Tackling Crime On The Dark Web

GCHQ and the National Crime Agency (NCA) in the UK have formed a new unit with which to police the Dark Web.

The Joint Operations Cell will tackle a wide range of online crime, including the drugs trade and exchange of stolen information, but its initial focus will be the tackling of online child sexual exploitation.

In a press release issued by the NCA, Robert Hannigan, Director at GCHQ, said:

“The Joint Operations Cell will increase our ability to identify and stop serious criminals, as well as those involved in child sexual exploitation and abuse online…We are committed to ensuring no part of the Internet, including the dark web, can be used with impunity by criminals to conduct their illegal acts”.

NCA Director General Keith Bristow explained how the internet had brought huge benefits to society, especially in terms of enabling communication, but those same advances had also made it significantly easier for criminals to share information between themselves, plan crimes and select targets for sexual exploitation and other heinous acts.
But Bristow said the coming together of the two agencies would enable a sharing of law enforcement skills to tackle the most serious of those offenders and the most complex of cases.

This new joint operation comes at a time when law enforcement globally appears to have taken a keen interest in the secretive part of the web that has become so synonymous with paedophiles, murderers and drug markets.
In August we listed some of the successes enjoyed by police forces around the world and highlighted how INTERPOL's Cyber Research Lab had run its first Dark Web training session. The session was designed to advise police on how criminals were able to employ various methods and strategies to avoid detection in the nether regions of the web.
With a second course scheduled for this month, INTERPOL is hoping senior law enforcement officers will at least gain an understanding of how underground criminal networks operate, and the speed with which they can move around, ditching old websites for new ones.

As Mark Stockley wrote recently, law enforcement has, up until now, struggled to identify Dark Web sites and determine who owns them - and hence who to arrest. But those who frequent the web's underbelly have often dropped themselves deep into trouble, typically through their own mistakes.

Mark explained how stupidity and carelessness led to the closure of the Silk Road drug marketplace and how one firearm seller got everything right online, only to then leave his fingerprints on a gun he sold to an undercover agent.

He also detailed how a 16-year-old boy from Manchester made the wrong type of connection when he attempted to buy Abrin - a toxin 30 times more powerful than Ricin - from an undercover cop, and how 1000 paedophiles were identified by a CGI 'honeypot' run by a Dutch charity.

As Mark wrote, various governments are determined to infiltrate the Dark Web, leveraging both existing technology we are aware of, as well as other methods they are disinclined to discuss - such as through the possible compromise of Tor entry guards and exit nodes.

Whatever capabilities law enforcement has, the truth is that further co-operation between agencies is required if the scourge of the Dark Web is to be defeated or, at the very least, battered into enough submission that some of the players decide the odds are stacked against them.

The coming together of the NCA and GCHQ is likely to only be the beginning of a new trend which will see a greater sharing of intelligence and resources as law enforcement agencies face up to the challenges created by ever-evolving technology.

Naked Security:

« Signal: The Snowden-Approved Crypto App Comes to Android
Can Cyber Intelligence Help Policing Defeat Terrorism? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Threatpost

Threatpost

Threatpost, is an independent news site which is a leading source of information about IT and business security.

iTrinegy

iTrinegy

iTrinegy is a world leader in Application Risk Management offering solutions to mitigate all networked application deployment risks

BCS Financial

BCS Financial

BCS Financial delivers financial and insurance solutions. Specialty risk products include Cyber and Privacy Liability insurance.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

Secura

Secura

The Secura Cyber Security and Intelligence system predicts and prevents security threats by discovering hidden patterns through the meticulous analysis of large amounts of data.

Blancco Technology Group

Blancco Technology Group

Blancco Technology Group is a leading global provider of mobile device diagnostics and secure data erasure solutions.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

Supra ITS

Supra ITS

Supra ITS is a leading full-service technology partner offering IT Consulting, Cloud Services, 24x7 Managed IT & Cybersecurity Services, and IT Project Support.

ZILLIONe

ZILLIONe

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.