Difference between revisions of "Dark Web"

From SI410
Jump to: navigation, search
(Bitcoin Laundering)
Line 32: Line 32:
 
===Bitcoin Laundering===
 
===Bitcoin Laundering===
 
As a virtual source of currency, Bitcoin runs the majority of deals and transactions on the Dark Web. For reference, illegal drug sales often reach close to or over $100 million a year, and Bitcoin is almost exclusively used for all of these sales.<ref>What Is The Dark Web?, N/A, 4 July 2017 [https://theconversation.com/explainer-what-is-the-dark-web-46070]</ref>
 
As a virtual source of currency, Bitcoin runs the majority of deals and transactions on the Dark Web. For reference, illegal drug sales often reach close to or over $100 million a year, and Bitcoin is almost exclusively used for all of these sales.<ref>What Is The Dark Web?, N/A, 4 July 2017 [https://theconversation.com/explainer-what-is-the-dark-web-46070]</ref>
Services such as [https://en.bitcoin.it/wiki/Bitcoin_Laundry Bitcoin Laundries], allow users on the Dark Web to send Bitcoin transactions to a 3rd party who then in turn send the same amount to the buyer, thus making it almost completely impossible to track the original buyer. Before Bitcoin, it was extremely difficult to facilitate any sort of trade on the Dark Web safely. The arrival of Bitcoin has paved the way for new markets and transactions to emerge.
+
Services such as [[https://en.bitcoin.it/wiki/Bitcoin_Laundry Bitcoin Laundries]], allow users on the Dark Web to send Bitcoin transactions to a 3rd party who then in turn send the same amount to the buyer, thus making it almost completely impossible to track the original buyer. Before Bitcoin, it was extremely difficult to facilitate any sort of trade on the Dark Web safely. The arrival of Bitcoin has paved the way for new markets and transactions to emerge.
  
 
==In popular culture==
 
==In popular culture==

Revision as of 21:45, 22 April 2018

Dark web.jpg

The Dark Web is a sector of the World Wide Web that requires specific software to access. Hailed as one of the last remaining safe-havens for complete anonymity, the Dark Web continues to garner attention and press worldwide. In order to access the Dark Web, certain protocols must be followed--most notably including the use of Tor. Tor is a software package and network structure that is used to run the Dark Web. Users can visit websites that are not crawled or indexed by search engines, such as Google, and they can keep their activity hidden and anonymous by using multiple levels of servers to route information through advanced encryption technology. Due to the ability of the Dark Web to completely hide someone's identity, however, the use of the service often strays into illegality. The Dark Web is criticized for facilitating illegal activity by providing a place for criminals to carry out their methods and deals. Ethical issues have also risen since the rise of the Dark Web: including but not limited to hosting illegal platforms, like the Silk Road, and providing a place for terrorist organizations and individual pedophiles to plan out and execute illegal acts.

History

The Dark Web has origins that can be traced all the way back to 1969,[1] when a Pentagon-funded program was able to transmit simple messages over secretive networks known collectively as ARPANET. Following these early attempts to transmit and store secretive data, there were also plans in the 1980’s and 90s to collect illegal data and keep them in safe havens, most notably in the Caribbean.[2]

However, it was not until 2002 that a more suitable format was developed for accessing the deeper reaches of the World Wide Web. Worked on since the mid-90s, an open-source software was released to the public under the name “Tor.” Developed by the U.S. Naval Research Laboratory[3], it is still unclear why the U.S. government decided to release the project to the public.

How Tor Works

Based on the concept of Onion Routing[4], Tor makes a user anonymous on the Internet by encrypting data going in and out of one’s IP address and subsequently routing this encrypted information through multiple servers.[5] Once the data reaches the last layer of Tor servers, any sort of tracking or surveillance software traces the source of the content to this exit point, not the individual user. Thus, much like an onion, these multiple layers allow an identity to be hidden on the Internet as it cannot be easily traced.

Whistleblowers and the Dark Web

However, it also allows more popular sites to survive and remain on the web even when faced by national security threats. For instance, the popular whistleblowing site Wikileaks, which aims to release classified government documents to the public, has survived due to the Dark Web.[6] Facebook is another example of a technological giant who makes use of the Tor database to allow its user to remain anonymous and avoid surveillance.[7] It can be argued that Tor and the Dark Web itself is a powerful tool that can help combat government surveillance and keep the possibility of total government control nearly impossible. Responsible usage of services like Tor can create a safe online space for users where they do not have to worry about their data being mined, sold, or bought by large-scale corporations. However, support has been difficult to garner for the Dark Web even with the potential upsides that this domain provides, the lack of security and safety navigating through it makes it difficult to achieve widespread support.

Ethical Concerns With the Dark Web

With over 57% of sites on Tor dedicated for criminal and illegal activity, [8] there is no question that the presence of the Dark Web is extremely controversial in society today. While on one hand it promotes anonymity and privacy, it also allows high-level criminals and organizations to engage in criminal activity with ease. However, there does not seem to be a solution in sight for stopping this activity. As long as Tor remains in place, there is not much government agencies can do to slow this surge of crime.

The issue of privacy vs. legality is the strongest argument built upon the formation of the Dark Web. If any sort of agency were to somehow gain access to Tor services, the entire operation would not be able to protect itself from surveillance and would ultimately become useless. For now, law enforcement can only hope for slip-ups and blunders which have allowed them to catch criminals in the past, such as arresting Silk Road founder Ross William Ulbricht in 2013.

Illegal Activities

Due to the extent of its anonymity capabilities, the Dark Web is notorious for hosting illegal activities and trades. The Dark Web aids in connecting users that desire to buy and sell illegal things. It digitalizes the black market, as it creates a virtual platform for things to be purchased on it. Drug trafficking is one of the largest markets on the Dark Web. Before it was shut down in 2013,[7] the Silk Road had nearly $1.2 billion in total sales. [8] Users are able to buy, sell, and ship products around the world being traced. One large-scale effect the Dark Web has created is the impact it has had on the Afghanistan opium trade, which now uses the anonymity provided to ship their product around the world.[9]

Arms trafficking is another large-scale operation that has exploded in the popularity through the Dark Web. With 59.9% of all Dark Web arms trafficking coming from the U.S, [10] it is a major issue for gun enforcement agencies around the world. Users are able to buy weapons ranging from pistols to explosives. Almost every type of weapon is able to be found on the Dark Web.

The Dark Web also has other illegal activities such as hitmen for hire, human trafficking, and smuggling goods that are illegal in certain countries.

Furthermore, the Dark Web hosts services such as counterfeit passports and IDs, social networks only created to share and distribute child pornography, and even hitmen available for hire.[11] Almost any known illegal activity can be found on the Dark Web for a price.

Bitcoin Laundering

As a virtual source of currency, Bitcoin runs the majority of deals and transactions on the Dark Web. For reference, illegal drug sales often reach close to or over $100 million a year, and Bitcoin is almost exclusively used for all of these sales.[9] Services such as [Bitcoin Laundries], allow users on the Dark Web to send Bitcoin transactions to a 3rd party who then in turn send the same amount to the buyer, thus making it almost completely impossible to track the original buyer. Before Bitcoin, it was extremely difficult to facilitate any sort of trade on the Dark Web safely. The arrival of Bitcoin has paved the way for new markets and transactions to emerge.

In popular culture

Stitchers, a science-fiction crime drama show on Freeform (formerly ABC Family), had an episode in the third season where the case involved a hit-man for hire website on the Dark Web. In the show, the website, "ALL IN" let the characters pick one person they would like to be killed. In return, they were required to kill somebody else.

In CBS crime-drama, Criminal Minds, FBI technical analyst and former hacker, Penelope Garcia has to sometimes go back into the underground hacker network and her contacts in the Dark Web.

Agents of Shield character, Skye (now Daisy Johnson), is a prominent member of the Rising Tide, an anonymous hacker organization that is keen on revealing the government's classified secrets such as the secrets of Iron Man, Hulk, and Thor.

References

  1. The Darknet: A Short History, Ty McCormick, 9 December 2013 foreignpolicy.com
  2. The Darknet: A Short History, Ty McCormick, 9 December 2013 foreignpolicy.com
  3. The Unlikely History of Tor, Paul Hill, 14 February 2018 expressvpn.com
  4. https://en.wikipedia.org/wiki/Onion_routing
  5. Everything About Tor: What is Tor? How Tor Works?, Aditya Tiwari, 22 May 2017 expressvpn.com
  6. What's Hiding In The Dark Web?, Ed Smith, 4 April 2017 [1]
  7. What's Hiding In The Dark Web?, Ed Smith, 4 April 2017 [2]
  8. How the dark web is used to sell illegal drugs like fentanyl, Katie Dangerfield, 24 May 2017 [3]
  9. What Is The Dark Web?, N/A, 4 July 2017 [4]