Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Online anonymity-granting systems such as The Onion Router (Tor) network can be used for both good and ill. The Dark Web is possible only because of online anonymity. The Dark Web poses a dilemma. Illegal markets, trolls and online child abuse rings proliferate due to the technology of Tor and other similar systems. However, the anonymity provided by such systems gives cover for people in repressive regimes that need the protection of technology in order to surf the Web, access censored content and otherwise exercise their genuine right to free expression. In other words, Tor is basically a neutral tool that can be used for either good or ill. Whether the technology is worth it depends upon the net effect. Unfortunately, the costs and benefits of a system like Tor are not evenly distributed globally. The ills tend to cluster in liberal countries, while the benefits tend to cluster most in repressive regimes. Shuttering anonymity networks is not a viable long-term solution, as it will probably prove ineffective and will be costly to those people that genuinely benefit from these systems. Rather than being a solely technological problem, this paper argues that the issue posed by the Dark Web, enabled by anonymity-granting technologies, is a social one. Just as peace and order are maintained in our offline lives through judicious policing, the same principle should apply online. The networks of the Dark Web need to be more actively policed, especially in liberal democratic countries. Online policing, as shown by the takedown of illegal marketplaces such as Silk Road and child pedophilia rings, is actually possible, and both as effective and as expedient as offline policing. More movement in the direction of judicious online policing can minimize the socially damaging costs of anonymity-granting technologies, while still allowing the benefits of such systems. It is not the ideal solution, but it is likely the best that can be done.
Computer Law & Security Review, 2020
This paper aims to shed light into the operation of SafeLine, the only Greek Hotline for illegal online content, and its seventeen years of successful operation as a member of INHOPE, the International Association of Internet Hotlines. The operation of SafeLine is introduced and an analysis of the received reports during its operation is attempted, in order to reveal hidden trends over the seventeen years. Furthermore, a comparison between the reports of SafeLine and the reports of the other 48 national hotlines, members of the International Association INHOPE, operating in 43 different countries spanning six continents worldwide is presented. Another main contribution of this paper is a correlation analysis between SafeLine's reports and dark web data. Specifically, SafeLine's reports are compared against the ALTAS dataset of the Voyager system of Web-IQ, drilled from the dark web, revealing a correlation of more than 50% between the reports received by SafeLine and the domains of illegal sites discussed in the dark web. Last, but not least, an analysis of the legislative framework concerning Child Sexual Abuse Material (CSAM) in all country members of INHOPE, European and outside Europe is attempted, revealing similarities as well as differences in what is considered illegal, the ways CSAM is tackled, and the penalty limits prescribed in various countries.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
This paper talks about how the dark web is utilized to genuine purposes just as to hide the noxious exercises or criminalism. The Dark Web is at the focal point of the discussion about whether online namelessness ought to be kept up despite the criminal behavior that it empowers. This paper will limit its degree by concentrating exclusively on the national contemplations of the Dark Web, and not those issues that dig into the domain of local law implementation. Drug dealing, firearms, fake products, unlawful erotic entertainment, and so forth these are issues that this paper characterizes as falling into the domain.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023
The Internet as a whole is a network of multiple computer networks and their vast infrastructure. The network consists of websites accessible through search engines such as Google, Firefox, etc. It's called the Surface Web. The Internet is further subdivided into the Deep Web-content that is unindexed and inaccessible to traditional search engines. The Dark Web is considered part of the Deep Web. It is accessible via TOR. Participants on the dark web are anonymous and hidden. Anonymity, confidentiality and the possibility of not being detected are three factors offered by special browsers like TOR and I2P. In this article, we discuss the impact of the Darknet in different social areas and provide results. It gives the number of daily anonymous darknet users (with TOR) in Kosovo and worldwide at the time showed the impact of hidden service sites and got search engine results from Ahimia and Onion City Dark Web. Anonymity on the dark web is not sufficiently verified. TOR strives to provide anonymous activity and aims to provide anonymous activity. Here are the results for showing the number of users and their location. calculations are based on IP addresses by country code, and accesses the sources of those addresses and reports the numbers in aggregate form. In this way,dark web users are indirectly represented. Another key factor is the number of anonymous network users on the dark web. In such a network, users are counted based on requests from directory clients (via TOR metrics) and the relay list is updated. Indirectly, the number of users calculated for the anonymous networks. I.
International Journal of Technology Transfer and Commercialisation, 2010
Anonymity in cyberspace is a major concern for the global community. The introduction, growth and utilisation of information and communication technologies (ICTs) have been accompanied by an increase in criminal activities. With respect to cyberspace, identities are easily cloaked in anonymity. Once a message sender's identity is anonymous, cyberspace provides the means to perpetrate wide spread criminal activity to the masses, with little chance of apprehension. On the other hand, anonymity in cyberspace allows whistle-blowers and political activists to express opinions critical of employers and the government enables entrepreneurs to acquire and share technical information without alerting their competitors, and permits individuals to express their views online without fear of reprisals and public hostility. On this basis the question of whether a State or a government can create a narrowlytailored restriction on cyberspace anonymity without violating the privacy remains unresolved. Accordingly, this paper seeks to address and analyse the following issues. Firstly, it starts by presenting the concept and several types of anonymity. Secondly, it focuses on the Internet and how it can be achieved, and why it is an essential tool for free speech. The paper will also describe proposals to outlaw anonymity over the Internet, since it has often been tied to criminal activity by law enforcement bodies. Finally, the paper concludes that total anonymity may be possible through the use of privacy-enhancing technologies such as those offered by Anonymizer.com and Freenet. Moreover, educated legislators can criminalize most true anonymity in cyberspace and still pass security.
This study examines the multifaceted legal challenges faced by governments and law enforcement agencies in their efforts to regulate the dark web. Through an analysis of existing legal frameworks, case studies, and emerging regulatory approaches, we identify key obstacles, including jurisdictional complexities, technological limitations, privacy considerations, and the balance between security imperatives and civil liberties. This research highlights how the anonymous, borderless nature of dark web spaces creates unprecedented regulatory difficulties that traditional legal systems struggle to address effectively. We conclude by proposing a multi-stakeholder framework that balances legitimate privacy interests with security requirements, while acknowledging the technical and jurisdictional realities of regulating hidden online spaces.
2007
To date, there has yet to be a study that characterizes the usage of a real deployed anonymity service. In this paper, we present observations and analysis obtained by participating in the Tor network. In particular, we are interested in answering the following questions: (1) Who uses Tor? What is the performance of the system? (3) How is the system used? (4) What does the traffic distribution look like? and (5) What are the legal and ethical implications of participating in an anonymous network?
This chapter aims to take a closer look at the issue of user control online, through the prism of anonymity and responsibility. It does so by examining the recent events which were part of “operation payback”, initiated by the online organization/collective/gathering “Anonymous”. In response to several companies’ perceived transgressions, Anonymous has commenced an attack on their public domain servers. In addition, they provided sympathetic web users with a free and easy to use DDoS tool to facilitate the attacks. This paper draws the distinction between Anonymous and hackers, and compares the relation of the two groups with the powers that be. The aim is to show how multitude of varying factors have led to increased resistance to Anonymous because they are not hackers, and how they in fact may contribute to limiting user control online rather than empower it.
This paper presents the results of a qualitative study on discussions about two major law enforcement interventions against Dark Net Market (DNM) users extracted from relevant Reddit forums. We assess the impact of Operation Hyperion and Operation Bayonet (combined with the closure of the site Hansa) by analyzing posts and comments made by users of two Reddit forums created for the discussion of Dark Net Markets. The operations are compared in terms of the size of the discussions, the consequences recorded, and the opinions shared by forum users. We find that Operation Bayonet generated a higher number of discussions on Reddit, and from the qualitative analysis of such discussions it appears that this operation also had a greater impact on the DNM ecosystem.
Studies in Conflict & Terrorism, 2015
The layers of the Internet go far beyond the surface content that many can easily access in their daily searches. The other content is that of the Deep Web, content that has not been indexed by traditional search engines such as Google. The furthest corners of the Deep Web, segments known as the Dark Web, contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities. It is the exploitation of the Dark Web for illegal practices that has garnered the interest of officials and policymakers. Individuals can access the Dark Web by using special software such as Tor (short for The Onion Router). Tor relies upon a network of volunteer computers to route users' web traffic through a series of other users' computers such that the traffic cannot be traced to the original user. Some developers have created tools-such as Tor2web-that may allow individuals access to Torhosted content without downloading and installing the Tor software, though accessing the Dark Web through these means does not anonymize activity. Once on the Dark Web, users often navigate it through directories such as the "Hidden Wiki," which organizes sites by category, similar to Wikipedia. Individuals can also search the Dark Web with search engines, which may be broad, searching across the Deep Web, or more specific, searching for contraband like illicit drugs, guns, or counterfeit money. While on the Dark Web, individuals may communicate through means such as secure email, web chats, or personal messaging hosted on Tor. Though tools such as Tor aim to anonymize content and activity, researchers and security experts are constantly developing means by which certain hidden services or individuals could be identified or "deanonymized." Anonymizing services such as Tor have been used for legal and illegal activities ranging from maintaining privacy to selling illegal goods-mainly purchased with Bitcoin or other digital currencies. They may be used to circumvent censorship, access blocked content, or maintain the privacy of sensitive communications or business plans. However, a range of malicious actors, from criminals to terrorists to state-sponsored spies, can also leverage cyberspace and the Dark Web can serve as a forum for conversation, coordination, and action. It is unclear how much of the Dark Web is dedicated to serving a particular illicit market at any one time, and, because of the anonymity of services such as Tor, it is even further unclear how much traffic is actually flowing to any given site. Just as criminals can rely upon the anonymity of the Dark Web, so too can the law enforcement, military, and intelligence communities. They may, for example, use it to conduct online surveillance and sting operations and to maintain anonymous tip lines. Anonymity in the Dark Web can be used to shield officials from identification and hacking by adversaries. It can also be used to conduct a clandestine or covert computer network operation such as taking down a website or a denial of service attack, or to intercept communications. Reportedly, officials are continuously working on expanding techniques to deanonymize activity on the Dark Web and identify malicious actors online.
2015
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.
JOURNAL OF SECURITY AND SUSTAINABILITY ISSUES, 2021
The elementary interest of every country is to maintain its inner security and stability. To achieve this goal the state must restrict within legal frameworks some fundamental rights of its own citizens. One of these fundamental rights is the right to privacy that can be breached only under certain circumstances. It is easy to see that it is unacceptable for a state not to control within the legal frameworks the communication of its own citizens so they can commit crimes, run terrorist rings, or spy rings or establish drug cartels without any consequences. Of course, the control over the communication is not the only means of the successful investigation but undeniably a vital one. That is why the Janus faced nature of the Dark Web is a real security risk nowadays. Although this new medium is the fruit of the last two decades its presence today is stronger than ever before and its popularity is growing day by day. Its most important features are anonymity, hidden geolocation and freedom from censorship. The Dark Web is very useful when it provides anonymity for political dissidents and whistleblowers, but is very harmful when it provides the same features for arm and drug traffickers and terrorists not to mention for pedophiles and so on. This article aims to shed some light on the effects of the Dark Web on the security and economy of the states especially in the aspects of organized crime and the terrorism.
2018
With the growth of the post-9/11 national counter-terror apparatus and as digital systems became more ubiquitous in Americans’ daily lives, the U.S. government engaged in unprecedented forms of mass surveillance during the first two decades of the 21st century. Since 2004, users have been able to download the Tor web browser, an anonymity-granting technology, allowing them to avoid government and commercial surveillance as well as to access content on the deep web. While existing research has shown that Tor is most likely to be downloaded in countries with very high and very low levels of political repression, little is known about the social conditions that produce interest in Tor within the United States. This study examines the issue attention cycles, socio-political conditions, and state-level industry composition associated with public interest in the Tor browser in the U.S. Using data at the state-year level from 2006-2015, this study examines whether social conditions (includ...
Global Crime, 2020
General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ? Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.
The development of the Internet and related communication technologies has had a transformative effect upon social, political, economic, and cultural life. It has also facilitated the emergence of a wide range of crimes that take shape in the spaces of virtual communication. These offenses include technology-oriented crimes such as hacking and the distribution of malicious software; property-oriented crimes such as media piracy, theft, and fraud; and interpersonal offenses such as stalking, harassment, and sexual abuse. In many instances, these crimes serve to entrench and exacerbate existing patterns of victimization, vulnerability, and inequality, along lines of difference related to gender, sexuality, ethnicity, age, and income. The anonymized and globally distributed nature of the Internet creates huge challenges for crime prevention, detection, and prosecution of online offenses.
The internet plays a contributory role in radicalisation, but is only one of a number of mechanisms currently deployed to win recruits to global jihad. Technical regulation of online content is difficult and may be counter-productive, driving forums deeper underground or alienating users. Tim Stevens argues that adopting a social approach that educates and empowers online communities could have more success.
Efe Kerem Sözeri is a PhD candidate at Vrije Universiteit Amsterdam and is writing his dissertation on Turkish migrants' political behaviors in Europe and Turkey. He received his MA degree from the same institution where he completed his thesis with a two-year scholarship. In addition to his academic work, Efe writes about press freedoms and censorship for the Daily Dot, Vocativ, and Global Voices in English; P24 and Bianet in Turkish, and TAZ in German.
This study examines critically the nature of the Internet in relation to its facility for committing crimes. It discovers that the Internet is open, user-controlled, global, decentralized, inexpensive, abundant, interactive, and makes use of independent infrastructure. All these features are combined to form the medium’s transnational nature that challenges ordinary traditional regulatory platforms. It is also found that with increasing over dependence on computer systems within the global Internet network, the incidence of cyber criminality is significantly on the rise. Yet, the processes of investigation and prosecution of suspects are greatly hindered as a result of the amoeboid nature of cyberspace which makes it difficult to locate suspects and their conducts. The paper advocates progress in more sophisticated technology that would aid easy identification of suspects, constant review of cyber laws, and increased public enlightenment on the operations of the Internet. Doctrinal and critical approaches were employed in the study.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.