What Europe Can Do To Catch Dark Web Criminals

Europe is ready to get serious about fighting crime schemes hatched on the dark web, the infamous home of hackers, pedophiles, terrorists, and other undesirables. 

Representatives of 28 countries have met in The Hague to discuss “how best countries can work together with Europol’s recently established dedicated dark web team, and pursue its aim of fighting crime on the dark web,” according to an EU press release.

The meeting resulted in the creation of a dark web investigation team, which will “share information, provide operational support and expertise in different crime areas, and develop tools and approaches to conducting dark web investigations.”

While the press release emphasised the determination of EU countries to clean up the dark web, it was a bit short on detail. It's probably unrealistic to expect a press release announcing the establishment of the investigative unit to describe in depth the methods and tactics to be used, but it's a fact that tracking down criminals on the dark web is extremely difficult.

Exact numbers are very hard to come by, but sites that report on the dark web indicate that there are several hundred arrests made each year. Considering the size of the dark web, which is now estimated to be 9 times larger than the surface web, and given the fact that much of it is dedicated to criminal activity, that could be considered a very small number.

It's the fluid nature of the dark web, the fact that it cannot be indexed or searched in the same way the surface web is, that all aspects of it are anonymous, that sites disappear as quickly as they appear, that makes tracking down criminals so difficult.
For example, it took authorities from five agencies half a year and countless resources to track down a longtime drug dealer on the dark web in a recent case last year, and they caught him only because of several mistakes he made, including traveling to a contest in Texas to show off his distinctive beard.

Relying on criminals' mistakes is not how Europol, or any other agency, will be able to back up that enthusiastic tweet. How then can they do so? The only way is to proactively search out dark web criminals, and establish patterns of behavior and links to activities on the surface web.

The only way to do that search is by utilising specialised software and systems that can scan the dark web and collect this information. Part of that specialization is the requirement that systems be robust enough to scan dozens, if not hundreds of dark web sources and develop a profile that can be analysed.

That analysis entails looking for connections and threads that can lead to the possible identity of cyber-criminals. For example, a thorough search of a dark web transactions can lead to the identity of a server where a dark web criminal converts cryptocurrency into regular money. 

Cybercriminals eventually have to do that if they want to buy non-virtual products, or they could try to move the money into a bank account somewhere. The bottom line is that in many cases, criminals leave strong identifiers that help in the process of tracking them down, and a good analysis system will take advantage of that.

That kind of advanced analysis system can make those connections even in the wake of the advanced tools hackers use today, which makes it even harder than it has been to track them down.

Teams employing advanced analytics can more quickly and efficiently take advantage of investigations that have already been done in previous cases, which can provide insight into the patterns of behavior of hacking gangs, and help authorities track them down more efficiently.

The more the dark web is monitored, and the more its secrets are unearthed, the more its data can be analysed, making it more likely that criminals will be caught, sooner rather than later.

Hackers aren't going anywhere; indeed, incident after incident shows that they are only getting more active, deploying more tools and more sophisticated tools. According to the EU’s own figures, more of that criminal activity than ever is taking place through the dark net.

Between them, the 28 countries involved in the program could make a huge difference in stamping out dark web crime, if they use their resources wisely. Let's hope that they do.

Infosecurity:     VisulaCapitalist

You Might Also Read: 

A Guided Tour Of The Asian Dark Web:

Give Children More Control Of Data Privacy:

 

 

« The Best Security Is Based On Zero Trust
Iranian Political Influence Campaign Goes Global »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

Cyscale

Cyscale

Cyscale is a consultancy and development agency helping Enterprises adopt and migrate to the Cloud by providing an Automated Cloud Security Platform.

Perseus Cyber Security

Perseus Cyber Security

Perseus provides all-around digital protection for small and medium-sized businesses through state-of-the-art software solutions, flexible online training and emergency response.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

Moss Adams

Moss Adams

Moss Adams is a fully integrated professional services firm dedicated to assisting clients with growing, managing, and protecting prosperity.

Prelude

Prelude

Prelude offer the first autonomous platform built to attack, defend and train critical assets through continuous red-teaming.

Gulf Business Machines (GBM)

Gulf Business Machines (GBM)

GBM is a leading end-to-end digital solutions provider, offering the broadest portfolio, including industry-leading digital infrastructure, digital business solutions, security and services.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.