Crimes Committed Through the Dark Web

Crimes
of the Dark Web

Abstract

            Beyond the regular world of the all-accessible
Internet, lies a world of hidden platforms and communities used by only the
darkest and most sinister of individuals. This hidden creation is called the
Dark Web (DW). The Dark Web is a platform on the internet that is only
accessible using a specific type of software. This software allows people to
hide behind various IP addresses to remain undetected in order to complete
illegal and extremist acts. This paper serves to go into detail about what the
DW is and how it is used, what types of crimes are committed, and other illegal
acts performed within it. It will explain the different domains that reside
within the DW, what they are used for, and why they were so successful. This
paper will also go into what kinds of individuals choose to use it, and why
they feel the need to do so, and how they have been caught and stopped in the
past. This paper will strive to cover all different aspects of the DW and all that
is associated with it, to better understand its reason for existing.

Crimes
of the Dark Web

            There are many types of crimes committed
in this world, however the most recently evolved platform for crime is known as
the Dark Web (DW). The DW is a discrete online infrastructure used by
miscreants such as terrorists, where they are able to share their ideologies
and communicate with one another in often illegal activities (Chen, Chung, Qin,
Reid, Sageman, & Weimann, 2008). The DW is the main support of crimes
taking place in today’s cyberspace, and according to Alrwais, Li, Wang, Xie, and
Yu, (2013), these crimes cause hundreds of millions in damage every year. There
is still limited knowledge about DW infrastructures, despite progress being
made to understand and disrupt the malignant activities (Alrwais, et al.,
2013), though we do know from accounts of experience, as well as the little
research that has been done, some of the happenings within DW social networks.
This paper will serve to explain the DW, what it is used for, and the different
domains associated with it. It will go into detail about how individuals access
it, and the different reasons one might have to do so. This paper will also
cover different domains within DW platforms, misconceptions about it, and
various crimes committed associated with DW use.

What is the Dark Web and how is it accessed?

            There are many different
explanations used to define the DW, as it is something very difficult to
understand. What is mainly understood about it is, the DW is a class of content
on the internet that is part of something called the “Deep Web” (Chertoff &
Simon, 2015). The Deep Web is a platform that is not available by standard
search engines, meaning you cannot access it without the correct software
(Gehl, 2014). Chertoff and Simon (2015) explain that the DW is used for near-complete
anonymity to perform illegal acts away from the face of the public. According
to some, the DW is a platform used for power and freedom, attempting to
overcome growing social networking as well as state oppression (Gehl, 2014). To
others, it is a place that is able to foster new opportunities for individuals
with malicious intent to commit crimes and “dark business” in a more secretive
fashion (Alrwais, et al., 2013). As mentioned before, it is impossible to enter
the DW without proper software. There are different ways to be able to access
the DW, but one of the most common ways is by use of “The Onion Router,” also
known as “TOR” (Hayes, Cappa, & Cardon, 2018). The Onion Router is an
infrastructure that can be used to create almost completely anonymous
connections over a public domain, which is how individuals roam around the DW
and utilize different internet services without being detected (Goldschlag,
Reed, & Syverson, 1999). The Onion Router “covers your online tracks by
blending your internet traffic into data from many servers worldwide to make
you functionally invisible” (Hodson, 2014). The Onion Router was first created
about 20 years ago as a military research project. Its original intention was
to avoid traffic analysis (TA), which is used to identify IP addresses (Forte,
2006). The individuals running this research project lost control of the
software, ultimately making it available to the general public, creating
privacy on the internet that is almost impossible to control (Forte, 2006). The
reason for this software being called an “onion” router, is likely due to the
layers involved in it, starting with the all-accessible “surface web,” and
moving deeper and deeper through layers into the DW (Weimann, 2016). It was
Michael K. Bergman that stated the DW as compared to skimming a net across the
surface of the ocean. You may catch a great deal within the net, however there
is a breadth of information that resides deeper that cannot be reached
(Weimann, 2015).

Who is using the Dark Web and Why?

            To many, the DW is a terrifying
place that should never be entered. As most people are aware, it is full of
dangerous individuals, seeking out antisocial activities with others who share
similar ideals and interests. The creation of the DW has allowed for
individuals such as terrorists to reside within it undetected to go about their
business. It is known that these terrorists have been active in public online
platforms since the late 1990s, however would get shut down by
counter-terrorism agencies. This is when then DW came in handy for these
individuals, as the DW provides a kind of security that nowhere else is able to
provide, and therefore is perfect to execute antisocial and illegal acts
(Weimann, 2016). A recent study was conducted and found that 57% of the content
residing within the DW consists of illegal content such as pornography, illicit
finances, drug hubs, weapons trafficking, counterfeit currency, terrorist communication,
and more (Moore & Rid). The DW is a host for marketplaces that allow
“vendors” to sell illegal items to consumers using Bitcoin rather than actual
money (Hayes, et al., 2018). Bitcoin is a crypto-currency that allows for these
seller’s to anonymously trade illegal items on the DW without leaving a trail
(Hayes, et al., 2018). It is believed that the DW marketplaces are so
successful because consumers of these illegal items feel safe shopping there,
because they can be almost certain they will never be caught due to the hefty
precautions used within these sites (Hayes, et al., 2018). This high level of
anonymity nurtures illegal activities within the DW including not only drug
trafficking, but also credit card fraud and identity theft, as well as leaks of
sensitive information (Chertoff & Simon, 2015).

            There are various different groups
of people that use the DW for their own personal gain, many of them being
extremist or terrorist groups. One of the first major hate-sites that
originated on the DW was a groups of neo-Nazi’s (Anwar & Abulaish, 2012).
As of 2012, the neo-Nazi hate-site contained 58 different forums with a total
of 619, 634 threads and over 8 million posts (Anwar & Abulaish, 2012). Evidence
of these hate groups show the danger that is growing on DW forums, and the
significant threat they pose to society. Accessibility to these extremist
groups allow for a global audience to be present and share ideals world-wide
with one another, that would not be able to be accomplished otherwise (Zhou,
Reid, Qin, Chen, & Lai, 2005). Being online means hate groups can now grow
larger than ever before. Not only can extremist ideals now reach entire
communities in the real world, but those communities can now spread their
ideals thousands of times faster and join with other communities across the
world, allowing for a much bigger problem than we have ever faced before. A
quote taken from Roversi (2006) states quite literally what is happening in the
world due to these extreme terrorist groups residing on the DW. The quote reads
as a testimony against the DW and its happenings of nostalgia for the Fascist
era, videos appearing on extremist web sites of police and political “adversaries,”
and propaganda being created against Blacks, gays, and Jews. The statement continues,
arguing a complete “Balkanization” of the web slowly occurring (Roversi, 2006).
Balkanization being a fragmentation of the internet that is hostile towards one
another.

            The DW and its users have grown
exponentially over the years. In 2007 alone, there was an estimated eight
hundred active right-wing websites document in the US (Caiani & Parenti,
2009). As Caiani and Parenti (2009) point out, it is not just the number of
extremist websites on the DW that is interesting, however it is the role the
internet plays in these organizations that is gaining scientific interest. As
research expands in this field, there are findings indicating the use of these
sites being dissemination of propaganda, inciting violence, facilitate
recruitment in order to reach a larger, more global audience, and to connect
with others that have similar interests (Caiani & parenti, 2009). To prove
further this usage of the DW, after the attacks in November of 2015 in Paris,
ISIS turned to the DW to spread propaganda in an attempt to protect its
supporters (Weimann, 2016). ISIS’s media outlet is known as Al-Hayat Media Center, where information
is spread about the happenings within the group, allowing for people from all
corners of the earth to reach and be informed of this growing terrorist
organization (Weimann, 2016).

            Researchers are still unsure about
whether or not the ability to communicate secretly online is a causal factor
for an increase in terrorism. It is known however, that this online
accessibility substantially improves the ability of extremist groups to grow
and prosper, with the capacity to reach a mass audience (Caiani & Parenti,
2009). It is clear that socially unacceptable activities are infinitely easier
to execute within the DW than anywhere else, and it makes complete sense why
groups such as ISIS would choose to turn to a platform such as this.

Domains within the Dark Web

            As stated before, there are many different
domains that reside outside as well as within the DW, one being known as the
Silk Road (Lacson & Jones, 2016). The Silk Road was a cryptomarket that led
to the popularity of DW marketplaces after its rise and fall between 2011 and
2013 (Hayes, et al. 2018). The Silk Road marketplace, throughout its nearly two
years of operation, generated millions of dollars in revenue for those using it
(Lacson & Jones, 2016). This platform was used mainly for drug dealers and
buyers on an international level. The Silk Road was founded by a mysterious
individual known as the “Dread Pirate Roberts,” and used web-based currency
like bitcoin, supported military-grade privacy, and managed to stay out of the
eyes of law enforcement everywhere for the two years it remained in use (Lacson
& Jones, 2018). As stated before, sites like this are only accessible
through the TOR browser, also known as The Onion Router, where URLs always
consisted of seemingly random sets of characters, always followed by “.onion”
(Lacson & Jones, 2018). It seems as though the “.onion” was yet another
security feature among the many encryptions already in place. There was a study
conducted by Maddox, Barratt, Allen, and Lenton (2015), in which they
anonymously interviewed users of the Silk Road after its closure in 2013. Their
study found that the Silk Road was not just used for buying and selling drugs,
but it was also a place that supported personal freedom where open and safe
discussions were able to be had regarding stigmatized and illegal behaviours
between individuals who shared similar ideologies and interests (Maddox,
Barratt, Allen, & Lenton, 2015). This private domain was a place where
people could go to avoid public scrutiny and feel like part of a community.

            Along with the Silk Road, there are
also other domains and websites within the DW. The Assassination Market website
is yet another platform that allows individuals to perform illegal acts. This
platform is a prediction market where a party will place a bet on the date they
believe a given individual will die. Whoever guesses accurately collects a
payoff (Chertoff & Simon, 2015). Though this website is a prediction
market, it provides incentive for the gamblers to assassinate the given
individual in order to win the large sum of money (Chertoff & Simon, 2015).
There are also websites that allow individuals to hire assassins, one being White Wolves, and another known as C’thuthlu (Chertoff & Simon, 2015).
Alongside the Assassination Market, come other websites such as Banker & Co. and InstaCard, which are websites on the DW
that facilitate untraceable financial transactions using bitcoins or an
anonymous debit card issued by a bank (Chertoff & Simon, 2015). These
websites also allow individuals to buy stolen credit card information, one in
particular called Atlantic Carding offers
this service (Chertoff & Simon, 2015). With these websites, it has never
been easier to buy and sell illegal items on the internet.

Conclusion

            Among all of the crimes committed in
the world, those committed on the DW can be considered all the more dangerous. This
being said, we must note that virtual crime is no different than crime in the
real world. All that has changed is the medium to which people are utilizing to
commit these crimes, and the breadth of people that can be reached at any given
time (Chertoff & Simon, 2015). As discovered throughout this paper, the DW
is a platform on the internet that allows for near complete anonymity on the
web. This created a world for criminals to be able to exist in communities
committing antisocial acts virtually unnoticed by the vast majority of people
on and off the internet. It also allows for criminals to be able to reach a
much larger audience than ever before, creating a large problem when it comes
to terrorist and extremist groups, as well as the buying and selling of illegal
items. This paper served to explore the DW and all it entails, from what it is,
to how it was created, to how to access it, as well as various reasons people
feel the need for such a destructive and hateful platform. There is still
ongoing research regarding this topic, and much yet to be discovered about the
DW. Despite this, it is believed we have a good grasp on this concept from a scientific
standpoint, and will continue to strive to shut down the operations and
happenings on the DW. As we continue this goal, researchers will continue to
study and monitor different presences on the DW, both for scientific gain, and
to ensure the safety of the public.

References

  • Alrwais, S., Li, Z., Wang, X., Xie, Y., F. (2013). Finding the linchpins of the Dark Web: a study on topologically dedicated hosts on malicious web infrastructures. 2013 IEEE Symposium on Security and Privacy, 112-126. DOI: 10.1109/SP.2013.18
  • Anwar, T., & Abulaish, M. (2012). Identifying cliques in Dark Web forums – An agglomerative clustering approach. Intelligence and Security Informatics, 1-4. DOI: 10.1109/ISI.2012.6284289
  • Caiani, M., & Parenti, L. (2009). The dark side of the Web: Italian right-wing extremist groups and the internet. South European Society and Polotics, 14(3), 273-294. DOI: 10.1080/13608740903342491
  • Cappa, F., Cardon, J., & Hayes, D. R. (2018). A framework for more effective Dark Web marketplace investigations. Information, 9(8), 1-17.
  • Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., & Weimann, G. (2008). Uncovering the dark web: A case study of Jihad on the web. Journal of the Association for Information Science and Technology, 59(8), 1347-1359.
  • Chertoff, M., & Simon, T. (2015). The impact of the dark web on internet governance and cyber security. Waterloo, ON: Centre for International Governance Innovation and Chatham House.
  • Forte, D. (2006). Advances in onion routing: description and backtracking/investigation problems. Digital Investigation, 3(2), 85-88.
  • Gehl, R. W. (2014). Power/freedom on the dark web: A digital ethnography of the Dark Web Social Network. New Media and Society 18(7), 1219-1235.
  • Goldschlag, D., Reed, M., & Syverson, P. (February, 1999). Onion routing. Communications of the ACM, 42(2), 39-41. Retrieved from https://dl.acm.org/citation.cfm?id=293443
  • Hodson, H. (March, 2014). Invisible: A visitors’ guide to the dark web. New Scientist. Retrieved from https://www.newscientist.com/article/mg22129611-100-invisible-a-visitors-guide-to-the-dark-web/
  • Lacson, W., & Jones, B. (2016). The 21st century DarkNet market: Lessons from the fall of Silk Road. International Journal of Cyber Criminology, 10(1), 40-61. DOI: 10.5281/zenodo.58521
  • Maddox, A., Barratt, M. J., Allen, M., & Lenton, S. (2015). Constructive activism in the Dark Web: Cryptomarkets and illicit drugs in the digital ‘demimonde.’ Information, Communication & Society, 19(1), 111-126.
  • Moore, D., & Rid, T. (2016). Cryptopolitik and the Darknet. Survival: Global Politics and Strategy, 58(1), 7-38.
  • Roversi, A. (2006). L’odio in rete: siti ultras, nazifascismo online, jihad elettronica, 167, II mulino.
  • Weimann, G. (2015). Going dark: Terrorism on the Dark Web. Studies in Conflict and Terrorism, 39(3), 195-206.
  • Weimann, G. (2016). Terrorist Migration to the Dark Web. Terrorism Research Institute, 10(3), 40-44.
  • Zhou, Y., Reid, E., Qin, J., Chen, H., & Lai, G. (2005). US domestic extremist groups on the Web: link and content analysis. IEEE Intelligent Systems, 20(5), 44-51.
Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our Guarantees

Money-back Guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism Guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision Policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy Policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation Guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more