What Europe Can Do To Catch Dark Web Criminals

Europe is ready to get serious about fighting crime schemes hatched on the dark web, the infamous home of hackers, pedophiles, terrorists, and other undesirables. 

Representatives of 28 countries have met in The Hague to discuss “how best countries can work together with Europol’s recently established dedicated dark web team, and pursue its aim of fighting crime on the dark web,” according to an EU press release.

The meeting resulted in the creation of a dark web investigation team, which will “share information, provide operational support and expertise in different crime areas, and develop tools and approaches to conducting dark web investigations.”

While the press release emphasised the determination of EU countries to clean up the dark web, it was a bit short on detail. It's probably unrealistic to expect a press release announcing the establishment of the investigative unit to describe in depth the methods and tactics to be used, but it's a fact that tracking down criminals on the dark web is extremely difficult.

Exact numbers are very hard to come by, but sites that report on the dark web indicate that there are several hundred arrests made each year. Considering the size of the dark web, which is now estimated to be 9 times larger than the surface web, and given the fact that much of it is dedicated to criminal activity, that could be considered a very small number.

It's the fluid nature of the dark web, the fact that it cannot be indexed or searched in the same way the surface web is, that all aspects of it are anonymous, that sites disappear as quickly as they appear, that makes tracking down criminals so difficult.
For example, it took authorities from five agencies half a year and countless resources to track down a longtime drug dealer on the dark web in a recent case last year, and they caught him only because of several mistakes he made, including traveling to a contest in Texas to show off his distinctive beard.

Relying on criminals' mistakes is not how Europol, or any other agency, will be able to back up that enthusiastic tweet. How then can they do so? The only way is to proactively search out dark web criminals, and establish patterns of behavior and links to activities on the surface web.

The only way to do that search is by utilising specialised software and systems that can scan the dark web and collect this information. Part of that specialization is the requirement that systems be robust enough to scan dozens, if not hundreds of dark web sources and develop a profile that can be analysed.

That analysis entails looking for connections and threads that can lead to the possible identity of cyber-criminals. For example, a thorough search of a dark web transactions can lead to the identity of a server where a dark web criminal converts cryptocurrency into regular money. 

Cybercriminals eventually have to do that if they want to buy non-virtual products, or they could try to move the money into a bank account somewhere. The bottom line is that in many cases, criminals leave strong identifiers that help in the process of tracking them down, and a good analysis system will take advantage of that.

That kind of advanced analysis system can make those connections even in the wake of the advanced tools hackers use today, which makes it even harder than it has been to track them down.

Teams employing advanced analytics can more quickly and efficiently take advantage of investigations that have already been done in previous cases, which can provide insight into the patterns of behavior of hacking gangs, and help authorities track them down more efficiently.

The more the dark web is monitored, and the more its secrets are unearthed, the more its data can be analysed, making it more likely that criminals will be caught, sooner rather than later.

Hackers aren't going anywhere; indeed, incident after incident shows that they are only getting more active, deploying more tools and more sophisticated tools. According to the EU’s own figures, more of that criminal activity than ever is taking place through the dark net.

Between them, the 28 countries involved in the program could make a huge difference in stamping out dark web crime, if they use their resources wisely. Let's hope that they do.

Infosecurity:     VisulaCapitalist

You Might Also Read: 

A Guided Tour Of The Asian Dark Web:

Give Children More Control Of Data Privacy:

 

 

« The Best Security Is Based On Zero Trust
Iranian Political Influence Campaign Goes Global »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

Intersec Worldwide

Intersec Worldwide

Intersec Worldwide is a boutique Information Security Firm specializing in PCI Compliance, Assessment, Remediation, Forensics, Data Breach Investigations, Incident Response and IT Managed Services.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Protect AI

Protect AI

Protect AI is a cybersecurity company focused on AI & ML systems. Through innovative security products and thought leadership in MLSecOps, we help our customers build a safer AI powered world.

CatchProbe Intelligence Technologies

CatchProbe Intelligence Technologies

CatchProbe provides actionable web intelligence, OSINT, deception systems, threat intelligence, and digital crime analytics solutions and products through an AI-Driven intelligence platform.

Liquis Inc.

Liquis Inc.

Liquis, founded in 2002, is one of the largest facility decommissioning services companies in the U.S.

COGITANDA Dataprotect

COGITANDA Dataprotect

COGITANDA are a group of companies focused on dealing with cyber risks, managing them and insuring them.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

Kontra

Kontra

Kontra application security training is an interactive and intuitive learning experience that engages developers.

Tech Data

Tech Data

Tech Data, a TD Synnex company, is a leading global distributor and solutions aggregator for the IT ecosystem.