Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2019, 2019 International Conference on Computational Science and Computational Intelligence (CSCI)
The availability of sophisticated technologies and methods of perpetrating criminogenic activities in the cyberspace is a pertinent societal problem. Darknet is an encrypted network technology that uses the internet infrastructure and can only be accessed using special network configuration and software tools to access its contents which are not indexed by search engines. Over the years darknets traditionally are used for criminogenic activities and famously acclaimed to promote cybercrime, procurements of illegal drugs, arms deals, and cryptocurrency markets. In countries with oppressive regimes, censorship of digital communications, and strict policies prompted journalists and freedom fighters to seek freedom using darknet technologies anonymously while others simply exploit it for illegal activities. Recently, MIT's Lincoln Laboratory of Artificial Intelligence augmented a tool that can be used to expose illegal activities behind the darknet. We studied relevant literature reviews to help researchers to better understand the darknet technologies, identify future areas of research on the darknet and ultimately to optimize how data-driven insights can be utilized to support governmental agencies in unraveling the depths of darknet technologies. This paper focuses on the use of internet for crimes, deanonymization of TOR-services, darknet a new digital street for illicit drugs, research questions and hypothesis to guide researchers in further studies. Finally, in this study, we propose a model to examine and investigate anonymous online illicit markets. 1
Webology, 2021
Nowadays, the darknet or dark web has become one of the most booming topics in context with cyber security. [6]Several research studies and current reports conclude that how the anonymous nature of the darknet provides a platform for illegal activities and cybercrime. The dark web is a hidden online market for everything, including but not limited to human trafficking, drugs, illegal weapons, forged documents, hire services for murder, narcotics, indecent pornography, etc. Because of these reasons, it is difficult for digital forensic professionals to trace the origin of traffic, location, and ownership of any computer or person on the Darknet. This paper reveals the mysterious and invisible facts of the darknet in various ways.
Security Journal , 2018
In recent years, the Darknet has become one of the most discussed topics in cyber security circles. Current academic studies and media reports tend to highlight how the anonymous nature of the Darknet is used to facilitate criminal activities. This paper reports on a recent research project in four Darknet forums that reveals a different aspect of the Darknet. Drawing on our qualitative fndings, we suggest that many users of the Darknet might not perceive it as intrinsically criminogenic, despite their acknowledgement of various kinds of criminal activity in this network. Further, our research participants emphasised on the achievement of constructive socio-political values through the use of the Darknet. This achievement is enabled by various characteristics that are rooted in the Darknet’s technological structure, such as anonymity, privacy, and the use of cryptocurrencies. These characteristics provide a wide range of opportunities for good as well as for evil.
Studies in Conflict & Terrorism, 2015
The layers of the Internet go far beyond the surface content that many can easily access in their daily searches. The other content is that of the Deep Web, content that has not been indexed by traditional search engines such as Google. The furthest corners of the Deep Web, segments known as the Dark Web, contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities. It is the exploitation of the Dark Web for illegal practices that has garnered the interest of officials and policymakers. Individuals can access the Dark Web by using special software such as Tor (short for The Onion Router). Tor relies upon a network of volunteer computers to route users' web traffic through a series of other users' computers such that the traffic cannot be traced to the original user. Some developers have created tools-such as Tor2web-that may allow individuals access to Torhosted content without downloading and installing the Tor software, though accessing the Dark Web through these means does not anonymize activity. Once on the Dark Web, users often navigate it through directories such as the "Hidden Wiki," which organizes sites by category, similar to Wikipedia. Individuals can also search the Dark Web with search engines, which may be broad, searching across the Deep Web, or more specific, searching for contraband like illicit drugs, guns, or counterfeit money. While on the Dark Web, individuals may communicate through means such as secure email, web chats, or personal messaging hosted on Tor. Though tools such as Tor aim to anonymize content and activity, researchers and security experts are constantly developing means by which certain hidden services or individuals could be identified or "deanonymized." Anonymizing services such as Tor have been used for legal and illegal activities ranging from maintaining privacy to selling illegal goods-mainly purchased with Bitcoin or other digital currencies. They may be used to circumvent censorship, access blocked content, or maintain the privacy of sensitive communications or business plans. However, a range of malicious actors, from criminals to terrorists to state-sponsored spies, can also leverage cyberspace and the Dark Web can serve as a forum for conversation, coordination, and action. It is unclear how much of the Dark Web is dedicated to serving a particular illicit market at any one time, and, because of the anonymity of services such as Tor, it is even further unclear how much traffic is actually flowing to any given site. Just as criminals can rely upon the anonymity of the Dark Web, so too can the law enforcement, military, and intelligence communities. They may, for example, use it to conduct online surveillance and sting operations and to maintain anonymous tip lines. Anonymity in the Dark Web can be used to shield officials from identification and hacking by adversaries. It can also be used to conduct a clandestine or covert computer network operation such as taking down a website or a denial of service attack, or to intercept communications. Reportedly, officials are continuously working on expanding techniques to deanonymize activity on the Dark Web and identify malicious actors online.
Security Journal
After the Silk Road closure, many studies started focusing on the trend and patterns of darknet-related crimes in the 2010s. This first study combined a systematic literature review and bibliometric analysis in the field. This study clarifies 49 articles in criminology and penology among 1150 publications relating to the darknet on the Web of Science database to review and analyze the research evolutions of this topic in the last decade. The main findings point out (1) almost all leading authors with their most influential papers came from the Global South with predominant contributions; (2) unbalancing publications between regional scholars and their institutions and countries although the darknet-related criminals occurred and operated without border; and (3) some specialized themes have identified to call further extensive research such as policing interventions in the darknet and flows of the cryptocurrency in cryptomarkets, among others.
Drug and Alcohol Review, 2015
MIS Quarterly
Society's growing dependence on computers and information technologies has been matched by an escalation of the frequency and sophistication of cyber attacks committed by criminals operating from the Darknet. As a result, security researchers have taken an interest in scrutinizing the Darknet and other underground web communities to develop a better understanding of cybercriminals and emerging threats. However, many scholars lack the capability or expertise to operationalize Darknet research and are thus unable to contribute to this increasingly impactful body of literature. This article introduces a framework for guiding such research, called Darknet Identification, Collection, Evaluation, with Ethics (DICE-E). The DICE-E framework provides a focused reference point and detailed guidelines for scholars wishing to become active in the Darknet research stream. Four steps to conducting Darknet forum research are outlined: (1) identification of Darknet data sources, (2) data collection strategies, (3) evaluation of Darknet data, and (4) ethical concerns related to Darknet research. To illustrate how DICE-E can be utilized, an example empirical study is reported. This exemplar illustrates how DICE-E can guide scholars through key decision points when attempting to incorporate the Darknet within their research.
SSRN Electronic Journal, 2019
Darknet markets have been studied to varying degrees of success for several years (since the original Silk Road was launched in 2011), but many obstacles are involved which prevent a complete and systematic survey. The Australian National University's Cybercrime Observatory has developed tools to collect and analyse data captured from the darknet (illicit cryptomarkets). This report describes, at the high level, a method for collecting, and analysing, data from specific darknet marketplaces. Examples of typical results that may be obtained from darknet markets and current limitations to the automation of data capture are breifly outlined. While the proposed solution is not error-free, it is a significant step in the direction of providing a comprehensive solution tailored for data scientists, social scientists, and anyone interested in analysing trends from darknet markets.
CYBER SECURITY AND CYBER LAWS: ISSUES AND CHALLENGES , 2024
"Exploring the Shadows: Cybercrimes in the Dark Web" explores the shadowy side of the Internet where illegal activity flourishes and anonymity is king. Dark Web provides a window into the complex web of cybercrimes that are thriving in the shadowy corners of the internet. The dark web is a secret network that can only be accessed using specialised software. It is a haven for a variety of illicit activities, including identity theft, computer espionage, and the trafficking of drugs and weapons. By means of an extensive analysis, this investigation exposes the manner in which cybercriminals function, providing insight into the techniques and approaches they utilise to elude law enforcement and take advantage of gullible targets. It highlights the risks present in our increasingly linked society and clarifiesthe changing panorama of cyber threats via the use of case studies and expert analysis. In addition, this abstract emphasises how critical it is for stakeholders to work together and implement strong cybersecurity measures in order to reduce the dangers associated with cybercrimes on the dark web. In the end, "Exploring the Shadows" is a powerful call to action that promotes more caution and awareness when negotiating the perilous waters of the digital underworld.
American journal of qualitative research, 2020
Drug trafficking on darknet based marketplaces has become a highly concerning topic in law enforcement activities, recently. Even though Darkmarkets represent only a tiny fraction of the global drug trade, they are changing the drug markets social networks, introducing a new paradigm of the link between vendors and buyers of drugs. The aim of this study is to critically review the darkmarkets' ecosystem and the previous literature regarding these new marketplaces, trying to investigate how the drug trade is changing with these new technologies, and the role of organised crime (OC) in these new illegal markets. And trying to understand how and whether is it involved OC on these cyber drug markets and the chain behind them. Despite opinions of part of the academy, the results show that there are no empirical evidences of direct involvement of OC as vendors in darkmarkets. However, there are evidences of an indirect role of OC in darknet drug trafficking, as supplier of illegal drugs to the online-vendors.
Computer Law & Security Review, 2020
This paper aims to shed light into the operation of SafeLine, the only Greek Hotline for illegal online content, and its seventeen years of successful operation as a member of INHOPE, the International Association of Internet Hotlines. The operation of SafeLine is introduced and an analysis of the received reports during its operation is attempted, in order to reveal hidden trends over the seventeen years. Furthermore, a comparison between the reports of SafeLine and the reports of the other 48 national hotlines, members of the International Association INHOPE, operating in 43 different countries spanning six continents worldwide is presented. Another main contribution of this paper is a correlation analysis between SafeLine's reports and dark web data. Specifically, SafeLine's reports are compared against the ALTAS dataset of the Voyager system of Web-IQ, drilled from the dark web, revealing a correlation of more than 50% between the reports received by SafeLine and the domains of illegal sites discussed in the dark web. Last, but not least, an analysis of the legislative framework concerning Child Sexual Abuse Material (CSAM) in all country members of INHOPE, European and outside Europe is attempted, revealing similarities as well as differences in what is considered illegal, the ways CSAM is tackled, and the penalty limits prescribed in various countries.
This paper presents the results of a qualitative study on discussions about two major law enforcement interventions against Dark Net Market (DNM) users extracted from relevant Reddit forums. We assess the impact of Operation Hyperion and Operation Bayonet (combined with the closure of the site Hansa) by analyzing posts and comments made by users of two Reddit forums created for the discussion of Dark Net Markets. The operations are compared in terms of the size of the discussions, the consequences recorded, and the opinions shared by forum users. We find that Operation Bayonet generated a higher number of discussions on Reddit, and from the qualitative analysis of such discussions it appears that this operation also had a greater impact on the DNM ecosystem.
ArXiv, 2021
The internet can be broadly divided into three parts: surface, deep and dark. The dark web has become notorious in the media for being a hidden part of the web where all manner of illegal activities take place. This review investigates how the dark web is being utilised with an emphasis on cybercrime, and how law enforcement plays the role of its adversary. The review describes these hidden spaces, sheds light on their history, the activities that they harbour including cybercrime, the nature of attention they receive, and methodologies employed by law enforcement in an attempt to defeat their purpose. More importantly, it is argued that these spaces should be considered a phenomenon and not an isolated occurrence to be taken as merely a natural consequence of technology. This paper contributes to the area of dark web research by serving as a reference document and by proposing a research agenda.
Sakarya University Journal of Computer and Information Sciences
Crime, terrorism, and other illegal activities are increasingly taking place in cyberspace. Crime in the dark web is one of the most serious challenges confronting governments around the world. Dark web makes it difficult to detect criminals and track activities, as it provides anonymity due to special tools such as TOR. Therefore, it has evolved into a platform that includes many illegal activities such as pornography, weapon trafficking, drug trafficking, fake documents, and more specially terrorism as in the context of this paper. Dark web studies are critical for designing successful counter-terrorism strategies. The aim of this research is to conduct a critical analysis of the literature and to demonstrate research efforts in dark web studies related to terrorism. According to result of study, the scientific studies related to terrorism activities have been minimally conducted and the scientific methods used in detecting and combating them in dark web should be varied. Advanced...
This paper examines ethical issues to do with researching the Tor Project’s capacity for hidden services – the “darknet”. It discusses particular issues to do with anonymity, confidentiality, and researching illegal activity that researchers should take into special consideration before delving into the rich world of Tor’s hidden services, given the nature of Tor and its concentration on provision of technically anonymous services.
Forensic Science International, 2016
Cryptomarkets are online marketplaces that are part of the Dark Web and mainly devoted to the sale of illicit drugs. They combine tools to ensure anonymity of participants with the delivery of products by mail to enable the development of illicit drug trafficking. Using data collected on eight cryptomarkets, this study provides an overview of the Canadian illicit drug market. It seeks to inform about the most prevalent illicit drugs vendors offer for sale and the preferred destination countries. Moreover, the research gives an insight into the structure and organisation of distribution networks existing online. We inform on the number of listings each vendor manages, the number of cryptomarkets they are active on and the products they sell in function of their presence on them. This research demonstrates the importance of online marketplaces in the illicit drug markets. It shows how the analysis of data available online may elicit knowledge on criminal activities. Such knowledge is mandatory to design efficient policy for monitoring or repressive purposes.
Global Journal of Health Science, 2017
BACKGROUND: The illegal electronic trade of NPS substances on the deep web and the darknet have never been thoroughly mapped. This study will propose and illustrate a blueprint for mapping of the darknet e-marketplace, including activities originating from the Middle East.MATERIALS & METHODS: Multiple Internet snapshots were taken for the darkest e-marketplace, e-markets, Grams search engine, and e-vendors. In relation to the most popular and high-risk NPS substances, the most dominant e-market will be identified. Special correlation will be carried out with the; population count of shipping countries of NPS, the incidence of rape and sexual assaults, and religious affiliation.RESULTS: The most popular high-risk NPS were identified; cannabis and cannabimimetic, MDMA, crack, Meth, and LSD. These were geo-mapped primarily into; Netherlands, US, UK, Germany, Australia, Canada, France, and Spain. AlphaBay e-market was found to be a proper representative for the darknet e-marketplace; th...
Multifaceted Uses of Cutting-Edge Technologies and Social Concerns, 2024
Criminal and terrorist organizations seek to benefit from the advantages of using the Dark Web, especially its confidential nature and difficulty tracking users, to achieve direct illegal activities without any oversight or legal accountability. Sites on this network, which offer forged and stolen documents, credit card data, and personal accounts, have transformed into a black market for illicit activities, serving as a hub for criminals, hackers, hired killers, counterfeiters, and human traffickers, among others. The chapter seeks to analyze how to integrate artificial intelligence and machine learning in combating dark web crimes, shed light on illegal criminal activities across the dark web, and discuss ways to combat them in light of the relevant technical and legal challenges. The chapter suggests increasing interest in emphasizing artificial intelligence as a forensics tool to prove crimes, concerted international efforts, and strengthening international security and judicial cooperation to effectively confront organized criminal activities via the dark network.
Ekonomika, 2017
The development of information and communication technologies, especially the Internet, has led to drastic changes in all spheres of human life and work. Although some of these changes have very positive effects, others are extremely negative. One example of the latter is a new kind of terrorism and criminal activity which is based on the use of the non-indexed part of the Internet which is called dark Web. Generally positive features such as access to information about Internet users, anonymity and protection of personal data are used with the evil intention of acquiring illegal profit and spreading ethnic hatred and intolerance. This paper gives a brief overview of documented ways for accessing this part of web, and examples of abuses of its features.
2016
This is an Open Access article distributed under the terms of the Creative Commons H T U Attribution-NonCommercial-ShareAlike 4.0 International (CC-BY-NC-SA 4.0) LicenseU T H , T which permits unrestricted non-commercial useT , distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission.
2018
In this paper we investigate the Dark Net which is the part of Internet accessible only via special browsers such as Tor. The Dark Net is the home of black-markets for illegal goods and services such as drugs, weapons and fake identities. In this study we investigate the Dark Net as a digital infrastructure over time to address the following research question: what are the forces underlying Dark Net markets? Our empirical approach is based on a set of techniques for accessing Dark Net marketplaces (DNM) and collecting various types of information on sites, transactions and users. We draw also on secondary sources such as reports of police interventions and interviews. Our analysis follows the tradition of critical realism to shed light on the generative mechanisms enabling Dark Net markets to operate and survive. 1 Corresponding author. [email protected] +39 0685225795 Spagnoletti et al. The generative mechanisms of dark net markets Proceedings of the 13th Pre-ICIS Workshop on I...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.