Transaction Search Form: please type in any of the fields below.
Date: November 22, 2024 Fri
Time: 11:43 am
Time: 11:43 am
Results for dark web
6 results foundAuthor: Chertoff, Michael Title: The Impact of the Dark Web on Internet Governance and Cyber Security Summary: With the Internet Corporation for Assigned Names and Numbers' contract with the United States Department of Commerce due to expire in 2015, the international debate on Internet governance has been re-ignited. However, much of the debate has been over aspects of privacy and security on the visible Web and there has not been much consideration of the governance of the "deep Web" and the "dark Web." The term deep Web is used to denote a class of content on the Internet that, for various technical reasons, is not indexed by search engines. The dark Web is a part of the deep Web that has been intentionally hidden and is inaccessible through standard Web browsers. A relatively known source for content that resides on the dark Web is found in the Tor network. Tor, and other similar networks, enables users to traverse the Web in near-complete anonymity by encrypting data packets and sending them through several network nodes, called onion routers. Like any technology, from pencils to cellphones, anonymity can be used for both good and bad. Users who fear economic or political retribution for their actions turn to the dark Web for protection. But there are also those who take advantage of this online anonymity to use the dark Web for illegal activities such as controlled substance trading, illegal financial transactions, identity theft and so on. Considering that the dark Web differs from the visible Web, it is important to develop tools that can effectively monitor it. Limited monitoring can be achieved today by mapping the hidden services directory, customer data monitoring, social site monitoring, hidden service monitoring and semantic analysis. The deep Web has the potential to host an increasingly high number of malicious services and activities. The global multi-stakeholder community needs to consider its impact while discussing the future of Internet governance. Details: Waterloo, ON: London: Centre for International Governance Innovation and the Royal Institute for International Affairs, 2015. 18p. Source: Internet Resource: Paper Series: No. 6: Accessed April 15, 2015 at: https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf Year: 2015 Country: International URL: https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf Shelf Number: 135233 Keywords: Computer CrimesCybercrimeCybersecurityDark WebInternet Crime |
Author: Finklea, Kristin Title: Dark Web Summary: The layers of the Internet go far beyond the surface content that many can easily access in their daily searches. The other content is that of the Deep Web, content that has not been indexed by traditional search engines such as Google. The furthest corners of the Deep Web, segments known as the Dark Web, contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities. It is the exploitation of the Dark Web for illegal practices that has garnered the interest of officials and policy makers. Individuals can access the Dark Web by using special software such as Tor (short for The Onion Router). Tor relies upon a network of volunteer computers to route users' web traffic through a series of other users' computers such that the traffic cannot be traced to the original user. Some developers have created tools - such as Tor2web - that may allow individuals access to Torhosted content without downloading and installing the Tor software, though accessing the Dark Web through these means does not anonymize activity. Once on the Dark Web, users often navigate it through directories such as the "Hidden Wiki," which organizes sites by category, similar to Wikipedia. Individuals can also search the Dark Web with search engines, which may be broad, searching across the Deep Web, or more specific, searching for contraband like illicit drugs, guns, or counterfeit money. While on the Dark Web, individuals may communicate through means such as secure email, web chats, or personal messaging hosted on Tor. Though tools such as Tor aim to anonymize content and activity, researchers and security experts are constantly developing means by which certain hidden services or individuals could be identified or "deanonymized." Anonymizing services such as Tor have been used for legal and illegal activities ranging from maintaining privacy to selling illegal goods - mainly purchased with Bitcoin or other digital currencies. They may be used to circumvent censorship, access blocked content, or maintain the privacy of sensitive communications or business plans. However, a range of malicious actors, from criminals to terrorists to state-sponsored spies, can also leverage cyberspace and the Dark Web can serve as a forum for conversation, coordination, and action. It is unclear how much of the Dark Web is dedicated to serving a particular illicit market at any one time, and, because of the anonymity of services such as Tor, it is even further unclear how much traffic is actually flowing to any given site. Just as criminals can rely upon the anonymity of the Dark Web, so too can the law enforcement, military, and intelligence communities. They may, for example, use it to conduct online surveillance and sting operations and to maintain anonymous tip lines. Anonymity in the Dark Web can be used to shield officials from identification and hacking by adversaries. It can also be used to conduct a clandestine or covert computer network operation such as taking down a website or a denial of service attack, or to intercept communications. Reportedly, officials are continuously working on expanding techniques to deanonymize activity on the Dark Web and identify malicious actors online. Details: Washington, DC: Congressional Research Service, 2015. 18p. Source: Internet Resource: CRS:R55101: Accessed July 20, 2015 at: https://www.fas.org/sgp/crs/misc/R44101.pdf Year: 2015 Country: International URL: https://www.fas.org/sgp/crs/misc/R44101.pdf Shelf Number: 136120 Keywords: Computer CrimeDark WebIllegal BehaviorIllicit GoodsInternet CrimeOnline Communications |
Author: Finklea, Kristin Title: Dark Web: Updated Summary: The layers of the Internet go far beyond the surface content that many can easily access in their daily searches. The other content is that of the Deep Web, content that has not been indexed by traditional search engines such as Google. The furthest corners of the Deep Web, segments known as the Dark Web, contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities. It is the exploitation of the Dark Web for illegal practices that has garnered the interest of officials and policymakers. Individuals can access the Dark Web by using special software such as Tor (short for The Onion Router). Tor relies upon a network of volunteer computers to route users’ web traffic through a series of other users’ computers such that the traffic cannot be traced to the original user. Some developers have created tools—such as Tor2web—that may allow individuals access to Torhosted content without downloading and installing the Tor software, though accessing the Dark Web through these means does not anonymize activity. Once on the Dark Web, users often navigate it through directories such as the “Hidden Wiki,” which organizes sites by category, similar to Wikipedia. Individuals can also search the Dark Web with search engines, which may be broad, searching across the Deep Web, or more specific, searching for contraband like illicit drugs, guns, or counterfeit money. While on the Dark Web, individuals may communicate through means such as secure email, web chats, or personal messaging hosted on Tor. Though tools such as Tor aim to anonymize content and activity, researchers and security experts are constantly developing means by which certain hidden services or individuals could be identified or “deanonymized.” Anonymizing services such as Tor have been used for legal and illegal activities ranging from maintaining privacy to selling illegal goods—mainly purchased with Bitcoin or other digital currencies. They may be used to circumvent censorship, access blocked content, or maintain the privacy of sensitive communications or business plans. However, a range of malicious actors, from criminals to terrorists to state-sponsored spies, can also leverage cyberspace and the Dark Web can serve as a forum for conversation, coordination, and action. It is unclear how much of the Dark Web is dedicated to serving a particular illicit market at any one time, and, because of the anonymity of services such as Tor, it is even further unclear how much traffic is actually flowing to any given site. Just as criminals can rely upon the anonymity of the Dark Web, so too can the law enforcement, military, and intelligence communities. They may, for example, use it to conduct online surveillance and sting operations and to maintain anonymous tip lines. Anonymity in the Dark Web can be used to shield officials from identification and hacking by adversaries. It can also be used to conduct a clandestine or covert computer network operation such as taking down a website or a denial of service attack, or to intercept communications. Reportedly, officials are continuously working on expanding techniques to deanonymize activity on the Dark Web and identify malicious actors online. Details: Washington, DC: Congressional Research Service, 2017. 19p. Source: Internet Resource: R44101: Accessed March 17, 2017 at: https://fas.org/sgp/crs/misc/R44101.pdf Year: 2017 Country: United States URL: https://fas.org/sgp/crs/misc/R44101.pdf Shelf Number: 144490 Keywords: Computer Crime Dark Web Illegal Behavior Illicit Goods Internet Crime Online Communications |
Author: Kruithof, Kristy Title: The role of the 'dark web' in the trade of illicit drugs Summary: The Internet has fundamentally changed ways of doing business, including the operations of illegal markets. RAND Europe was commissioned to investigate the role of the Internet in facilitating the drugs trade, particularly in the Netherlands. The Internet has fundamentally changed ways of doing business, including the operations and activities of illegal markets. There are now around 50 online marketplaces on the 'dark web' that trade illegal drugs, novel psychoactive substances (NPS), prescription drugs and other - often illegal - goods and services. These so-called cryptomarkets are accessible with a normal Internet connection, but require special anonymising software to access. The role of these cryptomarkets in facilitating the trade of illicit drugs was first highlighted by the success of Silk Road, an online marketplace for the sale of illegal goods. Silk Road was taken down by the FBI in October 2013; however, other very similar cryptomarkets filled the void within a matter of weeks. Details: Cambridge, UK: RAND Europe, 2016. 8p. Source: Internet Resource: Research Brief: Accessed September 27, 2017 at: https://www.rand.org/pubs/research_briefs/RB9925.html Year: 2016 Country: Netherlands URL: https://www.rand.org/pubs/research_briefs/RB9925.html Shelf Number: 147473 Keywords: Dark WebDrug MarketsIllegal Drug TradeIllegal MarketsInternet Crime |
Author: Broadhurst, Roderic Title: Malware Trends on 'Darknet' Crypto-Markets: Research Review Summary: This is an overview of current trends in online illicit crypto-markets or dark-nets, including the key role of virtual crypto-currencies in their operation. The focus is on the different kinds of digital products that are found in these on-line 'dark markets'. Primary data was collected from relevant websites accessed via The Onion Router (Tor). Tor allows anonymous encrypted communication between web-sites, and data capture over several months from one of the largest crypto-markets currently active - Dream Market enabled a description of short-term trends in the different malware products and their costs as available in underground or 'dark-net' crypto-markets. Details: Canberra: Australian National University, Cybercrime Observatory, 2018. 99p. Source: Internet Resource: Accessed March 14, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3226758 Year: 2018 Country: International URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3226758 Shelf Number: 154956 Keywords: Cybercrime Dark Markets Dark WebDark-Nets Malware Online Markets |
Author: Ball, Matthew Title: Data Capture and Analysis of Darknet Markets Summary: Darknet markets have been studied to varying degrees of success for several years (since the original Silk Road was launched in 2011), but many obstacles are involved which prevent a complete and systematic survey. The Australian National University's Cybercrime Observatory has developed tools to collect and analyse data captured from the darknet (illicit cryptomarkets). This report describes, at the high level, a method for collecting, and analysing, data from specific darknet marketplaces. Examples of typical results that may be obtained from darknet markets and current limitations to the automation of data capture are briefly outlined. While the proposed solution is not error-free, it is a significant step in the direction of providing a comprehensive solution tailored for data scientists, social scientists, and anyone interested in analysing trends from darknet markets. Details: Canberra: Australian National University (ANU); ANU Cybercrime Observatory, 2019. 14p. Source: Internet Resource: Accessed April 13, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3344936 Year: 2019 Country: Australia URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3344936 Shelf Number: 155400 Keywords: CryptomarketsCybercrimesDark WebIllicit Markets |