Crime Prevention on the Deep Dark Web
Policy Analysis Outline
September 23, 2018
Table of Contents
Key Words: 3
- Introduction. 4
- Problem Statement 4
- Importance to Cybersecurity. 4
- Roadmap. 5
- Background. 5
- History. 5
- Purpose of the Deep Dark Web. 6
- Current policies and practices. 6
III. Approach. 7
- What are you proposing to do about it (new policy, strategy, law) 7
- Critical review of the policies – why it may or may not work? What research supports this idea? 8
- Conclusion. 8
- Summary and strengths and weaknesses of the plan. 8
- Suggestions for future research. 8
The internet has created new opportunities for learning, socializing, trading, and organizing. Now that almost every individual in the globe has access to the internet, online security and anonymity have become vital to individuals, corporations, state, and non-state. Beyond the common web crawling browsers such as Google, Yahoo, and YouTube is a sea of hidden websites known as the deep web that cannot be accessed with regular browsers. Security agencies and organizations are encountering a new threat, the Deep Dark Web, where confidential data is leaked, making various firms vulnerable to hackers. Cyber-security policies and laws should be enacted and implemented to counter this new wave of crime.
Key Words: Deep Dark Web, policies, strategy, hacking, Cybersecurity.
A. Problem Statement
Many organizations have incurred losses after their private information was enforcement.
B. Importance to Cybersecurity
Understanding the implications of the Deep Dark Web as a facilitation for crimes is of importance to the field of Cybersecurity. The Deep Dark Web serves criminals as a safe environment to engage in criminal activities, right after data has been stolen. Since the Deep Dark Web is an online platform, designed to erase navigation tracks, it is very difficult for cCybersecurity professionals and law enforcement to capture those engaging in illegal activities. Also, most of those who commit electronic crimes tend to finish their work through the sale of information on the Deep Dark Web. Sensitive personal and organization information such as Intellectual Property, Personal Identifiable Information (PII), amongst others is being leaked into the internet and distributed illegally through the Deep Dark Web. Having this information in the Deep Dark Web.
This paper seeks to identify a policy issue concerning the Deep Dark Web and criminal activities that take place within the system. Also, during the research, an overview on how the Deep Dark Web originated will be provided, as well as, why it exists, and the policies that are currently in place to counter criminal activity.
The paper also has the proposed policies or laws together with an analysis on what can or cannot work. Monitoring the deep dark web ensures enables organizations to determine when its data is on its way for sale, thus enabling the organization take proactive steps to prevent such data leakage or breach.
This descriptive research gathers court cases and newspaper articles to examine the different ways in which law enforcers can succeed in preventing crime in the deep dark web. The research will apply both qualitative and quantitative data to analyze successful and failed attempts by law enforcers to contain dark web crimes. No human subjects were used in the collection of this data; only secondary sources will be used. The variables for this research include the type of crimes on the dark web, the nature of the crime, the type of market, and the nature of policies adopted (international or regional).
The Deep Dark Web was originated in the 1960s to designate networks that were separated from ARPANET (that evolved into internet) for security reasons (McCormick, 2013). The Dark Net could receive data from the ARPANET though they had addresses that did not appear in network listings as well as would not answer inquiries or pings. The US government created the Deep Dark Web to enable the spies to exchange information entirely anonymously (Meena, 2016). A technology referred to as Tor (The Onion Router) was developed by the US military researchers in the mid-1990s. Tor was released to the public domain so that everyone can use (Zur, 2018). This browser is the most famous method known to work as a road to enter the Deep Dark Web.
B. Purpose of the Deep Dark Web
Various individuals and organizations use it for both legal and illegal purposes. Research done in 2014 by University of Portsmouth indicated that the most searched content on Tor was child pornography and the black market where personal details, guns, and drugs are sold. It is also used to hide illegal online activities such as extremism, finance, fraud, abuse, arms, and hacking. On the other side, the government uses the dark web for two reasons: law enforcement and military intelligence. The military uses the Dark Web to protect military command as well as control systems from being recognized and hacked by the enemy. The Dark Web is also used for law enforcement purposes by performing online surveillance, sting operations, as well as maintaining the anonymous tip lines (Mattmann, 2017).
C. Current policies and practices
Previous research indicates that law enforcement agencies are increasingly facing difficulties surveilling and catching criminals on the deep dark web due to advanced encryption technology that offers more privacy and anonymity. Currently the Deep Dark Web is counteracted by various enforcement strategies and international law. A “Convention on Cybercrime” was promulgated by the Council of Europe which required signatory countries to criminalize different acts of computer misuse as well as prosecute or extradite the offenders (CM., 2018). Over 50 nations, including the United States, are EU Convention signatories. Various programs have been used to search computers that visit the dark web, for instance Tika and NIT, which are used to search child pornography in the dark web as well. Memex, which was launched by the Defense Advanced Research Projects Agency in 2014 is used to mine the Deep Dark Web to determine aspects of human trafficking. Also, Netherland’s Drug Information and Monitoring System (DIMS) are used to monitor illicit drugs market in recreational settings (Edmundson, 2017).
A. What are you proposing to do about it (new policy, strategy, law)
Governments can use other strategies or develop new laws and policies to counter the dark web market. One of the ways organizational or personal data is shared by criminals and where hacktivits exchange tips is through chat forums (Varghese, 2014). Thus, organizations should partner with security agencies to monitor the discussions to establish the threat which they pose. Secondly, the government should control or ban the use of bit coin since most illegal transactions are paid by that. The bit coin is not regulated by a central authority (it is outside the established financial system), it is anonymous, decentralized, and the transaction are not linked with addresses, names, or any information. Controlling or banning the bit coin will greatly reduce the deep dark web illegal activities (Chikada, 2016). The other strategy that the security forces can use is real life observation and monitoring parcels (SBWire, 2018). Mostly the dark wen entails drug trade where the drugs are delivered by companies through parcels or emails (Hale, 2018). By cutting the link between the source and the client, the drug industry will decrease over time. Real life observation is where the security agencies track individuals suspected to be involved in dark web activities (Koebler, 2015). For instance, the founder of Silk Road, Ross Ulbricht was tracked and convicted by tracking his real-life activities.
B. Critical review of the policies – why it may or may not work? What research supports this idea?
Disrupting the dark-net sales may potentially result in to never-ending games of “whack a mole” where old crypomarkets are replaced with new ones with buyers and sellers moving from one site to another. Thus, a new strategy is needed to counter the dark web activities. The above strategies may go a long way in reducing and preventing dark web illegal activities. The Deep Dark Web is more complicated than it seems or else, it would have been outside the criminal world a long time ago, therefore, some challenges may be present during the implementation of policies that seek to deter illegal activity in this platform.
A. Summary and strengths and weaknesses of the plan.
The activities in deep dark web can be minimized by enforcing the various policies and implementing the different strategies. The strength of these policies plans is that it can be easily implemented in various countries and by different organizations. The weakness is that the emergency of new dark sites makes it difficult to eliminate the deep dark web illegal activities.
B. Suggestions for future research
The future research should focus on how to identify every bit of criminal activity in the Deep Dark Web as well as implementing barriers that prevent this activity.
Chikada, A. (2016). The Deep Web, darknets, Bitcoin and brand protection. Retrieved from: https://www.worldtrademarkreview.com/enforcement-and-litigation/deep-web-darknets-bitcoin-and-brand-protection
C.M. (2018). Law Enforcement’s Techniques in Curbing Cybercrime in the Dark Web. Retrieved from: https://darkwebnews.com/law-enforcement/darknet-crime-reducing-le-techniques/
Edmundson, N. (2017). To Catch a Criminal: Hacking into the Dark Web and International Law Implications. Retrieved from: https://www.law.utah.edu/to-catch-a-criminal-hacking-into-the-dark-web-and-international-law-implications/
Hale, J. (2018, June 13). HIDDEN WEB What is the dark web? From drugs and guns to the Chloe Ayling kidnapping, a look inside the encrypted network. Retrieved from: https://www.thesun.co.uk/tech/2054243/dark-web-kidnap-chloe-ayling-encrypted-network-black-death/
Jona, S. (2018). Dark Web Demand Increases despite the Crackdown, Research Confirms. Retrieved from: https://www.deepdotweb.com/2018/06/26/dark-web-demand-increases-despite-the-crackdown-research-confirms/
Koebler, J. (2015). Six Ways Law Enforcement Monitors the Dark Web. Retrieved from: https://motherboard.vice.com/en_us/article/jp5a9g/six-ways-law-enforcement-monitors-the-dark-web
Mattmann, C. (2017). Google for the dark web: The US Government tech that could scour the hidden internet for criminal activity. Retrieved from: https://www.dailymail.co.uk/sciencetech/article-4106602/Google-dark-web-Government-tech-scour-hidden-internet-criminal-activity.html
Mccormick, T. (2013). The Darknet: A Short History. Retrieved from: https://foreignpolicy.com/2013/12/09/the-darknet-a-short-history/
McGlynn, L. (2018, May 08). What Employers Need to Know About the Dark Web. Retrieved from https://www.shrm.org/resourcesandtools/hr-topics/technology/pages/employers- need-to-know-about-dark-web.aspx
Meena, S. (2016). What is the history of deep web? Retrieved from: https://www.quora.com/What-is-the-history-of-deep-web
Piscitello, D. (2017). The Dark Web: The Land of Hidden Services. Retrieved from https://www.icann.org/news/blog/the-dark-web-the-land-of-hidden-services
SBWire. (2018). Digitial Journal . Retrieved from: http://www.digitaljournal.com/pr/3888602
Sidek, F. B. (2015). Understanding the Importance of the Deep Web and Dark Web. Retrieved from: https://www.linkedin.com/pulse/understanding-importance-deep-web-dark-fadli-b-sidek
Varghese, J. (2014). Five strategies for negotiating international business contracts. Retrieved from: http://www.tradeready.ca/2014/fittskills-refresher/strategies-negotiating-international-business-contracts/
Zur, A. R. (2018). What is the Deep Dark Web? Retrieved from: https://www.cybintsolutions.com/what-is-the-dark-web/