The Dark Web Encompasses Both Criminal & Legal Activities

The Dark Web Encompasses Both Criminal & Legal Activities


Directors Report: This article is exclusive to Premium Subscribers. For unrestricted website access please Subscribe: £5 monthly / £50 annual.


The term Dark Web does sound ominous and it is that part of the Internet that comprises numerous hidden sites cannot be accessed through the usual web browsers.

In 2023 the Dark Web has on average over 2.5 million daily visitors and it’s estimated that more than half of those visitors have participated in illegal activities. And what is alarming is that in April 2023, daily Dark Web visitors rose by 200,000 to reach 2.7 million.

The Dark Web, sometimes called the Dark Net, is a collection of encrypted content that is not indexed by conventional search engines like Google and Microsoft Bing.  It requires a special browser, like the Tor Browser, to access the content.  It's content includes large databases of data, often used for illegal activities.

As with the early Internet, the Dark Web has a reputation as a haven for illegal activities and is frequently implicated in illicit and criminal activity. While the Dark Web has played a hand in illegal and unethical transactions, it also provides a social outlet for people who may otherwise be persecuted for their identities or political beliefs. It also gives legal authorities the additional tools they need to apprehend the perpetrators of unethical activities.

The Dark Web market has recently been growing at an alarming rate, due to increased demand for illicit goods and services by its users.

With technology itself becoming more accessible worldwide, there has been an inevitable increase in Dark Web activity. What was once a small, mysterious part of the Internet has now become a force to be reckoned with. The Dark Web in 2022 grew more diverse, extensive, and powerful than in previous years. It has been gaining massive attention worldwide, and it is estimated that there are more users than ever.

Background

The Dark Web first officially appeared in the early 2000s along with the creation of Freenet, which was developed by Ian Clarke to secure users against government intervention and cyber attacks. The system, which is still available today, allows users to express themselves freely without being tracked online.

The Dark Net is part of the biggest global system, the Internet that holds information about everything, and almost everyone and the Internet comes in layers: visible, deep, and dark. And some layers have exponentially more data than others.

The Internet has become more complex by the day, but it’s also intimidating. With so much you don’t know and cannot control, it’s normal to feel anxious, especially when you run into news and reports about the Dark Web. You instinctively associate this ominous name with illicit goods and hidden services.

The US Naval Research Laboratory funded a project called The Onion Router (TOR). TOR offered intelligence sources a way to communicate easily and safely, especially in hostile areas where personal safety is key. It is now one of the most common browsers used to access the Dark Web, using databases to help people make their way around and find the information they need.

Understanding the Dark Web

As its name implies, the Dark Web is a secret network that exists underground. It's made up of a series of websites that are hidden from the general public. This means they aren't accessible through traditional search engines, such as Google.

Traditional search engines return results because they contain indexes of links to websites. These are ranked based on keywords and relevancy. The Dark Web, on the other hand, uses information that isn't available on these other search engines, such as content from individual accounts, such as email,social media, banking, along with personal and professional databases, and documents, legal and medical.

Also called the Darknet, the Dark Web is much like the broader web was in its early days during the late 20th century. There is a lot of material about getting it working, and not very much to do once one gets there.

A lot of the content on the Dark Web is very amateurish. On the other hand, it is much easier for individuals to start sites and get attention. Tech giants and large media organisations have very little influence on the Dark Web.

History of the Dark Web

In the 1970s, shortly after the creation of the Internet forerunner, ARPANET was developed by the Pentagon’s Defense Advanced Research Projects Agency, a number of isolated, secretive networks begin to appear, giving rise to the term Darknet. 

In the 1980s, a series of problems with storing sensitive or illegal photos, videos, and data began to surface, causing a number of “data havens” to spring up, the informational equivalent of tax havens in the Caribbean. As part of the dot com bubble in the late 1990s, Napster spawned a series of peer-to-peer networks like Gnutella, Freenet, and Kazaa, that operated with decentralised data hubs for trade and distribution of copyrighted music and movie files.

TOR, which is an acronym for its original project name, The Onion Routing project, was developed in the mid-1990s by United States Naval Research Laboratory as a way of protecting US intelligence communications online. But it also has another natural constituency, those wanting to browse the Darknet.

The Dark Web was originally used by the United States Department of Defense to communicate anonymously, and it has now become a hub for users wishing to remain anonymous around the world. People use the Dark Web for both legal and illegal purposes. It uses a technology called "onion routing," which protects users from surveillance and tracking through a random path of encrypted servers.

When users access a site through Tor, their information is routed through thousands of relay points that cover the user's tracks and make their browsing virtually impossible to trace. So, the US Naval Research Laboratory funded a project called The Onion Router (TOR). TOR offered intelligence sources a way to communicate easily and safely, especially in hostile areas where personal safety is key.

It is now one of the most common browsers used to access the dark web, using databases to help people make their way around and find the information they need.

The rise of crypto currencies increased the popularity of the Dark Web, especially for cyber criminals. That's because digital currencies often provide a great deal of anonymity for people who buy and sell on the Dark Web. Because of its association with certain illicit activities, there have been calls for regulation of the Dark Web. For instance, the G20 and the Financial Action Task Force (FATF) have both called for crypto-currency companies to provide information on buyers and sellers in transactions conducted online. 

This is especially true when helping law enforcement track criminal organisations and illicit activities.

However, the Dark Web is not the only place where illegal activities take place on the Internet. Many cyber criminals operate on the surface web and the Deep Web as well. However, the Dark Web does offer a higher degree of anonymity and is therefore a more attractive option for those looking to engage in illegal activities.

The Dark Web is a small, hidden part of the Internet with strong ties to illegal activities and should be approached with caution. It's important to be aware of the risks and to understand that just because something is on the Dark Web doesn't make it legal. Be sure to protect yourself by staying informed.

Legal Access To The Dark Web

Despite what the name implies, it isn't illegal to access the Dark Web. It actually provides individuals with privacy and anonymity that traditional websites don't offer to individuals. For example, people can go on the Dark Web and post their thoughts about political activity without any fear of being reprimanded by government officials and other groups.

You can access the Dark Web by installing specific, anonymous browsers, such as TOR. Once installed, the browser works the same way traditional ones do. But it can be a little difficult to access information because it doesn't use an index to locate the desired information.

The Dark Web is an anonymous, encrypted network that sends traffic through nodes around the world, obscuring a user’s online footprint. The individual's IP address is protected, making it very difficult for anyone to trace any part of the connection. This is achieved by encrypting traffic in multiple layers and bouncing it through a network of random computers, each of which removes a layer of encryption before bouncing it on to the next device.

This is how the information gets anonymised as it's passed randomly, so you can’t identify the source, the destination, or the contents as they are encrypted with multiple layers. The rise of crypto currencies increased the popularity of the Dark Web, especially for cyber criminals. That's because digital currencies often provide a great deal of anonymity for people who buy and sell on the Dark Web.

The term Dark Web refers to encrypted online content that is not indexed by conventional search engines. Accessing the Dark Web can only be done using specific browsers, such as TOR Browser.

There is a great deal of privacy and anonymity that comes with using the Dark Web compared to traditional websites. As such, most of the attention is placed on online marketplaces for drugs, exchanges for stolen data, and other illegal activities when people think of the Dark Web.

Despite this, there are often very legitimate reasons why people choose to use the Dark Web, including political dissidents and people who want to keep certain information private.

The Dark Web refers to sites that are not indexed and only accessible via specialised web browsers. Significantly smaller than the tiny surface web, the Dark Web is considered a part of the Deep Web. Using our ocean and iceberg visual, the Dark Web would be the bottom tip of the submerged iceberg.

The Dark Web, however, is a very concealed portion of the Deep Web that few will ever interact with or even see. In other words, the Deep Web covers everything under the surface that's still accessible with the right software, including the Dark Web.

Through the Dark Web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location.

The reputation of the Dark Web has often been linked to criminal intent or illegal content, and "trading" sites where users can purchase illicit goods or services. However, legal parties have made use of this framework as well. When it comes to Dark Web safety, the Deep Web dangers are very different from Dark Web dangers. Illegal cyber activity cannot necessarily be stumbled upon easily but tends to be much more extreme and threatening if you do seek it out.

Legal Uses Of The Dark Web

While using the Dark Web may seem suspect on the surface, it is perfectly legal, and there are many legitimate uses of Tor and anonymous browsing. For example, in countries where government surveillance may be used to spy on and oppress political dissidents, the Dark Web is often a place for communication that avoids government censorship and scrutiny.
 
Despite these added layers of security, users should still be cautious using the Dark Web and take proper security measures, such as periodically updating their security software, browsing with a robust VPN, and avoiding the use of a standard email address.

Illegal Uses Of The Dark Web

Given its anonymous nature, the Dark Web is also used for illicit and even illegal purposes and this includes the buying and selling of illegal drugs, weapons, passwords, and stolen identities, as well as the trading of illegal pornography and other potentially harmful materials.

Several sites hosting illegal material have been discovered by government agencies and shut down in recent years, including Silk Road, AlphaBay, and Hansa.
 
The Dark Web's anonymity has also led to cyber security threats and various data breaches over the last few decades.

Illegal Pornography

The type of content that has the most popularity on the Dark Web is illegal pornography, more specifically, child pornography. About 80% of its web traffic is related to accessing child pornography despite it being difficult to find even on the Dark Web. A notable example is a website called Lolita City, which has since been taken down, contained over 100 GB of illegal child pornographic media and had about 15,000 members.

Conclusion

Whereas the Dark Web is most well-known for hosting illicit economic trade, it has become clear that the Dark Web also holds some profoundly serious national security implications that will affect most nations throughout the globe.

The proliferation of cyber and kinetic weapons, the facilitation of terrorism, intelligence gathering, extortion, malicious services-for-hire all of these illicit activities are occurring on the Dark Web, and the evidence put forth in this paper suggests that these activities may occur at increasing rates in the coming future.

Image: Eightshot Studio

Kaspersky:   Futurist Speaker:    

Investopedia:   Cyberhoot:    

Wikipedia:  Aura:  Investopedia:    

Tulane University:   Norton:    

Phishnet:  Forbes:  LMG Security:    

Avast:   Small Wars Journal

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Security Trends For 2024
Quantum Computing - Its Background & Future »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

Security IT Summit

Security IT Summit

The Security IT Summit is a unique one-day event which allows senior IT & Cyber security professionals to meet with innovative and competitive suppliers to the industry.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

MixMode

MixMode

MixMode's PacketSled platform delivers network monitoring, deep forensic analysis and incident response.

Cybercrypt

Cybercrypt

Cybercrypt is a world leading system provider in robust cryptography. Protecting critical assets, applications and sensitive data.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

SteelCloud

SteelCloud

SteelCloud has spent the last decade inventing technology to automate policy compliance, configuration control, and Cloud security.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

Abacode

Abacode

Abacode is a Managed Security Services Provider (MSSP). We help businesses consolidate all of their Regulatory Compliance & Cybersecurity needs, under one roof.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Cybil

Cybil

Cybil is a publicly-available portal where members of the international cyber capacity building community can find and share information to support the design and delivery of programs and projects.

C2SEC

C2SEC

C2Sec provides an innovative analytics platform that assesses and quantifies cyber risks in financial terms based on combining patented big data, AI, and cybersecurity technologies.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

Testhouse Ltd

Testhouse Ltd

Testhouse is a thought leader in the Quality Assurance, software testing and DevOps space. Founded in the year 2000 in London, UK, with a mission to contribute towards a world of high-quality software

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.