraband
constituted the core of merchant labor on Silk Road. This work was connected to the
abeyant presence of the state on the platform, where black market sales were triply
criminal — it is illegal to sell contraband (conspiracy to distribute), to send it through the
postal service (mail fraud), and to lie about the reason for receiving the contraband
payment (wire fraud). After photographing, describing, and selling a product — hardly an
easy task in a crowded and stylized black market194 — the AMA vendor started the
substantive work of packaging. Wearing gloves in order to prevent fingerprint traces, the
vendor first wrapped the outgoing product in mylar, "after initially working with double
vacuum sealing, which wouldn't be as dog-proof". He then put the product into a large
envelope, which he subsequently put in a larger manila envelope, preferring "a letter
format" over the fake package format used by other sellers.
The question of stealth packaging occupied many vendors on the discussion
board, with users offering a variety of strategies for deceptive or discreet containers: re-
sealed candy wrappers, re-glued tampon boxes, or the "inside a snap lock smelly proof
bag, crushed flat and wrapped again in lavender scented tissue paper and mailed in a
greeting card". In 2012, a vendor on the discussion board wrote about the labor of
packaging contraband, which served as a barrier to entry for new sellers: "I can spend
194 See the discussion of contraband advertisements in chapter 4.
108
upwards of 4 hours a day just packaging... it is a VERY time intensive [sic] and you are
always under the gun to get product out. I think this is what kills many vendors in the
beginning. They think it will be easy but it isn't so they end up quitting." He also noted
that packaging constituted an investment with a delayed yield: "I spend as much as $500
a week on packaging supplies and postage... that is $500 out of my pocket before I ever
see any money from The Road..." Here, the logistical practice of packaging was an
overhead expense, made elaborate and complicated by the spectral presence of state
surveillance.
The AMA vendor continued: once the product was in a stealth package, the
package needed to be shipped. This selling practice was likewise connected to the
abeyant presence of the state, as vendors took steps to avoid detection by the institution at
every stage of delivery. First, because the wholesale purchase of stamps and shipping
materials could look suspicious to state authorities, the AMA vendor "bought [his]
stamps and other supplies from multiple different places". He used an in-state,
established business for the return address, musing, "I don't know if any one of those
businesses every got a surprise return delivery though!" Then — and this became more
important as his sales grew — he dropped the packages "at multiple mailboxes on
relatively quiet streets". These were postal mailboxes, meaning he utilized the federal
postal system, rather than couriers, who, he claimed, were "more likely to open and check
your packages". While most of his deliveries were successful, he knew of three packages
that "for sure were intercepted", but "all were small enough amounts (<$200) that they
just resulted in a letter" from customs to the buyer. As the vendor explained, "It's not
possible to prove that [the buyer] ordered something like that so it's tough to make it
109
stand up in court. Small orders usually result in angry customs letter and no more." Here,
the vendor's shipping practices responded specifically to the prosecutorial dynamics of
the state, or its legal inability to prosecute without rigorous evidentiary support. These
practices were shared by other vendors who spoke about their experiences on the
discussion board. When someone began a humorous discussion board thread entitled "25
ways to get caught as a vendor on Silk Road", sellers posted cheeky comments about
rookie vendor mistakes. Several discussion board posters described blunders in the
packaging and shipping process: "Buy a lot of stamps in the same shop all the time"; "put
your actual correct return address on the package"; and "throw something personal from
your pockets between the envelopes in the mail". These witty responses highlighted,
through negation, the selling strategies involved in moving contraband through the state's
postal system.
The platform culture of anonymous users and unwitting buyers also informed
vendor practices. According to the AMA vendor, anonymity and naivety complicated the
customer service dimension of vendor sales. Reflecting on the nature of anonymous
trade, the vendor noted generally that "it's difficult to tell if the client is being honest or
not". This made fraud a potential obstacle in the commercial process. Unlike the dealer
who went by the name of Mr. Duch during the Ross William Ulbricht trial,195 he claimed
that he did not keep a spreadsheet of buyer information, but he did keep "a log of refunds
so [he] could see if somebody was trying it repeatedly". Fortunately, the discussion board
furnished a partial strategy to avoid fraudulent actors — "a sellers blacklist (for
blacklisting bad buyers)" to which the vendor "added a couple of users". The AMA
195 See the discussion of Mr. Duch and vendor blackmail in chapter 1.
110
vendor went so far as to say that fraudulent and naive actors were more of a concern than
the law enforcement agents, who he believed were "browsing around the SR [Silk Road]
forums and such". The vendor, in particular, characterized irresponsible users as the
Achilles' heal of dark web markets. When someone asked about technological flaws in
dark web market architecture, the vendor inverted the question and offered a social
response. "Weakest point," he replied, "is the pile of meat sat in front of the keyword,"
referring to human actors, susceptible to error and manipulation. "There are enough
people out there with terrible OPSEC [operations security] that are too willing to trust
people they ultimately can't see." Dealing with the culture of anonymous and reckless
customers meant commercial record-keeping and infrastructural crowd-sourcing as
means to honorable commerce.
Other sellers related similar experiences on the discussion board. According to
one vendor, merchant labor partially consists of customers "bugging the shit out of you,
asking you all kinds of questions about each transaction". Here, the exchange custom of
vendor evaluation multiplied customer service work for the vendor, who needed to prove
his commercial trustworthiness through long conversations.196 When one user speculated
that "Silk Road drug dealer has got to be the best job on earth [sic]", "because it's so
damn easy", a vendor countered that sellers "have to deal with crappy ungrateful
customers", including "customers that lie about their package not making it". Another
agreed that "[h]aving to deal with idiot customers" was a principal challenge. According
to the AMA vendor, it was the "idiot customers" who were the most frustrating. "I had a
guy message me," he related, "every single day asking where he package was (it was
196 See the discussion of vendor evaluation in chapter 2.
111
going international, I had no idea) and after about five days he starts asking for a refund
even though shipping usually takes 8-12 days. He left a bad review."
In these cases, vendors developed selling strategies to control the commercial
process in ways their reflect their goal of selling contraband. These strategies were
connected to website infrastructure, platform culture, and state institutions, which helped
vendors determine what to sell, how to sell, and to whom to sell. Infrastructures, cultures,
and institutions were not neutral backdrops but influential factors in the decision-making
operations of black market sellers. Silk Road was far from a self-regulating libertarian
utopia, as vendor practices were de facto regulations that helped sellers control the
commercial process. Vendors sought control over economic exchange by leveraging non-
economic factors, making Silk Road embedded rather than self-contained. With an eye on
infrastructures, cultures, and institutions, vendors developed strategies that well exceeded
the economic.
Free Trade
Craigslist vendors also take steps to control the commercial process in their
pursuit of profitable sales. These steps are related to the website infrastructure of the filter
protocol, which determines how many times users may post advertisements; post
expiration, which removes posts after a certain period of time; and scam text messages,
which can sometimes accompany the posting of contact information in advertisements.
Vendor strategies are also connected to the platform culture of casual users, who may
express interest in an item without actually following through on its purchase. Selling
tactics also interface with the state institutions of law enforcement, which can provide a
112
failsafe during the interpersonal encounter, and the commercial institutions of retail
stores, which make the secondhand market attractive through high prices and regular
product turnover. Despite their economic motives, Craigslist vendors leverage
infrastructures, cultures, and institutions to control the exchange process. The local
internet market is far from the self-contained and self-regulating platform envisioned by
cyberlibertarianism. Rather, Craigslist implicates a variety of other factors that are
external to electronic commerce, as vendors aim to exert de facto regulatory control in
the digital free market. In what follows, I draw on interviews I conducted with five
Craigslist vendors.
A Los Angeles woman in her 20s takes steps to control the commercial process on
Craigslist, and these steps are related to the commercial institutions of retail stores and
the state institutions of law enforcement. She sells and buys furniture on Craigslist, and
local market has become her "go-to place for finding furniture/getting rid of furniture"
after seven years of use. Craigslist offers a reasonable alternative to furniture stores,
which she sees as "way overpriced". She offers her wares at a significant discount, not
only compared to retail prices but also compared to Craigslist prices: "I'll usually check-
out what's the current selling price and try selling it $5 less. If that doesn't bit [sic] after a
few days, I'll sell it a little bit more. I'll also research similar items on Craigslist what's
the selling price and either try to have a price that’s $1-2 less or a very good description
that entices someone to buy it." Like other women users of the site,197 she takes
precautions when meeting with potential buyers. She typically meets prospective
exchange partners at "the Santa Monica Police Station or near the entrance of a Target" in
197 See the discussion of interpersonal Craigslist encounters in chapter 1.
113
her neighborhood. "I do usually go with a friend," she elaborated, "or someone just to be
on the safe side." Finally, she added, "I also always carry pepper spray." There are
institutions on either side of her selling practices: the commercial institution of the
furniture store motivates her to sell goods in the first place, and the state institution of law
enforcement allows her to safely finalize transactions.
Also in Los Angeles is a man in his 50s who has generated "about 1 million"
dollars in profits through Craigslist over the course of five years. His selling practices are
related to the website infrastructure of filter protocols and scam text messages. This
vendor uses the local market to rent out a three-apartment loft and a photo studio in
Downtown LA, both of which he "owns through prior circumstances". The former rakes
in "over 60K per year" in rent, and the latter brings in handsome returns through hourly
rentals. Craigslist labor is an addition to his formal employment, a job in finance with a
flexible schedule, Unlike the furniture dealer, he sells regularly on the platform, and he
includes in the exchange process a posting strategy that is infrastructural in nature.
Because he advertises multiple times each day, he schedules his advertisements to avoid
the platform's filter protocol, which removes repeated postings and sometimes bans over-
active IP addresses. "I post 6-8 ads a time, wait an hour then repeat," he explained. "I'm
competing with other people who run 40 50 ads per day". He subscribes to the Craigslist
subreddit because "CL [Craigslist] changes algorithms occasionally" and the group
discussion allows him "to get ahead of the ball". For him, fatigue accompanies the
infrastructural practice of scheduled advertisements: "I'm so tired of posting," he
conceded, "but it's easy." He has less control over another infrastructural element of the
local market. By including his contact information in hundreds of advertisements, the
114
vendor opens himself up to scam text messages, which he fights of "every day".
Scammers locate the contact information listed in his advertisements and, as he explains,
"use my phone number for scam texts and calls". The vendor could not even make it
through our hour-long interview without receiving a scam text message, remarking to me,
"just had one while we chat". Still, the open structure of the platform is what makes the
local market attractive. The vendor's motivations for using the local market revolves
around cost, utility, and reach: "It's free and very popular and it works." For this vendor,
website infrastructure is a major touch-stone of the commercial process, which he
alternately controls through a pricing strategy related to the filter protocol, or fails to
control through the reception of scam text messages.
Meanwhile, a Philadelphia woman in her 40s employs selling strategies related to
the website infrastructure of post expiration. She sells furniture and jewelry as a way to
clean out her living spaces and make casual revenue. A veteran of local commerce, she
has been on the platform for "more than 20 years", and she feels that the site has "not at
all changed" in that time. She continually renews her advertisements to prevent them
from expiring, an infrastructural feature of the platform. Because each "posting will
expire in a new days", she must regularly "refresh the posting" by posting it again and
again. This practice keeps her wares visible in the crowded market. Like the LA woman
selling furniture, she takes gender into consideration when planning interpersonal
encounters with prospective buyers. "I meet them at a halfway point," she told me.
"Sometime [sic] I have them come to my house only if it's a female." She does not rely
on state institutions to protect her against interpersonal conflict, but she does take steps
related to website infrastructure.
115
Further north, a Toronto woman in her 30s uses Craigslist to sell her copy-editing
services, which she performs as an addition to her job in publishing. Her selling strategies
interface with the website infrastructure of post expiration and scam text messages. For
this vendor, the commercial process begins with the composition of an advertisement, an
important practice, given that superlative writing is part of the service that she is offering.
"Writing quality ads is a lot of work," she told me. "A good ad has to have all the
keywords that clients are looking for, but be unique enough to stand out. It also can't
replicate the hundreds of other ads on the site." Moreover, she schedules her
advertisements in relation to the website infrastructure of filter protocols, posting "at the
same time once per day in a set rotation" in order to habitualize the practice and avoid the
platform filter. Posting on the platform has become more difficult during her ten years on
the platform, she told me, because "you get scam txts [sic] if you post ads with your
contact info", and "the volume of scam [sic] has increased dramatically" in recent years.
Like the LA real estate vendor, she manages these unwanted messages as a price of entry
into the local market. Her selling strategies, in this respect, are infrastructural: she tailors
her posts to the filter protocol embedded in website infrastructure, even as that
infrastructure furnishes unsolicited text messages from scammers.
In contrast to these seasoned vendors, a New Jersey man in his 20s came to
Craigslist with minimal experience and stumbled through commercial process in 2017.
The commercial institution of car dealerships, the platform culture of casual buyers, and
the website infrastructure of scam messages figured centrally in his experience of
secondhand auto sales. After he wrecked his first car, he went to a dealership to sell it for
parts, but he wasn't satisfied with the offered price. A friend suggested he post the vehicle
116
on Craigslist, which he did, at which point he received a variety of dead-end inquiries: "I
had several people text me asking for more pics and when you send them they just don't
respond. They'll seem interested then just ghost you." The casual culture of Craigslist
meant that buyers were quick to inquire about product but slow to finalize the transaction.
Corresponding with casual buyers "felt like work", and the practice of ghosting, or the
sudden cessation of interpersonal communication, multiplied the correspondence labor.
Having included his contact information in the advertisement, he also began to receive
scam text messages "from unknown area codes with horrific grammar or very clearly not
human, asking generic vague questions". In his experience with scammers, "when you
answer, they’ll send you a wall of text taking [sic] about how they’re in the military or
out of country or in the hospital etc, and would like to PayPal you the money and have an
'agent' pick up the car." At last, he was pleased to receive a reasonable offer from "a guy
who wanted to rebuild [the car]". However, on the day of the meet up, something didn't
feel right. As he explained, "[The buyer] told me he couldn't make it last minute, and that
his brother was coming to pick up the car." The sudden change of plans seemed like a
prelude to fraudulent exchange: "I thought this was some kind of play," he recalled.
Fortunately, his concerns were not warranted, as the buyer's story "turned out to be
legitimate, and [the buyer's] brother gave me cash and took the car." Unlike seasoned
sellers, he did not have a set of tactics for navigating the market, and he consequently
struggled through the commercial process. Indeed, without the know-how of more
experienced vendors, this rookie came close to entering a potentially fraudulent
exchange. Still, the local market remained attractive to him. When I checked up on the
New Jersey vendor a few weeks after our interview, he had just posted another car for
117
sale, although he had not yet received any offers. "It's a more expensive car," he told me,
"so I didn't expect it to sell too quick [sic]."
In these cases, Craigslist vendors take steps to control the commercial process, but
in ways oriented toward their goal of selling goods. These are not purely economic steps
but ones related to website infrastructure, platform culture, and state and commercial
institutions. This means that Craigslist is not a self-contained sphere but an embedded
arena of economic activity, as vendors marshal non-economic factors in realizing their
economic motives. This also means that Craigslist is not a self-regulating market, but one
that relies on the de facto regulatory controls of motivated users.
Embedded Economies
On internet markets, vendors take steps to control the commercial process, but in
ways that reflect their goal of selling goods. These steps are de facto regulatory controls
that are designed to facilitate fair exchange. Despite being oriented toward an economic
goal, these steps implicate website infrastructure, platform culture, and state and
commercial institutions. This matters, because internet markets are supposed to be self-
regulating and self-contained, yet vendors draw on factors that are external to electronic
commerce in order to manage online exchange. Merchant labor on internet markets is not
a purely economic affair but one that significantly involves non-economic factors. These
factors are not mere backdrops of exchange but important touch-stones in selling
strategies of commercial control. Even as business venues, internet markets are
embedded spheres of economic activity that are infrastructural, cultural, and institutional.
118
It is important to underline the role of infrastructures, cultures, and institutions in
merchant labor on internet markets, because accounts of the digital economy and
accounts of digital labor tend to focus on the economic dimension of internet activity.
These accounts help us understand how economic value is distributed and produced on
the internet; but they do less to shed light on the role of infrastructural, cultural, and
institutional factors in the digital economy and in digital labor. To be sure, such factors
appear in these accounts, but they are more often treated as background conditions and
less often treated as significant touchstones of user activity. Cyberlibertarianism takes
this treatment one step further by positioning internet platforms as island of economic
activity — self-regulating, self-contained, and self-sustaining. Once again, the
assumptions of cyberlibertarianism are not far-off fantasies but radicalized versions of
conventional thought patterns. In other words, where accounts of the digital economy and
digital labor position infrastructures, cultures, and institutions in the background of value
production, cyberlibertarianism removes these factors from the scene entirely — save for
the infrastructural protocols that make cultures and institutions irrelevant.
Internet markets are privileged sites for the study of infrastructures, cultures, and
institutions in the context of digital labor and electronic commerce. This is because
external factors become vitally important when vendors aim to control the commercial
process and execute profitable sales in the absence conventional regulations. Internet
markets represent a kind of ground-zero of digital exchange, where market actors freely
encounter one another with few commercial safeguards. Without the trappings of
conventional electronic commerce, internet markets visibly show us how digital workers
leverage the scattered resources available to them. The importance of these resources as
119
touchstones of merchant labor complicates the view of electronic commerce as purely
economic. Although debates over digital value production are beyond the scope of this
research, it is worth noting that the value produced by internet vendors is connected to
infrastructures, cultures, and institutions that appear external to digital labor.
Paradoxically, by removing the trappings of conventional regulations and by isolating
vendor practices as conceptual objects, internet markets end up revealing the deeply
embedded qualities of digital labor in the context of electronic commerce.
120
CHAPTER 4
THINGS FOR SALE ON THE INTERNET
CIRCULATING INSTITUTIONAL OBJECTS
Institutions also aim to control the commercial process on internet markets.
According to cyberlibertarianism, internet markets should be self-contained spheres of
economic activity, beyond the messy realities of institutions. Yet state, commercial, and
domestic institutions figure centrally in the circulation of objects on internet markets. In
particular, institutions take steps to control the circulation of contraband, antique, and
secondhand objects. These objects often enter digital exchange in exceptional moments
when institutional control falls short, changes orientation, or exceeds expectation. These
moments include: overflows, gaps, and bottlenecks in commercial institutions;
byproducts in domestic institutions; and lacunae in state institutions. Contraband, in
particular, exemplifies the role of institutional "failure" in digital exchange: because state
institutions are tasked with the management of contraband, every act of contraband
exchange is effectively a failure of institutional regulation. Far from being a white whale
of the dark web, contraband circulates across Craigslist, eBay, and Silk Road alike. Every
internet market is thus a black market — a final plot twist in our drama of exchange and
an object lesson in digital commerce. That internet markets circulate contraband
demonstrates the link between the anomalies of institutional regulation and the
circulation of material goods.
Market Objects
121
Commodities are widely studied conceptual objects. In his classical formulation,
Karl Marx defines commodities as privately owned goods exchanged in the capitalist
marketplace for a profit, an exchange that alters the social perception of goods.198 Walter
Benjamin follows this line of thinking in his analysis of consumer systems, which
similarly transform the perceptual status of commodities.199 Since Benjamin's midcentury
work, consumer culture has been widely studied as a social, psychological, economic,
political, and historical phenomenon.200 Studies of digital consumer culture generally
follow topical precedent and take a discursive approach to the question of online
consumption.201 Theorists of eBay, for instance, argue that the expansive collection of
objects online is alternately exhilarating and overwhelming to users.202 A recent line of
thought, sometimes referred to as materialist media studies, has moved from a symbolic
conception of commodities to an infrastructural one.203 Here, consumer objects are not
198 Karl Marx, Capital, Volume I (New York: Penguin Books, 1976). 199 Walter Benjamin, The Arcades Project (Cambridge: Harvard Univeristy Press, 1982). 200 Daniel Horowitz, The Anxieties of Influence: Critiques of American Consumer Culture (Amherst: University of Massachusetts Press, 2005). Julie Schor and Douglas B. Holt, eds., The Consumer Society Reader (New York: The New Press, 2000). Lawrence B. Gluckman, ed., Consumer Society in American History (Ithaca: Cornell University Press, 1999). Thorstein Veblen, The Theory of the Leisure Class (Boston: Houghton Mifflin, 1973). Pierre Bourdieu, Distinction: A Social Critique of the Judgement of Taste, trans. Richard Nice (Cambridge: Harvard University Press, 1984). Jean Baurdillard, The System of Objects, trans. James Benedict (London: Verso, 1968). Jennifer R. Scanlon, ed., The Gender and Consumer Culture Reader (New York: NYU Press, 2000). 201 Fortuitously for the present analysis, eBay is a mainstay in studies of digital consumer culture, many of which treat objects as forms of discourse. Michele White, Buy It Now: Lessons from eBay (Durham: Duke University Press). Ken Hills et al., eds. Everyday eBay: Culture, Collecting, and Desire (New York: Routledge, 2006). 202 Janice Denegri-Knott and Mike Molesworth, "'Love It. Buy It. Sell It.' Consumer Desire and the Social Drama of eBay," Journal of Consumer Culture 10, no. 1 (2010): 56-79. 203 Jeremy Packer and Steven B. Crofts Wiley, "Strategies for Materializing Communication," Communication and Critical/Cultural Studies 9, no. 1 (2012): 107-113, http://dx.doi.org/10.1080/14791420.2011.652487.
122
only signifiers of symbolic meaning but fluid phenomena that require systems of
maintenance and preservation.204 Studies of the internet of things take an infrastructural
approach by considering the vast systems of production, distribution, and maintenance
that make possible smart objects.205 The discursive tradition and the infrastructural
tradition are two key paradigms for understanding the circulation of commodities.
Contraband, antique, and secondhand goods are widely available on the internet.
A brief survey of their presence across the web will help us understand their unique
position within internet markets. The early internet featured several prominent drug
forums and marketplaces.206 At some point in the early to mid-2000s, users began to
populate Craigslist with drug advertisements, although this became decreasingly common
as Craigslist deleted its Erotic Services section, then its Adult Services Section, and, most
recently, its Personals Section.207 Drug distribution on the dark web began with Silk Road
204 Trevor Pinch, "Technology and Institutions: Living in a Material World," Theory and Society 37 (2008): 461-483, doi 10.1007/s11186-008-9069-x.m 205 Samuel Greenhard, The Internet of Things (Cambridge: MIT Press, 2015). Klaus Schwab, The Fourth Industrial Revolution (New York: Penguin Group, 2017). Nitesh Dhanjani, Abusing the Internet of Things (Sebastopol, CA: O'Reilly Media, 2015). 206 Edward Murguía et al., eds., Real Drugs in a Virtual World: Drug Discourse and Community Online (Lanham, MD: Lexington Books, 2007). Sarah N. Gatson, "Illegal Behavior and Legal Speech: Internet Communities' Discourse About Drug Use," in Edward Murguía et al., eds., Real Drugs in a Virtual World: Drug Discourse and Community Online (Lanham, MD: Lexington Books, 2007): 135-160. Beatriz Caiuby Labate and Clancy Cavnar, eds., Plant Medicines, Healing, and Psychedelic Science: Cultural Perspectives (New York: Springer, 2018). Mike Sugarman, "The World of Psychedelic Mushrooms Online," Hopes & Fears, March 17, 2017, http://www.hopesandfears.com/hopes/now/drugs/168731-psilocybin-mushrooms-and-the-rise-of-authentic-counter-cultures-on-the-internet. 207 By 2008, the popular press was regularly reporting on illegal Craigslist activity, including drug traffic and sex work. Note that many of the police reports mentioned are the results of independent investigations, rather than habitual practices, within law enforcement agencies. Patrice O'Shaughnessy, "Drug Dealers Doing Roaring Trade on Craigslist, Say City Investigators," New York Daily News, November 16, 2008, http://www.nydailynews.com/news/crime/drug-dealers-roaring-trade-craigslist-city-
123
in 2013.208 Weapon markets on the dark web began to thrive once the alternative
communication network grew in popularity.209 Less expected than the existence of a
weapons market on the dark web is the existence of a weapons market on Craigslist and
eBay. A 2008 study by the United States Governmental Accountability Office discovered
troves of restricted military equipment on the sites, including body armor vests and
nuclear chemical gear.210
Antiques were among the first objects to be widely circulated online. The history
of eBay, in particular, is a history of antique exchange: dealers in collectibles populated
investigators-article-1.338953. Bruce Lambert, "As Prostitutes Turn to Craigslist, Law Takes Notice," The New York Times, September 5, 2007, https://www.nytimes.com/2007/09/05/nyregion/05craigslist. Gary Klein, "Fake Drugs Lead to Arrests; 'Cocaine' Dealer Sold Cops Baking Soda," Marin Independent Journal, March 10, 2007, http://www.marinij.com/article/zz/20070310/NEWS/703109975. Duff Wilson and Serge F. Kovaleski, "Olympic Booster Tied to Clinic in Drug Inquiry," The New York Times, March 7, 2007, https://www.nytimes.com/2007/03/07/sports/othersports/07doping. Alan Duke, "Official: Craigslist to Replace 'Blatant Internet Brothel,'" CNN, May 13, 2009, http://www.cnn.com/2009/TECH/05/13/craigslist.sex.ads. Claire Cain Miller, "Craigslist Says It Has Shut Its Section for Sex Ads," The New York Times, September 15, 2010, https://www.nytimes.com/2010/09/16/business/16craigslist. In March 2018, the United States government passed into law an exception to Section 230 of the Communications Decency Act. Under the new legislation — Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA) — internet platforms may be held legally liable for "knowingly assisting, supporting, or facilitating" sex trafficking. H.R. 1865 — 115th Congress: Allow States and Victims to Fight Online Sex Trafficking Act of 2017, https://www.govtrack.us/congress/bills/115/hr1865. 208 European Monitoring Centre for Drugs and Drug Addiction, "The Internet and Drug Markets," EMCDDA Insight 21 (Luxembourg: Publications Office of the European Union). 209 Giacoma Persi Paoli et al., "Behind the Curtain: The Illict Trade of Firearms, Explosives, and Ammunition on the Dark Web", RAND Corporation (Santa Monica: RAND Corporation, 2017). 210 United States Governmental Accountability Office, "Internet Sales: Undercover Purchases on eBay and Craigslist Reveal a Market for Sensitive and Stolen U.S. Military Items," Testimony Before the Subcommittee on National Security and Foreign Affairs, Committee on Oversight and Government Reform, House of Representatives, April 10, 2008.
124
the auction site in the late 1990s, furnishing a baseline market in objects that helped the
platform reach a critical mass of users in the early days of the internet.211 Bringing the
antique market online was a boom for the collectibles industry, as well as a boom for the
illicit antiquities industry, an underground market in cultural relics, dominated by the
hyper-wealthy.212 By contrast, the online market in used goods is one dominated by the
middle and lower classes.213 Secondhand economies tend to emerge when the lifespan of
objects is high and the costs of conducting exchange is low.214 The secondhand market is
part of a broader landscape of used good exchange: yard sales, car-boot sales, and flea
markets, as well as clothing swaps, trash pickings, and other micro-economies sans
currency.215 In these cases, contraband, antique, and secondhand objects circulate in the
margins of technological and economic systems.
Object-Oriented Economy
Contrary to the cyberlibertarian vision of a self-contained internet platform, and
against the grain of the discursive tradition and the infrastructural tradition in commodity
studies, institutions play key roles in the circulation of objects on internet markets. In
211 Adam Cohen, The Perfect Store: Inside eBay (Boston: Little Brown and Company, 2003. See the discussion of eBay's history in Appendix VI. 212 Simon Mackenzie, "Illict Deals in Cultural Objects as Crimes of the Powerful," Crime, Law and Social Change 56 (2011): 133-153, 10.1007/s10611-011-9317-2. 213 Gretchen M. Herrmann, "Haggling Spoken Here: Gender, Class, and Style in US Garage Sale Bargaining," Journal of Popular Culture 38, no. 1 (2004): 55-81. 214 Valerie M. Thomas, "Demand and Dematerialization Impacts in Second-Hand Markets," Journal of Industrial Ecology 7, no. 2 (2003): 65-78, https://doi.org/10.1162/108819803322564352. 215 Colin C. Williams and Christopher Paddock, "Reconciling Economic and Cultural Explanations for Participation in Alternative Consumption Spaces," Geografiska Annaler 85, no. 3 (2003): 137-148.
125
particular, state, commercial, and domestic institutions aim (and sometimes fail) to
control the movement of objects within their jurisdiction. Contraband objects enter digital
exchange when the state fails to regulate them through laws and law enforcement bodies
— a failure related to jurisdictional structures and resource allocations. The online
circulation of antiques follows from gaps and overflows in commercial antique
institutions, which allow objects to circulate on the internet, but on institutional terms.
Bottlenecks in commercial retail institutions and overflows in domestic institutions
underwrite the entrance of secondhand objects into internet markets. Secondhand goods
alternately represent the failure of retail institutions to dominate the exchange of goods
within their purview, and the ability of domestic institutions to control the after-life of
household goods. These institutions variously attempt to control the commercial process,
making them yet another player in the regulatory drama of internet markets. In what
follows, we'll consider the objects in escalating order of platform presence: first, antiques
on eBay; then, secondhand goods on Craigslist and eBay; and, finally, contraband on Silk
Road, Craigslist, and eBay. Contraband will be the main focus of the chapter, given its
empirical and demonstrative presence across the internet markets.
Act One: Antique Objects
On eBay, the circulation of antiques follows from overflows and gaps in
commercial antique institutions. Objects qualify as antiques by virtue of their historical
production origins. In antique culture, the production origin of an object — where, when,
and by whom it was produced — is central to the object's qualification and valuation as
126
an antique.216 Customs authorities have regulatory jurisdiction over the movement of
antiques, and they determine which objects should not be removed from their production
origins. This is because antiques have a long history of being illegally transported.217
Antiques are also subject to regulation in the form of appraisals by trade associations.
eBay is part of a vast economic landscape in antique goods — retail venues, auction
houses, yard sales, and flea markets — its position within the antique landscape is
connected to its regulatory dynamics.218 On the one hand, eBay is more regulated than
yard sales and flea markets: vendor send auction items through the postal system, making
those items subject to customs regulation. On the other hand, eBay is less regulated than
auction houses and estate sale organizations, which employ in-house appraisers to ensure
the legitimacy and legality of antique goods. eBay thus occupies a middle ground in the
antique landscape between casual sales and formal institutions.
The circulation of antiques on eBay is related to the platform's middle ground
position. Let's consider two antiques that recently circulated on eBay. An antique plate
from eighteenth-century China attracted an opening bid of $25 in early 2018. When I
216 Leon Rosenstein, Antiques: The History of an Idea (Ithaca: Cornell University Press, 2008). 217 For instance, Lord Elgin stole and resold Athenian artifacts during the nineteenth century, and John Paul Getty purchased looted Italian art in the 1980s. Erin L. Thompson, Possession: The Curious History of Private Collectors from Antiquity to the Present (New Haven: Yale University Press, 2016). In a recent example, Hobby Lobby, a retail craft store in the United States, attempted to illegally import thousands of Iraqi relics from the United Arab Emirates and Israel, where, customs authorities determined, they belonged. Capturing the near-human status of objects, the court case was entitled, The United States of America v. Approximately Four Hundred Fifty (450) Ancient Cuneiform Tablets; and Approximately Three Thousand (3,000) Ancient-Clay Bullae. In the US, objects themselves are tried when they are seized by customs officials. 218 Kim Leggett and David Leggett, The Antique Atlas: The Guide to Antiquing America (New York, Rainy Day Publishers, 1997).
127
interviewed the amateur antique dealer who posted the Chinese plate, he explained that
he purchased the item at an antique fair in New Orleans. Drawing on his knowledge of
Chinese history, the dealer reasoned that the plate was worth "about $200, at least $150",
nearly three times what he had paid for it at the city fair, and he hoped to resell the
antique for a profit. However, few buyers at his local flea market in Baton Rouge could
afford or appreciate the antique. Nor were auction houses an appealing option, given their
tendency to buy low and sell high. As he explained, "They "rip you off by telling you [the
antique] is crap and then making a low-ball offer." eBay offered a commercial middle
ground. "If I post it on eBay," he projected, "it'll actually get goods bids. If I try to sell it
here [in Baton Rouge], people will offer me jack shit." Here, the antique circulated
through a gap in the landscape of commercial antique institutions — namely, the middle
ground between the yard sale and the auction house.
The next antique is a product of a prestigious commercial institution. Where the
plate seller captures the proficient but amateur vendor, the next seller embodies the
institutional dealer, extending retail business into the online sphere. In 2017, an
established antique house posted for sale an eighteenth-century English cabinet with an
opening bid of $11,000. I spoke to the woman who posted the advertisement — an
antique dealer in her early thirties who works at the affiliated auction house and who
started the bookcase auction after the object failed to sell at the venue's brick-and-mortar
showing room. She described eBay as a "back up plan" for the sale of specialized
antiques, and her decision to post on eBay revolved around an excess of supply.
Following a brief stint in the main gallery of the auction house, the cabinet was "sitting in
storage" and "taking up space" for weeks. This prompted the vendor to advertise the
128
object on eBay in search of an erudite and resourceful buyer from out of town. In this
case, the antique entered eBay through an overflow in the commercial antique institution.
In these cases, commercial antique institutions either forfeited or exerted control
over objects that fell within their purview. Neither yard sales nor auction houses sought
to control the movement of the Chinese plate, and this institutional indifference prompted
the dealer to sell the object on eBay. By contrast, the English cabinet was an object of
institutional control. The antique house placed the object in digital circulation, but on its
own terms — specifically, on the terms that it would sell and help solve an institutional
problem related to storage infrastructure. Here, the antique market played host to the
interplay of institutional indifference and institutional control. Far from self-regulating
and self-contained, eBay implicated institutions, their regulatory drives, and their
infrastructural capacities.
Act Two: Secondhand Objects
Secondhand goods enter Craigslist and eBay through bottlenecks in commercial
institutions and as byproducts of domestic institutions. On Craigslist, furniture, vehicles,
and electronics are major objects of secondhand exchange. These objects are widely
unregulated.219 They are also widely produced, being manufactured by industries oriented
around economies of scale (vehicles and furniture) or planned obsolescence
(electronics).220 Finally, they are widely purchased. Several social trends keep furniture,
219 Automobiles are the obvious exception, as a car deal requires a bill of sales in many states. United States Division of Motor Vehicles, "Bill of Sales Requirement," Selling Your Car, accessed February 4, 2018, https://www.dmv.org/bill-of-sale. 220 Thomas A. Kochan et al., eds., After Lean Production: Evolving Employment Practices in the World Auto Industry (Ithaca: Cornell University Press, 1997). Susan M.
129
vehicles, and electronics in high demand: a residential culture of rapid relocation, an
autocentric national infrastructure, a bike-friendly city infrastructure, and a vast consumer
market in video games, televisions, cell phones, and assorted technological toys.221 These
objects are widely unregulated, widely produced, and widely purchased — factors that
typically grease the wheels of commerce. Yet furniture, vehicles, and electronics pass
through retail bottlenecks once they enter the market. Furniture outlets, car dealerships,
bike shops, and electronics retailers sell these commodities at high price, well above the
cost of manufacture. This commercial gridlock — expansive production, broad demand,
and restricted distribution — is a perfect storm for secondhand markets: there are many
of these goods, there are many potential customers for them, and they are far cheaper to
exchange once they leave the sphere of commercial institutions.
In the interviews I conducted with Craigslist users, many identified the platform
with inexpensive secondhand objects. These objects, they explained, could be bought or
sold at prices that were more reasonable than commercial retail outlets. In buying and
selling furniture on the platform, a Los Angeles woman in her 20's explained that "prices
are more reasonable" compared to retail stores. The high turnover rate of furniture by
individuals could occasionally lead to spectacular deals on secondhand interiors,
Walcott, A Profile of the Furniture Manufacturing Industry (New York: Business Expert Press, 2013). Peter Scott, The Market Makers: Creating Mass Markets for Consumer Durables in Inter-War Britain (New York: Oxford University Press, 2017). Alfred D. Chandler, Jr., Inventing the Electronic Century: The Epic Story of the Consumer Electronics and Computer Industries (Cambridge: Harvard University Press, 2005). 221 Eric Klinenberg, Going Solo: The Extraordinary Rise and Surprising Appeal of Living Alone (New York: Penguin Press, 2012). Christopher W. Wells, Car Country: An Environmental History (Seattle: University of Washington Press, 2012). Jeff Mapes, Pedaling Revolution: How Cyclists Are Changing American Cities (Eugene: Oregon State University Press, 2009). Alfred D. Chandler, Jr., Inventing the Electronic Century.
130
"because people get desperate trying to get rid of things". A three-time car buyer with
whom I spoke likewise preferred the platform over conventional dealerships in light of
major price differentials. "I've witnessed dealerships tend to be more expensive," he
explained, "being that they have to make a profit and pay salaries. And I've found that
dealers are more inclined to hide problems with the vehicle that could cause major
problems." Exchange on Craigslist, according to him, was less profit-oriented and less
opaque than exchange at a car dealership, where institutional factors complicated
commerce and drove up the price of goods. For another user I interviewed, the exchange
of electronics on Craigslist was far more equitable than exchange at an electronics retail
venue. Video game retailers, the user complained, are willing to repurchase secondhand
consoles and games — but at an offensively low price. They will, for example, sell a new
XBox One for $500, purchase a used one for $80, and then resell the used ones for $200.
In these cases, secondhand objects enter Craigslist circulate through bottlenecks in
commercial retail institutions.
On eBay, secondhand goods enter the market as byproducts of domestic
institutions. In the auction market, electronics, clothing, and sporting goods are major
objects of secondhand exchange. Since we already spoke about electronics, we'll focus on
clothing and sporting goods here. Clothing and sporting goods are widely produced and
potentially longevous: they may be maintained over years through proper care.222
Moreover, clothing and sporting goods are household objects that circulate through
222 Leslie Davis Burns et al., The Business of Fashion: Designing, Manufacturing, and Marketing, 5th ed. (New York: Bloomsbury, 2016). Richard A. Lipsey, The Sporting Good Industry: History, Practices, and Products (Jefferson, NC: McFarland & Company, 2006).
131
domestic institutions, or spaces of human development, such familial households and
other institutions of care. In these domestic spheres, care workers are able to maintain the
longevity of clothing and sporting goods by means of domestic labor — the ongoing
work of washing, drying, folding, sorting, and storing goods. Domestic caretakers, who
are overwhelmingly women, maintain the quality of secondhand objects and thus make
them eligible for resale on internet markets. In this way, secondhand objects on eBay
circulate as derivatives of the domestic care system. The practices of human
development, performed by women and other caretakers, underwrite the afterlife of
consumer objects. Often, this is unintentional: caretakes maintain objects within the
proximate context of domestic institutions, and this long-term care ends up making these
objects eligible for resale.
I interviewed several women who have used eBay to sell clothing and sporting
equipment that their children no longer needed. A California woman began to sell her
daughter's old clothing on the platform in order to clear the house for an upcoming move.
She described the collection as "years of clothes", "nice stuff" that was "basically
collecting dust". After selling "a ton of dresses and shirts", plus "all of the purses" that
she had posted, she took down the remaining advertisements and gave the unsold goods
to charity. Another woman with whom I spoke sold used sporting equipment out of
which her sons had grown: "bats, helmets, cleats, you name it". During our interview, she
reflected on the amount of object turnover within her family. "Everybody needs
something," she stated, referring to her husband and sons, "and then a year later forget
[sic] about it." When a mother of five, who I interviewed, became an empty nester, she
and her husband decided to renovate their basement, which had served as storage space
132
for domestic detritus. The pair ended up making "several hundred dollars" by selling a
full pair of old golf clubs, "at least a dozen dresses", and other miscellaneous objects. In
such instances, secondhand objects circulate as byproducts of domestic care systems.
Secondhand objects on internet markets are bound up in institutional dynamics.
Commercial retail institutions try but fail to control the exchange of commodities in their
purview. Furniture outlets, car dealerships, bike stores, and video game retailers seek to
dominate the movement of goods that fall within their respective markets, but their
distribution bottlenecks make them unnattractive commercial venues for many
consumers. By exchanging objects outside of these bottlenecks, Craigslist users avoid the
high prices and slick selling tactics of conventional retail institutions. By contrast,
domestic institutions effectively control the after-life of household goods, even if that
control is unintentional at first. Care work gives secondhand objects a second life,
enabling them move outside of domestic institutions into venues of electronic commerce.
In such cases, merchant labor serves as an extension of domestic labor. Care work not
only makes secondhand objects eligible for resale; but the act of reselling is itself a
means to clean, and thereby maintain, the household. In one fell swoop, domestic care
workers maintain the household and generate revenue for the domestic institution. In both
cases, institutional dynamics figure centrally in the circulation of objects through internet
markets.
Here, role of institutions within electronic commerce stands in contrast to the
cyberlibertarian vision of a self-contained internet platform. It also exceeds the realms of
discourse and infrastructure, which are considered integral factors in commodity
circulation.
133
Act Three: Contraband
On Craigslist, eBay, and Silk Road, the circulation of contraband follows from
lacunae in state institutions. More than commercial institutions, and far more than
domestic institutions, state institutions vigorously attempt to control the movement of
objects under their jurisidiction. By and large, they succeed in this attempt — enforcing
drug, firearm, and military equipment laws through authoritative state agencies. Yet the
digital exchange of contraband represents a failure by the state to regulate outlawed
objects. Silk Road enjoyed a temporary vacation from institutional control due to the
state's jurisdictional structure, in which only federal agencies have the capacity to execute
technologically sophisticated operations. On Craigslist, the movement of contraband also
follows from the jurisdictional structure of the state, but in a different way: local law
enforcement bodies generally lack the resources necessary to monitor illegal
advertisements and locate offending parties., Contraband on eBay likewise follows from
the jursidictional structure of the state, falling into a middle ground between federal and
local agencies. Loopholes in the state laws also figure into the circulation of contraband
on these platforms. That all three internet markets are also black markets underlines the
relationship between state institutional "failure" and internet market objects: contraband
enters digital circulation in those situated spaces where the state fails to control the
objects in its purview. Let's begin with drugs on Silk Road and Craigslist before turning
to the arms trade on Silk Road, Craigslist, and eBay.
On Silk Road, multiple lacunae in state power made possible the circulation of
drugs on the platform. In a 2013 Senate hearing on Bitcoin, Silk Road, and the dark web,
134
federal law enforcement officials explained the problems associated with the enforcement
of cybercrime.223 The hearing sheds light on the institutional gaps that Silk Road
exploited durings it brief tenture.
First and foremost, the circulation of drugs on Silk Road followed from a jurisdictional
gap related to the infrastructure of the dark web. Conventionally, the United States
government, like many European states, divides jurisdiction over the enforcement of drug
laws between multiple agencies at municipal, state, and federal levels.224 However, in the
case of black markets on the dark web, federal agencies — specifically, the Federal
Bureau of Investigation (FBI), the Drug Enforcement Agency (DEA), and the
Department of Homeland Security (DHS) — are exclusively equipped to enforce drug
laws, because they possess the resources and expertise necessary to shut down dark web
markets.225 Recall that dark web infrastructure is highly anonymous and that federal
agents could only shut down Silk Road after gaining access to its administrative
homepage via the login credentials on Ulbricht's seized laptop.226 Today, federal agencies
continue to shut down dark web markets, but only from the inside, after infiltrating their
root systems.227 Being the original black market on the dark web, Silk Road enjoyed a
223 "Beyond Silk Road: The Potential Risks, Threats, and Promises of Virtual Currencies," Hearing Before the Committee on Homeland Security and Governmental Affairs, United States Senate, 113th Congress, November 18, 2013. 224 Joost van Slobbe, "The Drug Trade on the Deep Web: A Law Enforcement Perspective," in European Monitoring Centre for Drugs and Drug Addiction, "The Internet and Drug Markets." 225 "Beyond Silk Road," 11-25. 226 United States of America v. Ross William Ulbricht, 31 F. Supp. 3d 540 (S.D.N.Y., 2014). See the discussion of the Silk Road takedown in Appendix VI. 227 For instance, in 2017, the United States Department of Defense took down several major black markets on the dark web, including AlphaBay, after infilitrating their root systems. According to reports, the DOJ waited several weeks between infriltration and shut-down in order to collect information on users. Martin Kaste, "Justice Department
135
relatively long tenure before being taken down, in the wake of a three-year federal
investigation.228 Because only federal agencies were equipped to enforce drug laws on
the platform, and because that enforcement took years to enact, drugs on Silk Road
circulated through a lacuna in state power that was jurisdictional and transitory in nature
— on the one hand, the absence of non-federal agencies who could typically enforce drug
laws, and, on the other hand, the temporal delay in looming federal enforcement.
Silk Road took additional steps to evade state power while conducting black
market exchange on the platform. In a second lacuna, drugs circulated through a digital
cryptocurrency designed to dodge state power. Unlike interpersonal drug exchange, drug
transactions on Silk Road were technical processes with inevitable digital trails. Even as
the black market was briefly immune to state takedown, individual merchants could still
be identified and prosecuted through their financial dealings. Silk Road merchants
accordingly conducted commerce in Bitcoin, a digital cryptocurrency that supports
verifiable and anonymous transactions without a centralized third party.229 Bitcoin may
be exchanged electronically between parties and without the direct involvement of banks
or states, as the digital "wallets" that hold Bitcoin are currently not under the regulatory
purview of either institution.230 Bitcoin may be sent over the internet with relative ease
Announces Seizure of Dark Web Marketplace", NPR, July 20, 2017, https://www.npr.org/2017/07/20/538370711/justice-department-announces-seizure-of-dark-web-marketplace. 228 United States of America v. Ross William Ulbricht. Federal agents testified to the length of the investigation during Ubricht's federal trial. 229 "Beyond Silk Road." 230 Of course, the popular image of Bitcoin as a rogue or anti-institutional technology is fundamentally flawed, insofar as financial institutions and elite capitalists control a significant portion of Bitcoin trade. Further, it is likely that the United State Securities and Exchange Commission (SEC) will classify Bitcoin as a security, making it necessary for Bitcoin holders to claim their coins as assets during tax filings.
136
and stored in a digital wallet with relative anonymity, making the currency attractive to
those looking to evade state surveillance online. Beyond the reach of the state and
between the parties involved, Bitcoin allowed Silk Road drugs to be exchanged outside
the purview of state records and state surveillance. Covert delivery practices (discussed at
length in chapter 3) also allowed drugs to be exchanged without detection by the state.
Silk Road drugs were often delivered through the postal system, which, according to
vendors on the discussion board, tended to examine the contents of exchange less often
than private couriers. In order to evade detection by postal authorities, vendors
camouflaged drugs in the mail by padding envelopes, using discreet boxes, and
concealing items inside a variety of containers meant to distract or deceive: tampon
boxes, potato chips, and candy wrappers.231 The relatively small size of controlled
substances made covert shipment a possibility. Here, state postal authorities fail to
control the movement of contraband within their purview.
On Craigslist, drugs circulate through lacunae in state power related to the
jurisdictional structure of law enforcement. Thomas Dart, the former sheriff of Cook
County in Illinois, explained the jurisdictional problem of illegal activity on Craigslist
when he filed an unsuccesful lawsuit against the company for facilitating prostitution.232
His statements in court help us understand the allocation of state resources at the level of
231 See the discussion of postal delivery strategies in chapter 2 and 3. 232 Thomas Dart, Sherriff of Cook County v. craigslist, Inc., 665 F. Supp. 2d 961 (E.D. Ill. 2009). Although the court leaned on section 230 of the Communications Decency Act, it was in response to this legal case that Craigslist altered, and then shuttered, its Erotic Services section. The problem of digital law enforcement has also been taken up in studies of online sex trafficking. Abby Peter, "Policing the Virtual Red Light District: A Legislative Solution to the Problems of Internet Prostitution and Sex Trafficking," Brooklyn Law Review 77 (2012): 823-859. See also the discussion of Craigslist litigation in chapter 1.
137
local law enforcement. Municipal law enforcement agenices typically possess jurisdiction
over local drug exchange.233 However, because these agencies rarely have the resources
to track down internet users, and because federal agencies generally focus on the
takedown of large black markets, drug traffic on Craigslist occurs in a jurisdictional gray
zone — too large of a task for local authorities and too little of a problem for federal
ones.234 That Craigslist is willing to provide law enforcement agencies with whatever
information they require matters little when those agencies lack the resources necessary
to track down actors involved in online contraband exchange. The regulation of
contraband by the state becomes less vigorous on local level, due to the resource
limitations of municipal law enforcement agencies.
Craigslist actors take additional steps to protect themselves from state power.
After all, even though local law enforcement agencies do not meticulously survey
Craigslist, these agencies still operate in the places where Craigslist traders conduct
illegal exchange. Local commerce means cash exchange: the technical trappings of
Bitcoin and Paypal are unnecessary during face-to-face transactions, and cash is the
preferred medium of exchange for criminal actors broadly, because cash is supremely
easy to launder.235 Local commerce also means that temporary mobile phone ("burners")
and peer-to-peer messaging services play roles in the economy of Craigslist contraband
exchange. Trading partners must arrange the details of the exchange and the interpersonal
encounter in real time, and these temporary and encrypted media allow merchants to
evade state power in so doing. Here, the evasion of state power informs the transactional
233 "Beyond Silk Road," 11-25. 234 Thomas Dart, Sherriff of Cook County v. craigslist, Inc, 44-57. 235 "Beyond Silk Road," 16-25
138
and communicative dimensions of contraband. Finally, because Craigslist formally
prohibits the exchange of illegal objects on the platform,236 drug vendors on the platform
use obfuscated text, colloquial terms, and linguistic cyphers to evade platform filters.
Coded terms, vague and ever-changing, are able to evade the site's automated protocol,
formalized and static. Craigslist drugs consequently circulate through loopholes in digital
protocols, in addition to gaps in state institutional control.
Lacunae in state power also make possible the digital exchange of weapons on
internet markets. Despite the wide production and the minimal regulation of guns in the
United States,237 the arms trade on Silk Road faced significant regulatory challenge.
Firearms law in the United States requires a federal license to ship firearms across state
lines, one of the few regulations by which gun retailers on the internet must abide.238
Unlike drugs, weapons cannot be hidden in candy wrappers and shipped in secret. Yet a
condition in firearms law permits gun parts or "components" to be shipped without a
license.239 Consequently, Silk Road vendors broke down weapons into their constituent
parts, and shipped each part separately. Buyers were responsible for assembling the
weapon on their own, a task covered in gun tutorials on firearm websites.240 This postal
236 Craigslist, "Prohibited," About, accessed January 22, 2018, https://www.craigslist.org/about/prohibited.html. 237 The Firearms Industry Trade Association, "Firearms and Ammunition Industry Economic Impact 2018," Government Relations, https://www.nssf.org/government-relations/impact. Audrey Carlson and Sahil Chinoy, "How to Buy a Gun in 15 Countries," The New York Times, March 2, 2018. 238 Mayors Against Illegal Guns, "Trace the Guns." 239 United States Postal Service, "Mailability", Firearms, Restricted Matter, Hazardous, Restricted, and Perishable Mail, accessed January 20, 2018, https://pe.usps.com/text/ pub52/pub52c4_009. 240 Youtube also featured gun construction videos during Silk Road's tenure, although they began to restrict gun-related content in the 2017 and 2018. Valentina Palladino, "Youtube Expands Firearms Restrictions, More Gun Videos to Be Banned," Ars
139
hack is essentially a commercial version of packet switching, the computing process by
which information is broken down into constituent bits for delivery and then reassembled
upon arrival. Where the computational process exploits the small size of bits for speedy
delivery through a digital network, the delivery method exploits the legal status of
weapons parts for permissible delivery through a postal network. Drugs circulated
through this exception in firearms law — a state regulation designed to control the
movement of guns.
Where the arms trade on Silk Road relied on a postal loophole in firearm law, the
arms trade on Craigslist relies on an the interpersonal loophole in firearms law — that
weapons may be exchanged freely between private citizens.241 Firearms on Craigslist
circulate through the regulatory exemptions of interpersonal weapon exchange, an
abeyance in the state enforcement of firearms law. Further, because Craigslist is a local
market that relies on face-to-face encounters, users of the platform are exempt from
postal regulations, both the legal permits of online gun distributors and the obfuscation
strategies of Craigslist merchants. Craigs formally prohibits weapons, just as it prohibits
drugs and other illegal items.242 Indeed, weaponry is the first group of items on the
platform's list of prohibited objects, suggesting that the platform recognizes the existence
of an arms trade on its site. In its Prohibited policy, Craigslist forbids the exchange
"weapons; firearms/guns and components; BB/pellet, stun, and spear guns; etc." and
Technica, March 22, 2018, https://arstechnica.com/information-technology/2018/03/youtube-to-crack-down-harder-on-videos-about-building-buying-firearms. 241 Wintemute, Background Checks for Firearm Transfers. 242 Craigslist, "Prohibited."
140
"ammunition, clips, cartridges, reloading materials, gunpowder, fireworks, explosives".243
Yet firearms advertisements appear regularly on the platform, often without textual
obfuscation, in places such as New York, Texas, and Georgia. The explanatory logic of
firearms circulation finds a limit in the platform's black box filter. It is possible that the
filter errs on the side of laissez faire and that some weapon advertisements are indeed
taken down. What is evident, however, is the presence of an arms trade that evades state
and platform regulations alike.
On eBay, weapons circulate through a different lacuna in state power. eBay
mainly features auxiliary protective gear and defense equipment. The items that qualify
as contraband are those that the military produces for internal use only. According to
2008 report by United States Governmental Accountability Office, eBay circulates a
variety of sensitive military equipment: F-14 antennas, biological chemical gear, and
body armor plates, some of which are in demand by enemies of the US.244 This is
equipment that is regulated by the military, but that escapes the military's system of
object control, presumably through theft and mishandling. (However informative, the
GAO survey does not detail the internal military policies surrounding the regulation of
sensitive defense equipment.) Although the report is dated, restricted military equipment
continues to appear on the platform, contrary to eBay's formal ban on illegal objects.245
Following black market logic, military gear is often more valuable than firearms,
precisely because firearms are so widely produced. For instance, a 2017 auction for a
243 Craigslist, "Prohibited." 244 United States Governmental Accountability Office, "Internet Sales." 245 eBay, "Prohibited and Restricted Items," Help, accessed January 16, 2018. https://www.ebay.com/help/policies/prohibited-restricted-items/prohibited-restricted-items?id=4207.
141
Kevlar helmet directly indicates its exclusive use in the military. As on Craigslist, the
platform's black box filter prevents a clear expanation of this state of affairs. It is possible
that the filter is more permissive than restrictive in determining what objects are allowed
to circulate in the auction market. Regardless, these pieces defense equipment circulate
through a breakdown in the state regulation of objects— in particular, the military
regulation of objects.
In all of these cases, the circulation contraband on internet markets follows from a
failure of state institutions to regulate the objects that they outlaw. This failure is the
exception, not the rule, as the state conventionally wields its legal authority to effectively
prevent the circulation of contraband. Platforms likely take down more contraband than
they passively allow to circulate, cooperating with law enforcement authorities when
necessary. Yet state institutions feature jurisdictional structures, resource limitations, and
legal exceptions that make possible the online circulation of contraband. Contrary to the
cyberlibertarian vision of a self-regulating and self-contained internet platform, the
regulatory endeavors of state institutions figure centrally in the digital exchange of
contraband.
Whose Objects?
Cyberlibertarianism casts internet markets as self-regulating and self-contained
spheres of digital activity, discrete zones of electronic commerce that are immune to
regulatory concerns and external interferences. Central to the cyberlibertarian vision of an
internet platform in perpetual equilibrium is the absence of institutions — those bugbears
of libertarianism and cybernetics that are said to undermine the integrity of economic and
142
technological systems. Craigslist, eBay, and Silk Road variously subscribe to this
cyberlibertarian vision, even as they cooperate with state institutions and operate
according to corporate structures. The dream of fully automated commerce is also a
dream of commerce beyond institutional involvement. Yet state, commercial, and
domestic institutions figure centrally in the circulation of objects on internet markets.
These institutions take steps to control the movement of goods within their purview.
These steps range in character from vigorous to casual, but they make institutions key
players in the regulatory drama of internet markets.
Contraband is the most conspicuous case of institutional and regulatory drama, as
states invest significant resources in the regulation of contraband yet fail to
comprehensively undercut the movement of outlawed goods. In such cases, black market
actors not only exploit the circumstantial absence of institutional control but take
additional steps to evade state detection. The interplay of institutional control, actor
strategy, and market activity in the context of contraband exchange exemplifies the
regulatory drama of internet markets. That contraband circulates across Craigslist, eBay,
and Silk Road alike demonstrates the relationship between electronic commerce and
regulatory exception: objects enter the free digital market in moments when institutional
control falls short, changes orientation, or exceeds expectation. Anomalies in institutional
regulation helps underwrite objects in digital circulation. A strange day for one is a
typical day for the other.
The digital free market shows us how institutions enter into the exchange process
through the provision of market objects. This is important, because internet markets are
designed to make regulations and institutions obsolete. If institutions make oblique
143
appearances in the very place where they are supposed to be irrelevant, then it is likely
that electronic commerce will always be connected to institutions in some fashion. The
role of institutions in digital exchange may be obvious in the context of postal delivery
systems, which help transport the objects sold online; but it is less obvious in the context
of object provision, as institutions help furnish the goods that make digital exchange
possible. In addition to discourses and infrastructures, then, institutions can play
important roles in the circulation of commodities on the internet. With material interests
and regulatory powers, institutions are not neutral backdrops but motivated actors in
digital exchange. As we saw in the last two chapters, users and platforms sometimes rely
on institutions to control the commercial process, as when Craigslist merchants meet in
front of local police stations or when eBay tailors its policies to corporate structures. But
this is not all: institutions themselves enter the theater of electronic commerce and exert
regulatory control over the movement of objects. The digital free market also show us
how institutional regulatory control can break down, alter course, or surpass expectation.
On internet markets, institutions can fail to realize their regulatory goals, shift their
regulatory strategies, or perform regulatory functions without prior intention. This helps
us understand how institutions work in the context of electronic commerce — and how
they fail.
144
CONCLUSION
BEYOND CYBERLIBERTARIANISM
According to cyberlibertarianism, internet markets should be self-regulating and
self-contained spheres of digital economic activity. Yet exchange platforms are scenes of
regulatory drama, as actors of all stripes — individual, institutional, casual, and dedicated
— take steps to control the commercial process and alleviate concerns of fraudulent
exchange. Automated protocols, designed to replace regulations, end up being the very
means by which economic conflict occurs. Website infrastructure and platform culture,
figured by cyberlibertarianism as neutral backdrops of exchange, end up being vital
resources for actors intent on controlling the commercial process. State, commercial, and
domestic institutions, cast as irrelevant to an autonomous internet by the digital ideology,
end up furnishing many of the objects involved in internet exchange. Far from the
cyberlibertarian vision of digital exchange beyond regulations and institutions, internet
markets are embedded spheres of electronic commerce, which implicate control
mechanisms and external factors in their core operations. My critique of
cyberlibertarianism, rooted in the dynamics of internet markets, has broader
consequences for how we understand the digital ideology, the dynamics of electronic
commerce, and the role of regulations and institutions on the internet.
As venues that actualize cyberlibertarian principles, internet markets are ideal
case studies of the digital ideology. The actualization of cyberlibertarian principles is
important, because advocates of the digital ideology are wont to complain that
regulations prevent the emergence of an internet equilibrium. Karl Polanyi noted this
tendency in his midcentury critique of free market libertarianism, which always insists
145
that its theory will be realized, once the next regulation is removed (and the next, and the
next).246 By meeting the laissez faire conditions demanded by cyberlibertarianism,
internet markets are experiments in the digital ideology that decisively disprove its
predictions. They foil the cyberlibertarian excuse that internet regulations are standing in
the way of an autonomous digital sphere. If the predictions of cyberlibertarianism cannot
be realized in the free digital market, then they likely cannot be realized anywhere. This
makes internet markets valuable objects of study: they uniquely actualize the tenets of
cyberlibertarianism and, in so doing, demonstrate significant flaws in the influential
paradigm. Moving forward, they may serve as a counterpoint to the claim that an internet
equilibrium is just one regulatory removal away.
Nearly two decades ago, Lawrence Lessig penned a classic work on internet
regulation. In Code and Other Laws of Cyberspace, Lessig critiqued the idea that
conventional regulations could not touch the internet.247 Several years later, in the preface
to the second edition of Code, Lessig noted that he had originally set out to evaluate the
fashionable notion that "cyberspace was beyond the reach of real-space regulation"248.
Popular ideas about the internet have considerably changed since the original publication
of Code. Today, one popular idea is that regulations ought not touch the internet — an
idea that I characterize as cyberlibertarianism. Central to this ideological imperative is the
rejection of regulations and institutions on the internet. In this line of thought, internet
activity, including commercial activity, is fundamentally cooperative, making regulations
246 Karl Polanyi, The Great Transformation: The Political and Economic Origins of Our Time (Boston: Beacon Press, 1944). 247 Lawrence Lessig, Code and Other Laws of Cyberspace (New York: Basic Book, 1999/2006). 248 Lessig, Code and Other Laws of Cyberspace, ix.
146
effectively unnecessary, and making institutions largely obsolete. Peter Thiel's vision of a
libertarian island nation is a nice material analog to the vision of internet platforms as
self-regulating and self-contained spheres of digital activity.
Still, cyberlibertarianism is changing. For instance, internet platforms have begun
to install increasingly sophisticated systems of content moderation.249 Laissez faire might
be the company line, but the company practice is quite different. This recalls a paradox of
cyberlibertarianism, discussed in the introduction: internet platforms insist on immunity
from state regulations, even as they cooperate with state institutions in various ways. The
state is also whistling a different tune when it comes to platform liability. Recent
legislation introduced an exception to Section 230 of the Communications Decency Act
by eliminating platform immunity in cases of human trafficking.250 This is the very first
crack in the legal edifice of Section 230, upon which platforms have relied to defend their
autonomy against state interference. Mark Zuckerberg's 2018 Congressional testimony
captures some the changes in cyberlibertarianism as they unfold within states and
platforms. Although the questions posed by members of Congress were far from
sophisticated, the governmental demand that Facebook account for its mismanagement of
data denotes an institutional willingness to, at the very least, have a conversation about
internet regulation, institutional oversight, and platform responsibility. Zuckerberg's
token response to the problem of regulation was not self-regulation by users (as it was in
2010) but self-regulation by automation — specifically, artificial intelligence tools
249 Tarleton Gillespie, Custodians of the Internet (New Haven: Yale University Press, 2018). 250 H.R. 1865 — 115th Congress: Allow States and Victims to Fight Online Sex Trafficking Act of 2017. Retrieved from https://www.govtrack.us/congress/bills/115/hr1865.
147
designed to monitor and analyze content. This answer, which I discuss in more detail
below, suggests an active approach to platform regulation that does not simply rest on the
combined decisions of users. In this respect, cyberlibertarianism is coming to feature
another paradox: platforms insist that they are basically self-regulating, but they install
regulatory controls nonetheless. As with the paradox of the state, platforms want to be
seen as self-regulating and get credit for installing regulations. "We don't need
regulations," the new company line seems to run, "but we're going to install them
anyway."
If cyberlibertarianism overlooks the role of regulations and institutions on the
internet, then actors outside of the technology industry should insist on the reality of
regulations and institutions in order to create a fair and cooperative internet. Part of the
critical intellectual tradition consists of identifying the ideological assumptions that
structure social life. Cyberlibertarianism is an ideology that structures social life in its
technological aspect. It is crucially important that we understand cyberlibertarianism —
not only because technology companies have major public platforms upon which to
espouse their views and defend their practices, but also because other forms of thought
share assumptions with cyberlibertarianism. My argument in this project identifies the
subtle parallels between cyberlibertarianism and certain scholarly formulations. In
pointing out these parallels, I do not mean to suggest that these formulations of thought
should be dismissed as unwitting puppets of the digital ideology. Rather, I mean to
demonstrate that cyberlibertarianism is far from a pet theory of motivated technology
actors. It cannot be reduced to an ideological pawn that serves the economic interests of
Silicon Valley (although it certainly does serve those interests). Cyberlibertarianism
148
should instead be understood as a compelling way of thinking about technology and
society, which variously influences internet policy, public debate, and scholarly research.
In the context of internet markets, cyberlibertarianism shares key assumptions
with electronic reputation studies, free labor theory, and accounts of digital economy,
digital labor, and digital commodities. Cyberlibertarianism and electronic reputation
studies converge on a view of internet exchange, including economic exchange, as
fundamentally cooperative. Here, in the absence of conflict, regulations and institutions
have little importance as mechanisms of cooperation that are grounded in productive
authority. These paradigms overlook the important difference between regulations, which
can be enforced by jurisdictional institutions, and protocols, which can only be embedded
into computational systems. Code, as Lessig had it, is indeed a kind of law — but a law
without a regulatory institution to enforce its conditions. In Kojin Karatani’s political
terms, code is law in the “nation” sense of guiding behavior but not in the “state” sense of
enforcing behavioral standards. In overlooking this distinction, cyberlibertarianism and
electronic reputation studies are unable to account for the manipulation of platform
protocols, whereby actors take advantage of institutional absence to avoid regulatory
consequence. In particular, the idea that rating systems can replace status codes misses
the regulatory enforcement that face-to-face communities are able to enact. Recognizing
the difference between protocols and regulations can set the groundwork for platforms
regulations that are actually effective and that don't rely on a vision of fully automated
commerce.
Meanwhile, in its focus on monetization, free labor theory ultimately forwards an
economic functionalism, in which all internet activity contributes to the online production
149
of capital. Tiziana Terranova frames internet platforms as economic whirlpools that drag
all activity into their monetizing currents. Despite its roots in the critical tradition, this
framework is not so different from the cyberlibertarian vision of internet markets as self-
contained economies. The upshot of both paradigms is that economic forces are
fundamental and non-economic forces are marginal. Yet internet markets demonstrate the
importance of non-economic forces in the operations of digital exchange. The claim that
economies are embedded is far from original, but, in the context of the internet economy,
the claim needs to be asserted as a counter to an economic functionalism that privileges
the movement of capital as proper to internet platforms. Here, economic functionalism
neglects the role of regulations and institutions online, unless they play conspicuous parts
in digital monetization.
The conceptual focus on resource allocation continues in accounts of digital
economy and digital labor. These accounts generally sideline infrastructures, cultures,
and institutions in their emphasis on the location and provision of economic resources
online. As functions of institutions, regulations play even less of a role in many of these
accounts. Such accounts are willing to recognize the role of non-economic factors, but as
conditions that set the scene rather than as elements that drive the narrative — as prelude,
not as plot. Wikimomics makes no mention of regulatory concerns over data brokerage,
and The Rise of the Network Society assumes that immaterial and material objects will
float through global networks without regulatory stopgaps.251 Accounts of digital labor
fare better in this evaluation. Lily Irani and Sarah Roberts consider the infrastructure and
251 Don Tapscott and Anthony D. Williams, Wikinomics: How Mass Collaboration Changes Everything (New York: Portfolio, 2006). Manuel Castells, The Rise of the Network Society (Hoboken: Wiley & Blackwell, 2000).
150
the culture of technology work, but they mainly focus on the economic value generated in
these outsourced spheres.252 Although many of these writers would certainly recognize
the embedded nature of the digital economy and digital labor, this recognition does not
necessarily play out in their analyses. The conceptual focus on economic resource
distribution can overlook the ways that non-economic factors enter into that distribution.
In the context of the internet, scholars should follow the money — but keep going once
they find it.
The discursive tradition and the infrastructural traditions of commodity analysis
are more willing to consider the role of non-economic factors in the circulation of
consumer objects. Still, these traditions tend to treat commodities as symbolic objects or
systemic objects, rather than as institutional objects. When institutions do enter the
picture, they are sites rather than agents: commercial institutions produce objects, and
domestic institutions consume them. This brings us back to the lacuna of exchange,
discussed in the introduction: the sphere of production and the sphere of consumption are
well covered in the scholarship, but the sphere of circulation is less comprehensively
studied. Institutions operate differently in the context of circulation, as they take on the
messy task of controlling the movement of objects. State institutions, in particular, face a
staggeringly complex task in the control of contraband circulation. As black markets,
exchange platforms underline the relevance of state institutions to the study of
commodities. More broadly, insofar as institutions provide many of the objects that
252 Sarah T. Roberts, "Commercial Content Moderation: Digital Laborers' Dirty Work," in Intersectional Internet: Race, Sex, Class and Culture Online, eds. Safiya Umoja Noble and Brendesha M. Tynes. (New York: Peter Lang, 2016): 147-160. Lilly Irani, "The Cultural Work of Microwork,” New Media & Society 15, no. 5 (2015): 720-739, doi: 10.1177/1461444813511926.
151
circulate in the free digital market, exchange platforms encourage us to think about
commodities as symbolic, infrastructural, and institutional objects. To overlook the role
of institutions in the circulation of commodities on the internet is to risk a
cyberlibertarian formulation, in which exchange platforms play host to the movement of
goods beyond the banal realities of institutions.
Cyberlibertarianism, then, is not a pipe dream of technologists but an appealing
framework for understanding technology and society. Those who are interested in an
equitable internet must understand the appeal of cyberlibertarianism in order undermine
its influence. The appeal of cyberlibertarianism is partially rooted in its relationship to
other ideologies and its simplicity as a conceptual framework. First and foremost, the
digital ideology draws on the celebration of the market as an engine of prosperity; this
celebration continues today, even after the decline of free market fundamentalism in the
Hayekian vein.253 It is not a far leap from a self-regulating market to a self-regulating
internet to a self-regulating internet platform. The celebration of the market, in turn,
draws on the classical liberal formulation of negative liberty, which defines freedom as
the absence of authority, including institutional authority. Here, freedom and control are
mutually exclusive forces that are in perpetual competition with one another.
Cyberlibertarianism follows in the footsteps of market ideology and negative liberty by
making an absolute distinction between internet freedom and institutional control. This
way of thinking about freedom and control is seductively simple: it creates a storybook
narrative of good actors and bad actors, and it pins all problems of technology and society
on the overbearing control tendencies of the bad actors.
253 Joseph Vogl, The Specter of Capital (Stanford: Stanford University Press, 2015).
152
Individuals invested in a cooperative internet must understand the appeal of
cyberlibertarianism in order to create new frameworks that may counter its influence. We
need to think of compelling ways to frame technology and society that demand
accountability from actors in industry and in government. We need to be critical of state
power without framing institutions as fundamentally burdensome; and we need to
forward a view of positive liberty online, according to which institutional involvement
underwrites individual freedom on the internet. We need to be open to regulations
without framing them as panaceas to structural problems, which would only contribute to
the regulatory capture being executed by technology companies today. It is certainly
easier to create a seductive theory that is simple in nature, but the situation is too nuanced
and the stakes are too high for watered-down formulations. If we don't influence the
conversation around technology and society, then powerful actors with deep pockets and
compelling ideologies will.
One place to enter the conversation is contemporary discussions surrounding
automation. Part of what distinguishes internet markets from conventional markets is
their attempt to fully automate exchange and thereby facilitate commerce without
regulations and institutions. Blockchain advocates understand automation as a means to
outmode regulations and institutions in the context of electronic commerce. The
blockchain is a public ledger that records every cryptocurrency transaction and is,
undoubtedly, an important technological development.254 However, for many blockchain
advocates, the public ledger is a viable replacement for regulations and institutions,
254 Satoshi Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System,” published online 2008, https://bitcoin.org/en/bitcoin-paper.
153
because the technology makes all transactions open and transparent.255 In this line of
thought, contracts are unnecessary when the blockchain is recording all transactions, and
courts are obsolete when the blockchain serves as a public record of exchange. For
advocates of the technology, the blockchain protocol promises to automate trade and
transcend the banalities of contract and court. The dream of fully automated commerce
lives on. In contrast to this dream, we should underline the shortcomings of automation
and highlight the differences between protocols and regulations. We should also consider
the role of the state in electronic commerce without subscribing to a blanket opposition to
institutional involvement.
In his 2018 Congressional hearing, Mark Zuckerberg positioned automation as a
clean technological solution to complex structural problems related to content
moderation. The idea that automation will comprehensively solve platform dysfunction
relies on a cyberlibertarian vision of a digital system in perpetual equilibrium. We should
counter this vision by highlighting the problems of internet conflict — not only
harassment and hate speech, but also deception and fraud, which treat automated
protocols as raw materials rather than definitive barriers. Paradoxically, by affirming the
reality of conflict on the internet, we can make inroads to a more cooperative web. In this
respect, contemporary studies of platform cooperativism could benefit from a broad
recognition of internet conflict, which will continue to be a problem on democratically
owned platforms.256 Internet conflict can become a point of departure for broader
255 David Golumbia, The Politics of Bitcoin: Software as Right-Wing Extremism (Minneapolis: University of Minnesota Press, 2016). 256 Trebor Scholz and Nathan Schneider, eds., Ours to Hack and to Own (New York: OR Books, 2017).
154
conversations surrounding platform governance, understood as regulations that are
institutionalized on the level of platforms.
Internet markets showcase the flaws of cyberlibertarianism, and they help us
understand the root structure of the digital ideology — its core assumptions, its idealized
visions, and its seductive qualities. Cyberlibertarianism is a sleek way of thinking about
the relationship between technology and society in an increasingly complex world:
innovation and freedom are good, institutions and regulations are bad, and the internet, to
revise Stewart Brand's formulation, wants to be free. Internet markets offer an alternative
account of freedom and control in the context of electronic commerce, and they help us
reframe the relationship between technology and society without the biases and blind
spots of cyberlibertarianism. The past decade witnessed considerable changes in
conversations surrounding technology, and the next decade will likely follow suit. As
cyberlibertarianism changes form, there is an opportunity to shift the dialogue in a
nuanced and cooperative direction. The state and the public are no longer willing to sit
back and let technology companies sidestep issues of accountability. At this critical
juncture, free digital markets help us understand the stakes of an unregulated internet, and
they furnish evidence that allows us to reframe conversations surrounding technology. A
new digital framework should ask what makes electronic commerce equitable or unfair,
what makes platforms functional or dysfunctional, what makes the internet cooperative or
conflictual, and what makes technological life liveable or, all to often, unliveable.
155
APPENDICES
Appendix I
Discussion Boards
Craigslist, eBay, and Silk Road each feature an internal discussion board on their
respective web domains, as well as auxiliary discussion boards on the Reddit web
domain. They each feature hundreds (in some cases, thousands) of conversational
threads, and they reach back to the origins of the markets themselves, or to the origins of
Reddit in the 2005. In these discussion boards, merchants have carte blanche freedom to
discuss anything that they please, from commerce and technology to culture and politics,
as well as critiques and complaints about the hosting platform. Understandably, most
discussion board conversation revolves around commerce, that being, after all, the topic
that unifies these internet merchant. Discussion boards are attractive research sources,
because they feature organic and topical conversations among many users, including
experienced users, over an extended period of time.
As organic discursive phenomena, discussion board conversations constitute
naturally occurring talk, understood as "informal conversation which would have
occurred even if it was not being observed or recorded, and which [is] unaffected by the
presence of the observer and/or the recording equipment"257. Naturally occurring talk
offers a window into the experiences, practices, and attitudes of interlocuters, without the
257 Stephanie Taylor, "Locating and Conducting Discourse Analytic Research,” in Discourse as Data, ed. Margaret Wetherell (London: Sage, 2001): 5-48. 27.
156
mediation of the researcher and concomitant liabilities of her observing presence.
Discussion board conversation unfolds without the onus of being an object of
observation. Naturally occurring talk should not be cast as purer than other sources of
data that include observation,258 but it is useful for capturing extemporaneous interactions
between speakers.
From a methodological perspective, there are important limitations and drawbacks
to discussion board conversations. As digital discursive phenomena, discussion board
conversations do not include "the details of talk"259, such as pauses and non-verbal
expressions, which can offer insight into user attitudes. In addition to being uniquely
polished, discussion board conversations are unevenly distributed: not all users
participate in discussion board conversations, and, among those who do participate, some
contribute more than others. Further, as crowd-sourcing venues, discussion boards feature
what might be called the problem of experiential extremes. In a typical case of a
discussion board thread, a very inexperienced user asks a question, to which a very
experienced user offers an answer. Here, middle-ground perspectives are absent, and
discussion board analysis risks an over-emphasis on user extremes (naiveté and
expertise). Further, as crowd-sourcing mechanisms, discussion board conversations are
often oriented around problems. For instance, users may come to discussion boards after
they have been defrauded, in order to to vent, complain, or fix their commercial mistakes.
258 Christine Griffin, "Being Dead and Being There: Research Interviews, Sharing Hand Cream and the Preference for Analyzing 'Naturally Occurring Data',” Discourse Studies 9, no. 2 (2007): 246-269. doi: 0.1177/1461445607075340. 259 Kathryn Roulston, "Issues Involved in Methodological Analyses of Research Interviews,” Qualitaitve Research Journal 16, no. 1 (2016): 68-79, 73, doi: 10.1108/QRJ-02-2015-0015
157
Here, successful exchange is absent, and discussion board analysis risks an over-
emphasis on market breakdown. The problems of experiential extremes and market
breakdowns informed my processes of data collection, as discussed below. Despite these
problems, discussion boards are valuable sources of internet research, and there are many
precedents for analyzing user conversations in order to understand platforms.260
In order to identify trends in user activity on internet markets, I ran a total of
eighteen (18) web crawls — three on each of the six discussion boards. These crawls
were custom-built scripts in Python and Java, and they utilized a series of computational
tools to pull data out of HTML files and render them in manageable parse trees. These
tools included Celery, an asynchronous task queue that executes multiple jobs at once;
RabbitMQ, a messaging agent that manages these tasks; and Docker, to help coordinate
these programs. Given that thread conversations on discussion boards follow a comment-
response cycle, I designed the scripts to render whole threads rather than singular posts,
and this allowed me to capture the ebb and flow of naturally occurring web discourse.261
In effect, the scripts crawled (went through page by page) the discussion boards and
rendered (put into a separate document) all of the conversations that included select
keywords. When crawling the internal discussion boards of Craigslist and eBay, I
incorporated temporal boundaries and only rendered threads composed after 2010,
260 Nancy Baym "From Practice to Culture on Usenet,” in The Cultures of Computing, ed. Susan Leigh Star (Oxford: Blackwell, 1995): 29-53. Gary Burnett and Laurie Bonnici, "Beyond the FAQ: Explicit and Implicit Norms in Usenet Newsgroups,” Library & Information Science Research, 25 (2003): 333-351. Andrea Forte et al. "Decentralization in Wikipedia Governance,” Journal of Management Information Systems, 26 (2009): 49-72, doi: 10.2753/MIS0742-12222602013. 261 Norman K. Denzin, "Cybertalk and the Method of Instances,” in Doing Internet Research, ed. Steve Jones (Thousand Oaks: Sage, 1999).
158
around the time that Craigslist and eBay solidified their internet presence, as discussed in
the case studies section. Temporal boundaries helped limit the number of threads
rendered from these expansive and longevous discussion boards, which began in the
1990s.
I ran these scripts in groups of six at three different intervals. Let's go through my
logic for each script, foregrounding methodological processes in the spirit of Cho and
Trent, before discussing data analysis and interpretation. I used an iterative criterion
sample to guide my data collection during the web crawls. 262 That is, I sampled
discussion board data based on a criterion (the inclusion of certain keywords) and ran
multiple iterations of web crawls based on the findings of the preceding crawl(s).
Collecting data in waves helped "clarify the main patterns, see contrasts, identify
exceptions or discrepant instances, and uncover negative instances — where the pattern
does not hold"263. The criterion was theoretically driven: I began with general concerns,
and then developed orienting concepts as I went along.264 This process ran as follows.
Motivated by the relative absence of research on internet fraud,265 I began with a
series of keywords related to topic: fraud, scam, con, trick, and their semantic variations.
In this first wave, I ran web crawls with fraud-related keywords on each of the six
262 Matthew B. Miles and A. Michael Huberman, Qualitative Data Analysis, 2nd ed. (Thousand Oaks: Sage, 1994). 263 Miles and Huberman, Qualitative Data Analysis, 29. 264 Glaser and Strauss refer to this latter process as "theoretical sampling". Barney G. Glaser and Anselm L. Strauss, The Discovery of Grounded Theory (Chicago: Aldine Publishing, 1967). 265 The handful of studies of internet fraud come from computer science and law. Youngsam Park et al., "Understanding Craigslist Rental Scams,” in Financial Cryptography and Data Security, eds. Jen Grossklags and Bart Preneel (Berlin: Springer, 2016): 3-21. Calkins, "My Reputation Always Had More Fun Than Me".
159
discussion boards under study: the internal discussion boards and the Reddit boards of
Craigslist, eBay, and Silk Road. It should be noted that the Silk Road discussion board
that I crawled was an archived version of the original site,266 and, while the subreddit is
technically active, all of the posts from the Silk Road era were archived by Reddit. In
analyzing and interpreting these fraud-related threads, I noticed that users developed
commercial practices related to fraud evasion and market success. This lead to my second
set of crawls, which rendered threads with the following keywords: trust, honest, fair,
cooperative, good, best, and their semantic variations. This second round helped counter
the problem of market breakdown on discussion boards, or their tendency to foreground
failure and malfunction. In analyzing and interpreting these cooperation-related thread, I
found that users had different opinions on the matter, depending on their position as
buyer or seller. This lead to my third round of crawls, which rendered threads with the
following keywords: seller, vendor, sales, work, labor, business, and their semantic
variations. Each of these web crawls rendered between two hundred and three thousand
threads related to the topical keywords.
After developing a corpus of posts, I pattern-coded the parsed data with themes
that emerged progressively during the initial review.267 The data was rendered in a
Microsoft Word document, and I included pattern codes in the top left hand of the
document. (See coding protocol below.) I developed the pattern code in an iterative
fashion, moving between the collected data and my interests in electronic commerce.
This lead to the identification of typical case samples, which exemplified user activity in
266 Gwern Branwen et al., Dark Net Market Archives, 2011-2015, (July 2015), https://www.gwern.net/DNM-archives 267 Miles and Huberman, Qualitative Data Analysis.
160
the context of fraud, cooperation, or labor.268 I concluded the pattern-coding when I
reached a saturation point, having had repeated (and decreasingly valuable) encounters
with the same set of accounts of user activity.269 Each waves of crawls generated
evidence that exceeded the concerns of its original criteria. In analyzing fraud, I came
across patterns of user customs and collective intelligence; in analyzing customs and
intelligence, I came across patterns related to labor and sales; in analyzing labor and
sales, I came full circle to patterns about fraud and customs. Through them all, I came
across patterns about systems and objects, those mute shadows of user activity.
Following collection, I employed a critical, interpretive approach to these case
samples. Drawing on textual analysis, I sought to identify patterns in user activity,
understood as a triplex of user experience, user practice, and user attitude.270 These
patterns were often explicit, as when users simply recounted what they did, how they did
it, and what they thought about it. Sometimes, these patterns were implicit, as when user
statements evinced deeper assumptions about commerce or technology. In those cases, I
followed Stuart Hall in considering the ideological "deep-structure" of discussion board
statements — their operative assumptions, embedded in the social and institutional
contexts of their utterance.271 Like critical discourse analysis, this type of analysis
respects the veracity of actors while remaining remaining attentive to their underlying
social position and material interests.272 Unlike critical discourse analysis, it does not rely
268 Miles and Huberman, Qualitative Data Analysis. 269 Glaser and Strauss, The Discovery of Grounded Theory. 270 Elfriede Fürsich, "In Defense of Textual Analysis: Restoring a Challenged Method for Journalism and Media Studies,” Journalism Studies 10, no. 2 (2009): 238-252, 10.1080/14616700802374050. 271 Stuart Hall et al., Policing the Crisis (Basingstoke: Palgrave McMillan, 2013). 272 David R. Howarth, Discourse (Buckingham: Open University Press, 2010).
161
on a formalized semantic code to unveil latent meaning; rather, it uses humanistic
interpretive methods to navigate the explicit and the implicit dimensions of a text.273
The question of ethics accompanied the collection of discussion board data. Users
were not entirely anonymous, because their statements were connected with their
profiles, and their profiles were connected to an active email. That said, users were
relatively anonymous, given the distance between identity and avatar.274 Craigslist, eBay,
and Reddit users posted in a public forum, "open and available to anyone with an internet
connection"275, with the knowledge that it would be read by others, although not
necessarily analyzed by others. Silk Road users posted in a semi-public forum, "available
to most people"276 with the technical know-how to navigate to the dark web. That data is
public or semi-public does not mean researchers have a priori permission to use the data
in their work.277 Privacy is a matter of "expectations and consensus"278, and internet
research needs to be attuned to the propriety of information flows.279 In the case of the
discussion boards, there was an evident public or semi-public quality, as well as a
relatively high degree of anonymity — either by virtue of the avatar/identity distance, or
273 Fürsich, "In Defense of Textual Analysis." 274 Bryan H. Choi, "The Anonymous Internet,” Maryland Law Review 72 (2013): 501-570. 275 Malin Sveninsson Elm, "How Do Various Notions of Privacy Influence Decisions in Qualitative Internet Research?" in Internet Inquiry, eds. Annette Markham and Nancy Baym (Thousand Oaks: Sage, 2009), 75. 276 Elm, "How Do Various Notions of Privacy Influence Decisions in Qualitative Internet Research?” 75. 277 Annette Markham and Elizabeth Buchanan, "Ethical Decision-Making and Internet Research: Recommendations from the AoIR Ethics Working Committee (Version 2.0),” (August 2012), http://aoir.org/reports/ethics2.pdf. 278 Annette Markham and Elizabeth Buchanan, "Ethical Decision-Making and Internet Research,” 7. Elm, "How Do Various Notions of Privacy Influence Decisions in Qualitative Internet Research?" 279 Helen Nissenbaum, Privacy in Context (Stanford: Stanford University Press, 2010).
162
by virtue of anonymizing dark web protocols. Still, in order to protect user expectations
of privacy, and to ensure reasonable distance between individual, avatar, and research
data, I followed others in internet studies and refrained from citing individual discussion
board numbers, as these would shorten the figurative distance between individual and
research data.280
The nature of the discussion differed between venues and platforms. Craigslist
and eBay users discussed a set of commercial concerns that were not particularly
sensitive, given the general social acceptability of internet exchange.281 Silk Road users
discussed a set of commercial concerns that were particularly sensitive, given the illegal
nature of contraband exchange. I found that two factors mitigated this ethical issue. First,
users who posted on the Silk Road discussion board could only do so through a Silk Road
account, which required a dark web address for registration; this added a level of
anonymity to posts. Users who posted on the Silk Road subreddit did not have this
anonymous protection, but they posted on a public forum with less expectations of
privacy. Second, the Silk Road discussion board is an inactive website, making it even
more difficult to trace the connection between an avatar relic and an anonymized user.
On both the internal discussion board and the Silk Road subreddit, all users were a priori
former users. Like public circulation, temporal distance does not give researchers
280 Barbara Sharf, "Beyond Netiquette: The Ethics of Doing Naturalistic Research on the Internet," in Doing Internet Research, ed. Steve Jones (Thousand Oaks: Sage, 1999): 243-256. Chelsea Reynolds, "'I Am Super Straight and I Prefer You Be Too:' Constructions of Heterosexual Masculinity in Online Personal Ads for 'Straight' Men Seeking Sex with Men," Journal of Communication Inquiry, 39 (2015): 213-231, doi: 10.1177/0196859915575736. Baym, "From Practice to Culture on Usenet." 281 Annette Markham, "Ethical Concerns in Internet Research" in The International Encyclopedia of Social and Behavioral Sciences, 2nd edition, ed. James Wright (Philadelphia: Elsivier Press, 2015): 340-377.
163
permission to use data sets, but it does lessen the stakes of admitted illegal activity.282
Between the expectations of privacy, the anonymizing technologies, and the archived
nature of the websites, I determined that discussion board conversations related to Silk
Road could be ethically collected. More broadly, given the proper storage and
management of the data, I found that discussion board conversations qualified as ethical
sources of research.
Crawl Details
Craigslist Forum
Website https://forums.craigslist.org
Technical Elements Python (Celery, RabbitMQ, Docker)
Keywords Dates Renders
Fraud, scam, trick July 2017 905
Best, good deal, fair August 2017 488
282 Emma Wincup, Criminological Research: Understanding Qualitative Methods (Thousand Oaks: Sage, 2017).
164
Seller, vendor, work October 2017 654
Craigslist Reddit
Website https://www.reddit.com/r/craigslist
Technical Elements Python (Celery, RabbitMQ)
Keywords Dates Renders
Fraud, scam, trick July 2017 248
Best, good deal, fair August 2017 112
Seller, vendor, work October 2017 186
eBay Discussion Board
Website https://community.ebay.com/t5/Discussion-Boards/ct-
p/12001
Technical Elements Java (Celery, RabbitMQ, Docker)
Keywords Dates Renders
Fraud, scam, trick July 2017 1022
Best, good deal, fair August 2017 356
165
Seller, vendor, work October 2017 768
eBay Reddit
Website https://www.reddit.com/r/Ebay
Technical Elements Python (Celery, RabbitMQ)
Keywords Dates Renders
Fraud, scam, trick July 2017 296
Best, good deal, fair August 2017 183
Seller, vendor, work October 2017 205
Silk Road Forum
Website (original) http://dkn255hz262ypmii.onion
Website (archived) https://www.gwern.net/DNM-archives
Technical Elements Python (Celery, RabbitMQ, Docker)
166
Keywords Dates Renders
Fraud, scam, trick July 2017 176
Best, good deal, fair August 2017 97
Seller, vendor, work October 2017 112
Silk Road Reddit
Website (presently) https://www.reddit.com/r/deepweb
Website (formerly) http:www.reddit.com/r/silkroad
Technical Elements Python (Celery, RabbitMQ)
Keywords Dates Renders
Fraud, scam, trick July 2017 84
Best, good deal, fair August 2017 68
Seller, vendor, work October 2017 47
Coding Protocol
167
1. Establish that the post concerns the keyword topic: fraud, cooperation, selling, objects.
2. Mark the post as relating to one of the keywords.
3. Identify patterns within the marked posts to develop subcategories.
4. Mark the keyword-marked post as relating to one of the subcategories.
5. Stop when the subcategorized posts stop exhibiting diversity.
168
Appendix II
Interviews
Twenty-seven semi-structured interviews with internet merchants constitute the
second major source of research data. I followed IRB protocol at each stage of interview
research, from contacting participants to storing data, and I received IRB approval from
the University of Pennsylvania.283 Where the discussion boards offered a breadth of data
related to user activity, the interviews offered a depth of data related to user activity. This
allowed me to hone in on the experiences, practices, and attitudes of individual users. On
the one hand, these interviews had an emic dimension, being concerned with platform
activity from the first-person perspective of individual users, each with their own
idiosyncratic circumstances, practices, and viewpoints.284 In this capacity, the interviews
gave me insight into the life-world of users and permitted me to "explore the meaning(s)
participants give to ideas and terms"285. This was helpful, for example, in understanding
how users thought about fraud. User perception plays a role in platform activity, blurring
the boundaries between the internal world of users and the external world of platforms.286
On the other hand, these interviews occurred within the broader etic orientation of the
research study, concerned with platform trends more than user perception. In this
283 "Online Interviews with Craigslist and eBay Users,” approved by the Institutional Review Board, University of Pennsylvania. 284 Cho and Trent, "Validity in Qualitative Research Revisited.” 285 Michelle Kazmer and Bo Xie, "Qualitative Interviewing in Internet Studies,” Information, Communication, & Society, 11, no. 2 (March 2008): 257-278, doi: 10.1080/13691180801946333. 286 Griffin, "Being Dead and Being There: Research Interviews, Sharing Hand Cream and the Preference for Analyzing 'Naturally Occurring Data,'"
169
capacity, the interviews were valuable as triangulation mechanisms, as users elaborated
on platform trends identified in other sources.287 Conducting semi-structured interviews
over a seven-month period meant speaking to users about particular phenomena as
patterns emerged in the research. Still, my concern in those cases was with depth of data:
had users encountered this phenomenon, and, if so, what did they think about it?
Participant responses lead me in unexpected directions: some patterns appeared
significant but were not confirmed by users; and other patterns appeared insignificant but
turned out to be major concerns for users. Here, triangulation supported, but did not
conclusively guarantee, the identification of trends, whether expected or unexpected.
I selected interview participants first through a theoretical sample and then
through a sequentially-driven conceptual sample.288 In the theoretical sample, I sought
out experienced users of internet markets, understood as users who had been on Craigslist
or eBay for over seven years. These participants were "encultured informants"289 who had
command over platform activity and "access to information"290 derived from their time
on the site. In order to locate experienced users, I posted a call for interview participants
on four discussion boards: the internal discussion boards and the subreddits of Craigslist
and eBay. From this round of posting, I found thirteen users (seven from Craigslist and
six from eBay) who fit my criteria, and I conducted interviews with them over the course
of four months. Reddit was my most effective recruitment venue, as nine of the thirteen
287 Atkinson and Coffey. "Revisiting the Relationship Between Participant Observation and Interviewing." 288 Miles and Huberman, Qualitative Data Analysis. 289 James Spradley, The Ethnographic Interview (Boston: Holt, Rinehart and Winston, 1979). 290 Carol Warren, "Qualitative Intervewing," in Handbook of Interview Research, ed. Jaber F. Gubrium and James A. Holstein (Thousand Oaks: Sage, 2001): 83-100.
170
users contacted me through my advertisement on the site. These participants ranged in
age from 20s to 60s, and nine of the thirteen participants were men. In order to enhance
the credibility of my findings, I sought interview participants who would "reflect a
variety of perspectives"291. While the age range of the first sample was relatively varied,
the gender composition was not. Both men and experienced users were over-represented
in the sample, and this informed the next stage of recruitment. I returned to the discussion
boards and, through another set of advertisements, took a conceptually-driven sequential
sampling of women users and inexperienced users.292 In other words, my "initial choice
of informants lead [me] to similar and different ones"293 as points of comparison and
contrast. From this round of posting, I found eight users (four from Craigslist and four
from eBay). Five of them were experienced women users, two of them were
inexperienced men users, and one of them was an inexperienced woman user. These
interview took place over the course of two months. My last round of interviews occurred
over a month and proceeded according to a different conceptual frame — not the
characteristics of users but of objects. I identified typical advertisements for secondhand
and antique goods on eBay and Craigslist, and I contacted the users who posted those
objects for sale. Among those who agreed to be interviewed, two were men, and four
were women. These participants, ranging from expert dealers to casual resellers,
contributed to the experiential and gendered variety of the sample. I concluded the
291 Herbert Rubin and Irene Rubin, Qualitative Interviewing, 2nd ed. (Thousand Oaks: Sage, 2012). 292 Miles and Huberman, Qualitative Data Analysis. 293 Miles and Huberman, Qualitative Data Analysis, 27.
171
interviews when they reached a saturation point and stopped exhibiting significant
diversity.
Following recruitment, I conducted hour-long, semi-structured interviews with
participants in order to understand user experiences, practices, and attitudes. These were
text-only internet interviews that occurred in private chat rooms over Cyph, a peer-to-
peer online messaging system.294 I followed IRB protocol in protecting the confidentiality
and privacy of the interview data during each stage of the research process.295 As internet
interviews, they featured a degree of "contextual naturalness"296, understood as a sense of
conversational ease, arising from the familiar circumstance of a computer terminal, as
opposed to a face-to-face interview. This allowed participants to "use language the way
they do in most of their everyday interactions"297. However, as textual interviews, they
lacked the material richness of face-to-face interviews, being without facial expression
and body language, as well as "details of talk"298 — silences, verbal pauses, and self-
corrections. These non-verbal communication practices, valuable to the interview
researcher, were not available during my text-based, internet interviews.
In creating an interview template, I followed Herbert Rubin and Irene Rubin in
thinking of interviews as "structured conversations"299 designed to cover research
problems, which the interviewer develops beforehand, and to explore organic themes,
which arise during the course of the interview. I also followed Rubin and Rubin in
294 "About Cyph,” Cyph, retrieved July 22, 2017, https://www.cyph.com/about. 295 "Online Interviews with Craigslist and eBay Users,” approved by the Institutional Review Board, University of Pennsylvania. 296 Kazmer and Xie, "Qualitative Interviewing in Internet Studies,” 259. 297 Kazmer and Xie, "Qualitative Interviewing in Internet Studies,” 259. 298 Roulson, "Issues Involved in Methodological Analyses of Research Interviews,” 73. 299 Rubin and Rubin, Qualitative Interviewing, 129.
172
structuring the interview into main questions, follow-up questions, and probes. These
question forms are designed to occasion "depth and detail, vivid and nuanced answers,
rich with thematic detail"300. Here, interview participants are understood as
"conversational partners"301, both information sources and meaning makers, and the
importance of follow-up questions and probes reflect this constructionist sensibility.302
First, I developed twelve main questions related to my research problems, such as fraud,
customs, and labor. These were general questions about user activity. How long have you
been using this platform? Are you more of a buyer or seller? What do you buy or sell on
the platform? Have you ever been scammed? Some of these were questions about user
opinions. Does selling on the platform feel like work? What do you think about platform
policies? Do you ever feel unsafe during meet-ups? I also included a few droll questions
that were relevant to my research questions but that also introduced some levity into the
(relatively intensive) interview. What was the weirdest thing you have ever seen on the
platform? Do you have a favorite memory associated with the site? Second, during the
interviews, I asked follow-up questions in response to participant statements. These
questions were formulated to occasion rich and nuanced explanations of user activity.
Detail and description were central guiding principles, as I focused on specific events and
objects. How did you come upon that rare antique? What happened the time you were
defrauded? Why did you post that item for sale online in the first place? How did you feel
about that? Third, as corollaries to the follow-up questions, I asked probes in order to
elicit clarity and deepen user responses. What do you mean by that term? Could you give
300 Rubin and Rubin, Qualitative Interviewing, 129. 301 Rubin and Rubin, Qualitative Interviewing, 79. 302 Warren, "Qualitative Intervewing.”
173
me an example of that? In preparing and conducting the interview, I worked to be
reflexive about my position as a researcher. I understand reflexivity as a process of self-
questioning in which the researcher remains "conscious of their cultural, linguistic,
political, and ideological origins and those they are studying"303. Aware of my
background in the university304, I used conversational language and steered clear of social
science categories305, asking low-stakes and open-ended questions in everyday terms.306
In analyzing the interviews, I pattern-coded the data with themes that emerged
progressively during review. The interviews were rendered in PDF documents, and I
included pattern codes in mark-ups to the documents. Some of themes overlapped with
patterns in other sources of evidence, and some of them were standalone themes unique
to the interviews. On the one hand, I treated the interviews as autonomous texts with their
own themes and patterns. I sought to identifying common experiences, practices, and
attitudes, while respecting the particularity of each user's experience. On the other hand, I
positioned the interviews alongside other sources of evidence. Consequently, during the
pattern-coding of the interviews, I identified patterns internal to the interviews, as well as
themes that cross-referenced with other sources of evidence.
303 Cumming-Potvin, "'New Basics' and Literacies: Deepening Reflexivity in Qualitative Research." Qualitative Research Journal 13, no. 2 (2013): 214-230, doi 10.1108/QRJ-04-2013-0024. 304 Rubin and Rubin argue that being associated with the university "has plusses and minuses" — one is allowed to ask questions but also seen as judgmental. Rubin and Rubin, Qualitative Interviewing, 85. 305 Jonathan Potter and Alexa Hepburn, "Eight Challenges for Interview Researchers,” in The Sage Handbook of Interview Research, eds. Jaber Gubrium et al. (Thousand Oaks: Sage, 2014): 555-570. 306 Cumming-Potvin, "'New Basics' and Literacies: Deepening Reflexivity in Qualitative Research."
174
Following collection, I employed a critical, interpretive approach to the interview
data. As in the interpretation of discussion board conversations, I drew on textual analysis
in identifying patterns in user experience, user practice, and user attitude. These patterns
were both explicit and implicit, sometimes at the same time — as when users recounted
experiences (explicit) but did so in a way that belied deeper (implicit) assumptions about
that experience. In analyzing the implicit dimension of interview statements, I continued
to follow Stuart Hall in considering their ideological "deep-structure", or their covert
conceptual underpinning.307 As in critical discourse analysis, I respected the veracity of
actors while remaining remaining attentive to their underlying social position and
material interests.308 Still, I did not employ the semantic tools of critical discourse
analysis, preferring the tools of humanistic interpretation to navigate the manifest and
latent dimensions of interview statements.309 The specificity of interviews as a research
source also informed my interpretation of the data — and distinguished it from my
approach to the discussion board. Where discussion board conversations offered a
breadth of data and allowed for the interpretation of user activity within a far-reaching,
group context; interviews offered a depth of data and allowed for the interpretation of
user activity within a well-rounded, individual context. Unlike the discussion board,
interviews wove together the three dimensions of user activity — experience, practice,
and attitude — as users painted inclusive portraits of their platform engagement.
Comparatively, discussion board statements were fragmented: users related experiences,
practices, and attitude that fit the conversational circumstances, often without context.
307 Hall et al., Policing the Crisis. 308 Howarth, Discourse. 309 Fürsich, "In Defense of Textual Analysis."
175
For example, where a discussion board participant might mention a strategy for selling
antiques in response to a question about sales, an interview participant could explain that
their selling strategies are derived from their experiences of purveying antiques and their
opinions about digital antique culture. The holism of the interview made for rich
interpretation, in which the explicit and the implicit were interwoven, and the three
dimensions of user experience were linked in single cases.
In reporting the interview, I followed Jonathan Potter and Alexa Hepburn in
making transparent the conditions of the interview, including the active role of the
interviewer.310 This meant, for example, mentioning when a statement was a response to
a specific question asked by me. I aimed to balance a commitment to transparency, on the
one hand, with a sense of flow in the presentation of evidence. Unlike other studies
involving research interviews, I did not reproduce the question and answer format of the
exchange. This was because my interpretation did not occasion a semantic analysis and a
concomitant breakdown of statements into constituent parts.311 There were other
limitations to the interviews beyond linguistic approaches. I did not collect data on class,
race, sexuality, ability, and other social factors that are part of internet markets insofar as
they are part of social life. I relied on a large-scale Pew survey of internet merchants to
set a baseline understanding of class and race on these platforms — which are
overwhelmingly occupied by middle-class whites.312 Still, given the absence of relevant
data in my research, I avoided arguments related to these topics, despite there being many
to be made. Finally, as already mentioned, I did not conduct ethnographic field work, and
310 Potter and Hepburn, "Eight Challenges for Interview Researchers." 311 Roulston, "Issues Involved in Methodological Analyses of Research Interviews." 312 Smith, "Gig Work, Onling Selling, and Home Sharing."
176
my interviews cannot be taken as comprehensive accounts of internet markets, but only
as situated perspectives on experiences, practices, and opinions.
Recruitment Post
Hi everyone. Are there any regular [eBay/Craigslist] users interested in a paid and
anonymous interview? I'm looking for regular [eBay/Craigslist] users willing to
participate in a paid and anonymous interview about the platform — $40 via paypal for
an hour-long online chat interview.
A bit about me: I'm a phd student at the university of pennsylvania studying digital
economy. My dissertation is on internet markets, and [eBay/Craigslist] is one of my case
studies. You can check out my credentials on the university of pennsylvania website:
asc.upenn.edu/people/students/jonathan-pace
Safe travels and thanks for reading.
eBay Interview Questions
1.! What is your current city, gender, and age range (20s, 30s, etc.)?
2.! For how long have you been using eBay?
177
3.! Are you more of a buyer or a seller?
4.! What are some examples of things you have purchased on eBay?
5.! What made you choose eBay over a conventional retail store?
6.! Have you ever purchased goods from other internet markets, such as Craigslist?
7.! Do you shop at antique stores or yard sales, as well?
8.! Have you ever seen bizarre or unexpected objects for sale on the website?
9.! What are some examples of things you have sold on eBay?
10.!What prompts you to post something for sale on the website?
11.!Do you have any selling strategies?
12.!Are you generally pleased with the price at which things sell?
13.!How much does selling through the website feel like work? Does it take up a lot of
time?
14.!Have you ever posted something for sale and received no bids on it?
15.!Have you ever encounter problems with fraud or scams?
16.!Are you active in the [forums/reddit] ? What is your interest there?
17.!Do you have a favorite memory or fun story associated with the website?
Craigslist Interview Questions
1.! What is your current city, gender, and age range (20s, 30s, etc.)?
2.! How long have you been using Craigslist?
3.! Are you more of a buyer or a seller?
178
4.! What are some examples of things you have purchased on Craigslist?
5.! Why did you choose Craigslist over a conventional retail store?
6.! Where do you meet up with sellers to conduct transactions?
7.! Have you ever felt unsafe during a meet up?
8.! Have you ever seen bizarre or unexpected objects for sale on the website?
9.! Have you ever purchased goods from other internet markets, such as eBay?
10.!What are some examples of things you have sold on Craigslist?
11.!What prompts you to post something for sale on the website?
12.!Are you generally pleased with the price at which things sell?
13.!How much does selling through the website feel like work? Does it take up a lot of
time?
14.!Where do you meet up with buyers to conduct transactions?
15.!Have you ever posted something for sale and received no inquiries about it?
16.!Have you ever encounter problems with fraud or scams?
17.!Do you think Craigslist is doing enough to prevent fraud and scams?
18.!Are you active in the [forums/reddit]? What is your interest there?
19.!Do you have a favorite memory or fun story associated with the website?
Coding Protocol
1. Mark user statements as relating to one of the keywords: fraud, cooperation, selling,
objects.
179
2. Identify patterns within the marked statements to develop subcategories.
3. Mark the keyword-marked statements as relating to one of the subcategories.
4. Stop when the subcategorized posts no longer exhibit significant diversity.
Interview Dates and Participant Numbers
Round 1 13 participants July 2017
Round 2 8 participants September 2017
Round 3 6 participants October 2017
180
Appendix III
Governmental Records
In analyizing governmental records. I looked at court cases; public reports from
governmental agencies; Congressional hearings, codes of law, such as contract, fraud,
postal, drug, and firearms law. I accessed these documents through PACER, an online
service that provides access to court records and documents; the University of
Pennsylvania law library; and governmental websites. My goal in looking at these
records was to understand the legal and governmental systems within which internet
markets operate. I began with a theoretical sample of institutional documents that directly
involved my case studies: court cases to which they were party and public reports in
which they were directly mentioned. This lead me to documents that indirectly involved
my case studies: court decisions that set precedents for internet laws under which they
operate; public reports about the internet crimes that occur on them; and Congressional
hearings related to their infrastructure, such as payment and dark web infrastructure, and
related to the regulation of contraband, which platforms circulate. Finally, I sought out
codes of law to fill in the gaps of my knowledge: contract and fraud law to understand the
legal dimensions of electronic commerce, and postal, drug, and firearms law to
understand the circulation of contraband through internet markets.
In analyzing the data, I pattern coded the material according to themes that
emerged during review. These pattern codes took the form of mark-ups on PDF
documents. Some of these themes overlapped with those developed in other sources. On
the one hand, I was interested in connecting institutional activity to user activity and
181
platform activity. This was helpful, for example, in understanding how the circulation of
contraband (a user activity) could proceed without the intervention of content moderation
(platform activity) or law enforcement (institutional activity). On the other hand, I sought
out the novel components of the legal and governmental record, searching for evidence
that was unique thereto. For example, courts of law may demand that platforms explain
their secret or "black box" technologies in order to resolve legal disputes, and those
explanatory instances are valuable for internet research. Similarly, Congressional
hearings offered insight into the internal processes of governmental agencies, such as law
enforcement agencies.
In interpreting the documents, I continued to employ a critical, interpretive
approach, drawing on textual analysis to identify patterns in the systems surrounding
internet markets. Here, however, I foregrounded the institutional context of their
production. These are governmental documents, composed within state organizations that
have routinized processes and clear interests. Those who are speakers in these documents
— judges, federal officials, government workers — are embedded within this state
organization and follow its rubrics. I aimed to respect the veracity of these actors while
remaining remaining attentive to their underlying institutional position.313 In addition to
drawing on textual analysis, I drew on political-economic analysis in seeing states as
actors with material and symbolic resources, as well as strong incentives to protect and
maintain those resources.
313 Howarth, Discourse.
182
Documents List
Court Cases
•! Chicago Lawyers Committee for Civil Rights Under Law v. craigslist. Inc. 519 F.3d
666 (7th Cir. 2008).
•! craigslist. Inc. v. 3Taps, Inc. 3:12-CV-03816-CRB (N.C. Cal. 2015).
•! craigslist. Inc. v. Alecksey Kerbel et al. C-11-3309 EMC (N.D. Cal. 2012).
•! craigslist. Inc. v. John L. Stover et al. CV-11-03308 SBA (N.D. Cal. 2012).
•! craigslist. Inc. v. Naturemarket, Inc. 694 F. Supp. 2d 1039 (N.D. Cal. 2010).
•! Grace v. eBay. Inc. 16 Cal. Rptr. 3d 192 (California Ct. App. 2004).
•! The United States of America v. Approximately Four Hundred Fifty (450) Ancient
Cuneiform Tablets; and Approximately Three Thousand (3.000) Ancient-Clay Bullae,
Case No. 1:17-cv-03980 (2018).
•! Thomas Dart, Sherriff of Cook County v. craigslist. Inc. 665 F. Supp. 2d 961 (E.D. Ill.
2009).
•! Tiffany (NJ) Inc. v. eBay, Inc. 576 F.Supp. 2d 463 (S.D.N.Y. 2008).
•! United States of America v. Ross William Ulbricht. 31 F. Supp. 3d 540 (S.D.N.Y..
2014).
183
Governmental Reports
•! United States Governmental Accountability Office. "Internet Sales: Undercover
Purchases on eBay and Craigslist Reveal a Market for Sensitive and Stolen U.S.
Military Items." Testimony Before the Subcommittee on National Security and
Foreign Affairs. Committee on Oversight and Government Reform. House of
Representatives. April 10, 2008.
•! Internet Crime Complaint Center. "Internet Crime Report, 2017.” Last modified
January 15, 2018. https://pdf.ic3.gov/2016_IC3Report.pdf.
Congressional Hearings and Legislation
•! "Beyond Silk Road: The Potential Risks. Threats. and Promises of Virtual
Currencies." Hearing Before the Committee on Homeland Security and
Governmental Affairs. United States Senate. 113th Congress. November 18, 2013.
•! "Allow States and Victims to Fight Online Sex Trafficking Act of 2017." H.R. 1865.
115th Congress.
Coding Protocol
1. Establish that document is relevant to one or more of the research topics.
2. Mark document as relating to one or more of the keywords: fraud, cooperation, sale,
objects.
184
3. Identify patterns within the marked statements to develop subcategories.
4. Mark the keyword-marked statements as relating to one of the subcategories.
185
Appendix IV
Platform Documents
Platform documents included user agreements, terms of use, user guidelines,
market policies, and promotional materials. In the case of Silk Road, I also used internal
platform records that detailed major site-related activity; these records were retrieved by
the Federal Bureau of Investigation during their investigation into Silk Road, and they
were presented as evidence by the prosecution in the criminal trial of Silk Road's
architect. I took a theoretical sample of platform documents related to user activity. Each
of these documents was designed to control user activity (guidelines and policies) or to
protect markets from problematic user activity (user agreements and terms of use). I
pattern-coded this data with themes that emerged progressively through review, and some
of these overlapped with themes that developed from other research sources. For
instance, a user agreement bans a practice that, as relayed in discussion board
conversations and interviews, nevertheless occurs on the platform; and the phrasing of
the user agreement reflects the state of internet law, as relayed in the legal records. Note
how triangulation unfolds in this case — not with the goal of comprehensive
generalizability but with the goal of credible trend identification. In interpreting these
documents, I drew on textual analysis to identify patterns in platform activity. More
notably, I drew on political-economic analysis to consider how the material interests of
platforms inform their user documentation. This includes, for instance, how user
agreements enable platform companies to control economic resources or evade legal
liabilities.
186
Document List
•! Craigslist
o! "About"
o! "Avoiding Scams"
o! "Flags and Community Moderation"
o! "Jim Buckmaster"
o! "Prohibited"
o! "Terms of Use"
•! eBay
o! "Money Back Guarantee"
o! "Prohibited and Restricted Items"
o! "User Agreement"
•! Silk Road
o! "Weekly Reports"
o! "Expense Reports"
o! "Net Worth Calculator"
o! "Breakdown of Sales Data"
187
Appendix V
Supplemental Media
ABC News
AIM Group
Alexa Statistics
The Atlantic
Ars Technica
Bright Planet
Business Insider
CBS News
CNN
CNet
Columbia Business Times
Crunchbase
The Economist
Fast Company
Finance India
Forbes
Gawker
Gizmodo
GQ
The Gothamist
188
The Guardian
The Hill
Marin Independent Journal
Mashable
The Morning Call
The New York Times
The New Yorker
NBC Los Angeles
NBC Washington
Philly.com
Quartz
SF Gate
Slate
Tech Crunch
Vanity Fair
Variety
VICE
The Washington Post
Wired
189
Appendix IV
Primer on the Case Studies
Craigslist
The history of Craigslist begins in 1995, when Craig Newmark, a computer
programmer turned consultant, started a e-mailing friends and coworkers about events in
San Francisco related to art and technology.314 The e-mail chain eventually snowballed to
a formal listserv that included two hundred people, who introduced apartment searches
and job hunts into the discussion. When the listserv grew too large, Newmark created a
website with a dot-org top-level domain; he named the platform Craigslist, because, as he
recalls, users told him, "'Hey, we already call it Craigslist. Let's keep it personal and
quirky and just call it Craigslist.'"315 By 1999, when Newmark hired Jim Buckmaster to
oversee the site's technical operations, Craigslist was being visited over a million times
per month, making it one of the most popular platforms on the (relatively) budding
internet.316 Over the next few years, Buckmaster expanded the platform to include locales
beyond San Francisco and beyond the United States. He also instituted a community
moderation system, which allowed users to flag posts that seemed off-topic or
illegitimate; this removed the onus of content review from the company's shoulders and
permitted Buckmaster to focus on back-end maintenance rather than front-end upkeep.
314 Susan Freese, Craigslist: The Company and Its Founder (North Mankato: ABDO, 2011). I draw on Freese through the rest of this paragraph. 315 SF Gate Staff, "Craigslist / On the Record: Craig Newmark,” SF Gate, August 15, 2004, https://www.sfgate.com/business/ontherecord/article/CRAIGSLIST-On-the-record-Craig-Newmark-2733312.php. 316 Freese, Craigslist: The Company and Its Founder.
190
With these developments, Buckmaster became company president and CEO, while
Newmark remained as chairperson of the board of directors. Craigslist rode the wave of
Web 2.0 through the early 2000s, and, by the end of the decade, one in five adults
reported using Craigslist every month. Since then, Craigslist has solidified its technical
structure and dropped from the eighth to the fifteenth most popular website in the country
— hardly a Roman fall, given the general increase in traffic and platforms on the internet
since then.317 True to the "quirky and personal" spirit of the platform, Newmark and
Buckmaster continue to eschew targeted advertising and information brokerage.
Craigslist generates revenue by charging fees for job postings in certain locations and for
brokered apartment listings in New York City.318
Outside of commerce, Craigslist has a laid-back platform culture and a popular
reputation as a no-frills market that is utilitarian and effective but also "quirky and
personal". Several cultural objects attest to this reputation. In 2005, a Montreal man, Kyle
McDonald, began to barter objects on Craigslist with the purpose of obtaining
increasingly valuable goods.319 Documenting the journey on a personal website, he began
by trading a red paperclip for a pen, and, less than a year later, he was trading a role in
movie for a two-story farmhouse in Saskatchewan.320 "Weird Al" Yankovich wrote a
parody song about the website, in the style of 1960s blue rock.321 There, he hums on
317 "Internet Growth Statistics,” Internet World Stats, retrieved January 2018, https://www.internetworldstats.com. 318 Johnny Ryan, A History of the Internet and the Digital Future (London: Reaktion Books, 2010): 141. 319 Kyle McDonald, One Red Paperclip: How to Trade a Paperclip for a House (Austin: River Grove Books, 2007). 320 "About,” One Red Paperclip, http://www.redpaperclip.com/about. 321 Caroline McCarthy, "Weird Al Takes on Craigslist with The Doors,” CNet, June 16, 2009, https://www.cnet.com/news/weird-al-takes-on-craigslist-with-the-doors.
191
about the idiosyncrasies of platform commerce and user posts: a missed connection from
"Saturday at the mall"; the trade of a Chevy Malibu for and "old wheelbarrow and a
slightly used sombrero"; "an open letter to the snotty barista at the Coffee Bean on San
Vincente"; and a "trash can of Styrofoam peanuts" offered for free — but only the
peanuts, "the trash ain't part of the deal".322 2009 saw the premiere of Craigslist Joe, a
documentary about a man living off of food, shelter, and transportation gleaned through
Craigslist interactions.323 The film concludes with the sentiment that people are
"overwhelmingly trustworthy and generous"324. Craigslist Joe echoed the humanistic
tone of 24 Hours on Craigslist, a documentary capturing the stories of people who posted
in the San Francisco section Craigslist over the course of a single day.325 These character
vignettes include an Ethel Merman impersonator, a member of a support group for
diabetic cats, and a ballroom dance instructor. In the words of Variety film critic Dennis
Harvey, the documentary is a "colorful human mosaic", less about the internet than about
"the stubborn nonconformity for which it provides an outlet"326. These eclectic objects in
popular culture evince the Craigslist's reputation as simultaneously utilitarian (McDonald
finds a house, Weird Al exchanges goods, Joe locates provisions, and diabetic cat owners
find support) and eccentric (a paper clip turned piece of property, a missed connection, an
open letter, a free trash can of peanuts, and a cast of colorful characters).
322 "Craigslist by 'Weird Al' Yankovic,” Genius Lyrics, https://genius.com/Weird-al-yankovic-craigslist-lyrics. 323 Craigslist Joe, directed by Joseph Garner (CLJ Films, 2012), DVD. 324 Craigslist Joe, directed by Joseph Garner. 325 24 Hours on Craigslist, directed by Michael Ferris Gibson (Zealot Pictures, 2005), DVD. 326 Dennis Harvey, "24 Hours on Craigslist,” Variety, February 17, 2005, https://variety.com/2005/film/reviews/24-hours-on-craigslist-1200527841.
192
From a technical perspective, the Craigslist interface is scandalously
unassuming.327 The interface features blue text in an Arial font, set against light gray
banners and a white background — an iconic layout that the platform has barely altered
since the 2000s.328 A home page outlines the site sections and subsections, listing
platform documents beneath a live calendar. One of the sections is a discussion section,
home of the discussion boards that constitute a major research source in this project. The
discussion boards are organized in topic, ranging from art and literature to money and
taxes, and they are structured in conversational threads, publishing comments in
chronological order in response to a foundational post. For instance, an owner of a
diabetic cat might begin a new thread in the Pet section by posting a question about
animal medication; users would then reply to the post, and their comments would be
listed in chronological order beneath the original post. Unlike the Craigslist market,
discussion boards are not locally bounded, and users from all over the world may post on
the same board. They are analogous in structure to Usenet or Reddit forums.
Craigslist users post classified advertisements in specific categories, and
interested users reply directly to the poster through email or phone number. Classified
advertisements may be viewed as a list of thumbnails, as a gallery of photos, or (if
relevant) as a map of locations. Outside of job and housing postings, users pay no fee to
publish advertisements, which expire after several weeks. Despite the simplicity of the
posting from the perspective of users, Craigslist features several protocols and
327 Gary Wolf, "Why Craigslist is Such a Mess,” Wired, August 24, 2009, https://www.wired.com/2009/08/ff-craigslist. Dani Fankhauser, "Why the Web Hasn't Birthed a Prettier Craigslist,” Mashable, February 17, 2013, https://mashable.com/2013/02/17/prettier-craigslist/#pTgshlhJEaq2. 328 Fankhauser, "Why the Web Hasn't Birthed a Prettier Craigslist."
193
functionalities that serve the technical foundations of local commerce. Craigslist utilizes
an filtering protocol that prevents the posting of multiple identical advertisements and the
repeated loading of the site (in technical terms, repeated client requests). Site
advertisements are published with a flag functionality, through which users can report
posts that appear suspicious. Advertisements are removed when they accrue a certain
number of flags, although that number is not publicly known. Craigslist refers to the
process of user flagging as "community moderation"329. Craigslist also includes a profile
functionality, and users can only post on the platform after creating a profile — a simple
process that consists of verifying an email, agreeing to terms of use, and setting a
password. Craigslist provides a temporary email account or "mail relay" through which
users can communicate and which services as a relatively anonymous contact method. In
creating a post, users select a category, provide basic information in a text box, indicate a
preferred contact method, and answer a captcha. Neither names nor identifying
documents are necessary to create accounts of post advertisements, making Craigslist
users anonymous by default. Finally, Craigslist features a set of platform documents
related to best practices: a manual for avoiding fraud, a list of banned objects, and
personal safety tips.
eBay
329 "Flags and Community Moderation,” Craigslist, retrieved March 2017, https://www.craigslist.org/about/help/flags_and_community_moderation.
194
In 1996, Iranian-American computer programmer Pierre Omidyar founded
AuctionWeb to exchange some of his collectibles, which he had started to amass as a side
hobby.330 When the site began to attract high levels of internet traffic, especially from
antique dealers accustomed to auction exchange, Omidyar upgraded to his internet
service to a business account in order to accommodate the surge in online activity.331 By
1997, the platform was hosting two million auctions each month, hiring executives and
board members to fill its ranks, accepting seven million dollars in funding from a venture
capital firm, and rebranding itself as eBay — an adaptation of Echo Bay, Omidyar's first
choice for the site name, tabled due to an unavailable domain address. 332 When eBay
went public in September 1998, the company was the over-achieving child of the dot-
com boom — an early tech unicorn that with a userbase of a million and a market
valuation of $1.88 billion.333 Through the 2000s, eBay expanded beyond collectibles and
travel products to include clothing, electronics, sporting goods, and other consumer
durables, as well as cars, for which the company briefly created (and then shuddered) a
separate market in automobiles.334 During this period, eBay also took commercial
330 Adam Cohen, The Perfect Store (Boston: Little Brown & Co, 2002). 331 Adam Cohen, The Perfect Store. 332 Randall Stross, eBoys: The True Story of the Six Tall Men Who Backed eBay and Other Billion-Dollar Start-Ups (New York: Balantine Books, 2000). Adam Cohen, The Perfect Store. Randopl Court, "Online Auction Craze is Going, Going Gaga,” Wired, November 6, 1997, https://www.wired.com/1997/11/online-auction-craze-is-going-going-gaga. 333 CNN Staff, "EBAY: Return of the IPO,” CNN Money, September 42, 1998, http://money.cnn.com/1998/09/24/technology/ebay. Wired News, "Ebay Boosts IPO Share Price,” Wired, September 23, 1998, https://www.wired.com/1998/09/ebay-boosts-ipo-share-price. Jennifer Sullivan, "Investor Frenzy over eBay IPO,” Wired, September 24, 1998. 334 E-Commerce Journal Staff, "Ebay's History,” E-Commerce Journal, March 26, 2008, http://www.ecommerce-journal.com/articles/ebays_history_the_owner_of_paypal.
195
advantage of Web 2.0 developments through the acquisition of online auction markets,
such as Up2Sale.com, Half.com, Mercadolibre.com, Lokau.com, Carad.com,
Baazzee.com, Marketplaats.nl, Rent.com, Loquo.com, and Shopping.com; conventional
auction houses, including Butterfield & Butterfield and Alando ; and communication and
payment technologies, such as Skype and Paypal — two of the company's most profitable
investments.335 eBay also took a 28% stake in Craigslist, buying out a shareholder and
former employee in 2004.336 However, the relationship soured by 2008, when eBay sued
Craigslist for diluting its stake in the company to 24%, a move that cost eBay a board seat
and prompted Craigslist to buy back the minority stake.337 In the 2010s, eBay introduced
retail sales to the website, furnishing company-made clothing and home goods to
compete with internet retail giants, such as Amazon.338 This distinguishes eBay from
Craigslist and Silk Road, which rely exclusively on the peer-to-peer commerce of users.
Ankurt Chauan, "The Brand That Auctioned the www,” Finance India, March 24, 2009http://finance.indiainfo.com/2009/04/24/0904241614 _the_brand_that_auctioned_the_www. Crunchbase Staff, "eBay Acquisitions,” Crunchbase, last updated February 2018, https://www.crunchbase.com/organization/ebay/acquisitions/acquisitions_list#section-acquisitions. Jonathan Chew, "PayPal Returns Today With a Market Cap Larger than eBay,” Fortune, July 20, 2015. Jean-Louis Gassée, "Why Did MicroSoft Spend $8.5bn on Skype?” The Guardian, May 16, 2011, https://www.theguardian.com/technology/2011/may/16/ballmer-microsoft-skype. 335 E-Commerce Journal Staff, "Ebay's History.” Crunchbase Staff, "eBay Acquisitions.” 336 E-Commerce Journal Staff, "Ebay's History.” Crunchbase Staff, "eBay Acquisitions.” 337 Ryan Mac, "eBay Ends Ties With Craigslist, Sells Minority Stake Back To Craigslist," Forbes, June 19, 2015, https://www.forbes.com/sites/ryanmac/2015/06/19/ebay-ends-ties-with-craigslist-sells-minority-stake-back-to-craigslist. 338 Jeff Himmelman, "EBay's Stragey for Taking On Amazon,” The New York Times, December 19, 2013, https://www.nytimes.com/2013/12/22/magazine/ebays-strategy-for-taking-on-amazon.
196
eBay culture reflects the history of the platform and the transactional form of the
auction. In consumer culture, eBay is considered a place to find rare or unexpected items.
In 1999, someone tried to auction off a kidney on the platform.339 A 2001 episode of the
television series Will & Grace featured a fierce bidding war between characters over a
pair of Britney Spears' sneakers. In 2015, to commemorate the platform's twenty-year
anniversary, Time magazine published a list of "The 20 Weirdest Things Ever Sold on
eBay"340. An Instagram account with forty-five thousand followers "finds the weirdest
shit on eBay so you don't have to"341, posting screenshots of disfigured dolls, Versace
jump ropes, and other detritus from the open auction market. Here, eBay is a source of
consumer goods that are rare or eclectic, not necessarily valuable but not necessarily
worthless. Further, as the Will & Grace example illustrates, eBay culture is also an
auction culture that features the competitive economic practices proper to sale by bid.
These practices include: bidding wars, in which buyers aim to out-bid each other on
objects before the auction timer runs out; sniping, in which buyers wait until the very last
minute to post a high offer that will secure them the item; and shill bidding, in which
sellers bid on their own products in order to drive up the bidding prices among
customers.342 Auction culture blends into antique culture, another crucial dimension of
339 Amy Harmon, "Auction for a Kidney Pops Up on eBay,” The New York Times, September 3, 1999, https://www.nytimes.com/1999/09/03/us/auction-for-a-kidney-pops-up-on-ebay-s-site. 340 Samantha Grossman, "The 20 Weirdest Things Ever Sold on eBay,” Time, September 2, 2015, "The 20 Weirdest Things Ever Sold on eBay.” 341 Tish Weinstock, "This Instagram Account Finds the Weidest Shit on eBay So You Don't Have To,” Vice, May 21, 2018, https://i-d.vice.com/en_us/article/pavpmz/this-instagram-account-finds-the-weirdest-shit-on-ebay-so-you-dont-have-to. "ebaybae,” Instagram, https://www.instagram.com/ebaybae. 342 Ken Steiglitz, Snipers, Shills, and Sharks: eBay and Human Behavior (Princeton: Princeton University Press, 2007).
197
eBay, as both view the exchange of goods as a competitive practice, or, at least, high-
stakes practice that can turn into a lucrative investment or a missed opportunity. As an
antique venue, eBay is part of a vast economic landscape in collectibles — retail venues,
auction houses, yard sales, and flea markets. The foundational role of antique dealers in
the early days of the online auction market means that eBay culture is also antique
culture: the platform generally follows the representational conventions of collectibles
exchange, even when other objects are offered for sale.
On a technical level, eBay has a unique interface and runs on a series of protocols
and functionalities. The current platform interface features a standardized scheme of
bright colors, bold black text in Arial font, and multiple banners that direct users to
different parts of the site. As on Craigslist, there is a discussion board that is not
moderated by the platform, allowing users to freely discuss their concerns without
penalty or censorship. Auction page are uniformly formatted, with a product photo on the
left, real-time auction information on the right, and product description below. Still,
auction pages enjoy a high level of customization: there are few limits on the length and
the format of product descriptions, and some vendors create their own formatting
templates to standardize their offerings.
eBay also features several protocols that are important to market operations.
There is a filter protocol that removes advertisements for banned items. Once an
advertisement passes through the filter, it moves through the auction protocol, where
vendors are prompted to set for the auction a timeframe (ranging from days to weeks), a
reserve price (minimal acceptable bid), and a Buy it Now price (price that secures the
item and thus ends the auction). In the case of a successful bid, the buyer pays the vendor
198
through a payment protocol, Paypal, which places electronically transferred money in a
temporary escrow before delivering it to the receiver. This protocol, through which every
transaction must pass, allows the platform to collect a commission on each transaction,
ranging from ten to twenty percent of the selling price. Further, eBay features a
reputation protocol, which allows buyers to rate sellers after a purchase. There, buyers are
to evaluate the accuracy of product description and the quality of customer service
offered by sellers. eBay also maintains a dispute resolution center to resolve contested
transactions, including claims of fraud. Outside of protocols, eBay includes a copyright
functionality, which allows companies to request item removal if the item is a suspected
counterfeit. Profile creation is a simple process that consists of email verification and
password creation. Seller fees and credit card numbers accompany vendor profiles, which
have access to the post functionality but may be financially penalized in cases of
contested dispute.
Silk Road
Silk Road was a market on the dark web. The dark web is an amorphous
collection of internet sites that run on darknets, or overlay networks that employ non-
standard communication protocols in order to encrypt and anonymize information.343 The
343 Typically, a domain name is translated into a corresponding IP address through the Domain Name System (DNS). Once the address has been located, Transmission Control Protocol (TCP) enables a connection between two hosts, who are then able to exchange information. TCP/IP refers to this suite of standard communication protocol. Instead of having a standard top-level domain (such as .com) and a corresponding IP address that can be translated by DNS, dark web sites employ a non-standard top-level domain (.onion) that can only be accessed through private overlay networks, such as The Onion Router (Tor) and Invisible Internet Project (I2P). Moreover, rather than connect through the conventional Internet port, dark web sites use alternative ports, of which there are
199
term "darknet" was initially coined in the 1970s to designate networks insulated from
ARPANET. Only in the early 2000s did the term gain relative purchase, following a
conference publication by Microsoft employees on digital piracy344 and topical articles in
Wired345. The phrase "dark web" likely developed contemporaneously within hacker
circles as an idiomatic reference to darknet-accessible websites. Despite some
terminological confusion in the popular press, the dark web is not equivalent to the deep
web, or the assortment of websites, mostly databases, that have not been indexed by
traditional search engines.346 The dark web does not include file-sharing websites, such as
Kazaa, as these utilize standard internet protocols, nor does it include military networks,
such as the Secret Internet Protocol Router Network, as these are structurally detached
from the public internet.347 Dark web sites are published and maintained primarily
through Tor Hidden Services, which conceal user identities and hide server locations.348
over sixty thousand on any computer. Between the non-standard IP address, the absence of DNS entry, and the unusual port configuration, dark web users are highly difficult to trace. Cath Everett, "Moving Across to the Dark Side,” Network Security (September 2009): 10-13. Nichols Christin, "Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.” 344 Peter Biddle et al., "The Darknet and the Future of Content Distribution" (paper presentation, Digital Rights Management Conference, Washington, DC, 2002). 345 Wired Staff, "Dark Netizen,” Wired. August 1, 2004, https://www.wired.com/2004/08/dark-netizen. Jeff Howe, "The Shadow Internet,” Wired, January 1, 2005, https://www.wired.com/ 2005/01/topsite. 346 Michael Bergman, "The Deep Web: Surfacing Hidden Value,” Bright Planet, published online 2001, https://brightplanet.com/2012/06/the-deep-web-surfacing-hidden-value. 347 Steve Mansfield-Devine, "Going Over to the Dark Side,” Network Security (December 2009): 4-6. Cath Everett, "Moving Across to the Dark Side.” 348 When computers connect to the internet, they each are assigned a unique IP address. A computer's IP address corresponds to its internet service provider, IP host name, and geospatial location. IP addresses consequently permit the tracking of internet-connected computers. In order to prevent tracking, private overlay networks (such as Tor) relay users through a series of servers before connection, so their IP addresses correspond to a
200
They predominately function as underground marketplaces for the exchange of illegal or
highly regulated goods: fake identification and passports, stolen credit cards and
identities, hacker services and manuals, pirated media and electronic goods, human slaves
and escorts, guns and ammunition, and street and pharmaceutical drugs. The dark web
also hosts social networking sites for criminal and radical groups, including terrorist
organizations349 and hacker collectives350.
In January of 2011, Ross William Ulbricht, an American man in his thirties,
developed and launched Silk Road as a business venture and an experiment in free
markets.351 After obtaining a hidden server to host Silk Road — named after the
sprawling trade networks of antiquity — Ulbricht advertised the site on drug and
cryptocurrency forums on the clear web, such as Shroomery.org and Bitcointalk.org.352
Living in Colorado at the time, he grew psychedelic mushrooms in his backyard in order
to post them in the market and therefore attest to the legitimacy of the site in the absence
node in another part of the world. This is made possible through a network of six thousand volunteer computers, which function as intermediary nodes. In the case of Tor, these computers range from private desktops to institutional networks, including governmental and university networks, as Tor was originally established to protect political whistleblowers and victims of domestic abuse. Further, the relay system allows users to publish sites without revealing the site's server location Hence, in addition to being navigationally inaccessible through the TCP/IP protocol, dark web sites are grounded in servers that are difficult to physically locate. Digital Citizens Alliance, "Busted, But Not Broken: The State of Silk Road and the Darknet Marketplaces," published online 2014, http://digitalcitizensalliance.org. 349 Steve Mansfield-Devine, "Going Over to the Dark Side.” 350 Robert Gehl, "Power/Freedom on the Dark Web: A Digital Ethnography of the Dark Web Social Network, New Media & Society (published online October 2014): 1-17, 10.1177/1461444814554900 351 See the discussion of Ulbricht's libertarianism in chapter 1. United States of America v. Ross William Ulbricht, Government Sentencing Submission. 352 United States of America v. Ross William Ulbricht, Government Sentencing Submission. "Silk Road Timeline,” Antilop, https://antilop.cc/sr.
201
of a user base.353 By October of 2011, Silk Road was facilitating a million dollars worth
of trade each month; Ulbricht was collecting a hundred thousand dollars in commission
as his monthly paycheck; and law enforcement agencies were investigating the platform
after a seller agreed to turn state witness.354 Four months later, in February 2012, Ulbricht
hired programmers to help maintain the site, which was now moving two million dollars
worth of contraband each month.355 Stakes rose in the summer, as Silk Road hit one
hundred million in sales and federal agents went undercover to infiltrate the anonymous
site.356 Ulbricht was unknowingly corresponding with an undercover FBI agents when he
reported the "explosive growth" of Silk Road to the discussion board in November 2012,
and when he hired an assassin to murder a user who was extorting him in January
2013.357 Later that year, the Reykjavik Metropolitan Police (RMP) in Iceland, where Silk
Road's hidden server was located, identified the platforms dark web address, leading the
FBI to search and shut down the domestic servers in Pennsylvania hosting Silk Road
data.358 In order to capture Ulbricht, however, the FBI needed to directly connect the
executive to the platform, a difficult task in the anonymous conditions of the dark web.
Consequently, in October 2013, federal agencies staked out the San Francisco Public
Library, where Ulbricht often worked, until the executive arrived, opened his laptop, and
logged into the Silk Road central administration page.359
353 Jamie Bartlett, The Dark Net (New York: Melville House, 2016). 354 United States of America v. Ross William Ulbricht, Exhibit GX 251. 355 United States of America v. Ross William Ulbricht, Exhibit GX 251. "Silk Road Timeline,” Antilop, https://antilop.cc/sr. 356 United States of America v. Ross William Ulbricht, Exhibit GX 251. "Silk Road Timeline,” Antilop, https://antilop.cc/sr. 357 United States of America v. Ross William Ulbricht, 1523-1557. 358 United States of America v. Ross William Ulbricht, 1563-1622. 359 United States of America v. Ross William Ulbricht, 140-177.
202
From a technical perspective, Silk Road featured a conventional interface and
operated through a set of protocols and functionalities. Visually, the interface resembled
the bare-boned Craigslist system, inflected through hacker aesthetics: product categories
presented in their entirety, advertisements arrayed as thumbnails in lines of three, set
against a white background with dark green Arial text, and the Silk Road logo on the
upper left. It also drew on the internet retail conventions with a shopping cart
functionality, displayed on the top of the interface.
An escrow protocol was key to the site's operation Traders dealt in Bitcoin, a
digital currency that supports verifiable and anonymous transactions without a centralized
third party.360 When purchasing a good on Silk Road, buyers were to place their
payments in a site-supported escrow. Upon receiving the item, the buyer was to inspect
the product and finalize the purchase. Finalization released the funds from escrow to the
vendor. The escrow system was designed to prevent the sale of counterfeit products and
to generate revenue for the site executive. Ulbricht took a commission, ranging from ten
to twenty percent of the selling price, on every trade that passed through Silk Road's
escrow system.361 Silk Road also featured a reputation protocol in the form of a five-star
rating system, which allowed buyers to evaluate vendors. The vendor reputation system
was also designed to encourage competition among sellers, who could strategically brand
themselves claim a small market segment.
360 Bartlett, The Dark Net. 361 United States of America v. Ross William Ulbricht, 256-258.
203
REFERENCES
"Beyond Silk Road: The Potential Risks, Threats, and Promises of Virtual Currencies."
Hearing Before the Committee on Homeland Security and Governmental Affairs.
United States Senate. 113th Congress. November 18, 2013.
"Commercium.” The Oxford Classical Dictionary, 3rd rev. ed., edited by Simon
Hornblower and Antony Spawforth. Oxford: Oxford University Press. 2005.
"ebaybae.” Instagram. https://www.instagram.com/ebaybae.
Aglietta, Michel. A Theory of Capitalist Regulation: The US Experience. London: Verso,
2015.
Agrawal, Ajay et al. The Prediction Machine: The Simple Economics of Artificial
Intelligence. Cambridge: Harvard Business Review, 2018.
AIM Group. "Craigslist Revenue Soars Again.” Published online November 2016.
http://www.aimgroup.com/2016/11/29/craigslist-revenue-soars-again.
AIM Group. Global Classified Advertising Annual. Published online November 2016.
http://www.aimgroup.com/reports.
Akerlof, George and Robert J. Shiller. Phishing for Phools: The Economics of
Manipulation and Deception. Princeton: Princeton University Press, 2015.
Alexa. "craigslist Traffic Statistics.”. http://www.alexa.com/siteinfo/craigslist.org.
Alexa. "How Popular Is eBay?" Published 2017.
http://www.alexa.com/siteinfo/ebay.com.
Alexa."How Popular is Craigslist?" Published 2017.
http://www.alexa.com/siteinfo/craigslist.org.
204
Appadurai, Arjun. "Archive and Aspiration." In Information Is Alive, edited by Joke
Brouwer and Arjen Mulder, 14-25. Rotterdam: NAI Publishers, 2003.
Appadurai, Arjun. "Commodities and the Politics of Value.” In The Social Life of Things,
edited by Arjun Appadurai, 3-65. Philadelphia: Cambridge University Press.
1986.
Arsht, Andrew and Daniel Etcovich. "The Human Costs of Online Content Moderaiton.”
Harvard Journal of Law and Technology (March 2, 2018).
https://jolt.law.harvard.edu/digest/the-human-cost-of-online-content-moderation.
Arthur, Christopher and Geertz Reuten. eds. The Circulation of Capital: Essays on
Volume Two of Marx's Capital. New York: St. Martin's Press, 1998.
Assmann, Aleida. "Canon and Archive." In A Companion to Cultural Memory Studies,
edited by Astrid Erll and Ansgar Nünning, 97-107. Berlin: Walter de Gruyter,
2010.
Atkinson, Paul and Amanda Coffey. "Revisiting the Relationship Between Participant
Observation and Interviewing.” in Handbook of Interview Research, edited by
Jaber F. Gubrium and James A. Holstein, 801-814. Thousand Oaks: Sage, 2001.
Aufderheide, Patricia and Peter Jaszi. Reclaiming Fair Use. Chicago: University of
Chicago Press, 2011.
Bakardjieva, Maria and Andrew Feedberg. "Community Technology and Democratic
Rationalization." The Information Society 18 (2002): 181-192.
Bakardjieva, Maria. The Internet Society. London: Sage, 2005.
Bambury, Paul. "A Taxonomy of Internet Commerce.” First Monday 3, no. 10 (October
1998): no pagination. http://firstmonday.org/ojs/index.php/fm/article/view/624.
205
Barbrook, Richard and Andy Cameron. "The California Ideology." Science as Culture 6,
no. 1 (1996): 44-72. https://doi.org/10.1080/09505439609526455.
Barbrook, Richard. "The Hi-tech Gift Economy.” First Monday 3, no. 12 (1998): no
pagination. http://firstmonday.org/ojs/index.php/fm/article/view/631/552.
Bartlett, Jamie. The Dark Net. London: William Heinemann of Random House, 2014.
Bartlow, John Perry. "A Declaration of the Independence of Cyberspace.” In Crypto
Anarchy. Cyberstates. and Pirate Utopias, edited by Peter Ludlow, 27-30.
Cambridge: MIT Press, 2001.
Baurdillard, Jean. "Consumer Society.” In Consumer Society in American History, edited
by Lawrence B. Glickman, 33-56. Ithaca: Cornell University Press, 1970/1999.
Baurdillard, Jean. The System of Objects. London: Verso, 1968/2005.
Baym, Nancy "From Practice to Culture on Usenet.” In The Cultures of Computing,
edited by Susan Leigh Star, 29-53. Oxford: Blackwell, 1995.
Baym, Nancy. "The Emergence of Community in Computer-Mediated Communication."
In Cybersociety: Computer-Mediated Communication and Community, edited by
Steve Jones, 138-163. Thousand Oaks: Sage, 1995.
Baym, Nancy. "What Constitutes Quality in Qualitative Internet Research?" in Internet
Inquiry, edited by Annette N. Markham and Nancy K. Baym, 183-189. Thousand
Oaks: Sage, 2009.
Bays, Hillary and Miranda Mowbray. "Cookies. Gifting. and the Internet.” First Monday
4, no. 11 (1999): no pagination.
http://firstmonday.org/ojs/index.php/fm/article/view/700/610.
Bell, Daniel. The Coming of Post-Industrial Society. New York: Basic Books, 1973.
206
Benjamin, Walter. The Arcades Project. Cambridge: Harvard Univeristy Press, 1982.
Benkler, Yochai, The Wealth of Networks. New Haven: Yale University Press, 2006.
Bennett, Jane. The Enchantment of Modern Life: Attachments, Crossings, and Ethis.
Princeton: Princeton University Press, 2001.
Benson, Bruce L. "The Spontaneous Evolution of Commercial Law." Southern Economic
Journal 55, no. 3 (January 1989): 644-661.
Berardi, Franco. The Soul At Work. Cambridge: MIT Press, 2009.
Bergman, Michael. "The Deep Web: Surfacing Hidden Value.” Bright Planet. Published
online 2001. https://brightplanet.com/2012/06/the-deep-web-surfacing-hidden-
value.
Biddle, Peter et al. "The Darknet and the Future of Content Distribution" Paper
presentation. Digital Rights Management Conference. Washington, DC, 2002.
Biddle, Sam. "The Best Robot Floor Cleaners.” Gizmodo, October 31, 2011.
https://gizmodo.com/5853095/which-robot-maid-will-clean-your-floors-the-best.
Birkinbine, Benjamin et al., eds. Global Media Giants. New York: Routledge, 2016.
Bolin, Göran. Value and the Media: Cultural Production and Consumption in Digital
Markets Farnham: Ashgate Press. 2011.
Boltanski, Luc and Eve Chiapello. The New Spirit of Capitalism, translated by Gregory
Elliot. London: Verso, 2005.
Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. Translated by
Richard Nice. Cambridge: Harvard University Press, 1984.
boyd, danah. "Friends. Friendsters. and Myspace Top 8: Writing Community into Being
on Social Network Sites." First Monday 11 (2006): no pagination.
207
Boyd, Josh. "In Community We Trust: Online Security Communication at eBay.”
Journal of Computer-Mediated Communication 7, no. 3 (2002): no pagination.
10.1111/j.1083-6101.2002.tb00147.x.
Boyd, Josh. "Virtual Orality: How eBay Controls Auctions Without an Auctioneer's
Voice.” American Speech 76, no. 3 (2001): 286-300.
Branwen, Gwern et al. "Dark Net Market Archives, 2011-2015." Published online July
2015. https://www.gwern.net/DNM-archives.
Braucher, Jean and Barak Orbach. "Scamming: The Misunderstood Confidence Man.”
Yale Journal of Law and Humanities 27, no. 2 (2015): 249-292.
http://heinonline.org/
Breland, Ali and David McCabe. "Internet Companies Dominate Tech Lobbying.” The
Hill, September 22, 2016. http://thehill.com/policy/technology/297126-internet-
companies-dominate-tech-lobbying.
Broussard, Meredith. Artificial Unintelligence. Cambridge: MIT Press, 2018.
Brousseau, Eric and Nicolas Curien, eds. Internet and Digital Economics. Cambridge:
Cambridge University Press, 2007.
Brügger, Niels, ed. Web 25: Histories from the First Twenty Five Years of the World
Wide Web. New York: Peter Lang, 2017.
Brügger, Niels, ed. Web History. New York: Peter Lang, 2010.
Brunton, Finn. Spam. Cambridge: MIT Press, 2015.
Buckland, Michael. Information and Society. Cambridge: MIT Press, 2017.
Buckmaster, Jim. "CL at OSCON." Craigslist Blog. Last modified July 13, 2013.
http://blog.craigslist.org/2013/07/23/cl-at-oscon.
208
Burgess, Jean and Joshua Green. Youtube: Online Video and Participatory Culture.
Cambridge: Polity Press, 2009.
Burnett, Gary and Laurie Bonnici. "Beyond the FAQ: Explicit and Implicit Norms in
Usenet Newsgroups.” Library & Information Science Research, 25 (2003): 333-
351.
Burns, Leslie Davis et al. The Business of Fashion: Designing, Manufacturing, and
Marketing, 5th ed. New York: Bloomsbury, 2016.
Butler, Judith. "Further Reflections on Conversations of Our Time.” Diacritics 27, no. 1
(Spring 1997). http://www.jstor.org/stable/1566267.
Butler, Judith. Bodies That Matter: On the Discursive Limits of Sex. New York:
Routledge, 1993
Butler, Judith. Precarious Life: The Powers of Mourning and Violence. London: Verso,
2004.
Cahill, Michael T. "Extortion and Blackmail.” In The Encyclopedia of Criminology and
Criminal Justice. edited by Jay S. Albanese. New York: Wiley-Blackwell, 2014.
Calkins, Mary. "My Reputation Always Had More Fun Than Me: The Failure of eBay's
Feedback Model to Effectively Prevent Online Auction Fraud.” Richmond
Journal of Law and Technology (Spring 2001).
Cameron, W.S.K. "Fallibilism, Rational Reconstruction. and the Distinction between
Moral Theory and Ethical Life.” In Perspectives in Habermas, edited by Lewis
Edwin Hahn, 175-194. Chicago: Open Court, 2000.
Candlin, Fiona and Raiford Guins, eds. The Object Reader. New York: Routledge, 2009.
209
Carlson, Audrey and Sahil Chinoy. "How to Buy a Gun in 15 Countries." The New York
Times. March 2, 2018.
Carruthers, Bruce G. and Brian Uzzi. "Economic Sociology in the New Millenium.”
Contemporary Sociology 29. no. 3 (May 2000): 486-494.
Castells, Manuel. The Rise of the Network Society. Hoboken: Wiley & Blackwell, 2000.
CBS Staff. "Hunt For 'Craigslist Killer' Intensifies.” CBS News, April 18, 2009.
https://www.cbsnews.com/news/hunt-for-craigslist-killer-intensifies/. Cornwall,
Rupert. "Sex. Death. and Cyberspace: Who Is the Craigslist Killer?" The
Independent, June 20. 2009.
https://www.independent.co.uk/news/world/americas/sex-death-and-cyberspace-
who-is-the-craigslist-killer-1707653.html. Lauren Pearle and McPhee, Michelle.
"Accused 'Craigslist Killer' Phillip Maroff FAces New Assault. Weapons
Charges.” ABC News, May 4, 2009.
https://abcnews.go.com/US/story?id=7497625.
Center for Energy and Environmental Policy Research. "The Economics of Ride-Hailing:
Driver Revenue. Expenses and Taxes.” Published online February 2018.
http://ceepr.mit.edu/
Chandler, Alfred D. Jr. Inventing the Electronic Century: The Epic Story of the
Consumer Electronics and Computer Industries. Cambridge: Harvard University
Press, 2005.
Chauan, Ankurt. "The Brand That Auctioned the www.” Finance India, March 24, 2009,
http://finance.indiainfo.com/2009/04/24/0904241614_the_brand_that_auctioned_t
he_www.
210
Chen, Adrian. "The Underground Website Where You Can Buy Any Drug Imaginable.”
Gawker, June 1, 2011. http://gawker.com/the-underground-website-where-you-
can-buy-any-drug-imag-30818160.
Chen, David Lee Kuo. ed. Handbook of Digital Currency. London: Elsevier, 2015.
Cheney-Lippold, John. We Are Data. New York: NYU Press, 2017.
Cheng, T.C.E. and S. Podolsky. Just In Time Manufacturing: An Introduction. London:
Chapman & Hall, 1993.
Chew, Jonathan. "PayPal Returns Today With a Market Cap Larger than eBay.” Fortune,
July 20, 2015.
Chicago Lawyers Committee for Civil Rights Under Law v. craigslist. Inc. 519 F. 3d 666
(7th Cir. 2008).
Cho, Jeasik and Allen Trent. "Validity in Qualitative Research Revisited.” Qualitative
Research 6, no. 3 (2006). 320. 10.1177/1468794106065006.
Choi, Bryan H. "The Anonymous Internet.” Maryland Law Review 72 (2013): 501-570.
Chordia, Tarun et al. "High-frequency Trading.” Journal of Financial Markets 16, no. 4
(November 2013): 627-645.
Christensen, Clayton The Innovator's Dilemma: When New Technologies Cause Great
Firms to Fail. Cambridge: Harvard Business Review Press, 1997.
Christin, Nichols. "Traveling the Silk Road: A Measurement Analysis of a Large
Anonymous Online Marketplace.” International World Wide Web Conference
Committee Proceedings (May 2013): no pagination. ACM 978-1-4503-2035-
1/13/05.
211
CNN Staff. "EBAY: Return of the IPO.” CNN Money, September 42, 1998.
http://money.cnn.com/1998/09/24/technology/ebay.
Cohen-Almagor, Raphael. Confronting the Internet's Dark Side. Cambridge: Cambridge
University Press, 2015.
Cohen, Adam. The Perfect Store: Inside eBay. Boston: Little, Brown and Company,
2002.
Cohen, Nicole. "The Valorization of Surveillance: Towards a Political Economy of
Facebook.” Democratic Communiqué 22, no. 1 (2008): 5-22.
Cohen, Noam. The Know-It-Alls. New York: The New Press, 2017.
Coleman, E. Gabriella. "The Social Construction of Freedom in Free and Open Source
Software: Hackers. Ethics. and the Liberal Tradition." Doctoral dissertation,
University of Chicago, 2005.
Coleman, Gabriella. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of
Anonymous. London: Verso, 2015.
Communications Decency Act of 1996. 47 U.S.C. § 230 (1996).
Connolly, Regina. "Trust in Commercial and Personal Transactions in the Digital Age.”
In The Oxford Handbook of Internet Studies, edited by William H. Dutton, 165-
192. Oxford: Oxford University Press. 2013.
Court, Randoplh. "Online Auction Craze is Going. Going Gaga.” Wired, November 6,
1997. https://www.wired.com/1997/11/online-auction-craze-is-going-going-gaga.
Cowan, Ruth Schwartz. More Work For Mother. New York: Basic Books, 2008.
Craigslist. "About.” Craigslist. Retrieved March 2017. https://www.craigslist.org/about.
212
Craigslist. "Avoiding Scams." About. Updated October 20. 2014. Retrieved from The
Way Bakc Machine.
https://web.archive.org/web/20141020025419/https://www.craigslist.org/about/sc
ams.
Craigslist. "Avoiding Scams." About. Updated September 21. 2014. Retrieved from The
Way Bakc Machine.
https://web.archive.org/web/20140914121202/https://www.craigslist.org/about/sc
ams.
Craigslist. "Avoiding Scams.” About. Last accessed 1 December 2017.
https://www.craigslist.org/about/scams.
Craigslist. "Flags and Community Moderation.”. Retrieved March 2017.
https://www.craigslist.org/about/help/flags_and_community_moderation.
Craigslist. "Jim Buckmaster.” About. Accessed May 9, 2018.
https://www.craigslist.org/about/jim_buckmaster.
Craigslist. "Prohibited." About. Accessed January 22, 2018.
https://www.craigslist.org/about/prohibited.html.
Craigslist. "Terms of Use." About. Last updated December 27, 2017.
https://www.craigslist.org/about/terms-of-use.
craigslist, Inc. v. 3Taps, Inc. 3:12-CV-03816-CRB (N.C. Cal. 2015).
craigslist, Inc. v. Alecksey Kerbel et al. C-11-3309 EMC (N.D. Cal. 2012).
craigslist, Inc. v. John L. Stover et al. CV-11-03308 SBA (N.D. Cal. 2012).
craigslist, Inc. v. Naturemarket, Inc. 694 F. Supp. 2d 1039 (N.D. Cal. 2010).
Crary, Jonathan. 24/7: Late Capitalism and the Ends of Sleep. London: Verso, 2014.
213
Crunchbase Staff. "eBay Acquisitions.” Crunchbase. Last updated February 2018.
https://www.crunchbase.com/organization/ebay/acquisitions/acquisitions_list#sect
ion-acquisitions.
Crystal, David et al. Language and the Internet. Cambridge: Cambridge University Press,
2006.
Cushing, Ellen. "Amazon Mechanical Turk: The Digital Sweatshop.” Utne, February
2013. https://www.utne.com/science-and-technology/amazon-mechanical-turk-
zm0z13jfzlin.
Cyph. "About Cyph.”. Retrieved July 22. 2017. https://www.cyph.com/about.
Davidson, Guy. Queer Commodities: Contemporary US Fiction. Consumer Capitalism.
and Gay and Lesbian Subcultures. New York: Palgrave Macmillan, 2012.
Davis, J. "Forms and Norms: The Economy of Social Relations.” Man 8, no. 2 (June
1973): 159-179. http://www.jstor.org/stable/2800844.
Davis, John. Exchange. Buckingham: Open University Press, 1992.
Davison, Patrick "The Language of Internet Memes." In The Social Media Reader, edited
by Michael Mandiberg, 120-135. New York: New York University Press, 2012:.
Deleuze, Giles and Félix Guattari. A Thousand Plateaus: Capitalism and Schizophrenia.
Minneapolis: University of Minnesota Press, 1987.
Deleuze, Gilles and Félix Guattari. A Thousand Plateaus. London: Bloomsbury, 2016.
Denegri-Knott, Janice and Detlev Zwick. "Tracking Prosumption Work on eBay:
Reproduction of Desire and the Challenge of Slow Re-McDonaldization."
American Behavioral Scientist 56, no. 4 (2012): 439-458. doi
10.1177/0002764211429360.
214
Denegri-Knott, Janice and Detlev Zwick. D. "Tracking Prosumption Work on eBay:
Reproduction of Desire and the Challenge of Slow Re-McDonaldization.”
American Behavioral Scientist 56. no. 4 (2012): 439-459. doi:
10.1177/0002764211429360.
Denegri-Knott, Janice and Mike Molesworth. "'Love It. Buy It. Sell It.' Consumer Desire
and the Social Drama of eBay." Journal of Consumer Culture 10, no. 1 (2010):
56-79.
Denzin, Norman K. "Cybertalk and the Method of Instances.” In Doing Internet
Research, edited by Steve Jones, 107-125. Thousand Oaks: Sage. 1999.
Denzin, Norman. The Research Act. Piscataway: Transaction Publishers, 1970.
Dewey, Caitlin. "Think Twice Before Answering That Ad: 101 Murders Have Been
Linked to Craigslist." The Washington Post, January 11, 2016.
https://www.washingtonpost.com/news/the-intersect/wp/2016/01/11/think-twice-
before-answering-that-ad-101-killers-have-found-victims-on-craigslist.
Dhanjani, Nitesh. Abusing the Internet of Things. Sebastopol: O'Reilly Media, 2015.
Dibbel, Julian. "A Rape in Cyberspace." The Village Voice. December 23, 1993.
Dickey, Megan Rose. "Airbnb CEO Said Company Will 'Be Ready to IPO Next Year'
But Might Not.” Tech Crunch, May 30, 2018.
https://techcrunch.com/2018/05/30/airbnb-ceo-said-company-will-be-ready-to-
ipo-next-year-but-might-not.
Digital Citizens Alliance. "Busted. But Not Broken: The State of Silk Road and the
Darknet Marketplaces.”
215
Downes, Larry. "The Tangled Web of Net Neutrality and Regulations." Harvard
Business Review, March 31, 2017. https://hbr.org/2017/03/the-tangled-web-of-
net-neutrality-and-regulation.
Dram, Robert D. and Margaret Jane Radin. "Altered States: Electronic Commerce and
Owning the Means of Value Exchange.” Stanford Technology Review 2 (1999).
Drucker, Peter. The Age of Discontinuity. New Brunswick: Transaction, 1992.
Duke, Alan. "Official: Craigslist to Replace 'Blatant Internet Brothel.'" CNN, May 13,
2009. http://www.cnn.com/2009/TECH/05/13/craigslist.sex.ads
Dumouchel, Paul and Luisa Damiano. Living With Robots. Translated by Malcolm
DeBevoise. Cambridge: Harvard University Press, 2017.
Dwoskin, Elizabeth and Craig Timberg. "How Merchants Use Facebook to Flood
Amazon with Fake Reviews." The Washington Post, April 23, 2018.
Dyer-Witherford, Nick. Cyber-Marx: Cycles and Circuits of Struggle in High-
Technology Capitalism. Urbana: University of Illinois Press, 1999. Langlois,
Ganaele et al., eds. Compromised Data: From Social Media to Big Data. New
York: Bloomsury Academic, 2015.
E-Commerce Journal Staff. "Ebay's History.” E-Commerce Journal, March 26, 2008.
http://www.ecommercejournal.com/articles/ebays_history_the_owner_of_paypal.
eBay Inc. "Fill Your Cart With Color.” Television advertisement. Directed by Bridget
Savage Cole, Josh Nussbaum, and Director X.
eBay, Inc. "eBay Inc. Reports Fourth Quarter and Full Year 2017 Results.” January 31,
2018. https://www.ebayinc.com/stories/news/ebay-inc-reports-fourth-quarter-and-
full-year-2017-results.
216
eBay. "eBay Money Back Gaurantee.” Help. Accessed December 2017.
eBay. "Offers to Buy or Sell Outside of eBay Policy." Accessed February 18, 2018.
https://www.ebay.com/help/policies/payment-policies/offers-buy-sell-outside-
ebay-policy?id=4272#section2.
eBay. "Our New Logo.” Published online 2016. https://pages.ebay.com/np/en-
us/announcements/new/index.html?article.
eBay. "Prohibited and Restricted Items." Help. Accessed January 16, 2018.
https://www.ebay.com/help/policies/prohibited-restricted-items/prohibited-
restricted-items?id=4207.
eBay. "User Agreement.” Last modified April 3, 2018.
https://www.ebay.com/help/policies/
Elder-Vass, Dave. "Lifeworld and Systems in the Digital Economy.” European Journal
of Social Theory 21, no. 2 (2018): 227-244. doi: 10.1177/1368431017709703.
Elder-Vass, Dave. Profit and Gift in the Digital Economy. Cambridge: Cambridge
University Press. 2016.
Elm, Malin Sveninsson. "How Do Various Notions of Privacy Influence Decisions in
Qualitative Internet Research?" In Internet Inquiry, edited by Annette Markham
and Nancy Baym, 69-87. Thousand Oaks: Sage, 2009.
European Monitoring Centre for Drugs and Drug Addiction. "The Internet and Drug
Markets." EMCDDA Insight 21. Luxembourg: Publications Office of the
European Union.
Everett, Cath. "Moving Across to the Dark Side.” Network Security (September 2009):
10-13.
217
Facebook. "Introducing Marketplace.” Published October 2016.
http://newsroom.fb.com/news/2016/10/introducing-marketplace-buy-and-sell-
with-your-local-community.
Fankhauser, Dani. "Why the Web Hasn't Birthed a Prettier Craigslist.” Mashable,
February 17, 2013. https://mashable.com/2013/02/17/prettier-
craigslist/#pTgshlhJEaq2.
Federici, Silvia. Revolution at Point Zero. Oakland: PM Press, 2012.
Ferriss, Tim. The Four Hour Work Week. New York: Random House, 2007.
Fiegerman, Seth. "Uber CEO says company plans to go public in 2019.” CNN, November
9, 2017. http://money.cnn.com/2017/11/09/technology/uber-ipo-2019/index.
Finn, Ed. What Algorithms Want: Imagination in the Age of Computing. Cambridge: MIT
Press, 2017.
Fiore-Gartland, Brittany and Gina Neff. "Disruption and the Political Economy of
Biosensor Data.” In Quantified: Biosensing Technologies in Everyday Life, edited
by Dawn Nafus, 101-122. Cambridge: MIT Press, 2016.
Firth, Raymond. Themes in Economic Anthropology. Hoboken: Taylor and Francis, 2013.
Fiske, Alan Page. Structures of Social Life. New York: Free Press, 1993.
Ford, Heather and Judy Wajcman. "'Anyone Can Edit'. Not Everyone Does: Wikipedia's
Infrastructure and Gender Gap.” Social Studies of Science 44, no. 4 (2017): 511-
527. doi:10.1177/0306312717692172.
FormerSR. "I'm a former Silk Road drug dealer. AMA!" Reddit. r/Casualama. https://
www.reddit.com/r/casualiama/comments/1l0axd/im_a_former_silk_road_drug_de
aler_ama
218
Forte, Andrea et al. "Decentralization in Wikipedia Governance.” Journal of
Management Information Systems 26 (2009): 49-72. doi: 10.2753/MIS0742-
12222602013.
Forte, Andrea, Vanessa Lacro, and Amy Bruckman. "Decentralization in Wikipedia
Governance." Journal of Management Information Systems 26 (2009). 49-72. doi:
10.2753/MIS0742-1222260103.
Foucault, Michel. "An Interview with Michel Foucault.” History of the Present 4 (Spring
1988): 1-13. http://anthropos-lab.net/wp/publications/2009/05/hotp1988.pdf.
Foundation for Peer-to-Peer Alternatives. "Commons Transitions: Policy Proposals for an
Open Knowledge Commons Society." Published online, 2015.
http://commonstransition.org/wp-content/uploads/2015/03/Commons-
Transition_-Policy-Proposals-for-a-P2P-Foundation.pdf.
Fraser, Nancy. "Behind Marx's Hidden Abode.” New Left Review 1, no. 86 (March 2014).
Freese, Susan. Craigslist: The Company and Its Founder. North Mankato: ABDO, 2011.
I draw on Freese through the rest of this paragraph.
Friedman, David. "The Craigslist Killers.” GQ, July 13, 2014.
https://www.gq.com/story/craigslist-killers.
Fuchs, Christian et al. Internet and Surveillance: The Challenges of Web 2.0 and Social
Media. New York: Routledge, 2012.
Fuchs, Christian. "Capitalism or Information Society?" European Journal of Social
Theory 16. no. 4 (2012): 413-434. doi: 10.1177/1368431012461432.
219
Fuchs, Christian. "Dallas Smythe and Digital Labor." In The Routledge Companion to
Labor and Media, edited by Richard Maxwell, 51-62. New York: Routledge.
2016.
Fuchs, Christian. Digital Labor and Karl Marx. New York: Routledge, 2014.
Fuchs, Christian. Social Media: A Critical Introduction. Thousand Oaks: Sage, 2017.
Fung, Brian. "FCC Net Neutrality Process 'Corrupted' By Fake Comments and Vanishing
Consumer Complaints. Officials Say.” The Washington Post, November 24, 2017.
https://www.washingtonpost.com/news/the-switch/wp/2017/11/24/fcc-net-
neutrality-process-corrupted-by-fake-comments-and-vanishing-consumer-
complaints-officials-say/?utm_term=.b661c4ae6baf.
Fürsich, Elfriede. "In Defense of Textual Analysis: Restoring a Challenged Method for
Journalism and Media Studies.” Journalism Studies 10, no. 2 (2009): 238-252.
10.1080/14616700802374050.
Galloway, Alexander. "The Reticular Fallacy.” October 6. 2014.
http://cultureandcommunication.org/galloway/the-reticular-fallacy. Galloway
makes a similar argument about the embrace of horizontality in critical theory.
Galloway, Alexander. Protocol. Cambridge: MIT Press, 2004.
Garner, Joseph, dir. Craigslist Joe. CLJ Films, 2012. DVD.
Garnham, Nicholas. "Information Society as Theory or Ideology.” Information.
Communication. & Society 3, no. 2 (2000): 139-152.
Gassée, Jean-Louis. "Why Did MicroSoft Spend $8.5bn on Skype?" The Guardian, May
16, 2011. https://www.theguardian.com/technology/2011/may/16/ballmer-
microsoft-skype.
220
Gatson, Sarah N. "Illegal Behavior and Legal Speech: Internet Communities' Discourse
About Drug Use." In Real Drugs in a Virtual World: Drug Discourse and
Community Online, edited by Edward Murguía et al., 135-160. Lanham.:
Lexington Books. 2007.
Gehl, Robert. "Power/Freedom on the Dark Web: A Digital Ethnography of the Dark
Web Social Network. New Media & Society (published online October 2014): 1-
17. 10.1177/1461444814554900
Gehl, Robert. Reverse Engineering Social Media: Software. Culture. and Political
Economy in New Media Capitalism. Philadelphia: Temple University Press, 2014
Gehring, David. "The Depoliticized Politics of Crowdfunding: A Critical Examination of
the Darren Wilson Crowdfunding Campaign." First Monday 12, no. 10 (October
2016). http://firstmonday.org/ojs/index.php/fm/article/view/6957.
Genius Lyrics. "Craigslist by 'Weird Al' Yankovic.” https://genius.com/Weird-al-
yankovic-craigslist-lyrics.
Geras, Norman. "Essence and Appearance: Aspects of Fetishism in Marx's Capital.” New
Left Review 1, no. 65 (January 1971). https://newleftreview.org/I/65/norman-
geras-essence-and-appearance-aspects-of-fetishism-in-marx-s-capital.
Ghosh, Rishab. "Cooking Pot Markets on the Internet" First Monday 3. no. 3 (1998).
http://firstmonday.org/ojs/index.php/fm/article/view/580/501.
Ghosh, Shona. "Electrocution, Cardiac Pain, and a Miscarriage: Amazon Warehouse
Investigation Reveals 600 Ambulance Calls for Injured Workers.” Business
Insider, June 1, 2018. http://www.businessinsider.com/ambulances-called-600-
times-amazon-uk-warehouses-2018-6.
221
Gibson-Graham, J. K. The End of Capitalism (As We Knew It): A Feminist Critique of
Political Economy. Oxford: Blackwell Publishers, 1996.
Gibson, Michael Ferris, dir. 24 Hours on Craigslist. Zealot Pictures, 2005. DVD.
Gifis, Steven H, ed. Dictionary of Legal Terms. New York: Barron's, 2015.
Giles, Jim. "Internet Encyclopaedias Go Head To Head." Nature (December 2005): 900–
901. doi:10.1038/438900a.
Gillespie, Tarleton. "The Politics of 'Platforms'." New Media & Society 12, no. 3. (2010):
347-364. doi: 10.1177/1461444809342738.
Gillespie, Tarleton. Custodians of the Internet. New Haven: Yale University Press, 2018.
Gilman, Nils et al., eds. Deviant Globalization: Black Market Economy in the 21st
Century. New York: Continuum, 2011.
Gilman, Nils et al. Deviant Globalization: Black Market Economy in the 21st Century.
New York: Continuum, 2011
Glaser, Barney G. and Anselm L. Strauss. The Discovery of Grounded Theory. Chicago:
Aldine Publishing, 1967.
Glickman, Lawrence B., ed. Consumer Society in American History. Ithaca: Cornell
University Press, 1970/1999.
GNU Operating System. "Licenses.”. Accessed 13 November 2017.
https://www.gnu.org/ licenses/licenses.html.
Goldman, Eric. "Regulating Reputation." In The Reputation Society: How Online
Opinions Are Shaping the Offline World, edited by Hassan Masum and Mark
Tovey, 51-62. Cambridge: MIT Press, 2011.
222
Golumbia, David. The Politics of Bitcoin: Software as Right-Wing Extremism.
Minneapolis: University of Minnesota Press, 2016.
Goode, Erica. "Craigslist Used in Deadly Ploy to Lure Victims in Ohio." The New York
Times, December 2, 2011. https://www.nytimes.com/2011/12/02/us/three-lured-
to-death-in-ohio-by-craigslist-job-ad.html.
Goode, Lauren. "Google's Human-Robot Caller.” Wired, May 11, 2018.
https://www.wired.com/2018/05/gadget-lab-podcast-358.
Goolsbee, Austan et al. Microeconomics. 2nd ed. New York: Worth Publishers, 2015.
Gordon, Uri. Anarchy Alive. London: Pluto Press, 2008.
Grace v. eBay. Inc. 16 Cal. Rptr. 3d 192 (California Ct. App. 2004).
Graham, Mark and Stefano De Sabbata. "The Anonymous Internet.” Oxford Internet
Institute. Published online 2014. http://geography.oii.ox.ac.uk.
Graham, Roderick. "Nurturing Non-Market Spaces in the Digital Environment."
Greenberg, Andy. "Meet the Dread Pirate Roberts. the Man Behind Booming Black
Market Drug Website Silk Road.” Forbes, August 14, 2013.
https://www.forbes.com/sites/ andygreenberg/2013/08/14/meet-the-dread-pirate-
roberts-the-man-behind-booming-black-market-drug-website-silk-road.
Greenhard, Samuel. The Internet of Things. Cambridge: MIT Press, 2015.
Gregory, C.A. Gifts and Commodities. Chicago: Hau Books, 1967/2015.
Greif, Avner. "Reputation and Coalitions in Medieval Trade: Evidence on the Maghribi
Traders." Journal of Economic History 49, no. 4 (December 1989): 857-882.
http://www.jstor.org/stable/2122741.
223
Griffin, Christine. "Being Dead and Being There: Research Interviews. Sharing Hand
Cream and the Preference for Analyzing 'Naturally Occurring Data'.” Discourse
Studies 9, no. 2 (2007): 246-269. doi: 0.1177/1461445607075340.
Grimmelman, James. "The Virtues of Moderation.” Yale Journal of Law and Technology
17, no. 1 (2015): 42-109. http://digitalcommons.law.yale.edu/yjolt/vol17/iss1/2.
Grimmelmann, James. "The Internet Is a Semicommons." Fordham Law Review 78
(2010): 2799-2842.
Grossberg, Larry. "Cultural Studies versus Political Economy: Is Anyone Else Bored
with this Debate?.” Critical Studies in Media Communication 12. no. 1 (1995):
72-81.
Grossberg, Larry. "Toward a Genealogy of the State of Cultural Studies: The Discipline
of Communication and the Reception of Cultural Studies in the United States.” In
Disciplinarity and Dissent in Cultural Studies, edited by Cary Nelson and Dikip
Parameshwar Goankar, 131-147. New York: Routledge, 1996:.
Grossman, Samantha. "The 20 Weirdest Things Ever Sold on eBay.” Time, September 2,
2015.
Grover, Joel and Amy Corral. "Don't Fall for Fake Reviews: I-Team Uncovers Them on
Yelp. Facebook. Google." NBC Los Angeles, September 25, 2017.
https://www.nbclosangeles.com/news/local/Fake-Reviews-on-Yelp-Facebook-
Google-447796103.html
Gun Laws By States. "Texas Gun Laws". Laws. Accessed January 24. 2018.
https://www.gunlawsbystate.com/law/states/texas-gun-laws.
Habermas, Jürgen. Between Facts and Norms. Cambridge: Polity Press, 1996.
224
Habermas, Jürgen. Justification and Application. Cambridge: MIT Press, 1993.
Hall, Stuart et al. Policing the Crisis. Basingstoke: Palgrave McMillan, 2013.
Hall, Stuart. "Encoding/Decoding.” In Media and Cultural Studies Keywords, edited by
Meenakshi Gigi Durham and Douglas M. Kellner, 166-176 (Hoboken: Wiley-
Blackwell. 1973/2003).
Hall, Stuart. "Re-thinking the 'Base-and-Superstructure' Metaphor." In Papers on Class,
Hegemony, and Party, edited by John Bloomsfield, 43-72. London: Lawrence and
Wishart, 1977.
Hall, Stuart. "The Problem of Ideology: Marxism Without Gaurantees." In Stuart Hall:
Critical Dialogues in Cultural Studies, edited by David Morley and Kuan-Hsing
Chen, 24-45. London: Routledge, 1996.
Hall, Stuart. "The Rediscovery of 'Ideology': Return of the Repressed in Media Studies."
In Culture, Society, and the Media, ed. Michael Gurevitch et al. New York:
Routledge, 1982: 52-86.
Halpin, Brian. "Subject to Change Without Notice: Mock Schedules and Flexible
Employment in the United States.” Social Problems 62, no. 3 (August 2015). doi:
10.1093/socpro/spv008.
Hancock, Jeffrey T. and Jamie Guillroy. "Deception with Technology.” In The Handbook
of the Psychology of Communication Technologies, edited by S. Shyam Sundar,
270-289. New York: John Wiley & Sons, 2015.
https://doi.org/10.1002/9781118426456.ch12.
Hardt, Michael and Tony Negri. Multitude: War and Democracy in the Age of Empire.
New York: Penguin Books, 2004.
225
Hardy, Trotter. "The Proper Legal Regime of Cyberspace." University of Pittsburgh Law
Review 55 (1994): 993-1056.
Harmon, Amy. "Auction for a Kidney Pops Up on eBay.” The New York Times,
September 3, 1999. https://www.nytimes.com/1999/09/03/us/auction-for-a-
kidney-pops-up-on-ebay-s-site.
Harvey, Dennis. "24 Hours on Craigslist.” Variety, February 17, 2005.
https://variety.com/2005/film/reviews/24-hours-on-craigslist-1200527841.
Haskell, Thomas L. "Capitalism and the Origins of the Humanitarian Sensibility.” The
American Historical Review 90. no. 2 (1985): 339-361.
http://www.jstor.org/stable/1852669.
Havens, Timothy et al. "Critical Media Industry Studies: A Research Approach.”
Communication, Culture, and Critique 2 (2009): 234-253.
Henry Joost and Ariel Schulman, dir. Catfish. Supermarché, 2010.
Herian, Robert. "Anything But Disruptive: Blockbhain. Capital. and a Case of the Fourth
Industrial Age Enclosure.” Critical Legel Thinking. Published October 2016.
http://criticallegalthinking.com/2016/10/18/anything-disruptive-blockchain-
capital-case-fourth-industrial-age-enclosure-part.
Herrman, John. "The Return of Techno-Moral Panic.” The New York Times, December 5,
2017. https://www.nytimes.com/2017/12/05/magazine/the-return-of-the-techno-
moral-panic.
Herrmann, Gretchen M. "Haggling Spoken Here: Gender. Class. and Style in US Garage
Sale Bargaining." Journal of Popular Culture 38. no. 1 (2004): 55-81.
226
Hills, Ken et al., eds. Everyday eBay: Culture, Collecting, and Desire. New York:
Routledge, 2006.
Himmelman, Jeff. "EBay's Stragey for Taking On Amazon.” The New York Times,
December 19, 2013. https://www.nytimes.com/2013/12/22/magazine/ebays-
strategy-for-taking-on-amazon.
Hine, Christine. Virtual Ethnography. London: Sage, 2011.
Hirsch, E.D. Jr. et al., eds. The New Dictionary of Cultural Literacy, 3rd ed. s.v. "by hook
or by crook." 62.
Hobbes, Thomas. Leviathan. Oxford: Oxford University Press, 1998
Hochman, David. "Robot Butlers Are Taking Over Hotels (Good News: No Tipping
Required).” Forbes, February 23, 2018.
https://www.forbes.com/sites/davidhochman/2018/02/23/robot-butlers-are-taking-
over-hotels-good-news-no-tipping-required.
Homans, George C. "Social Behavior as Exchange.” American Journal of Sociology 63,
no. 6 (May 1958): 567-606. http://www.jstor.org/stable/2772990.
Horowitz, Daniel. The Anxieties of Influence: Critiques of American Consumer Culture.
Amherst: University of Massachusetts Press, 2005).
Howarth, David R. Discourse. Buckingham: Open University Press, 2010.
Howe, Jeff. "The Shadow Internet.” Wired, January 1, 2005.
https://www.wired.com/2005/01/topsite.
H.R. 1865 — 115th Congress: Allow States and Victims to Fight Online Sex Trafficking
Act of 2017. Retrieved from https://www.govtrack.us/congress/bills/115/hr1865.
227
Hracs, Brian J. and Doreen Jakob. "Selling the Stage: Exploring the Spatial and Temporal
Dimensions of Interactive Cultural Experiences.” In Spatial Dynamics in the
Experience Economy, edited by Anne Lorentzen et al, 71-87. New York:
Routledge, 2015.
Internet Crime Complaint Center. "Internet Crime Report, 2017.” Last modified January
15, 2018. https://pdf.ic3.gov/2016_IC3Report.pdf.
Internet World Stats. "Internet Growth Statistics.” Retrieved January 2018.
https://www.internetworldstats.com.
Irani, Lilly. "The Cultural Work of Microwork.” New Media & Society 15, no. 5 (2015):
720-739. 10.1177/1461444813511926.
Isaac, Mike and Katie Benner. "Lyft Said to Explore IPO as It Raises $1 Billion Led By
Alphabet.” The New York Times, October 19, 2017.
https://www.nytimes.com/2017/10/19/technology/lyft-capitalg-alphabet.html.
Jacques, Scott and Richard Wright. "Informal Control and Illicit Drug Trade.”
Criminology 49, no. 3 (2011): 729-765. doi: 10.1111/j.1745-9125.2011.00234.x.
Jarrett, Kylie and D.E. Wittkower. "Economies of the Internet.” First Monday 21, no. 10
(2016): no pagination.
http://firstmonday.org/ojs/index.php/fm/article/view/6939/5624.
Jarrett, Kylie. Feminism, Labour, and Digital Media: The Digital Housewife. New York:
Routledge, 2016.
Johnson, David R. and David G. Post. "Law and Borders: The Rise of Law in
Cyberspace." in Crypto Anarchy. Cyberstates. and Pirate Utopias, edited by Peter
Ludlow, 143-195. Cambridge: MIT Press, 2001.
228
Johnson, Ericka. Dreaming of a Mail-Order Husband: Russian-American Internet
Romance. Durham: Duke University Press, 2007.
Jones, Steve, ed. CyberSociety 2.0. London: Sage, 1998.
Karatani, Kojin. The Structure of World History, translated byMichael K. Boudaghs.
Durham: Duke University Press, 2014.
Kaste, Martin. "Justice Department Announces Seizure of Dark Web Marketplace". NPR.
July 20, 2017. https://www.npr.org/2017/07/20/538370711/justice-department-
announces-seizure-of-dark-web-marketplace.
Katz, Avery W. "Economic Foundations of Contract Law.” In Philosophical Foundations
of Contract Law, edited by Gregory Klass et al., 171-192. Oxford University
Press, 2014).
Katz, Elihu and Paul Lazarsfeld. Personal Influence. New York: Routledge, 2017.
Kaye, David. "Whose Space Is It Anyway? Content Moderation in the Shadow of
Government Regulation." Paper presented at All Things In Moderation, Los
Angeles, CA, December 2017.
Kazmer, Michelle and Bo Xie. "Qualitative Interviewing in Internet Studies.”
Information. Communication. & Society 11, no. 2 (March 2008): 257-278. doi:
10.1080/13691180801946333.
Kendall, Lori. "Community and the Internet.” In The Handbook of Internet Studies,
edited by Mia Consalvo and Charles Ess, 309-326. Malden: Wiley-Blackwell,
2013.
229
Kessler, Sarah. "Pixel and Dimed: On (Not) Getting By in the Digital Economy.” Fast
Company, March 18, 2014. https://www.fastcompany.com/3027355/pixel-and-
dimed-on-not-getting-by-in-the-gig-economy.
Klein, Gary. "Fake Drugs Lead to Arrests; 'Cocaine' Dealer Sold Cops Baking Soda."
Marin Independent Journal, March 10, 2007.
http://www.marinij.com/article/zz/20070310/NEWS/703109975.
Klinenberg, Eric. Going Solo: The Extraordinary Rise and Surprising Appeal of Living
Alone. New York: Penguin Press, 2012.
Knorr Cetina, Karen. "The Market.” Theory. Culture. and Society 23. no. 2-3 (2006):
551-556. doi: 10.1177/0263276406062702.
Kochan, Thomas A. et al., eds. After Lean Production: Evolving Employment Practices
in the World Auto Industry. Ithaca: Cornell University Press, 1997.
Kolakowski, Leszek. Main Currents of Marxism. Translated by P.S. Falla. London:
Oxford University Press.,1978.
Kollmann, Tobias. "What is E-Entrepreneurship? Fundamentals of Company Founding in
the Net Economy.” In Handbook of Research on Techno-Entrepreneurship, edited
by François Thérin, 141-162. Cheltenham: Edward Elgar Publishing Limited,
2013.
Koselleck Reinhart. "Linguistic Change and the History of Events.” Journal of Modern
History 61 (December 1989): 649-666.
Kostakakis, Vasilis. "Identifying and Understanding the Problems of Wikipedia's Peer
Governance: The Case of Inclusionists Versus Deletionists." First Monday 15. no
pagination. doi: 10.5210/fm.v15i3.2613.
230
Krause, Jens, Graeme D. Ruxton, and Stefan Krause. "Swarm Intelligence in Animals
and Humans." Trends in Ecology and Evolution 25, no. 1 (January 2010): 28-34.
Kropotkin, Peter. "Anarchism." In The Encyclopaedia Britannica. 11th ed. 1901.
Kropotkin, Peter. The Conquest of Bread and Other Writings, edited by Marshall S.
Shatz. Cambridge: Cambridge University Press, 1995.
Labate, Beatriz Caiuby and Clancy Cavnar. eds. Plant Medicines, Healing, and
Psychedelic Science: Cultural Perspectives. New York: Springer, 2018.
Lambert, Bruce. "As Prostitutes Turn to Craigslist. Law Takes Notice." The New York
Times, September 5, 2007.
https://www.nytimes.com/2007/09/05/nyregion/05craigslist.
Langlois, Ganaele et al. Compromised Data: From Social Media to Big Data. New York:
Bloomsury Academic, 2015.
Lapavitsas, Costas. Profiting Without Producing. London: Verso, 2014.
Larkin, John. "Criminal and Civil Liability For User Generated Content: Craigslist. A
Case Study.” Journal of Technology, Law and Policy 15 (2010): 85-112.
Latour, Bruno. "On Technical Mediation." Common Knowledge 3. no. 2 (1994): 29-64.
32.
Latour, Bruno. Reassembling the Social. Oxford: Oxford University Press, 2005.
LeClair, Edward E. et al., eds. Economic Anthropology. New York: Holt, Rinehart and
Winston, 1960.
Leggett, Kim and David Leggett. The Antique Atlas: The Guide to Antiquing America.
New York: Rainy Day Publishers, 1997.
231
Lehdonvirta, Vili and Edward Castronova. Virtual Economies. Cambridge: MIT Press,
2014.
Lessig, Lawrence. Free Culture. New York: Penguin Press, 2004).
Lethman, Jonathan. "The Ecstasy of Influence: A Plagiarism." Harpers Magazine,
February 2007. https://harpers.org/archive/2007/02/the-ecstasy-of-influence.
Levin, Sam. "Moderators Who Had to View Child Abuse Content Sue Microsoft.
Claiming PTSD.” The Guardian, January 11, 2017.
https://www.theguardian.com/technology/2017/jan/11/microsoft-employees-
child-abuse-lawsuit-ptsd.
Levy, Pierre. Collective Intelligence: Mankind's Emerging World in Cyberspace.
Translated by Robert Bononno. New York: Helix Press, 1999.
Lingel, Jessa. Digital Countercultures and the Struggle for Community. Cambridge: MIT
Press, 2017.
Lipsey, Richard A. The Sporting Good Industry: History, Practices, and Products.
Jefferson: McFarland & Company, 2006.
Liss-Marino, Tara. "Sell (It) Yourself: Marketing Pleasure in Digital DIY." Doctoral
dissertation, University of Pennsylvania, 2014.
Lomell, Heidi Mork. "The Politics of Numbers: Crime Statistics as Source of Knowledge
and Tool of Governance.” In International Handbook of Criminology, edited by
Shlomo Giora Shoam et al., 117-151. Boca Raton: CRC Press, 2010.
Losse, Katherine. The Boy Kings. New York: Free Press, 2012.
Luckman, Susan. Craft and the Creative Economy. New York: Palgrave McMillan, 2015.
232
Lupo, Salvatore. History of the Mafia. translated by Anthony Shugaar. New York:
Columbia University Press, 2009.
Mac, Ryan. "Craig Newmark Founded Craigslist To Give Back. Now He's A
Billionaire.” Forbes, May 3, 2017.
https://www.forbes.com/sites/ryanmac/2017/05/03/how-does-craigslist-make-
money.
Machlup, Fritz. The Production and Distribution of Knowledge in the United States.
Princeton: Princeton University Press, 1962.
Mackenzie, Simon. "Illict Deals in Cultural Objects as Crimes of the Powerful." Crime,
Law and Social Change 56 (2011): 133-153. 10.1007/s10611-011-9317-2.
Mamonov, Stanislav and Raquel Benbunan-Fich. "Exploring Factors Affecting Social E-
Commerce Service Adoption: The Case of Facebook Gifts.” International Journal
of Information Management 37, no. 6 (December 2017): 590-600.
Mankiw, Gregory N. Principles of Economics. 7th ed. Suwanee: South-Western College
Publishers, 2017.
Mansfield-Devine, Steve. "Going Over to the Dark Side.” Network Security (December
2009): 4-6.
Mapes, Jeff. Pedaling Revolution: How Cyclists Are Changing American Cities. Eugene:
Oregon State University Press, 2009.
Markham, Annette and Elizabeth Buchanan. "Ethical Decision-Making and Internet
Research: Recommendations from the AoIR Ethics Working Committee (Version
2.0).” Published online August 2012. http://aoir.org/reports/ethics2.pdf.
233
Markham, Annette. "Ethical Concerns in Internet Research" In The International
Encyclopedia of Social and Behavioral Sciences. 2nd edition, edited by James
Wright, 340-377. Philadelphia: Elsivier Press, 2015.
Markham, Annette. "Internet Communication as a Tool for Qualitative Research." in
Qualitative Research. 2nd ed., edited by David Silverman, 95-124. Thousand
Oaks: Sage, 2004).
Marwick, Alice and Rebecca Lewis. "Media Manipulation and Disinformation Online."
Data & Society. Published online 2018.
Marwick, Alice. Status Update. New Haven: Yale University Press, 2013.
Marx, Karl. Capital, Volume II., translated by David Fernbach. London: Penguin Books,
1992.
Marx, Karl. Capital: A Critique of Political Economy. Vol. I., translated by Ben Fowkes.
London: Penguin. 1992.
Marx, Karl. Economic and Philosophical Manuscripts, translated by Martin Milligan.
Moscow: Progress Publishers, 1974.
Mary Calkins. "My Reputation Always Had More Fun Than Me: The Failure of eBay's
Feedback Model to Effectively Prevent Online Auction Fraud.” Richmond
Journal of Law and Technology 7 (Spring 2001): 33-72.
Massanari, Adrienna. "#Gamergate and The Fappening: How Reddit's Algorithm.
Governance. and Culture Support Toxic Technocultures.” New Media & Society
19, no. 3 (2017): 329-346. doi: /10.1177/1461444815608807.
Masum, Hassan and Mark Tovey, eds. The Reputation Society. Cambridge: MIT Press,
2011.
234
Mathew, Ashwin Jacob. "Where In the World Is the Internet? Locating Political Power in
Internet Infrastructure." Doctoral dissertation, University of California, Berkeley,
2014.
Maurer, Bill. "Payment: Forms and Functions of Value Transfer in Contemporary
Society.” Cambridge Anthropology 20, no. 2 (2012): 15-35. doi:
10.3167/ca2012.300202.
Mauss, Marcel. The Gift. London: Routledge, 1950/2002.
Mayer, Jane. Dark Money: The Hidden History of the Billionaires Behind the Rise of the
Radical Right. New York: Anchor, 2017.
McCarthy, Caroline. "Weird Al Takes on Craigslist with The Doors.” CNet, June 16,
2009. https://www.cnet.com/news/weird-al-takes-on-craigslist-with-the-doors.
McCormick, Ty. "The Darknet." Foreign Policy. December 2013.
McDonald, Kyle. One Red Paperclip: How to Trade a Paperclip for a House. Austin:
River Grove Books, 2007.
McGee, Kevin and Jörgen Skågeby. "Gifting Technologies.” First Monday 9, no. 12
(2004): no pagination. http://firstmonday.org/article/view/1192/1112.
McGuigan, Lee and Vincent Manzerolle. eds. The Audience Commodity in a Digital Age:
Revisiting a Critical Theory of Commercial Media. New York: Peter Lang, 2014.
McLuhan, Marshall. The Gutenberg Galaxy. Toronto: University of Toronto Press, 1962.
McLuhan, Marshall. Understanding Media. Cambridge: MIT Press, 1994.
McQuail, Denis. McQuail's Mass Communication Theory. 6th ed. Los Angeles: Sage,
2010.
235
Meiksins, Peter and Peter Whalley. "Controlling Technical Workers in Alternative Work
Arrangements: Rethinking the Work Contract.” In The Critical Study of Work,
edited by Rick Baldoz et al., 236-258. Philadelphia: Temple University Press,
2001).
Merleau-Ponty, Maurice. "Eye and Mind." Translated by Carleton Dallery. in The
Primacy of Perception: And Other Essays on Phenomenological Psychology,
edited by James M. Edie, 159-192. Evanston: Northwestern University Press,
1964.
Mezzadri, Alessandra. The Sweatshop Regime. Cambridge: Cambridge University Press,
2016.
Miles, Matthew B. and A. Michael Huberman. Qualitative Data Analysis. 2nd ed.
Thousand Oaks: Sage, 1994.
Miller, Claire Cain. "Craigslist Says It Has Shut Its Section for Sex Ads." The New York
Times, September 15, 2010.
https://www.nytimes.com/2010/09/16/business/16craigslist.
Mimica, Mila and Pat Collins. "D.C. Lawyer David Messerschmitt Stabbed to Death in
Thomas Circle Hotel." NBC Washington, February 12, 2015.
https://www.nbcwashington.com/
Mirowski, Philip and Dieter Plehwe. The Road from Mont Pelerin: The Making of the
Neoliberal Thought Collective. Cambridge: Harvard University Press.
Moran, Robert. "Online Exchanges Now Welcome In Philly Police Station Lobbies."
Philly.com, March 6, 2017. http://www.philly.com/philly/news/Online-
exchanges-now-welcome-in-Philly-police-station-lobbies.html.
236
Morley, Neville. Trade in Classical Antiquity. Cambridge: Cambridge University Press,
2007.
Moulier-Boutang, Yann. Cognitive Capitalism. Cambridge: Polity Press, 2012.
Mounteney, Jane et al. "The Internet and Drug Markets: Shining a Light on these
Complex and Dynamic Systems." In "The Internet and Drug Markets," edited by
European Monitoring Centre for Drugs and Drug Addiction, 13-19. Luxembourg:
Publications Office of the European Union), 2016.
Mullins, Paul R. Race and Affluence: An Archaelogy of African America and Consumer
Culture. New York: Springer, 1999).
Murguía, Edward et al., eds. Real Drugs in a Virtual World: Drug Discourse and
Community Online. Lanham: Lexington Books, 2007.
Nakamoto, Satoshi. "Bitcoin: A Peer-to-Peer Electronic Cash System.” Published online
2008. https://bitcoin.org/en/bitcoin-paper.
National Institute of Drug Abuse. "Nationwide Trends." Revised June 2015.
https://www.drugabuse.gov/publications/drugfacts/nationwide-trends. The
Treatment Center. "State by State Drug Trends." Published 2016.
https://ttccare.com/resources/state-drug-trends. Trust for America's Health. "Pain
in the Nation: The Drug. Alcohol. and Suicide Epidemics and the Need for a
National Resilience Strategy." Published online May 2018.
http://healthyamericans.org/reports/paininthenation.
Naussea County Police Department. "Pistol License." Documents. Accessed January 24.
2018. https://www.pdcn.org/DocumentCenter/View/112.
Negri, Antonio. Reflections on Empire. Cambridge: Polity, 2008.
237
Newman, Lily Hay. "Police Stations Increasingly Offer Safe Haven for Craigslist
Transactions." Slate, January 30, 2015.
http://www.slate.com/blogs/future_tense/2015/01/30/police_stations_offer_their_l
obbies_as_safe_havens_for_craigslist_transactions.html.
Nissenbaum, Helen. Privacy in Context. Stanford: Stanford University Press, 2010.
Noble, Safiya Umoja. Algorithms of Oppression: How Search Engines Reinforce Racism.
New York: NYU Press, 2018.
O'Shaughnessy, Patrice. "Drug Dealers Doing Roaring Trade on Craigslist. Say City
Investigators." New York Daily News, November 16, 2008.
http://www.nydailynews.com/news/crime/drug-dealers-roaring-trade-craigslist-
city-investigators-article-1.338953.
One Red Paperclip. "About.”. http://www.redpaperclip.com/about.
Orth, Maurine. "Killer @ Craigslist." Vanity Fair, October 2009.
https://www.vanityfair.com/culture/2009/10/craigslist-murder.
Pace, Jonathan. "The Concept of Digital Capitalism.” Communication Theory (2018).
doi:10.1093/ct/qtx009.
Packer, Jeremy and Steven B. Crofts Wiley. "Strategies for Materializing
Communication." Communication and Critical/Cultural Studies 9, no. 1 (2012):
107-113. http://dx.doi.org/10.1080/14791420.2011.652487.
Pai, Ajit. "FCC Chairman Defends Repeal of Net Neutrality.” Interview with Rachel
Martin. Morning Edition. NPR, November 22, 2017,
https://www.npr.org/2017/11/22/.../fcc-chairman-defends-repeal-of-net-neutrality.
238
Palazzo, David Peter. "The 'Social Factory' in Postwar Italian Radical Thought from
Operaismo to Autonomia." Doctoral dissertation, City University of New York,
2014.
Palladino, Valentina. "Youtube Expands Firearms Restrictions. More Gun Videos to Be
Banned." Ars Technica. March 22, 2018. https://arstechnica.com/information-
technology/2018/03/youtube-to-crack-down-harder-on-videos-about-building-
buying-firearms.
Pankoke-Babetz, Uta and Phillip Jeffrey. "Documented Norms and Conventions on the
Internet." International Journal of Human-Computer Interaction 14, no. 2 (2002):
219-235.
Paoli, Giacoma Persi et al. "Behind the Curtain: The Illict Trade of Firearms. Explosives.
and Ammunition on the Dark Web". RAND Corporation. Santa Monica: RAND
Corporation, 2017.
Paoli, Letizia. Mafia Brotherhoods: Organized Crime, Italian Style. New York: Oxford
University Press, 2003.
Park, Youngsam et al. "Understanding Craigslist Rental Scams.” In Financial
Cryptography and Data Security, edited by Jen Grossklags and Bart Preneel, 3-21
(Berlin: Springer. 2016):
Pasquale, Frank. The Black Box Society. Cambridge: Harvard University Press, 2015).
Patston, Matthew. "Columbia Police Department Opens 'Online Exchange Zone' To
Deter Violence." Columbia Business Times, February 12, 2015.
http://columbiabusinesstimes.com/2015/02/12/columbia-police-department-
opens-online-exchange-zone-to-deter-violence.
239
Pearson, Erika. "Digital Gifts: Participation and Gift Exchange in LiveJournal
Communities.” First Monday 12, no. 5 (2007): no pagination.
http://firstmonday.org/article/view/1835/1719.
Pearson, Jordan. "Starbucks Wi-Fi Hijacked People's Laptops to Mine Cryptocurrency.”
Vice, December 12, 2017.
https://motherboard.vice.com/en_us/article/gyd5xq/starbucks-wi-fi-hijacked-
peoples-laptops-to-mine-cryptocurrency-coinhive.
Peck, Janice. "Why We Shouldn't Be Bored with the Political Economy versus Cultural
Studies Debate.” Cultural Critique 64 (2006): 92-126.
http://www.jstor.org/stable/4489259.
Pein, Corey. Live Work Work Work Die: A Journey into the Savage Heart of Silicon
Valley. New York: Metropolitan Books, 2018.
Pelaprat, Etienne and Barry Brown. "Reciprocity: Understanding Online Social
Relations.” First Monday 17, no. 10 (2012): no pagination.
http://firstmonday.org/ojs/index.php/fm/article/view/3324.
Peter, Abby. "Policing the Virtual Red Light District: A Legislative Solution to the
Problems of Internet Prostitution and Sex Trafficking." Brooklyn Law Review 77
(2012): 823-859.
Peters, Justin. "Craigslist is Ugly. Janky. Old School... and Unbeatable.” Wired, February
14, 2017. https://www.wired.com/2017/02/craigslist-is-ugly-janky-old-schooland-
unbeatable.
Philip Houston et al. Spy the Lie: Former CIA Officers Teach You How To Detect
Deception. New York: St. Martin's, 2012.
240
Phillips, Whitney. This is Why We Can't Have Nice Things. Cambridge: MIT Press, 2015.
Pickard, Victor. "Social Democracy or Corporate Libertarianism? Conflicting Media
Policy Narratives in the Wake of Market Failure.” Communication Theory 23
(2013): 336-355.
Pinch, Trevor. "Technology and Institutions: Living in a Material World." Theory and
Society 37 (2008): 461-483. doi 10.1007/s11186-008-9069-x.m
Polanyi, Karl. The Great Transformation: The Political and Economic Origins of Our
Time. Boston: Beacon Press, 1944.
Pomerantz, Jeffrey. Metadata. Cambridge: MIT Press, 2018.
Potter, Jonathan and Alexa Hepburn. "Eight Challenges for Interview Researchers.” In
The Sage Handbook of Interview Research, edited by Jaber Gubrium et al., 555-
570. Thousand Oaks: Sage, 2014.
Poulantzas, Nicos. State, Power, Socialism. Translated by Patrick Camiller. London:
Verso, 2014.
Powell, Walter W. and Kaisa Snellman. "The Knowledge Economy.” Annual Review of
Sociology 30 (2004): 199-220.
https://doi.org/10.1146/annurev.soc.29.010202.100037.
Prassl, Jeremias. Humans As a Service: The Promise and Perils of Work in the Gig
Economy. Oxford: Oxford University Press, 2018.
Proudhon, Pierre Joseph. What Is Property? Translated by Donald R. Kelley and Bonnie
G. Smith. Cambridge: Cambridge University Press, 1994.
Pullen, Christopher and Margaret Cooper, eds. LGBT Identity and Online New Media.
New York: Routledge, 2010.
241
Reid, Elizabeth. "Hierarchy and Power: Social Control in Cyberspace." In Communities
in Cyberspace, edited by Marc A. Smith and Peter Kollock, 107-133. London:
Routledge, 1999.
Reyes, Juliana Feliciano and Jason Laughlin. "How Incentives in the Gig Economy Put
Workers At Risk.” The Morning Call, June 4, 2018.
http://www.mcall.com/business/mc-biz-gig-economy-workers-hazards-20180531-
story.
Reynolds, Chelsea. "'I Am Super Straight and I Prefer You Be Too:' Constructions of
Heterosexual Masculinity in Online Personal Ads for 'Straight' Men Seeking Sex
with Men." Journal of Communication Inquiry, 39 (2015). 213-231. doi:
10.1177/0196859915575736.
Rheingold, Howard. The Virtual Community. Cambridge: MIT Press, 2000.
Ripeanu Matei et al. "Gifting Technologies: A BitTorrent Case Study.” First Monday 11,
no. 11 (2006): no pagination.
http://firstmonday.org/ojs/index.php/fm/article/view/1412/1330.
Roberts, Sarah T., "Commercial Content Moderation: Digital Laborers' Dirty Work." In
Intersectional Internet: Race, Sex, Class and Culture Online, edited by Safiya
Umoja Noble and Brendesha M. Tynes, 147-160. New York: Peter Lang, 2016.
Rogers, Richard. Digital Methods. Cambridge: MIT Press, 2013.
Rose, Carol. "The Comedy of the Commons: Custom. Commerce. and Inherently Public
Property." The University of Chicago Law Review 53, no. 3 (Summer 1986): 711-
781.
242
Rosenblat, Alex. "What Motivates Gig Economy Workers.” Harvard Business Review,
November 17, 2016. https://hbr.org/2016/11/what-motivates-gig-economy-
workers.
Rosenstein, Leon. Antiques: The History of an Idea. Ithaca: Cornell University Press,
2008.
Rosin, Hannah. "Murder By Craigslist.” The Atlantic, September 2013.
https://www.theatlantic.com/magazine/archive/2013/09/advertisement-for-
murder/309435.
Roulston, Kathryn. "Issues Involved in Methodological Analyses of Research
Interviews.” Qualitaitve Research Journal 16, no. 1 (2016): 68-79. 73. doi:
10.1108/QRJ-02-2015-0015
Rubin, Herbert and Irene Rubin. In Qualitative Interviewing. 2nd ed. (Thousand Oaks:
Sage. 2012).
Ryan, Johnny. A History of the Internet and the Digital Future. London: Reaktion Books,
2010.
Sandmo, Agnar. Economics Evolving: A History of Economic Thought. Princeton:
Princeton University Press, 2011
Scanlon, Jennifer R., ed. The Gender and Consumer Culture Reader. New York: NYU
Press, 2000.
Schiller, Dan. Digital Capitalism. Cambridge: MIT Press, 1999.
Schollmeier, Rüdiger. "A Definition of Peer-to-Peer Networking for the Classification of
Peer-to-Peer Architectures and Applications.” Proceedings of the First
International Conference on Peer-to-Peer Computing. IEEE, 2002.
243
Scholz, Trebor and Nathan Schneider, eds. Ours to Hack and to Own. New York: OR
Books, 2017.
Scholz, Treboz, ed. Digital Labor: The Internet as Playground and Factory. New York:
Routledge, 2013.
Schor, Julie and Douglas B. Holt. eds. The Consumer Society Reader. New York: The
New Press, 2000.
Schwab, Klaus. The Fourth Industrial Revolution. New York: Penguin Group, 2017
Scott, Peter. The Market Makers: Creating Mass Markets for Consumer Durables in
Inter-War Britain. New York: Oxford University Press, 2017.
Sevignani, Sebastian. Privacy and Capitalism in the Age of Social Media. New York:
Routledge, 2016.
SF Gate Staff. "Craigslist / On the Record: Craig Newmark.” SF Gate, August 15, 2004.
https://www.sfgate.com/business/ontherecord/article/CRAIGSLIST-On-the-
record-Craig-Newmark-2733312.php.
Shanker, Deena. "Reddit Is In Flames As Its Moderators Revolt Over the Unexplained
Firing of an Employee.” Quartz, July 3. 2015. https://qz.com/444844/reddit-is-in-
flames-as-its-moderators-revolt-over-the-unexplained-firing-of-an-employee.
Shannon, Derric et al., eds. The Accumulation of Freedom: Writings on Anarchist
Economics. Oakland: AK Press, 2011.
Sharf, Barbara. "Beyond Netiquette: The Ethics of Doing Naturalistic Research on the
Internet." In Doing Internet Research, edited by Steve Jones, 243-256. Thousand
Oaks: Sage, 1999.
244
Sholz, Trevor. "Market Ideology and the Myths of Web 2.0.” First Monday 13, no. 3.
(2008): no pagination. http://firstmonday.org/article/view/2138/1945.
Shu, Catherine. "Youtube Releases Its First Report About How It Handles Flagged
Videos and Policy Violations.” TechCrunch, April 24, 2018.
https://techcrunch.com/2018/04/23/youtube-releases-its-first-report-about-how-it-
handles-flagged-videos-and-policy-violations.
Sloterdijk, Peter. Bubbles. Cambridge: MIT Press, 2011.
Smith, Aaron. "Gig Work, Online Selling, and Home Sharing.” Pew Research Center.
Published November 2016. http://www.pewinternet.org/2016/11/17/gig-work-
online-selling-and-home-sharing.
Smith, Adam. The Wealth of Nations. New York: Bantam Classic, 2003.
Smith, Stephen A. "Remedies for Breach of Contract: One Principle or Two." in
Philosophical Foundations of Contract Law, edited by Gregory Klass et al., 341-
361. Oxford University Press, 2014.
Spradley, James. The Ethnographic Interview. Boston: Holt. Rinehart and Winston, 1979.
Srnicek, Nick. Platform Capitalism. Cambridge: Polity Press, 2017.
Starosielski. Nicole. The Undersea Network. Durham: Duke University Press, 2015.
Statista "Leading Shopping and Classified websites in the United States. based on market
share of visits.” Published 2014. https://www.statista.com/statistics/266203/us-
market-share-of-leading-shopping-classifieds-websites.
Statista. "eBay Statistics and Facts.” Published online 2018.
https://www.statista.com/topics/2181/ebay.
245
Statista. "eBay's Annual Net Revenue in the United States from 2013 to 2016.” Published
2016. https://www.statista.com/statistics/221854/ebays-annual-net-revenue-in-
the-united-states/
Steiglitz, Ken. Snipers. Shills. and Sharks: eBay and Human Behavior. Princeton:
Princeton University Press. 2007).
Stiglitz. Joseph E. The Economic Role of the State. Oxford: Wiley-Blackwell, 1989.
Stross, Randall. eBoys: The True Story of the Six Tall Men Who Backed eBay and Other
Billion-Dollar Start-Ups. New York: Balantine Books, 2000.
Sugarman, Mike. "The World of Psychedelic Mushrooms Online." Hopes & Fears,
March 17, 2017. http://www.hopesandfears.com/hopes/now/drugs/168731-
psilocybin-mushrooms-and-the-rise-of-authentic-counter-cultures-on-the-internet.
Suler, John. "The Online Disinhibition Effect.” CyberPsychology & Behavior 7, no. 3
(June 2004). 321–326. doi:10.1089/1094931041291295.
Sullivan , Jennifer. "Investor Frenzy over eBay IPO.” Wired, September 24, 1998,
https://www.wired.com/1998/09/investor-frenzy-over-ebay-ipo.
Sundararajan, Arun. The Sharing Economy. Cambridge: MIT University Press, 2016.
Surowieki, James. The Wisdom of Crowds. New York: Anchor Books, 2005.
Tapscott, Don and Anthony D. Williams. Wikinomics: How Mass Collaboration Changes
Everything. New York: Portfolio, 2006.
Taylor, Stephanie. "Locating and Conducting Discourse Analytic Research.” In
Discourse as Data, edited by Margaret Wetherell, 5-48. London: Sage, 2001.
Terranova, Tiziana. "Free Labor: Producing Culture for the Digital Economy.” Social
Text 18, no. 2 (2000): 33-58.
246
The Economist Staff. "Amazons of the Dark Net.” The Economist, November 1, 2013.
https://www.economist.com/news/international/21629417-business-thriving-
anonymous-internet-despite-efforts-law-enforcers.
The Firearms Industry Trade Association. "Firearms and Ammunition Industry Economic
Impact 2018." Government Relations. https://www.nssf.org/government-
relations/impact.
The United States of America v. Approximately Four Hundred Fifty (450) Ancient
Cuneiform Tablets; and Approximately Three Thousand (3.000) Ancient-Clay
Bullae, Case No. 1:17-cv-03980 (2018).
Thomas Dart. Sherriff of Cook County v. craigslist. Inc. 665 F. Supp. 2d 961 (N.D. Ill.
2009).
Thomas, Valerie M. "Demand and Dematerialization Impacts in Second-Hand Markets."
Journal of Industrial Ecology 7, no. 2 (2003): 65-78.
https://doi.org/10.1162/108819803322564352.
Thompson, Erin L. Possession: The Curious History of Private Collectors from Antiquity
to the Present. New Haven: Yale University Press, 2016.
Tiffany, Inc. v. eBay, Inc. 576 F. Supp. 2d 463 (S.D.N.Y. 2008).
Tolentino, Jia. "The Gig Economy Celebrates Working Yourself to Death.” The New
Yorker, March 22, 2017. https://www.newyorker.com/culture/jia-tolentino/the-
gig-economy-celebrates-working-yourself-to-death.
Toma, Catalina L. and Jeffrey T. Hancock. "Looks and Lies: The Role of Physical
Attractiveness in Online Dating Self-Presentation and Deception.”
247
Communication Research 37, no. 3 (2010): 335-351.
doi:10.1177/0093650209356437.
Touraine, Alain. The Post-Industrial Society. London: Wildwood House, 1974.
Trottier, Daniel. Social Media as Surveillance. New York: Routledge, 2012.
Tsikerdekis, Michail and Sherali Zeadally. "Detecting and Preventing Online Identity
Deception in Social Networking Services.” IEEE Internet Computing 19, no. 3
(2015): 41-49. https://ieeexplore.ieee.org/document/7111875.
Turner, Fred. From Counterculture to Cyberculture. Chicago: University of Chicago
Press, 2010.
Ulbricht, Ross William. "Ross William Ulbricht.” LinkedIn. Accessed February 1, 2015.
https://www.linkedin.com/in/rossulbricht.
United States Division of Motor Vehicles. "Bill of Sales Requirement." Selling Your Car.
Last accessed February 4. 2018. https://www.dmv.org/bill-of-sale.
United States Drug Enforcement Agency. "2015 National Drug Threat Assessment
Summary." Published online October 2015.
https://www.dea.gov/docs/2015%20NDTA%20Report.pdf.
United States Governmental Accountability Office. "Internet Sales: Undercover
Purchases on eBay and Craigslist Reveal a Market for Sensitive and Stolen U.S.
Military Items." Testimony Before the Subcommittee on National Security and
Foreign Affairs. Committee on Oversight and Government Reform. House of
Representatives. April 10, 2008.
United States of America v. Ross William Ulbricht. 31 F. Supp. 3d 540 (S.D.N.Y. 2014).
248
United States Postal Service. "Mailability". Firearms. Restricted Matter, Hazardous,
Restricted, and Perishable Mail. Accessed January 20. 2018.
https://pe.usps.com/text/pub52/pub52c4_009.
van Dijck, José. Culture of Connectivity: A Critical History of Social Media. Oxford:
Oxford University Press, 2013.
van Dijk, José and David Nieborg. "Wikinomics and Its Discontents: A Critical Analysis
of Web 2.0 Business Manifestos.” New Media & Society 11, no. 5 (2009): 855-
874. doi:10.1177/1461444809105356.
van Laerhoven, Frank and Elinor Ostrom. "Traditions and Trends in the Study of the
Commons." International Journal of the Commons 1, no. 1. (October 2007): 3–
28.
van Slobbe, Joost. "The Drug Trade on the Deep Web: A Law Enforcement Perspective."
In European Monitoring Centre for Drugs and Drug Addiction. "The Internet and
Drug Markets," edited by European Monitoring Centre for Drugs and Drug
Addiction, 13-19. Luxembourg: Publications Office of the European Union),
2016.
Veale, Kylie. "Internet Gifting Economies: Voluntary Payment Schemes as Tangible
Reciprocity.” First Monday 8, no. 12 (2003): no pagination.
http://firstmonday.org/ojs/index.php/fm/article/view/1101/1021.
Veblen, Thorstein. The Theory of the Leisure Class. Boston: Houghton Mifflin, 1973.
Velkova, Julia. "Open Cultural Production and the Online Gift Economy: The Case of
Blender.” First Monday 21, no. 10 (2016): no pagination.
http://firstmonday.org/ojs/index.php/fm/article/view/6944.
249
Vogl, Joseph. The Specter of Capital. Stanford: Stanford University Press, 2015.
von Hayek, Friedrich. The Fatal Conceit, edited by William Warren Bartley. Chicago:
University of Chicago Press, 1989.
Wagner, Kurt. "Congress Doesn't Know How Facebook Works and Other Things We
Learned From Mark Zuckerberg's Testimony." Recode, April 11, 2018.
https://www.recode.net/2018/4/11/17226742/congress-senate-house-facebook-
ceo-zuckerberg-testimony-hearing.
Walcott, Susan M. A Profile of the Furniture Manufacturing Industry. New York:
Business Expert Press, 2013.
Warren, Carol. "Qualitative Intervewing." In Handbook of Interview Research, edited by
Jaber F. Gubrium and James A. Holstein, 83-100 (Thousand Oaks: Sage. 2001).
Weber, Max. Economy and Society: An Outline of Interpretive Sociology. Vol. 1, edited
by Guenther Roth and Claus Wittich. Berkeley: University of California Press,
2013.
Webster, Frank. Theories of Information Society. London: Routledge, 1995.
Weinstock, Tish. "This Instagram Account Finds the Weidest Shit on eBay So You Don't
Have To.” Vice, May 21, 2018. https://i-d.vice.com/en_us/article/pavpmz/this-
instagram-account-finds-the-weirdest-shit-on-ebay-so-you-dont-have-to.
Wellman, Barry. "Studying the Internet Through the Ages." In The Handbook of Internet
Studies, edited by Mia Consalvo and Charles Ess, 17-23. Malden: Wiley-
Blackwell, 2013.
Wells, Christopher W. Car Country: An Environmental History. Seattle: University of
Washington Press, 2012.
250
Westland, Christopher et al. Global Electronic Commerce. Cambridge: MIT Press, 1999.
White, Michele. Buy It Now: Lessons from eBay. Durham: Duke University Press, 2012.
White, Michele. Producing Women: The Internet, Traditional Femininity, Queerness,
and Creativity. New York: Routledge. 2015.
Wiener, Norbert. Cybernetics. New York: Wiley, 1948.
Williams, Colin C. and Christopher Paddock. "Reconciling Economic and Cultural
Explanations for Participation in Alternative Consumption Spaces." Geografiska
Annaler 85. no. 3 (2003): 137-148.
Williams, Raymond. "Base and Superstructure in Marxist Cultural Theory.” New Left
Review 1, no. 82 (November 1973). https://newleftreview.org/article/1568.
Wilson, Duff and Serge F. Kovaleski. "Olympic Booster Tied to Clinic in Drug Inquiry."
The New York Times, March 7, 2007.
https://www.nytimes.com/2007/03/07/sports/othersports/07doping.
Wincup, Emma. Criminological Research: Understanding Qualitative Methods.
Thousand Oaks: Sage, 2017.
Winner, Langdon. "Technology Today: Utopia or Dystopia?" Social Research 64, no. 3
(Fall 1997): 989-1017. http://www.jstor.org/stable/40971195.
Wintemute, Garen. "Background Checks for Firearm Transfers." Violence Prevention
Research Program, University of California, Davis. Published online 2013.
http://www.ucdmc.ucdavis.edu/vprp.
Wired Staff. "Ebay Boosts IPO Share Price.” Wired, September 23, 1998,
https://www.wired.com/1998/09/ebay-boosts-ipo-share-price/
251
Wired Staff. "Dark Netizen.” Wired, August 1, 2004.
https://www.wired.com/2004/08/dark-netizen.
Wolf, Gary. "Why Craigslist is Such a Mess.” Wired, August 24, 2009.
https://www.wired.com/2009/08/ff-craigslist.
Wong, Julia Carrie and Olivia Solon. "Facebook Releases Content Moderation
Guidelines — Rules Long Kept Secret.” The Gaurdian, April 28, 2018.
https://www.theguardian.com/technology/2018/apr/24/facebook-releases-content-
moderation-guidelines-secret-rules.
Woodward, Ian. Understanding Material Culture. London: Sage, 2007.
Woolgar, Steve, ed. Virtual Society? Oxford: Oxford University Press, 2002.
Yakas, Ben. "Newleywed 'Craigslist Killer' Claims She's Killed More Than 22 People."
Gothamist, February 16, 2014.
http://gothamist.com/2014/02/16/newlywed_craigslist_ killer_claims_s.php.
Zittrain, Jonathan. The Future of the Internet and How to Stop It. New Haven: Yale
University Press.