First comprehensive map of the ‘dark web’ reveals a remarkably antisocial corner of the internet

Science ◽  
2017 ◽  
Author(s):  
Matthew Hutson
Keyword(s):  

as the internet and its applications grew more sophisticated and widespread, so too did the strategy of modern terrorist groups such as ISIS and Boko Haram. The existence of the dark web adds to the online arsenal of groups using digital networks and sites to promulgate ideology or recruit supporters. This chapter will focus on developments such as Twitter and Facebook and the adept use of these tools by savvy terrorist cells (who are becoming much younger, demographically speaking).


Author(s):  
Tim Unwin

Technology is all too often seen as being inherently good, and there are powerful interests limiting the amount of attention paid to the darker side of ICTs and Internet access in particular. However, these darker aspects are crucial to understanding ICT4D, especially since they can more seriously impact the poor, both countries and people, than the rich. The following main challenges are covered in the chapter: privacy and security; the Surface Web and the Dark Web; cyber-security and resilience; negative aspects of the exploitation of Big Data and the abuse of people through social media; and the increasing dehumanization of people through the use of ICTs and the Internet of Things.


2019 ◽  
Author(s):  
◽  
Gokhale Craig

This research was supported financially by the BankSeta, the Council on Scientific and Industrial Research and the National Research Foundation with the aim to log The Onion Router (TOR) traffic usage in South Africa. The recent public disclosure of mass surveillance of electronic communications, involving senior government authorities, has drawn the public attention to issues regarding Internet security privacy. For almost a decade, there has been several research efforts towards designing and deploying open source, trustworthy and reliable electronic systems that ensure anonymity and privacy of users. These systems operate by concealing the true network identity of the communicating parties against eavesdropping adversaries of which TOR is an example of such a system. Clients that use the TOR network construct circuits (paths) which are utilised to route multiple network streams. A circuit is considered secure if there is one non-malicious router in the circuit. Such systems have served as anti-censorship and anti-surveillance tools. The implementation of TOR allows an individual to access the Dark Web, an area of the Internet that is said to be of a much larger magnitude than the Surface Web. The Dark Web which has earned a reputation as a sort of immense black market, associated with terrorist groups, child pornography, human trafficking, sale of drugs, conspiracies and hacking research, has received significant national and international press coverage. However, to date little or no research has been conducted on the illicit usage of the Dark Web and no research has been conducted in the use or misuse of the Dark Web in South Africa. There has not been any study which characterises the usage of a real deployed anonymity service. Observations obtained are presented by participating in the TOR network and the primary goal of this study is to elicit Dark Web traffic by South Africans. Past researchers undertook Dark Web crawling focusing only on specific web content such as explicitly focusing on child exploitation and terrorist activity. The experiment design of this study further builds on experiments conducted in previous studies. The deanonymisation methodology utilised in this study will allow for the detection of exit routing traffic and the logging of all Dark Web traffics areas omitted from the previous studies. This study does not confine the declassification of onion addresses to specific content types and aims to log all exit routing traffics, undertake a comprehensive declassification of websites visited by clients and obtain the Internet Protocol Addresses (IP) of these clients. The analysis of the sample results reveals that in the South African context, Dark Web traffic is mainly directed to social media websites. There are however causes for concerns as there are illicit activities occurring that include the sale of drugs, visiting of child pornographic websites, and the sale of weapons. Finally, the study presents evidence that exit routing traffic by the TOR node is limited to a large number of different countries some of which have serious Internet censorship laws.


Author(s):  
Kautsarina Kautsarina

AbstractEvery human action is culturally charged, as are all human activities related to the use of the internet. Netizens exchanged ideas that works in cyberspace. Ethnography is a research method devoted to understanding the cultural aspects of society. The use of ethnographic methods is considered relevant to assess the culture of users and society in cyberspace. In addition to the internet commonly used by the general public, the Internet also has a part known as Dark Web, where this area is used to search for things that tend to be sensitive, confidential and even illegal. In this study, using the Systematic Literature Review technique, the authors aimed to review what topics were raised in ethnographic studies on Dark Web and how ethnographic studies were carried out by earlier researchers in searching for activities on the Dark Web. The study shows that ethnographic studies on Dark Web are mostly done on illegal drug sales activity. Engagement with active participation with discussions and interviews is done to get a comprehensive overview of the communities and users of Dark Web studied. However, research ethics related to anonymity, research approval of illegal, covert and dangerous activity need to be considered by researchers who will conduct in-depth research on Dark Web. AbstrakSetiap tindakan manusia bermuatan kultural, begitu juga seluruh aktivitas manusia yang berkaitan dengan penggunaan internet. Bersama para pengguna internet lainnya, netizen mempertukarkan gagasan yang kemudian menghasilkan baik karya cipta maupun karsa di dunia maya. Etnografi merupakan metode penelitian yang dikhususkan untuk memahami aspek kultural dalam masyarakat. Penggunaan metode etnografi ini dinilai relevan untuk mengkaji kultur pengguna dan masyarakat dalam dunia maya. Selain internet yang biasa digunakan oleh masyarakat umum, internet juga memiliki bagian yang dikenal dengan Dark Web, dimana bagian ini biasa digunakan untuk mencari hal-hal yang cenderung bersifat sensitif, rahasia bahkan ilegal. Dalam studi ini, dengan menggunakan teknik Systematic Literature Review, penulis bertujuan untuk meninjau mengenai topik apa yang diangkat pada studi etnografi pada Dark Web dan bagaimana studi etnografi dilakukan oleh para peneliti sebelumnya dalam menelusuri aktivitas pada Dark Web tersebut. Hasil studi menunjukkan bahwa studi etnografi pada Dark Web banyak dilakukan pada aktivitas jual beli obat-obatan terlarang. Keterlibatan dengan partisipasi aktif dengan diskusi dan wawancara dilakukan untuk mendapatkan gambaran menyeluruh pada komunitas dan pengguna Dark Web yang diteliti. Namun begitu, etika penelitian terkait anonimitas, persetujuan riset terhadap aktivitas ilegal, terselubung dan cenderung berbahaya perlu dipertimbangkan oleh peneliti yang akan melakukan riset mendalam pada Dark Web.


Author(s):  
Melody Lee Rood ◽  
John Schriner

Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations from the literature focusing on shifting cultural attitudes, effective legislation, and increased education and training.


Author(s):  
Athira U. ◽  
Sabu M. Thampi

Internet has become the most unavoidable phenomenon in our daily life. Together with it has risen the most unfathomable aftermath of anonymity exploitation. The internet available for the normal users are limited to the sites that are directly indexed by common search engines. But apart from these contents, a major portion of the internet lies hidden from regular search engines and is not available to users resorting to ordinary browsers. This part forms the deep web and within it lies the darkest part also known as dark web. Several illegal activities take place in this darkest part, including child pornography, financial fraudulence, drug deployment, and many others. Thus, countermeasures to put a curb on these activities are very much required. The chapter focuses on the most relevant research areas and possible research scopes in the area of the dark web.


Author(s):  
Annamaria Szakonyi ◽  
Brian Leonard ◽  
Maurice Dawson

The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.


Author(s):  
David T. A. Wesley

Established U.S. law has long held that computer code is a language, like any other language, and is therefore subject to same free speech protections afforded other forms of speech under the First Amendment of the United States Constitution. Computer code also protects free speech through cryptography that enables protected communication between two or more parties. This article will consider the legal history of computer code as free speech and how it can be used to promote other forms of free speech through cryptography and secure communications. It will further argue that the deep web and dark web are direct results of these precedents, and while they can be abused by cybercriminals and malicious state actors, they are also indispensable in promoting free speech and human rights.


Sign in / Sign up

Export Citation Format

Share Document