Unraveling the Dark Web (2024)

Unraveling the Dark Web (1)

This article is the last in my series that explores various parts of the Internet. When discussing the dark web, some might say that one will never find a more wretched hive of scum and villainy. But if that is true, why does it continue to exist? What is stopping law enforcement from shutting it down? To find the answer, it is imperative to understand how the dark web works—and what makes it so difficult to solve its crimes and detect its activity.

The dark web was created by the US federal government to produce an environment in which individuals could maintain their anonymity. The government has many managed attribution environments, some of which I helped develop. The dark web is one that has become quite popular due to its availability and peer-to-peer nature.

Websites on the dark web are hosted separately and distinctly from the open or deep webs. The dark web was founded on the Onion router (Tor). The collection of Tor routers is what provides anonymity within the infrastructure. Accessing the dark web typically requires the use of an entrance node and an exit node, although some sites can be accessed directly if their domain ends in .onion. These nodes are connected using the same communication infrastructure that the open and deep webs use. The entrance node knows where a user is coming from and the exit node knows where they are going. However, the two nodes recognize only each other and do not share points of origin or destination. In order to connect to an entrance node, one must use a certain browser. The first browser was Tor, named after the router on which the dark web is implemented. Today there are several browsers that can be used to access the dark web.

Once a connection to an entrance node has been established, one has entered a network that is layered in encryption tunnels and secure methods for establishing those tunnels. These tunnels serve as end-to-end encryption (i.e., vice link encryption) between the Tor browser and the dark website being accessed. It should be noted that for the most part, websites hosted on the dark web are not crawled or advertised by search engines. This means one must know where they are going if they wish to take advantage of the dark web; however, this does not mean there are not search engines on the dark web, but rather that they are not a complete representation of all hosted websites. This makes sense, as the reason many sites exist on the dark web is to conduct nefarious business activities such as weapon sales, human trafficking, drug sales, criminal operations, credit card sales and more. Unfortunately, there are also hostile sites that attempt to install hostile code onto one’s computer, which can then be used as a zombie or bot to act on malicious intentions.

However, not all uses of the dark web involve illegal activity. This network allows news reporters and people who experience Internet censorship to maintain anonymity while reaching out to the world.

Despite this encryption, tunneling and lack of traceability, it is possible to identify someone who has used the dark web. At one time, the US federal government was the largest owner of entrance nodes and exit nodes to the dark web. This means it is possible that the government could have possessed a tool that put together the point of origin (the Tor browser) and a user’s destination. It also means that the encryption key (i.e., root key) is owned by the US federal government, meaning that it can decrypt all traffic. Remember, this is the same organization that released certified encryption algorithms for public use that contained back doors that it could use to get to your data. The most popular way to overcome this vulnerability is to use a proxy or virtual private network (VPN). Many VPN service providers contend that they flush all their audit trails when one disconnects from their service and do not cooperate with law enforcement. However, most VPN service providers are required to obey the laws of the countries in which they operate, meaning that a subpoena or other legal action could result in one’s identity being revealed.

Traffic analysis is an effective technique for targeting users who are on the dark web to conduct criminal activity. During traffic analysis, an analyst builds networks, observing who is going where and who is talking to whom. The identity of any one individual is not the primary interest; instead, an analyst tries to identify communication patterns that may be susceptible to compromise. Remember, if I can compromise anyone in the network, I can find my way to you.

The next approach to compromising identity on the dark web is the crosspollination of identity from the analog world, to the open or deep web, to the dark web. I know this is almost laughable, but many times someone will compromise their anonymity by buying a product from a commercial website using their cover account and then providing their real name, address and telephone number. On the dark web, the use of an identifying name, tag or callsign that is traceable to the open or deep web is the beginning of success for criminal investigators. Now, based on the user’s activities, they become a person of interest and more resources are expended to discover their identity.

The reality is there is not enough space here to go into extensive technical or operational detail about the dark web, but this introduction should help one achieve a basic understanding of it. The dark web can be an excellent managed attribution system, however, if the wrong entrance and exit nodes are used without protection, one could become much more familiar to the system than they realized. Regardless of why one is using the dark web, they should ensure that all antivirus software on their device is up to date. But it is important to keep in mind that antivirus software protects against known viruses; by choosing to visit the dark web, one may become susceptible to the latest and greatest viruses. This means you may get a virus named after you. Good luck.

Bruce R. Wilkins, CISA, CRISC, CISM, CGEIT, CISSP, is the chief executive officer ofTWM Associates Inc. In this capacity, he provides his customers with secure engineering solutions for innovative technology and cost-reducing approaches to existing security programs.

Unraveling the Dark Web (2024)

FAQs

Should you stay away from the dark web? ›

Like the regular web, the dark web can contain malware – but unlike the regular web, there are no sites that are guaranteed to be safe. Avoid downloading anything, and definitely don't download anything you're not 100% certain is legitimate.

Can you stumble upon the dark web? ›

You need to know what you are looking for.

There is no way to stumble upon websites, outside of the links posted by others publicly—every action must be deliberate.

Who started the dark web? ›

The dark web is known to have begun in 2000 with the release of Freenet, the thesis project of University of Edinburgh student Ian Clarke, who set out to create a "Distributed Decentralised Information Storage and Retrieval System." Clarke aimed to create a new way to anonymously communicate and share files online.

Does the government have access to the dark web? ›

For example, the FBI has reportedly conducted operations that allow it to “de-anonymize” Tor servers. The FBI does this by establishing nodes in the network that allow the agency to see the identities and locations of some illegal Tor-based webpages.

How to protect your identity from the dark web? ›

How to protect against dark web identity theft
  1. Strong password practices: Create unique, complex passwords for each online account and update them regularly. ...
  2. Two-factor authentication (2FA): Enable 2FA wherever possible to add an extra layer of protection to your accounts.
Mar 12, 2024

Should I monitor the dark web? ›

It can prevent identity theft and cyber attacks by giving early warnings about data breaches. The cost of dark web monitoring should match the value it brings in protecting sensitive information and avoiding fines.

How much of the internet is the dark web? ›

The dark web is only a small fraction (0.01%) of the deep web, which contains Internet content that is not searchable by your standard search engines. In other words, if Google can't find what you're looking for, it's probably still out there in the World Wide Web; it's just in the harder-to-access deep web.

What are the rules of the dark web? ›

It's not illegal to visit the dark web in the United States. But you can face criminal charges if you use the dark web to engage in illegal activity, such as the sale or purchase of illegal firearms, drugs, p*rnography, stolen passwords, hacked credit card account numbers, or other illicit items.

What is the dark web in Google? ›

The dark web is a part of the internet that lets people hide their identity and location from other people and from law enforcement. As a result, the dark web can be used to sell stolen personal info.

What is the new name for the dark web? ›

The dark web forms a small part of the deep web, the part of the web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.

Is it illegal to use the Tor browser? ›

Tor is not illegal in the US. Tor is often associated with dark web criminality, but the dark web also hosts many legitimate resources like the dark web wikipedia, secure email services, and research databases. If you're not engaged in illicit activities, it's not a crime to use the dark web to protect your privacy.

What currency is used on the dark web? ›

Bitcoins are an online currency with no ties to a government or central bank. Since their inception in 2009, it has become a medium for all kinds of black market activities online.

Who controls the dark web? ›

The dark web is also unregulated, meaning that it is run and upheld by a vast network of individuals around the world. This network contains thousands of volunteers who operate proxy servers to route dark web requests.

What are the positives of the dark web? ›

The dark web helps people to maintain privacy and freely express their views. Privacy is essential for many innocent people terrorized by stalkers and other criminals. The increasing tendency of potential employers to track posts on social media can also make it difficult to engage in honest discussions publicly.

How does your information get on the dark web? ›

If you're wondering “how does one's personal information get on the Dark Web?”, the answer includes data breaches, scams, and a very diverse range of cyber-attacks (phishing through email, private messages and voice calls, social media impersonation, malware infections or digital identity theft).

What are the dangers of the deep dark web? ›

Passwords, physical addresses, bank account numbers, and social security numbers circulate in the dark web all the time. You may already be aware that malicious actors can use these to harm your credit, engage in financial theft, and breach of your other online accounts.

What is the danger of dark web? ›

The dark web doesn't carry as many of the social contracts that website providers follow to protect users on the rest of the web. As such, users can find themselves regularly exposed to some types of malware like: Keyloggers. Botnet malware.

Top Articles
Council Post: 15 Essential Financial Goals Every Business Should Achieve In Its First Year
Cadre Real Estate Investing Review [2024]: Invest in Hidden Gems with the Help of AI
No Hard Feelings Showtimes Near Metropolitan Fiesta 5 Theatre
Froedtert Billing Phone Number
Booknet.com Contract Marriage 2
Ixl Elmoreco.com
30 Insanely Useful Websites You Probably Don't Know About
Miss Carramello
Osrs But Damage
Violent Night Showtimes Near Amc Fashion Valley 18
123Moviescloud
Craigslist Pikeville Tn
Dr. med. Uta Krieg-Oehme - Lesen Sie Erfahrungsberichte und vereinbaren Sie einen Termin
Quest Beyondtrustcloud.com
Dutch Bros San Angelo Tx
Bnsf.com/Workforce Hub
U Arizona Phonebook
라이키 유출
Cincinnati Adult Search
Litter Robot 3 RED SOLID LIGHT
Wiseloan Login
Il Speedtest Rcn Net
Avatar: The Way Of Water Showtimes Near Maya Pittsburg Cinemas
Elite Dangerous How To Scan Nav Beacon
Finding Safety Data Sheets
Craigslist Rome Ny
Sam's Club Gas Price Hilliard
FREE Houses! All You Have to Do Is Move Them. - CIRCA Old Houses
UPC Code Lookup: Free UPC Code Lookup With Major Retailers
Syracuse Jr High Home Page
Autotrader Bmw X5
Microsoftlicentiespecialist.nl - Microcenter - ICT voor het MKB
Joplin Pets Craigslist
Rise Meadville Reviews
Free Robux Without Downloading Apps
Manatee County Recorder Of Deeds
Geology - Grand Canyon National Park (U.S. National Park Service)
Myql Loan Login
RALEY MEDICAL | Oklahoma Department of Rehabilitation Services
Entry of the Globbots - 20th Century Electro​-​Synthesis, Avant Garde & Experimental Music 02;31,​07 - Volume II, by Various
Appraisalport Com Dashboard Orders
Barstool Sports Gif
Electric Toothbrush Feature Crossword
Carteret County Busted Paper
Sechrest Davis Funeral Home High Point Nc
Killer Intelligence Center Download
Bama Rush Is Back! Here Are the 15 Most Outrageous Sorority Houses on the Row
Cvs Minute Clinic Women's Services
18443168434
Noelleleyva Leaks
Nfl Espn Expert Picks 2023
Latest Posts
Article information

Author: Duane Harber

Last Updated:

Views: 6404

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Duane Harber

Birthday: 1999-10-17

Address: Apt. 404 9899 Magnolia Roads, Port Royceville, ID 78186

Phone: +186911129794335

Job: Human Hospitality Planner

Hobby: Listening to music, Orienteering, Knapping, Dance, Mountain biking, Fishing, Pottery

Introduction: My name is Duane Harber, I am a modern, clever, handsome, fair, agreeable, inexpensive, beautiful person who loves writing and wants to share my knowledge and understanding with you.