Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Combating Crime on the Dark Web

You're reading from   Combating Crime on the Dark Web Learn how to access the dark web safely and not fall victim to cybercrime

Arrow left icon
Product type Paperback
Published in Feb 2023
Publisher Packt
ISBN-13 9781803234984
Length 138 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Nearchos Nearchou Nearchos Nearchou
Author Profile Icon Nearchos Nearchou
Nearchos Nearchou
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Part 1:Introduction to Cybercrime and Dark Web’s History
2. Chapter 1: An Introduction to Cybercrime FREE CHAPTER 3. Chapter 2: An Introduction to the Dark Web 4. Part 2:The Dark Web’s Ecosystem and Major Crimes
5. Chapter 3: Drug Markets on the Dark Web 6. Chapter 4: Child Pornography on the Dark Web 7. Chapter 5: Human Trafficking on the Dark Web 8. Chapter 6: Cyberterrorism on the Dark Web 9. Part 3:Efforts to Combat Crimes on the Dark Web
10. Chapter 7: Efforts for Combating Crime on the Dark Web 11. Chapter 8: System for Combating Crime on the Dark Web 12. Chapter 9: Discussion and Evaluation 13. Index 14. Other Books You May Enjoy

Dark Web access tools

The Dark Web is often confused with the Deep Web, but it is essential to understand that these two are different entities. In simple terms, the Dark Web is a unique portion of the Deep Web, approximately 0.01 percent of it. There are a few distinguishing characteristics that a website must meet to be considered a Dark Web site. A Dark Web site must only be able to be accessed anonymously through a specialized browser such as TOR, Freenet, or I2P. Specifically, websites accessed through the TOR browser have the .onion domain suffix, a special top-level domain name referring to an anonymous onion service (Porup, 2019). The following screenshot shows what the full onion URL of the popular search engine DuckDuckGo looks like (DeepOnionWeb, 2019):

Figure 1.4 – DuckDuckGo onion URL

Figure 1.4 – DuckDuckGo onion URL

TOR is the most popular and most used Dark Web browser. As of October 2022, it has approximately 2 million users worldwide (TOR Metrics, 2022). A simplistic interpretation of TOR is that of an open source browser, which is actually an adaption of the Firefox browser. In a TOR network, thousands of volunteers around the world run relays (servers) that route traffic. The traffic is relayed and encrypted multiple times as it passes over the TOR network (TOR Project, 2021). Only a handful of alternative technologies can match TOR’s sophisticated features. The fact that all TOR users look alike on the internet makes TOR one of the most elite cyberspace technologies of all time.

Another popular Dark Web tool is I2P. I2P is an anonymous network like TOR, and it utilizes the end-to-end encryption standard. This standard is a secure communication method that stops other people from accessing packets of data while they are transmitted from one end system to another (Astolfi, Kroese, and Oorschot, 2015). The main difference between TOR and I2P is that I2P does not rely on a centralized database of server nodes, as it uses garlic routing rather than TOR’s onion routing. Garlic routing is an improved browsing technology and an extension of onion routing, and like garlic cloves, it works by encrypting multiple messages together into a layered encryption standard. The garlic technology increases data speed and makes it more difficult for attackers to perform traffic analysis. I2P’s decentralized approach has two significant advantages: better scalability and no trusted central party (Ali et al., 2016).

Due to the COVID-19 pandemic, more of people’s everyday activities have taken place at home. They include distance education, virtual offices, digital entertainment, online shopping, and doctor visits. However, this problem has increased the risk of attacks through the internet. The FBI stated that the number of cyberattacks reported from January to May 2020 was nearly the same as the number of cyberattacks for the entire year of 2019.

Several factors can affect potential victims’ vulnerabilities, including the following:

  • Individual behavior
  • Online activities
  • Personal traits
  • Attitudes about technology

It’s thus crucial for mental health services to know about the possible effects of cyberattacks and patient risks. This scenario can include the impact of internet-based mental health services during the coronavirus outbreak.

You have been reading a chapter from
Combating Crime on the Dark Web
Published in: Feb 2023
Publisher: Packt
ISBN-13: 9781803234984
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image