What Europe Can Do To Catch Dark Web Criminals

Europe is ready to get serious about fighting crime schemes hatched on the dark web, the infamous home of hackers, pedophiles, terrorists, and other undesirables. 

Representatives of 28 countries have met in The Hague to discuss “how best countries can work together with Europol’s recently established dedicated dark web team, and pursue its aim of fighting crime on the dark web,” according to an EU press release.

The meeting resulted in the creation of a dark web investigation team, which will “share information, provide operational support and expertise in different crime areas, and develop tools and approaches to conducting dark web investigations.”

While the press release emphasised the determination of EU countries to clean up the dark web, it was a bit short on detail. It's probably unrealistic to expect a press release announcing the establishment of the investigative unit to describe in depth the methods and tactics to be used, but it's a fact that tracking down criminals on the dark web is extremely difficult.

Exact numbers are very hard to come by, but sites that report on the dark web indicate that there are several hundred arrests made each year. Considering the size of the dark web, which is now estimated to be 9 times larger than the surface web, and given the fact that much of it is dedicated to criminal activity, that could be considered a very small number.

It's the fluid nature of the dark web, the fact that it cannot be indexed or searched in the same way the surface web is, that all aspects of it are anonymous, that sites disappear as quickly as they appear, that makes tracking down criminals so difficult.
For example, it took authorities from five agencies half a year and countless resources to track down a longtime drug dealer on the dark web in a recent case last year, and they caught him only because of several mistakes he made, including traveling to a contest in Texas to show off his distinctive beard.

Relying on criminals' mistakes is not how Europol, or any other agency, will be able to back up that enthusiastic tweet. How then can they do so? The only way is to proactively search out dark web criminals, and establish patterns of behavior and links to activities on the surface web.

The only way to do that search is by utilising specialised software and systems that can scan the dark web and collect this information. Part of that specialization is the requirement that systems be robust enough to scan dozens, if not hundreds of dark web sources and develop a profile that can be analysed.

That analysis entails looking for connections and threads that can lead to the possible identity of cyber-criminals. For example, a thorough search of a dark web transactions can lead to the identity of a server where a dark web criminal converts cryptocurrency into regular money. 

Cybercriminals eventually have to do that if they want to buy non-virtual products, or they could try to move the money into a bank account somewhere. The bottom line is that in many cases, criminals leave strong identifiers that help in the process of tracking them down, and a good analysis system will take advantage of that.

That kind of advanced analysis system can make those connections even in the wake of the advanced tools hackers use today, which makes it even harder than it has been to track them down.

Teams employing advanced analytics can more quickly and efficiently take advantage of investigations that have already been done in previous cases, which can provide insight into the patterns of behavior of hacking gangs, and help authorities track them down more efficiently.

The more the dark web is monitored, and the more its secrets are unearthed, the more its data can be analysed, making it more likely that criminals will be caught, sooner rather than later.

Hackers aren't going anywhere; indeed, incident after incident shows that they are only getting more active, deploying more tools and more sophisticated tools. According to the EU’s own figures, more of that criminal activity than ever is taking place through the dark net.

Between them, the 28 countries involved in the program could make a huge difference in stamping out dark web crime, if they use their resources wisely. Let's hope that they do.

Infosecurity:     VisulaCapitalist

You Might Also Read: 

A Guided Tour Of The Asian Dark Web:

Give Children More Control Of Data Privacy:

 

 

« The Best Security Is Based On Zero Trust
Iranian Political Influence Campaign Goes Global »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Fuel Recruitment

Fuel Recruitment

Fuel Recruitment is a specialist recruitment company for the IT, Telecoms, Engineering, Consulting and Marketing industries.

Cyren

Cyren

Cyren is a cloud-based, Internet security technology company providing threat detection and security analytics.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

Seclab

Seclab

Seclab is an innovative player in the protection of industrial systems and critical infrastructure against sophisticated cyber attacks.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

Baffle

Baffle

Baffle is pioneering a solution that makes data breaches irrelevant by keeping data encrypted from production through processing.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Node4

Node4

Node4 provide advanced, cloud-led digital transformation solutions, delivered with technical expertise, innovation and exceptional service to drive your business forwards.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

PyNet Labs

PyNet Labs

PyNet Labs is a Training Company serving corporates as well as individuals across the world with ever-changing IT and technology training.

DigitalXForce

DigitalXForce

DigitalXForce is the Digital Trust Platform for the New Era – SaaS based solution that provides Automated, Continuous, Real Time Security & Privacy Risk Management.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.