An assassination market is a prediction market where any party can place a bet (using anonymous electronic money and pseudonymous remailers) on the date of death of a given individual, and collect a payoff if they "guess" the date accurately. This would incentivise assassination of individuals because the assassin, knowing when the action would take place, could profit by making an accurate bet on the time of the subject's death. Because the payoff is for accurately picking the date rather than performing the action of the assassin, it is substantially more difficult to assign criminal liability for the assassination.
Early uses of the terms "assassination market" and "market for assassinations" can be found (in both positive and negative lights) in 1994's "The Cyphernomicon" by Timothy C. May, a cypherpunk. The concept and its potential effects are also referred to as assassination politics, a term popularized by Jim Bell in his 1995-96 essay of the same name.
In part ten of his essay, Bell posits a market that is largely non-anonymous. He contrasts this version with the one previously described. Carl Johnson's attempt to popularise the concept of assassination politics appeared to rely on the earlier version. There followed an attempt to popularise the second in 2001 that is ongoing today.
Technologies like Tor and Bitcoin have enabled online assassination markets as described in parts one to nine of Assassination Politics. The first assassination market that adopted a Jim Bell protocol became available in autumn 2001. It remains a continuous project called APster, which is a name that was used quite often by various cypherpunks.
The first prediction market entitled 'Assassination Market' was created by a self-described crypto-anarchist in 2013. Utilising Tor to hide the site's location and Bitcoin based bounties and prediction technology, the site lists bounties on politicians such as Barack Obama and Ben Bernanke.
- Harkin, James (2009). Lost in Cyburbia: How Life on the Net Has Created a Life of Its Own. Knopf Canada. p. 239. ISBN 978-0-307-37398-4.
- May, Timothy C. (1994-09-10). "The Cyphernomicon: Cypherpunks FAQ and More, Version 0.666". Cypherpunks.to. pp. Sections 4 & 16. Retrieved February 28, 2011.
- Bell, Jim (1997-04-03). "Assassination Politics" (PDF). Infowar. Archived (PDF) from the original on 27 January 2011. Retrieved February 28, 2011.
- McCullagh, Declan (2000-04-14). "Crypto-Convict Won't Recant". Wired News. Archived from the original on October 24, 2012. Retrieved January 14, 2008.
- Broiles, Greg (1999-08-27). "CJ files". Retrieved August 22, 2014.
- McCullagh, Declan (2001-05-15). "Online Cincy Cop Threats Probed". Wired News. Archived from the original on November 5, 2012. Retrieved August 22, 2014.
- Hettinga, R. A. (2003-07-07). "Online threats target Denver investigators". Retrieved August 22, 2014.
- "VENONA Cypherpunks Archives". 1993–2000. Retrieved August 22, 2014.
- Greenberg, Andy (2013-11-18). "Meet the 'Assassination Market' creator who's crowdfunding murder with Bitcoins". Forbes. Retrieved November 19, 2013.
- Bartlett, Jamie (22 July 2015). "Inside the Digital Underworld". Retrieved 22 July 2015.
- Hess, Patrick (2002). Cyberterrorism And Information War. Anmol Publications Pvt. Limited. ISBN 978-81-261-1161-9.
- Thomas, Douglas; Loader, Brian (2000). Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. Routledge. ISBN 978-0-415-21326-4.
- Sukumaran, R. (2004). "Cryptology, digital assassination and the terrorism futures markets" (PDF). Strategic Analysis. 28 (2): 219–236. doi:10.1080/09700160408450129.
- Clarke, R.; Dempsey, G.; Ooi, C. N.; O'Connor, R. F. (16–17 February 1998). Technological Aspects of Internet Crime Prevention. Proc. Conf. "Internet Crime". Australian Institute for Criminology, Melbourne University.