The Dark Web: What It Is And How It Works

We often hear about the dark web being linked to terrorist plots, drug deals, knife sales and child pornography, but beyond this it can be hard to fully understand how the dark web works and what it looks like.

So just for a minute imagine that the whole internet is a forest, a vast expanse of luscious green as far as the eye can see. And in the forest are well worn paths, to get from A to B. Think of these paths as popular search engines, like Google, allowing you as the user the option to essentially see the wood from the trees and be connected. But away from these paths, and away from Google, the trees of the forest mask your vision.

Off the paths it is almost impossible to find anything, unless you know what you’re looking for, so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works, and it is essentially the name given to all the hidden places on the Internet.

Just like the forest, the dark web hides things well, it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

Technical Challenges

Dark web technologies are robustly built without central points of weakness, making it hard for authorities to infiltrate. Another issue for law enforcement is that – like most things – the dark web and its technologies can also be used for both good and evil.

So in the same way criminals use it to hide what they are up to, it can also help groups fight oppression or individuals to whistle blow and exchange information completely anonymously.

In fact, Tor, “free software and an open network that helps you defend against traffic analysis” and a critical part of the so-called dark web, has been funded by a range of Western governments, including the US.

A service like Tor, is global, in no one physical location, and is operated by no one commercial entity, which is typical of these technologies.

Theoretically, the only way to intercept communications sent via something like Tor is to install a “backdoor” in the application everyone uses. A backdoor is meant to provide a secret way to bypass an application’s protection systems, in a similar way to how people hide backdoor keys in flower pots in the garden in case they get locked out of their house.

However, the use of a “backdoor” could also allow any governments, even oppressive ones, to intercept communications. Indeed, cyber breaches have shown us that any backdoor or weakness can be found and exploited by hackers in order to steel people’s information, pictures and data.

Exploiting the Darkness

Of course, none of this is new, criminals have always found ways to communicate with each other “under the radar”. Mobile phones have been used by criminal gangs to organise themselves for a long time, and as a society we are comfortable with laws enabling police to tap telephones and catch criminals.

Unfortunately, infiltrating the dark web is not quite as easy as tapping the local telephone exchange or phone network. Because the dark web is quite unlike the telephone system, which has fixed exchanges and is operated by a small set of companies, making interception easier.

Even if tapping the dark web was a straightforward exercise, morally it is still fraught with questions. In the UK, the Investigatory Powers Bill, dubbed the snoopers’ charter, sets out the powers and governance for Law Enforcement over communications systems. 

However, the discussion of the bill has been impacted by the Snowden revelations which have demonstrated that society is not comfortable with mass, unwarranted surveillance.

This public distrust has led to many technology companies pushing back when it comes to accessing users’ devices. We have seen Microsoft take on the US government over access to email and Apple against the FBI when petitioned to unlock an iPhone of a known terrorist.

And yet some of these same communications companies have been harvesting user data for their own internal processes. Famously, Facebook enabled encryption on WhatsApp, protecting the communications from prying eyes, but could still look at data in the app itself.

For now, though, it is clear that we still have a long way to go until society, government, law enforcement and the courts settle on what is appropriate use of surveillance both on and offline. And until then we will have to live with the fact that the one person’s freedom fighting dark web is another’s criminal paradise.

WeForum

You Might Also Read:

A Quick Tour Of Cybercrime’s Underground:

The Dark Web Is Hidden In Plain Sight:

Stolen Health Records Flooding Dark Web Markets:

Cyber Criminals Are Making $200k A Month:

 

 

« The Next Big Conflict Will Turn On Artificial Intelligence
Cybercrime Cost The Global Economy $450Billion In 2016 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

Cyber Technology Institute - De Montfort University

Cyber Technology Institute - De Montfort University

The Cyber Technology Institute provides training and high quality research and consultancy services in the fields of cyber security, software engineering and digital forensics.

CERT.at

CERT.at

CERT.at is the Austrian national Computer Emergency Response Team.

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN) is a not for profit group of professionals in the field of Information Security in Nigeria and Diaspora.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

The Security Awareness Company (SAC)

The Security Awareness Company (SAC)

The Security Awareness Company provides cyber security awareness training programs for companies of all sizes.

Kobil Systems

Kobil Systems

Kobil is a pioneer in the fields of smart card, one-time password, authentication and cryptography.

4Stop

4Stop

4Stop is a global KYC, compliance and anti-fraud risk management company.

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

Aries Security

Aries Security

Aries Security provides a premiere cyber training range and skills assessment suite and develops content for all levels of ability.

CertiProf

CertiProf

CertiProf has been enhancing professional lives since 2015, offering a wide range of IT certifications and agile framework training.

Telarus

Telarus

Telarus is a Technology Services Brokerage that holds contracts with the world's leading cloud voice, contact center, cybersecurity, mobility and IoT providers.

Qi An Xin (QAX)

Qi An Xin (QAX)

QAX is a listed company based in China, and a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.