What Europe Can Do To Catch Dark Web Criminals

Europe is ready to get serious about fighting crime schemes hatched on the dark web, the infamous home of hackers, pedophiles, terrorists, and other undesirables. 

Representatives of 28 countries have met in The Hague to discuss “how best countries can work together with Europol’s recently established dedicated dark web team, and pursue its aim of fighting crime on the dark web,” according to an EU press release.

The meeting resulted in the creation of a dark web investigation team, which will “share information, provide operational support and expertise in different crime areas, and develop tools and approaches to conducting dark web investigations.”

While the press release emphasised the determination of EU countries to clean up the dark web, it was a bit short on detail. It's probably unrealistic to expect a press release announcing the establishment of the investigative unit to describe in depth the methods and tactics to be used, but it's a fact that tracking down criminals on the dark web is extremely difficult.

Exact numbers are very hard to come by, but sites that report on the dark web indicate that there are several hundred arrests made each year. Considering the size of the dark web, which is now estimated to be 9 times larger than the surface web, and given the fact that much of it is dedicated to criminal activity, that could be considered a very small number.

It's the fluid nature of the dark web, the fact that it cannot be indexed or searched in the same way the surface web is, that all aspects of it are anonymous, that sites disappear as quickly as they appear, that makes tracking down criminals so difficult.
For example, it took authorities from five agencies half a year and countless resources to track down a longtime drug dealer on the dark web in a recent case last year, and they caught him only because of several mistakes he made, including traveling to a contest in Texas to show off his distinctive beard.

Relying on criminals' mistakes is not how Europol, or any other agency, will be able to back up that enthusiastic tweet. How then can they do so? The only way is to proactively search out dark web criminals, and establish patterns of behavior and links to activities on the surface web.

The only way to do that search is by utilising specialised software and systems that can scan the dark web and collect this information. Part of that specialization is the requirement that systems be robust enough to scan dozens, if not hundreds of dark web sources and develop a profile that can be analysed.

That analysis entails looking for connections and threads that can lead to the possible identity of cyber-criminals. For example, a thorough search of a dark web transactions can lead to the identity of a server where a dark web criminal converts cryptocurrency into regular money. 

Cybercriminals eventually have to do that if they want to buy non-virtual products, or they could try to move the money into a bank account somewhere. The bottom line is that in many cases, criminals leave strong identifiers that help in the process of tracking them down, and a good analysis system will take advantage of that.

That kind of advanced analysis system can make those connections even in the wake of the advanced tools hackers use today, which makes it even harder than it has been to track them down.

Teams employing advanced analytics can more quickly and efficiently take advantage of investigations that have already been done in previous cases, which can provide insight into the patterns of behavior of hacking gangs, and help authorities track them down more efficiently.

The more the dark web is monitored, and the more its secrets are unearthed, the more its data can be analysed, making it more likely that criminals will be caught, sooner rather than later.

Hackers aren't going anywhere; indeed, incident after incident shows that they are only getting more active, deploying more tools and more sophisticated tools. According to the EU’s own figures, more of that criminal activity than ever is taking place through the dark net.

Between them, the 28 countries involved in the program could make a huge difference in stamping out dark web crime, if they use their resources wisely. Let's hope that they do.

Infosecurity:     VisulaCapitalist

You Might Also Read: 

A Guided Tour Of The Asian Dark Web:

Give Children More Control Of Data Privacy:

 

 

« The Best Security Is Based On Zero Trust
Iranian Political Influence Campaign Goes Global »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Andrisoft

Andrisoft

Andrisoft develops WANGUARD, an anti-DDoS Software solution that monitors IP traffic using packet-based and flow-based Sensors, and protects networks

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

Equilibrium Security Services

Equilibrium Security Services

Equilibrium Security Services is a specialist cyber security company providing a full spectrum of IT security solutions from consultancy to design & implementation and managed security services.

Digiserve

Digiserve

Digiserve by Telkom Indonesia is an end-to-end managed solutions provider committed to empowering enterprises in Indonesia.

Neurosoft

Neurosoft

Neursoft is a fully integrated ICT company with Software Development, System Integration and Information Technology Security capabilities.

Appgate

Appgate

Appgate is the secure access company. We empower how people work and connect by providing solutions purpose-built on Zero Trust security principles.

Diaplous Group

Diaplous Group

Diaplous Group is a leading Maritime Risk Management (MRM) provider, delivering specialized services to an ever-broadening portfolio of shipping, oil & gas, energy and construction industries.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

OptimEyes.ai

OptimEyes.ai

OptimEyes.ai is a unique AI-powered, on-demand SaaS solution for cyber-security, data privacy and compliance risk modeling.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

Distology

Distology

Distology are an award-winning cloud security distributor bringing a wealth of experience and strong relationships with a huge breadth of partners covering the UK, Ireland and Benelux.

Guardz

Guardz

Guardz helps small and growing businesses to go from zero or low cyber protection to having comprehensive security – in the quickest and most straightforward way.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.