Tackling Crime On The Dark Web

GCHQ and the National Crime Agency (NCA) in the UK have formed a new unit with which to police the Dark Web.

The Joint Operations Cell will tackle a wide range of online crime, including the drugs trade and exchange of stolen information, but its initial focus will be the tackling of online child sexual exploitation.

In a press release issued by the NCA, Robert Hannigan, Director at GCHQ, said:

“The Joint Operations Cell will increase our ability to identify and stop serious criminals, as well as those involved in child sexual exploitation and abuse online…We are committed to ensuring no part of the Internet, including the dark web, can be used with impunity by criminals to conduct their illegal acts”.

NCA Director General Keith Bristow explained how the internet had brought huge benefits to society, especially in terms of enabling communication, but those same advances had also made it significantly easier for criminals to share information between themselves, plan crimes and select targets for sexual exploitation and other heinous acts.
But Bristow said the coming together of the two agencies would enable a sharing of law enforcement skills to tackle the most serious of those offenders and the most complex of cases.

This new joint operation comes at a time when law enforcement globally appears to have taken a keen interest in the secretive part of the web that has become so synonymous with paedophiles, murderers and drug markets.
In August we listed some of the successes enjoyed by police forces around the world and highlighted how INTERPOL's Cyber Research Lab had run its first Dark Web training session. The session was designed to advise police on how criminals were able to employ various methods and strategies to avoid detection in the nether regions of the web.
With a second course scheduled for this month, INTERPOL is hoping senior law enforcement officers will at least gain an understanding of how underground criminal networks operate, and the speed with which they can move around, ditching old websites for new ones.

As Mark Stockley wrote recently, law enforcement has, up until now, struggled to identify Dark Web sites and determine who owns them - and hence who to arrest. But those who frequent the web's underbelly have often dropped themselves deep into trouble, typically through their own mistakes.

Mark explained how stupidity and carelessness led to the closure of the Silk Road drug marketplace and how one firearm seller got everything right online, only to then leave his fingerprints on a gun he sold to an undercover agent.

He also detailed how a 16-year-old boy from Manchester made the wrong type of connection when he attempted to buy Abrin - a toxin 30 times more powerful than Ricin - from an undercover cop, and how 1000 paedophiles were identified by a CGI 'honeypot' run by a Dutch charity.

As Mark wrote, various governments are determined to infiltrate the Dark Web, leveraging both existing technology we are aware of, as well as other methods they are disinclined to discuss - such as through the possible compromise of Tor entry guards and exit nodes.

Whatever capabilities law enforcement has, the truth is that further co-operation between agencies is required if the scourge of the Dark Web is to be defeated or, at the very least, battered into enough submission that some of the players decide the odds are stacked against them.

The coming together of the NCA and GCHQ is likely to only be the beginning of a new trend which will see a greater sharing of intelligence and resources as law enforcement agencies face up to the challenges created by ever-evolving technology.

Naked Security:

« Signal: The Snowden-Approved Crypto App Comes to Android
Can Cyber Intelligence Help Policing Defeat Terrorism? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

Aricoma

Aricoma

Aricoma are Architects of Digital. We aim to become a major player in end-to-end IT services and digital transformation in Europe.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Crypto4A Technologies

Crypto4A Technologies

Crypto4A quantum-ready cybersecurity solutions significantly improve protection for Cloud, loT, Blockchain, V2X, government and military application deployments.

ProSearch Partners

ProSearch Partners

ProSearch Partners are national talent acquisition specialists exclusively focussing on Technology and Digital talent including Cybersecurity, Data Analytics and Execs.

Internet 2.0

Internet 2.0

Internet 2.0 is a Cyber Security technology company with a core focus on developing affordable but sophisticated cyber security solutions.

3Lines Venture Capital

3Lines Venture Capital

3Lines Venture Capital invests in exceptional founders and startups working on broad disruptive themes of Future of Work, AI enabled enterprises, and Industry 4.0.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

BriskInfosec Technology & Consulting

BriskInfosec Technology & Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

Sirti

Sirti

Sirti is Italy's leading technology company in the design and production of network infrastructures and telecoms system integration.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

White Knight Labs

White Knight Labs

White Knight Labs is a cyber security consultancy that specializes in cybersecurity training.

CyberAntix

CyberAntix

CyberAntix offers Premium CyberSecurity for your business using an advanced Security Operations Centre technology and process platform reinforced by a steadfast and expert SOC team.