This article is about darknet websites. For the part of the Internet not accessible by traditional web search engines, see deep web.
The dark web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but which require specific software, configurations or authorization to access.[1][2] The dark web forms a small part of the deep web, the part of the Web not indexed by search engines, although sometimes the term "deep web" is mistakenly used to refer specifically to the dark web.[3][4][5][6][7]
The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks like Freenet, I2P, and Tor, operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature.[8] The Tor dark web may be referred to as onionland,[9] a reference to the network's top level domain suffix .onion and the traffic anonymization technique of onion routing.
Contents [hide]
1 Terminology
2 Definition
3 Content
3.1 Botnets
3.2 Bitcoin services
3.3 Darknet markets
3.4 Hacking groups and services
3.5 Fraud services
3.6 Hoaxes and unverified content
3.7 Phishing and scams
3.8 Puzzles
3.9 Illegal and ethically disputed pornography
3.10 Illegal animal trade
3.11 Terrorism
3.12 Social media
4 Commentary
5 Journalism
5.1 Jamie Bartlett
5.2 Vice News
5.3 Other media
6 Concerns over the darknet
7 In popular culture
8 See also
9 References
10 Further reading
Terminology[edit]
The dark web has often been confused with the deep web, the parts of the web not searched by search engines. This confusion dates to at least 2009.[10] Since then, especially in reporting on Silk Road, the two terms have often been conflated,[11][12][13] despite recommendations that they be distinguished.[5][14][15][16]
Definition[edit]
Main article: Darknet
Darknet websites are accessible only through networks such as Tor ("The Onion Router”) and I2P (“Invisible Internet Project”).[17] Tor browser and Tor-accessible sites are widely used among the darknet users and can be identified by the domain “.onion”.[18] While Tor focuses on providing anonymous access to the Internet, I2P specializes on allowing anonymous hosting of websites.[19] Identities and locations of darknet users stay anonymous and cannot be tracked due to the layered encryption system. The darknet encryption technology routes users’ data through a large number of intermediate servers, which protects the users’ identity and guarantees anonymity. The transmitted information can be decrypted only by a subsequent node in the scheme, which leads to the exit node. The complicated system makes it almost impossible to reproduce the node path and decrypt the information layer by layer.[20] Due to the high level of encryption, websites are not able to track geolocation and IP of their users as well as the users are not able to get this information about the host. Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially.[21]
The darknet is also used for illegal activity such as illegal trade, forums, and media exchange for pedophiles and terrorists.[22]
At the same time, some of the traditional websites create alternative accessibility for the Tor browser in efforts to connect with their users. Such that ProPublica newspaper launched a new version of its website available for Tor users.[23]
Content[edit]
Web based Hidden Services in January 2015[24]
Category Percentage
Gambling
0.4
Guns
1.4
Chat
2.2
New
(Not yet indexed)
2.2
Abuse
2.2
Books
2.5
Directory
2.5
Blog
2.75
Porn
2.75
Hosting
3.5
Hacking
4.25
Search
4.25
Anonymity
4.5
Forum
4.75
Counterfeit
5.2
Whistleblower
5.2
Wiki
5.2
Mail
5.7
Bitcoin
6.2
Fraud
9
Market
9
Drugs
15.4
Web based Hidden Services in February 2016[25][26]
Category Percentage
Violence
0.3
Arms
0.8
Social
1.2
Hacking
1.8
Illegitimate pornography
2.3
Nexus
2.3
Extremism
2.7
Unknown
3.0
Other illicit
3.8
Finance
6.3
Drugs
8.1
Other
19.6
None
47.7
A December 2014 study by Gareth Owen from the University of Portsmouth found that the most commonly requested type of content on Tor was child pornography, followed by black markets, while the individual sites with the highest traffic were dedicated to botnet operations (see attached metric).[27] Many whistleblowing sites maintain a presence[28] as well as political discussion forums.[29] Sites associated with Bitcoin, fraud related services and mail order services are some of the most prolific.[27] To counter the trend of controversial content, the artist collective Cybertwee held a bake sale on an onion site.[30]
A more recent February 2016 study from researchers at King's College London gives the following breakdown of content by an alternative category set, highlighting the illicit use of .onion services:[31][32]
Botnets[edit]
Botnets are often structured with their command and control servers based on a censorship-resistant hidden service, creating a large amount of bot-related traffic.[27][33]
Bitcoin services[edit]
Bitcoin services such as tumblers are often available on Tor, and some – such as Grams – offer darknet market integration.[34][35] A research study undertaken by Jean-Loup Richet, a research fellow at ESSEC, and carried out with the United Nations Office on Drugs and Crime, highlighted new trends in the use of Bitcoin tumblers for money laundering purposes. A common approach was to use a digital currency exchanger service which converted Bitcoin into an online game currency (such as gold coins in World of Warcraft) that will later be converted back into money.[36][37] One of the important features of bitcoin and similar services in the Dark web are their encryption policy, which is becoming a test of the values of liberal democracy in the twenty-first century.[38]
Darknet markets[edit]
Main article: Darknet market
Commercial darknet markets, which mediate transactions for illegal drugs[39] and other goods, attracted significant media coverage starting with the popularity of Silk Road and Diabolus Market[40] its subsequent seizure by legal authorities.[41] Other markets sell software exploits[42] and weapons.[43] Examination of price differences in Dark web markets versus prices in real life or over the World Wide Web have been attempted as well as studies in the quality of goods received over the Dark web. One such study performed on the quality of illegal drugs found in Evolution, one of the most popular cryptomarkets active from January 2014 to March 2015.[44] An example of analytical findings included that digital information, such as concealment methods and shipping country, seems accurate," but the illicit drugs purity is found to be different from the information indicated on their respective listings."[44] Less is known about consumer motivations for accessing these marketplaces and factors associated with their use.[45]
Hacking groups and services[edit]
Many hackers sell their services there individually or as a part of groups.[46] Such groups include xDedic, hackforum, Trojanforge, Mazafaka, dark0de and the TheRealDeal darknet market.[47] Some have been known to track and extort apparent pedophiles.[48] Cyber crimes and hacking services for financial institutions and banks have also been offered over the Dark web.[49] Attempts to monitor this activity has been made through various government and private organizations, and an examination of the tools used can be found in the Procedia Computer Science journal.[50] Use of Internet-scale DNS Distributed Reflection Denial of Service (DRDoS) attacks have also been made through leveraging the Dark Web.[51]
Fraud services[edit]
Main article: Carding (fraud)
There are numerous carding forums, as well as fraud and counterfeiting services.[52] Many such sites are scams themselves.[53]
Hoaxes and unverified content[edit]
Main article: Hoax
There are reports of crowdfunded assassinations and hitmen for hire,[43][54] however these are believed to be exclusively scams.[55][56] The creator of Silk Road was arrested by Homeland Security investigations (HSI) for his site and allegedly hiring a hitman to kill six people, although the charges were later dropped.[57][58]
There is an urban legend that one can find live murder on the dark web. The term "Red Room" has been coined based on the Japanese animation and urban legend of the same name. However the evidence points towards all reported instances being hoaxes.[59][60]
On June 25, 2015, a creepy indie game Sad Satan was reviewed by Youtubers Obscure Horror Corner which they claimed to have found via the dark web. Various inconsistencies in the channel's reporting cast doubt on the reported version of events.[61]
Phishing and scams[edit]
Phishing via cloned websites and other scam sites are numerous,[62][63] with darknet markets often advertised with fraudulent urls.[64][65]
Puzzles[edit]
Puzzles such as Cicada 3301 and successors will sometimes use hidden services in order to more anonymously provide clues, often increasing speculation as to the identity of their creators.[66]
Illegal and ethically disputed pornography[edit]
There is regular law enforcement action against sites distributing child pornography[67][68] – often via compromising the site by distributing malware to the users.[69][70] Sites use complex systems of guides, forums and community regulation.[71]
Other content includes sexualised torture and killing of animals[72] and revenge porn.[73]
Illegal animal trade[edit]
Within the markets existing in the Dark web, illegal animal trade has increasingly appeared in Dark web markets after scrutiny and regulation increased in the World Wide Web. However the amount of activity is still negligible compared to the amount on the open web. As stated in an examination of search engine key words relating to wildlife trade, "This negligible level of activity related to the illegal trade of wildlife on the dark web relative to the open and increasing trade on the surface web may indicate a lack of successful enforcement against illegal wildlife trade on the surface web."[74]
Terrorism[edit]
There are at least some real and fraudulent websites claiming to be used by ISIL, including a fake one seized in Operation Onymous.[75] In the wake of the November 2015 Paris attacks an actual such site was hacked by an Anonymous affiliated hacker group GhostSec and replaced with an advert for Prozac.[76] The Rawti Shax Islamist group was found to be operating on the dark web at one time.[77]
Social media[edit]
There exists within the Dark Web emerging social media platforms similar to those on the World Wide Web. Facebook and other traditional social media platforms have begun to make Dark Web versions of their websites to address problems associated with the traditional platforms and to continue their service in all areas of the World Wide Web.[78]
Commentary[edit]
Although much of the dark web is innocuous, some prosecutors and government agencies, among others, are concerned that it is a haven for criminal activity.[79]
Specialist news sites such as DeepDotWeb[80][81] and All Things Vice[82] provide news coverage and practical information about dark web sites and services. The Hidden Wiki and its mirrors and forks hold some of the largest directories of content at any given time.
Popular sources of dark web .onion links include Pastebin, YouTube, Twitter, Reddit and other Internet forums.[83] Specialist companies with Darksum and Recorded Future track dark web cybercrime goings on for law enforcement purposes.[84]
In 2015 it was announced that Interpol now offers a dedicated dark web training program featuring technical information on Tor, cybersecurity and simulated darknet market take downs.[85]
In October 2013 the UK's National Crime Agency and GCHQ announced the formation of a 'Joint Operations Cell' to focus on cybercrime.[86] In November 2015 this team would be tasked with tackling child exploitation on the dark web as well as other cybercrime.[87]
Journalism[edit]
Many individual journalists, alternative news organizations, and educators or researchers are influential in their writing and speaking of the Darknet, and making its use clear to the general public.
Jamie Bartlett[edit]
Jamie Bartlett is a journalist and tech blogger for The Telegraph and Director of the Centre for the Analysis of Social Media for Demos in conjunction with The University of Sussex. In his book, The Dark Net,[88] Barlett depicts the world of the Darknet and its implications for human behavior in different context. For example, the book opens with the story of a young girl who seeks positive feedback to build her self-esteem by appearing naked online. She is eventually traced on social media sites where her friends and family were inundated with naked pictures of herself. This story highlights the variety of human interactions the Darknet allows for, but also reminds the reader how participation in a overlay network like the Darknet is rarely in complete separation from the larger Web. Bartlett's main objective is an exploration of the Darknet and its implication for society. He explores different sub-cultures, some with positive positive implications for society and some with negative.[89]
Bartlett gave a TEDTalk in June 2015 further examining the subject.[90] His talk, entitled "How the mysterious Darknet is going mainstream", introduces the idea behind the Darknet to the audience, followed by a walkthrough example of one of its websites called the Silk Road. He point out the familiarity of webpage design similar to consumer sites used in the larger commercial Web. Bartlett then presents examples of how operating in an uncertain, high-risk market like those in the Darknet actually breeds innovation that he believes can be applied to all markets in the future. As he points out, because vendors are always thinking of new ways to get around and protect themselves, the Darknet has become more decentralized, more customer friendly, harder to sensor, and more innovative. As our societies are increasingly searching for more ways to retain privacy online, such changes as those occurring in the Darknet are not only innovative, but could be beneficial to commercial online websites and markets.
Vice News[edit]
Vice News is Vice Media, Inc.'s current affairs channel, producing daily documentary essays and video through its website and YouTube channel. It promotes itself on its coverage of under-reported and off-stream stories. Vice News was created in December 2013 and is based in New York City, though it has bureaus worldwide. Since its creation, Vice News has covered emerging events and widespread issues around the world in a unique way that traditional media channels cannot or do not. As an "alternative" news station, it is able to cover many controversial, un-edited topics. One of these is the Darknet. Vice has many stories now examining different aspects of the Darknet and its underground markets, including examination of illegal animal hunting, child pornography, and drugs on the Darknet.
Other media[edit]
Traditional media and news channels like ABC News have also featured articles examining the Darknet.[91] Vanity Fair magazine published an article in October 2016 entitled The Other Internet. The article discusses the rise of the Dark Net and mentions that the stakes have become high in a lawless digital wilderness. It mentions that vulnerability is a weakness in a network's defenses. Other topics include the e-commerce versions of conventional black markets, cyberweaponry from TheRealDeal, and role of operations security.[92]
Concerns over the darknet[edit]
Some governments are concerned over the widespread of the Darknet because they are not able to decrypt potentially dangerous information transmitted through the highly encrypted network. The Great Firewall of China, which was implemented in order to block circumvention proxies such as SoftEther and GoAgent, currently blocks Tor as well.[93] In February 2015, Safe Internet League in Russia supported the initiative of the deputy, Leonid Levin, to implement a tool that blocks all of the anonymous networks including the Darknet. According to the executive director of the League, Denis Davydov, anonymous networks are primarily used to commit crimes.[94]
In addition to governments, marketers have concerns over the Darknet. Since Tor users do not leave a data trail such as a record of websites visited and time spent on each webpage, it becomes increasingly challenging for marketers to collect information about their customers.[23]
Anonymity provided by the Darknet opened new opportunities for drug sellers and buyers, which resulted in the emergence of cryptomarkets such as Silk Road. Easy accessibility of drugs raises concerns of public, while some researchers argue that illegal substances found online are indeed safer than actual black markets.[95]
In popular culture[edit]
See also: Daemon (novel series)
The dark web is a key plot element in Lee Child's novel Make Me (2015).[96]
Character Lucas Goodwin uses the dark web to find a hacker in the American television series House of Cards (2013).[97]
The dark web is a major plot element in the German techno-thriller film Who Am I (2014).[98] The film also visualizes secret darknet chatrooms with rundown subways in which masked people exchange messages.[99][100]
Killer.com (2015) is a novel by Kenneth G. Eade about a cyber bullying mob who hires a killer for hire over the darknet for an anonymous murder.[101][102]
CSI: Cyber (2015) follows the work of Mary Aiken inspired Special Agent in Charge Avery Ryan, who leads an FBI division tasked with working on the dark web, investigating everything from online baby auctions ("Kidnapping 2.0"), to the disabling of roller-coaster safeguards ("CMND:\CRASH"), the world of black market weaponry ("Ghost in the Machine"), the death of those using a transport app ("Killer En Route"), and a design flaw in a printer ("Fire Code").
Thomas Pynchon's Bleeding Edge dives deep into the dark web to untangle a conspiratorial plot linked to the bombing of the twin towers.
The 2016 game titled "Welcome to the Game" is entirely based on the deep/dark web.[103]
The dark web is a key plot point in the 2016 movie "Nerve", which is based upon a YA novel of the same name by Jeanne Ryan.[104][dubious – discuss]
In the episode "eps2.3_logic-b0mb.hc" (ep. 5 of season 2) of the drama–thriller television series Mr. Robot the protagonist Elliot is supposed to be repairing a Tor hidden site which turns out to be a darknet market called "Midland City" styled after the Silk Road for the sale of guns, sex trafficked women, rocket launchers, drugs and hitmen for hire. When he learns about this his conscience shows. Later he is dragged out of bed and beaten up by two goons and reminded by Ray, the site's administrator, that he was told not to look at the site's content.[105][106]
Aphex Twin's album Syro was announced on the dark webThis article is about darknet websites. For the part of the Internet not accessible by traditional web search engines, see deep web.
The dark web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but which require specific software, configurations or authorization to access.[1][2] The dark web forms a small part of the deep web, the part of the Web not indexed by search engines, although sometimes the term "deep web" is mistakenly used to refer specifically to the dark web.[3][4][5][6][7]
The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks like Freenet, I2P, and Tor, operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature.[8] The Tor dark web may be referred to as onionland,[9] a reference to the network's top level domain suffix .onion and the traffic anonymization technique of onion routing.
Contents [hide]
1 Terminology
2 Definition
3 Content
3.1 Botnets
3.2 Bitcoin services
3.3 Darknet markets
3.4 Hacking groups and services
3.5 Fraud services
3.6 Hoaxes and unverified content
3.7 Phishing and scams
3.8 Puzzles
3.9 Illegal and ethically disputed pornography
3.10 Illegal animal trade
3.11 Terrorism
3.12 Social media
4 Commentary
5 Journalism
5.1 Jamie Bartlett
5.2 Vice News
5.3 Other media
6 Concerns over the darknet
7 In popular culture
8 See also
9 References
10 Further reading
Terminology[edit]
The dark web has often been confused with the deep web, the parts of the web not searched by search engines. This confusion dates to at least 2009.[10] Since then, especially in reporting on Silk Road, the two terms have often been conflated,[11][12][13] despite recommendations that they be distinguished.[5][14][15][16]
Definition[edit]
Main article: Darknet
Darknet websites are accessible only through networks such as Tor ("The Onion Router”) and I2P (“Invisible Internet Project”).[17] Tor browser and Tor-accessible sites are widely used among the darknet users and can be identified by the domain “.onion”.[18] While Tor focuses on providing anonymous access to the Internet, I2P specializes on allowing anonymous hosting of websites.[19] Identities and locations of darknet users stay anonymous and cannot be tracked due to the layered encryption system. The darknet encryption technology routes users’ data through a large number of intermediate servers, which protects the users’ identity and guarantees anonymity. The transmitted information can be decrypted only by a subsequent node in the scheme, which leads to the exit node. The complicated system makes it almost impossible to reproduce the node path and decrypt the information layer by layer.[20] Due to the high level of encryption, websites are not able to track geolocation and IP of their users as well as the users are not able to get this information about the host. Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially.[21]
The darknet is also used for illegal activity such as illegal trade, forums, and media exchange for pedophiles and terrorists.[22]
At the same time, some of the traditional websites create alternative accessibility for the Tor browser in efforts to connect with their users. Such that ProPublica newspaper launched a new version of its website available for Tor users.[23]
Content[edit]
Web based Hidden Services in January 2015[24]
Category Percentage
Gambling
0.4
Guns
1.4
Chat
2.2
New
(Not yet indexed)
2.2
Abuse
2.2
Books
2.5
Directory
2.5
Blog
2.75
Porn
2.75
Hosting
3.5
Hacking
4.25
Search
4.25
Anonymity
4.5
Forum
4.75
Counterfeit
5.2
Whistleblower
5.2
Wiki
5.2
Mail
5.7
Bitcoin
6.2
Fraud
9
Market
9
Drugs
15.4
Web based Hidden Services in February 2016[25][26]
Category Percentage
Violence
0.3
Arms
0.8
Social
1.2
Hacking
1.8
Illegitimate pornography
2.3
Nexus
2.3
Extremism
2.7
Unknown
3.0
Other illicit
3.8
Finance
6.3
Drugs
8.1
Other
19.6
None
47.7
A December 2014 study by Gareth Owen from the University of Portsmouth found that the most commonly requested type of content on Tor was child pornography, followed by black markets, while the individual sites with the highest traffic were dedicated to botnet operations (see attached metric).[27] Many whistleblowing sites maintain a presence[28] as well as political discussion forums.[29] Sites associated with Bitcoin, fraud related services and mail order services are some of the most prolific.[27] To counter the trend of controversial content, the artist collective Cybertwee held a bake sale on an onion site.[30]
A more recent February 2016 study from researchers at King's College London gives the following breakdown of content by an alternative category set, highlighting the illicit use of .onion services:[31][32]
Botnets[edit]
Botnets are often structured with their command and control servers based on a censorship-resistant hidden service, creating a large amount of bot-related traffic.[27][33]
Bitcoin services[edit]
Bitcoin services such as tumblers are often available on Tor, and some – such as Grams – offer darknet market integration.[34][35] A research study undertaken by Jean-Loup Richet, a research fellow at ESSEC, and carried out with the United Nations Office on Drugs and Crime, highlighted new trends in the use of Bitcoin tumblers for money laundering purposes. A common approach was to use a digital currency exchanger service which converted Bitcoin into an online game currency (such as gold coins in World of Warcraft) that will later be converted back into money.[36][37] One of the important features of bitcoin and similar services in the Dark web are their encryption policy, which is becoming a test of the values of liberal democracy in the twenty-first century.[38]
Darknet markets[edit]
Main article: Darknet market
Commercial darknet markets, which mediate transactions for illegal drugs[39] and other goods, attracted significant media coverage starting with the popularity of Silk Road and Diabolus Market[40] its subsequent seizure by legal authorities.[41] Other markets sell software exploits[42] and weapons.[43] Examination of price differences in Dark web markets versus prices in real life or over the World Wide Web have been attempted as well as studies in the quality of goods received over the Dark web. One such study performed on the quality of illegal drugs found in Evolution, one of the most popular cryptomarkets active from January 2014 to March 2015.[44] An example of analytical findings included that digital information, such as concealment methods and shipping country, seems accurate," but the illicit drugs purity is found to be different from the information indicated on their respective listings."[44] Less is known about consumer motivations for accessing these marketplaces and factors associated with their use.[45]
Hacking groups and services[edit]
Many hackers sell their services there individually or as a part of groups.[46] Such groups include xDedic, hackforum, Trojanforge, Mazafaka, dark0de and the TheRealDeal darknet market.[47] Some have been known to track and extort apparent pedophiles.[48] Cyber crimes and hacking services for financial institutions and banks have also been offered over the Dark web.[49] Attempts to monitor this activity has been made through various government and private organizations, and an examination of the tools used can be found in the Procedia Computer Science journal.[50] Use of Internet-scale DNS Distributed Reflection Denial of Service (DRDoS) attacks have also been made through leveraging the Dark Web.[51]
Fraud services[edit]
Main article: Carding (fraud)
There are numerous carding forums, as well as fraud and counterfeiting services.[52] Many such sites are scams themselves.[53]
Hoaxes and unverified content[edit]
Main article: Hoax
There are reports of crowdfunded assassinations and hitmen for hire,[43][54] however these are believed to be exclusively scams.[55][56] The creator of Silk Road was arrested by Homeland Security investigations (HSI) for his site and allegedly hiring a hitman to kill six people, although the charges were later dropped.[57][58]
There is an urban legend that one can find live murder on the dark web. The term "Red Room" has been coined based on the Japanese animation and urban legend of the same name. However the evidence points towards all reported instances being hoaxes.[59][60]
On June 25, 2015, a creepy indie game Sad Satan was reviewed by Youtubers Obscure Horror Corner which they claimed to have found via the dark web. Various inconsistencies in the channel's reporting cast doubt on the reported version of events.[61]
Phishing and scams[edit]
Phishing via cloned websites and other scam sites are numerous,[62][63] with darknet markets often advertised with fraudulent urls.[64][65]
Puzzles[edit]
Puzzles such as Cicada 3301 and successors will sometimes use hidden services in order to more anonymously provide clues, often increasing speculation as to the identity of their creators.[66]
Illegal and ethically disputed pornography[edit]
There is regular law enforcement action against sites distributing child pornography[67][68] – often via compromising the site by distributing malware to the users.[69][70] Sites use complex systems of guides, forums and community regulation.[71]
Other content includes sexualised torture and killing of animals[72] and revenge porn.[73]
Illegal animal trade[edit]
Within the markets existing in the Dark web, illegal animal trade has increasingly appeared in Dark web markets after scrutiny and regulation increased in the World Wide Web. However the amount of activity is still negligible compared to the amount on the open web. As stated in an examination of search engine key words relating to wildlife trade, "This negligible level of activity related to the illegal trade of wildlife on the dark web relative to the open and increasing trade on the surface web may indicate a lack of successful enforcement against illegal wildlife trade on the surface web."[74]
Terrorism[edit]
There are at least some real and fraudulent websites claiming to be used by ISIL, including a fake one seized in Operation Onymous.[75] In the wake of the November 2015 Paris attacks an actual such site was hacked by an Anonymous affiliated hacker group GhostSec and replaced with an advert for Prozac.[76] The Rawti Shax Islamist group was found to be operating on the dark web at one time.[77]
Social media[edit]
There exists within the Dark Web emerging social media platforms similar to those on the World Wide Web. Facebook and other traditional social media platforms have begun to make Dark Web versions of their websites to address problems associated with the traditional platforms and to continue their service in all areas of the World Wide Web.[78]
Commentary[edit]
Although much of the dark web is innocuous, some prosecutors and government agencies, among others, are concerned that it is a haven for criminal activity.[79]
Specialist news sites such as DeepDotWeb[80][81] and All Things Vice[82] provide news coverage and practical information about dark web sites and services. The Hidden Wiki and its mirrors and forks hold some of the largest directories of content at any given time.
Popular sources of dark web .onion links include Pastebin, YouTube, Twitter, Reddit and other Internet forums.[83] Specialist companies with Darksum and Recorded Future track dark web cybercrime goings on for law enforcement purposes.[84]
In 2015 it was announced that Interpol now offers a dedicated dark web training program featuring technical information on Tor, cybersecurity and simulated darknet market take downs.[85]
In October 2013 the UK's National Crime Agency and GCHQ announced the formation of a 'Joint Operations Cell' to focus on cybercrime.[86] In November 2015 this team would be tasked with tackling child exploitation on the dark web as well as other cybercrime.[87]
Journalism[edit]
Many individual journalists, alternative news organizations, and educators or researchers are influential in their writing and speaking of the Darknet, and making its use clear to the general public.
Jamie Bartlett[edit]
Jamie Bartlett is a journalist and tech blogger for The Telegraph and Director of the Centre for the Analysis of Social Media for Demos in conjunction with The University of Sussex. In his book, The Dark Net,[88] Barlett depicts the world of the Darknet and its implications for human behavior in different context. For example, the book opens with the story of a young girl who seeks positive feedback to build her self-esteem by appearing naked online. She is eventually traced on social media sites where her friends and family were inundated with naked pictures of herself. This story highlights the variety of human interactions the Darknet allows for, but also reminds the reader how participation in a overlay network like the Darknet is rarely in complete separation from the larger Web. Bartlett's main objective is an exploration of the Darknet and its implication for society. He explores different sub-cultures, some with positive positive implications for society and some with negative.[89]
Bartlett gave a TEDTalk in June 2015 further examining the subject.[90] His talk, entitled "How the mysterious Darknet is going mainstream", introduces the idea behind the Darknet to the audience, followed by a walkthrough example of one of its websites called the Silk Road. He point out the familiarity of webpage design similar to consumer sites used in the larger commercial Web. Bartlett then presents examples of how operating in an uncertain, high-risk market like those in the Darknet actually breeds innovation that he believes can be applied to all markets in the future. As he points out, because vendors are always thinking of new ways to get around and protect themselves, the Darknet has become more decentralized, more customer friendly, harder to sensor, and more innovative. As our societies are increasingly searching for more ways to retain privacy online, such changes as those occurring in the Darknet are not only innovative, but could be beneficial to commercial online websites and markets.
Vice News[edit]
Vice News is Vice Media, Inc.'s current affairs channel, producing daily documentary essays and video through its website and YouTube channel. It promotes itself on its coverage of under-reported and off-stream stories. Vice News was created in December 2013 and is based in New York City, though it has bureaus worldwide. Since its creation, Vice News has covered emerging events and widespread issues around the world in a unique way that traditional media channels cannot or do not. As an "alternative" news station, it is able to cover many controversial, un-edited topics. One of these is the Darknet. Vice has many stories now examining different aspects of the Darknet and its underground markets, including examination of illegal animal hunting, child pornography, and drugs on the Darknet.
Other media[edit]
Traditional media and news channels like ABC News have also featured articles examining the Darknet.[91] Vanity Fair magazine published an article in October 2016 entitled The Other Internet. The article discusses the rise of the Dark Net and mentions that the stakes have become high in a lawless digital wilderness. It mentions that vulnerability is a weakness in a network's defenses. Other topics include the e-commerce versions of conventional black markets, cyberweaponry from TheRealDeal, and role of operations security.[92]
Concerns over the darknet[edit]
Some governments are concerned over the widespread of the Darknet because they are not able to decrypt potentially dangerous information transmitted through the highly encrypted network. The Great Firewall of China, which was implemented in order to block circumvention proxies such as SoftEther and GoAgent, currently blocks Tor as well.[93] In February 2015, Safe Internet League in Russia supported the initiative of the deputy, Leonid Levin, to implement a tool that blocks all of the anonymous networks including the Darknet. According to the executive director of the League, Denis Davydov, anonymous networks are primarily used to commit crimes.[94]
In addition to governments, marketers have concerns over the Darknet. Since Tor users do not leave a data trail such as a record of websites visited and time spent on each webpage, it becomes increasingly challenging for marketers to collect information about their customers.[23]
Anonymity provided by the Darknet opened new opportunities for drug sellers and buyers, which resulted in the emergence of cryptomarkets such as Silk Road. Easy accessibility of drugs raises concerns of public, while some researchers argue that illegal substances found online are indeed safer than actual black markets.[95]
In popular culture[edit]
See also: Daemon (novel series)
The dark web is a key plot element in Lee Child's novel Make Me (2015).[96]
Character Lucas Goodwin uses the dark web to find a hacker in the American television series House of Cards (2013).[97]
The dark web is a major plot element in the German techno-thriller film Who Am I (2014).[98] The film also visualizes secret darknet chatrooms with rundown subways in which masked people exchange messages.[99][100]
Killer.com (2015) is a novel by Kenneth G. Eade about a cyber bullying mob who hires a killer for hire over the darknet for an anonymous murder.[101][102]
CSI: Cyber (2015) follows the work of Mary Aiken inspired Special Agent in Charge Avery Ryan, who leads an FBI division tasked with working on the dark web, investigating everything from online baby auctions ("Kidnapping 2.0"), to the disabling of roller-coaster safeguards ("CMND:\CRASH"), the world of black market weaponry ("Ghost in the Machine"), the death of those using a transport app ("Killer En Route"), and a design flaw in a printer ("Fire Code").
Thomas Pynchon's Bleeding Edge dives deep into the dark web to untangle a conspiratorial plot linked to the bombing of the twin towers.
The 2016 game titled "Welcome to the Game" is entirely based on the deep/dark web.[103]
The dark web is a key plot point in the 2016 movie "Nerve", which is based upon a YA novel of the same name by Jeanne Ryan.[104][dubious – discuss]
In the episode "eps2.3_logic-b0mb.hc" (ep. 5 of season 2) of the drama–thriller television series Mr. Robot the protagonist Elliot is supposed to be repairing a Tor hidden site which turns out to be a darknet market called "Midland City" styled after the Silk Road for the sale of guns, sex trafficked women, rocket launchers, drugs and hitmen for hire. When he learns about this his conscience shows. Later he is dragged out of bed and beaten up by two goons and reminded by Ray, the site's administrator, that he was told not to look at the site's content.[105][106]
Aphex Twin's album Syro was announced on the dark web
The dark web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but which require specific software, configurations or authorization to access.[1][2] The dark web forms a small part of the deep web, the part of the Web not indexed by search engines, although sometimes the term "deep web" is mistakenly used to refer specifically to the dark web.[3][4][5][6][7]
The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks like Freenet, I2P, and Tor, operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature.[8] The Tor dark web may be referred to as onionland,[9] a reference to the network's top level domain suffix .onion and the traffic anonymization technique of onion routing.
Contents [hide]
1 Terminology
2 Definition
3 Content
3.1 Botnets
3.2 Bitcoin services
3.3 Darknet markets
3.4 Hacking groups and services
3.5 Fraud services
3.6 Hoaxes and unverified content
3.7 Phishing and scams
3.8 Puzzles
3.9 Illegal and ethically disputed pornography
3.10 Illegal animal trade
3.11 Terrorism
3.12 Social media
4 Commentary
5 Journalism
5.1 Jamie Bartlett
5.2 Vice News
5.3 Other media
6 Concerns over the darknet
7 In popular culture
8 See also
9 References
10 Further reading
Terminology[edit]
The dark web has often been confused with the deep web, the parts of the web not searched by search engines. This confusion dates to at least 2009.[10] Since then, especially in reporting on Silk Road, the two terms have often been conflated,[11][12][13] despite recommendations that they be distinguished.[5][14][15][16]
Definition[edit]
Main article: Darknet
Darknet websites are accessible only through networks such as Tor ("The Onion Router”) and I2P (“Invisible Internet Project”).[17] Tor browser and Tor-accessible sites are widely used among the darknet users and can be identified by the domain “.onion”.[18] While Tor focuses on providing anonymous access to the Internet, I2P specializes on allowing anonymous hosting of websites.[19] Identities and locations of darknet users stay anonymous and cannot be tracked due to the layered encryption system. The darknet encryption technology routes users’ data through a large number of intermediate servers, which protects the users’ identity and guarantees anonymity. The transmitted information can be decrypted only by a subsequent node in the scheme, which leads to the exit node. The complicated system makes it almost impossible to reproduce the node path and decrypt the information layer by layer.[20] Due to the high level of encryption, websites are not able to track geolocation and IP of their users as well as the users are not able to get this information about the host. Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially.[21]
The darknet is also used for illegal activity such as illegal trade, forums, and media exchange for pedophiles and terrorists.[22]
At the same time, some of the traditional websites create alternative accessibility for the Tor browser in efforts to connect with their users. Such that ProPublica newspaper launched a new version of its website available for Tor users.[23]
Content[edit]
Web based Hidden Services in January 2015[24]
Category Percentage
Gambling
0.4
Guns
1.4
Chat
2.2
New
(Not yet indexed)
2.2
Abuse
2.2
Books
2.5
Directory
2.5
Blog
2.75
Porn
2.75
Hosting
3.5
Hacking
4.25
Search
4.25
Anonymity
4.5
Forum
4.75
Counterfeit
5.2
Whistleblower
5.2
Wiki
5.2
5.7
Bitcoin
6.2
Fraud
9
Market
9
Drugs
15.4
Web based Hidden Services in February 2016[25][26]
Category Percentage
Violence
0.3
Arms
0.8
Social
1.2
Hacking
1.8
Illegitimate pornography
2.3
Nexus
2.3
Extremism
2.7
Unknown
3.0
Other illicit
3.8
Finance
6.3
Drugs
8.1
Other
19.6
None
47.7
A December 2014 study by Gareth Owen from the University of Portsmouth found that the most commonly requested type of content on Tor was child pornography, followed by black markets, while the individual sites with the highest traffic were dedicated to botnet operations (see attached metric).[27] Many whistleblowing sites maintain a presence[28] as well as political discussion forums.[29] Sites associated with Bitcoin, fraud related services and mail order services are some of the most prolific.[27] To counter the trend of controversial content, the artist collective Cybertwee held a bake sale on an onion site.[30]
A more recent February 2016 study from researchers at King's College London gives the following breakdown of content by an alternative category set, highlighting the illicit use of .onion services:[31][32]
Botnets[edit]
Botnets are often structured with their command and control servers based on a censorship-resistant hidden service, creating a large amount of bot-related traffic.[27][33]
Bitcoin services[edit]
Bitcoin services such as tumblers are often available on Tor, and some – such as Grams – offer darknet market integration.[34][35] A research study undertaken by Jean-Loup Richet, a research fellow at ESSEC, and carried out with the United Nations Office on Drugs and Crime, highlighted new trends in the use of Bitcoin tumblers for money laundering purposes. A common approach was to use a digital currency exchanger service which converted Bitcoin into an online game currency (such as gold coins in World of Warcraft) that will later be converted back into money.[36][37] One of the important features of bitcoin and similar services in the Dark web are their encryption policy, which is becoming a test of the values of liberal democracy in the twenty-first century.[38]
Darknet markets[edit]
Main article: Darknet market
Commercial darknet markets, which mediate transactions for illegal drugs[39] and other goods, attracted significant media coverage starting with the popularity of Silk Road and Diabolus Market[40] its subsequent seizure by legal authorities.[41] Other markets sell software exploits[42] and weapons.[43] Examination of price differences in Dark web markets versus prices in real life or over the World Wide Web have been attempted as well as studies in the quality of goods received over the Dark web. One such study performed on the quality of illegal drugs found in Evolution, one of the most popular cryptomarkets active from January 2014 to March 2015.[44] An example of analytical findings included that digital information, such as concealment methods and shipping country, seems accurate," but the illicit drugs purity is found to be different from the information indicated on their respective listings."[44] Less is known about consumer motivations for accessing these marketplaces and factors associated with their use.[45]
Hacking groups and services[edit]
Many hackers sell their services there individually or as a part of groups.[46] Such groups include xDedic, hackforum, Trojanforge, Mazafaka, dark0de and the TheRealDeal darknet market.[47] Some have been known to track and extort apparent pedophiles.[48] Cyber crimes and hacking services for financial institutions and banks have also been offered over the Dark web.[49] Attempts to monitor this activity has been made through various government and private organizations, and an examination of the tools used can be found in the Procedia Computer Science journal.[50] Use of Internet-scale DNS Distributed Reflection Denial of Service (DRDoS) attacks have also been made through leveraging the Dark Web.[51]
Fraud services[edit]
Main article: Carding (fraud)
There are numerous carding forums, as well as fraud and counterfeiting services.[52] Many such sites are scams themselves.[53]
Hoaxes and unverified content[edit]
Main article: Hoax
There are reports of crowdfunded assassinations and hitmen for hire,[43][54] however these are believed to be exclusively scams.[55][56] The creator of Silk Road was arrested by Homeland Security investigations (HSI) for his site and allegedly hiring a hitman to kill six people, although the charges were later dropped.[57][58]
There is an urban legend that one can find live murder on the dark web. The term "Red Room" has been coined based on the Japanese animation and urban legend of the same name. However the evidence points towards all reported instances being hoaxes.[59][60]
On June 25, 2015, a creepy indie game Sad Satan was reviewed by Youtubers Obscure Horror Corner which they claimed to have found via the dark web. Various inconsistencies in the channel's reporting cast doubt on the reported version of events.[61]
Phishing and scams[edit]
Phishing via cloned websites and other scam sites are numerous,[62][63] with darknet markets often advertised with fraudulent urls.[64][65]
Puzzles[edit]
Puzzles such as Cicada 3301 and successors will sometimes use hidden services in order to more anonymously provide clues, often increasing speculation as to the identity of their creators.[66]
Illegal and ethically disputed pornography[edit]
There is regular law enforcement action against sites distributing child pornography[67][68] – often via compromising the site by distributing malware to the users.[69][70] Sites use complex systems of guides, forums and community regulation.[71]
Other content includes sexualised torture and killing of animals[72] and revenge porn.[73]
Illegal animal trade[edit]
Within the markets existing in the Dark web, illegal animal trade has increasingly appeared in Dark web markets after scrutiny and regulation increased in the World Wide Web. However the amount of activity is still negligible compared to the amount on the open web. As stated in an examination of search engine key words relating to wildlife trade, "This negligible level of activity related to the illegal trade of wildlife on the dark web relative to the open and increasing trade on the surface web may indicate a lack of successful enforcement against illegal wildlife trade on the surface web."[74]
Terrorism[edit]
There are at least some real and fraudulent websites claiming to be used by ISIL, including a fake one seized in Operation Onymous.[75] In the wake of the November 2015 Paris attacks an actual such site was hacked by an Anonymous affiliated hacker group GhostSec and replaced with an advert for Prozac.[76] The Rawti Shax Islamist group was found to be operating on the dark web at one time.[77]
Social media[edit]
There exists within the Dark Web emerging social media platforms similar to those on the World Wide Web. Facebook and other traditional social media platforms have begun to make Dark Web versions of their websites to address problems associated with the traditional platforms and to continue their service in all areas of the World Wide Web.[78]
Commentary[edit]
Although much of the dark web is innocuous, some prosecutors and government agencies, among others, are concerned that it is a haven for criminal activity.[79]
Specialist news sites such as DeepDotWeb[80][81] and All Things Vice[82] provide news coverage and practical information about dark web sites and services. The Hidden Wiki and its mirrors and forks hold some of the largest directories of content at any given time.
Popular sources of dark web .onion links include Pastebin, YouTube, Twitter, Reddit and other Internet forums.[83] Specialist companies with Darksum and Recorded Future track dark web cybercrime goings on for law enforcement purposes.[84]
In 2015 it was announced that Interpol now offers a dedicated dark web training program featuring technical information on Tor, cybersecurity and simulated darknet market take downs.[85]
In October 2013 the UK's National Crime Agency and GCHQ announced the formation of a 'Joint Operations Cell' to focus on cybercrime.[86] In November 2015 this team would be tasked with tackling child exploitation on the dark web as well as other cybercrime.[87]
Journalism[edit]
Many individual journalists, alternative news organizations, and educators or researchers are influential in their writing and speaking of the Darknet, and making its use clear to the general public.
Jamie Bartlett[edit]
Jamie Bartlett is a journalist and tech blogger for The Telegraph and Director of the Centre for the Analysis of Social Media for Demos in conjunction with The University of Sussex. In his book, The Dark Net,[88] Barlett depicts the world of the Darknet and its implications for human behavior in different context. For example, the book opens with the story of a young girl who seeks positive feedback to build her self-esteem by appearing naked online. She is eventually traced on social media sites where her friends and family were inundated with naked pictures of herself. This story highlights the variety of human interactions the Darknet allows for, but also reminds the reader how participation in a overlay network like the Darknet is rarely in complete separation from the larger Web. Bartlett's main objective is an exploration of the Darknet and its implication for society. He explores different sub-cultures, some with positive positive implications for society and some with negative.[89]
Bartlett gave a TEDTalk in June 2015 further examining the subject.[90] His talk, entitled "How the mysterious Darknet is going mainstream", introduces the idea behind the Darknet to the audience, followed by a walkthrough example of one of its websites called the Silk Road. He point out the familiarity of webpage design similar to consumer sites used in the larger commercial Web. Bartlett then presents examples of how operating in an uncertain, high-risk market like those in the Darknet actually breeds innovation that he believes can be applied to all markets in the future. As he points out, because vendors are always thinking of new ways to get around and protect themselves, the Darknet has become more decentralized, more customer friendly, harder to sensor, and more innovative. As our societies are increasingly searching for more ways to retain privacy online, such changes as those occurring in the Darknet are not only innovative, but could be beneficial to commercial online websites and markets.
Vice News[edit]
Vice News is Vice Media, Inc.'s current affairs channel, producing daily documentary essays and video through its website and YouTube channel. It promotes itself on its coverage of under-reported and off-stream stories. Vice News was created in December 2013 and is based in New York City, though it has bureaus worldwide. Since its creation, Vice News has covered emerging events and widespread issues around the world in a unique way that traditional media channels cannot or do not. As an "alternative" news station, it is able to cover many controversial, un-edited topics. One of these is the Darknet. Vice has many stories now examining different aspects of the Darknet and its underground markets, including examination of illegal animal hunting, child pornography, and drugs on the Darknet.
Other media[edit]
Traditional media and news channels like ABC News have also featured articles examining the Darknet.[91] Vanity Fair magazine published an article in October 2016 entitled The Other Internet. The article discusses the rise of the Dark Net and mentions that the stakes have become high in a lawless digital wilderness. It mentions that vulnerability is a weakness in a network's defenses. Other topics include the e-commerce versions of conventional black markets, cyberweaponry from TheRealDeal, and role of operations security.[92]
Concerns over the darknet[edit]
Some governments are concerned over the widespread of the Darknet because they are not able to decrypt potentially dangerous information transmitted through the highly encrypted network. The Great Firewall of China, which was implemented in order to block circumvention proxies such as SoftEther and GoAgent, currently blocks Tor as well.[93] In February 2015, Safe Internet League in Russia supported the initiative of the deputy, Leonid Levin, to implement a tool that blocks all of the anonymous networks including the Darknet. According to the executive director of the League, Denis Davydov, anonymous networks are primarily used to commit crimes.[94]
In addition to governments, marketers have concerns over the Darknet. Since Tor users do not leave a data trail such as a record of websites visited and time spent on each webpage, it becomes increasingly challenging for marketers to collect information about their customers.[23]
Anonymity provided by the Darknet opened new opportunities for drug sellers and buyers, which resulted in the emergence of cryptomarkets such as Silk Road. Easy accessibility of drugs raises concerns of public, while some researchers argue that illegal substances found online are indeed safer than actual black markets.[95]
In popular culture[edit]
See also: Daemon (novel series)
The dark web is a key plot element in Lee Child's novel Make Me (2015).[96]
Character Lucas Goodwin uses the dark web to find a hacker in the American television series House of Cards (2013).[97]
The dark web is a major plot element in the German techno-thriller film Who Am I (2014).[98] The film also visualizes secret darknet chatrooms with rundown subways in which masked people exchange messages.[99][100]
Killer.com (2015) is a novel by Kenneth G. Eade about a cyber bullying mob who hires a killer for hire over the darknet for an anonymous murder.[101][102]
CSI: Cyber (2015) follows the work of Mary Aiken inspired Special Agent in Charge Avery Ryan, who leads an FBI division tasked with working on the dark web, investigating everything from online baby auctions ("Kidnapping 2.0"), to the disabling of roller-coaster safeguards ("CMND:\CRASH"), the world of black market weaponry ("Ghost in the Machine"), the death of those using a transport app ("Killer En Route"), and a design flaw in a printer ("Fire Code").
Thomas Pynchon's Bleeding Edge dives deep into the dark web to untangle a conspiratorial plot linked to the bombing of the twin towers.
The 2016 game titled "Welcome to the Game" is entirely based on the deep/dark web.[103]
The dark web is a key plot point in the 2016 movie "Nerve", which is based upon a YA novel of the same name by Jeanne Ryan.[104][dubious – discuss]
In the episode "eps2.3_logic-b0mb.hc" (ep. 5 of season 2) of the drama–thriller television series Mr. Robot the protagonist Elliot is supposed to be repairing a Tor hidden site which turns out to be a darknet market called "Midland City" styled after the Silk Road for the sale of guns, sex trafficked women, rocket launchers, drugs and hitmen for hire. When he learns about this his conscience shows. Later he is dragged out of bed and beaten up by two goons and reminded by Ray, the site's administrator, that he was told not to look at the site's content.[105][106]
Aphex Twin's album Syro was announced on the dark webThis article is about darknet websites. For the part of the Internet not accessible by traditional web search engines, see deep web.
The dark web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but which require specific software, configurations or authorization to access.[1][2] The dark web forms a small part of the deep web, the part of the Web not indexed by search engines, although sometimes the term "deep web" is mistakenly used to refer specifically to the dark web.[3][4][5][6][7]
The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks like Freenet, I2P, and Tor, operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature.[8] The Tor dark web may be referred to as onionland,[9] a reference to the network's top level domain suffix .onion and the traffic anonymization technique of onion routing.
Contents [hide]
1 Terminology
2 Definition
3 Content
3.1 Botnets
3.2 Bitcoin services
3.3 Darknet markets
3.4 Hacking groups and services
3.5 Fraud services
3.6 Hoaxes and unverified content
3.7 Phishing and scams
3.8 Puzzles
3.9 Illegal and ethically disputed pornography
3.10 Illegal animal trade
3.11 Terrorism
3.12 Social media
4 Commentary
5 Journalism
5.1 Jamie Bartlett
5.2 Vice News
5.3 Other media
6 Concerns over the darknet
7 In popular culture
8 See also
9 References
10 Further reading
Terminology[edit]
The dark web has often been confused with the deep web, the parts of the web not searched by search engines. This confusion dates to at least 2009.[10] Since then, especially in reporting on Silk Road, the two terms have often been conflated,[11][12][13] despite recommendations that they be distinguished.[5][14][15][16]
Definition[edit]
Main article: Darknet
Darknet websites are accessible only through networks such as Tor ("The Onion Router”) and I2P (“Invisible Internet Project”).[17] Tor browser and Tor-accessible sites are widely used among the darknet users and can be identified by the domain “.onion”.[18] While Tor focuses on providing anonymous access to the Internet, I2P specializes on allowing anonymous hosting of websites.[19] Identities and locations of darknet users stay anonymous and cannot be tracked due to the layered encryption system. The darknet encryption technology routes users’ data through a large number of intermediate servers, which protects the users’ identity and guarantees anonymity. The transmitted information can be decrypted only by a subsequent node in the scheme, which leads to the exit node. The complicated system makes it almost impossible to reproduce the node path and decrypt the information layer by layer.[20] Due to the high level of encryption, websites are not able to track geolocation and IP of their users as well as the users are not able to get this information about the host. Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially.[21]
The darknet is also used for illegal activity such as illegal trade, forums, and media exchange for pedophiles and terrorists.[22]
At the same time, some of the traditional websites create alternative accessibility for the Tor browser in efforts to connect with their users. Such that ProPublica newspaper launched a new version of its website available for Tor users.[23]
Content[edit]
Web based Hidden Services in January 2015[24]
Category Percentage
Gambling
0.4
Guns
1.4
Chat
2.2
New
(Not yet indexed)
2.2
Abuse
2.2
Books
2.5
Directory
2.5
Blog
2.75
Porn
2.75
Hosting
3.5
Hacking
4.25
Search
4.25
Anonymity
4.5
Forum
4.75
Counterfeit
5.2
Whistleblower
5.2
Wiki
5.2
5.7
Bitcoin
6.2
Fraud
9
Market
9
Drugs
15.4
Web based Hidden Services in February 2016[25][26]
Category Percentage
Violence
0.3
Arms
0.8
Social
1.2
Hacking
1.8
Illegitimate pornography
2.3
Nexus
2.3
Extremism
2.7
Unknown
3.0
Other illicit
3.8
Finance
6.3
Drugs
8.1
Other
19.6
None
47.7
A December 2014 study by Gareth Owen from the University of Portsmouth found that the most commonly requested type of content on Tor was child pornography, followed by black markets, while the individual sites with the highest traffic were dedicated to botnet operations (see attached metric).[27] Many whistleblowing sites maintain a presence[28] as well as political discussion forums.[29] Sites associated with Bitcoin, fraud related services and mail order services are some of the most prolific.[27] To counter the trend of controversial content, the artist collective Cybertwee held a bake sale on an onion site.[30]
A more recent February 2016 study from researchers at King's College London gives the following breakdown of content by an alternative category set, highlighting the illicit use of .onion services:[31][32]
Botnets[edit]
Botnets are often structured with their command and control servers based on a censorship-resistant hidden service, creating a large amount of bot-related traffic.[27][33]
Bitcoin services[edit]
Bitcoin services such as tumblers are often available on Tor, and some – such as Grams – offer darknet market integration.[34][35] A research study undertaken by Jean-Loup Richet, a research fellow at ESSEC, and carried out with the United Nations Office on Drugs and Crime, highlighted new trends in the use of Bitcoin tumblers for money laundering purposes. A common approach was to use a digital currency exchanger service which converted Bitcoin into an online game currency (such as gold coins in World of Warcraft) that will later be converted back into money.[36][37] One of the important features of bitcoin and similar services in the Dark web are their encryption policy, which is becoming a test of the values of liberal democracy in the twenty-first century.[38]
Darknet markets[edit]
Main article: Darknet market
Commercial darknet markets, which mediate transactions for illegal drugs[39] and other goods, attracted significant media coverage starting with the popularity of Silk Road and Diabolus Market[40] its subsequent seizure by legal authorities.[41] Other markets sell software exploits[42] and weapons.[43] Examination of price differences in Dark web markets versus prices in real life or over the World Wide Web have been attempted as well as studies in the quality of goods received over the Dark web. One such study performed on the quality of illegal drugs found in Evolution, one of the most popular cryptomarkets active from January 2014 to March 2015.[44] An example of analytical findings included that digital information, such as concealment methods and shipping country, seems accurate," but the illicit drugs purity is found to be different from the information indicated on their respective listings."[44] Less is known about consumer motivations for accessing these marketplaces and factors associated with their use.[45]
Hacking groups and services[edit]
Many hackers sell their services there individually or as a part of groups.[46] Such groups include xDedic, hackforum, Trojanforge, Mazafaka, dark0de and the TheRealDeal darknet market.[47] Some have been known to track and extort apparent pedophiles.[48] Cyber crimes and hacking services for financial institutions and banks have also been offered over the Dark web.[49] Attempts to monitor this activity has been made through various government and private organizations, and an examination of the tools used can be found in the Procedia Computer Science journal.[50] Use of Internet-scale DNS Distributed Reflection Denial of Service (DRDoS) attacks have also been made through leveraging the Dark Web.[51]
Fraud services[edit]
Main article: Carding (fraud)
There are numerous carding forums, as well as fraud and counterfeiting services.[52] Many such sites are scams themselves.[53]
Hoaxes and unverified content[edit]
Main article: Hoax
There are reports of crowdfunded assassinations and hitmen for hire,[43][54] however these are believed to be exclusively scams.[55][56] The creator of Silk Road was arrested by Homeland Security investigations (HSI) for his site and allegedly hiring a hitman to kill six people, although the charges were later dropped.[57][58]
There is an urban legend that one can find live murder on the dark web. The term "Red Room" has been coined based on the Japanese animation and urban legend of the same name. However the evidence points towards all reported instances being hoaxes.[59][60]
On June 25, 2015, a creepy indie game Sad Satan was reviewed by Youtubers Obscure Horror Corner which they claimed to have found via the dark web. Various inconsistencies in the channel's reporting cast doubt on the reported version of events.[61]
Phishing and scams[edit]
Phishing via cloned websites and other scam sites are numerous,[62][63] with darknet markets often advertised with fraudulent urls.[64][65]
Puzzles[edit]
Puzzles such as Cicada 3301 and successors will sometimes use hidden services in order to more anonymously provide clues, often increasing speculation as to the identity of their creators.[66]
Illegal and ethically disputed pornography[edit]
There is regular law enforcement action against sites distributing child pornography[67][68] – often via compromising the site by distributing malware to the users.[69][70] Sites use complex systems of guides, forums and community regulation.[71]
Other content includes sexualised torture and killing of animals[72] and revenge porn.[73]
Illegal animal trade[edit]
Within the markets existing in the Dark web, illegal animal trade has increasingly appeared in Dark web markets after scrutiny and regulation increased in the World Wide Web. However the amount of activity is still negligible compared to the amount on the open web. As stated in an examination of search engine key words relating to wildlife trade, "This negligible level of activity related to the illegal trade of wildlife on the dark web relative to the open and increasing trade on the surface web may indicate a lack of successful enforcement against illegal wildlife trade on the surface web."[74]
Terrorism[edit]
There are at least some real and fraudulent websites claiming to be used by ISIL, including a fake one seized in Operation Onymous.[75] In the wake of the November 2015 Paris attacks an actual such site was hacked by an Anonymous affiliated hacker group GhostSec and replaced with an advert for Prozac.[76] The Rawti Shax Islamist group was found to be operating on the dark web at one time.[77]
Social media[edit]
There exists within the Dark Web emerging social media platforms similar to those on the World Wide Web. Facebook and other traditional social media platforms have begun to make Dark Web versions of their websites to address problems associated with the traditional platforms and to continue their service in all areas of the World Wide Web.[78]
Commentary[edit]
Although much of the dark web is innocuous, some prosecutors and government agencies, among others, are concerned that it is a haven for criminal activity.[79]
Specialist news sites such as DeepDotWeb[80][81] and All Things Vice[82] provide news coverage and practical information about dark web sites and services. The Hidden Wiki and its mirrors and forks hold some of the largest directories of content at any given time.
Popular sources of dark web .onion links include Pastebin, YouTube, Twitter, Reddit and other Internet forums.[83] Specialist companies with Darksum and Recorded Future track dark web cybercrime goings on for law enforcement purposes.[84]
In 2015 it was announced that Interpol now offers a dedicated dark web training program featuring technical information on Tor, cybersecurity and simulated darknet market take downs.[85]
In October 2013 the UK's National Crime Agency and GCHQ announced the formation of a 'Joint Operations Cell' to focus on cybercrime.[86] In November 2015 this team would be tasked with tackling child exploitation on the dark web as well as other cybercrime.[87]
Journalism[edit]
Many individual journalists, alternative news organizations, and educators or researchers are influential in their writing and speaking of the Darknet, and making its use clear to the general public.
Jamie Bartlett[edit]
Jamie Bartlett is a journalist and tech blogger for The Telegraph and Director of the Centre for the Analysis of Social Media for Demos in conjunction with The University of Sussex. In his book, The Dark Net,[88] Barlett depicts the world of the Darknet and its implications for human behavior in different context. For example, the book opens with the story of a young girl who seeks positive feedback to build her self-esteem by appearing naked online. She is eventually traced on social media sites where her friends and family were inundated with naked pictures of herself. This story highlights the variety of human interactions the Darknet allows for, but also reminds the reader how participation in a overlay network like the Darknet is rarely in complete separation from the larger Web. Bartlett's main objective is an exploration of the Darknet and its implication for society. He explores different sub-cultures, some with positive positive implications for society and some with negative.[89]
Bartlett gave a TEDTalk in June 2015 further examining the subject.[90] His talk, entitled "How the mysterious Darknet is going mainstream", introduces the idea behind the Darknet to the audience, followed by a walkthrough example of one of its websites called the Silk Road. He point out the familiarity of webpage design similar to consumer sites used in the larger commercial Web. Bartlett then presents examples of how operating in an uncertain, high-risk market like those in the Darknet actually breeds innovation that he believes can be applied to all markets in the future. As he points out, because vendors are always thinking of new ways to get around and protect themselves, the Darknet has become more decentralized, more customer friendly, harder to sensor, and more innovative. As our societies are increasingly searching for more ways to retain privacy online, such changes as those occurring in the Darknet are not only innovative, but could be beneficial to commercial online websites and markets.
Vice News[edit]
Vice News is Vice Media, Inc.'s current affairs channel, producing daily documentary essays and video through its website and YouTube channel. It promotes itself on its coverage of under-reported and off-stream stories. Vice News was created in December 2013 and is based in New York City, though it has bureaus worldwide. Since its creation, Vice News has covered emerging events and widespread issues around the world in a unique way that traditional media channels cannot or do not. As an "alternative" news station, it is able to cover many controversial, un-edited topics. One of these is the Darknet. Vice has many stories now examining different aspects of the Darknet and its underground markets, including examination of illegal animal hunting, child pornography, and drugs on the Darknet.
Other media[edit]
Traditional media and news channels like ABC News have also featured articles examining the Darknet.[91] Vanity Fair magazine published an article in October 2016 entitled The Other Internet. The article discusses the rise of the Dark Net and mentions that the stakes have become high in a lawless digital wilderness. It mentions that vulnerability is a weakness in a network's defenses. Other topics include the e-commerce versions of conventional black markets, cyberweaponry from TheRealDeal, and role of operations security.[92]
Concerns over the darknet[edit]
Some governments are concerned over the widespread of the Darknet because they are not able to decrypt potentially dangerous information transmitted through the highly encrypted network. The Great Firewall of China, which was implemented in order to block circumvention proxies such as SoftEther and GoAgent, currently blocks Tor as well.[93] In February 2015, Safe Internet League in Russia supported the initiative of the deputy, Leonid Levin, to implement a tool that blocks all of the anonymous networks including the Darknet. According to the executive director of the League, Denis Davydov, anonymous networks are primarily used to commit crimes.[94]
In addition to governments, marketers have concerns over the Darknet. Since Tor users do not leave a data trail such as a record of websites visited and time spent on each webpage, it becomes increasingly challenging for marketers to collect information about their customers.[23]
Anonymity provided by the Darknet opened new opportunities for drug sellers and buyers, which resulted in the emergence of cryptomarkets such as Silk Road. Easy accessibility of drugs raises concerns of public, while some researchers argue that illegal substances found online are indeed safer than actual black markets.[95]
In popular culture[edit]
See also: Daemon (novel series)
The dark web is a key plot element in Lee Child's novel Make Me (2015).[96]
Character Lucas Goodwin uses the dark web to find a hacker in the American television series House of Cards (2013).[97]
The dark web is a major plot element in the German techno-thriller film Who Am I (2014).[98] The film also visualizes secret darknet chatrooms with rundown subways in which masked people exchange messages.[99][100]
Killer.com (2015) is a novel by Kenneth G. Eade about a cyber bullying mob who hires a killer for hire over the darknet for an anonymous murder.[101][102]
CSI: Cyber (2015) follows the work of Mary Aiken inspired Special Agent in Charge Avery Ryan, who leads an FBI division tasked with working on the dark web, investigating everything from online baby auctions ("Kidnapping 2.0"), to the disabling of roller-coaster safeguards ("CMND:\CRASH"), the world of black market weaponry ("Ghost in the Machine"), the death of those using a transport app ("Killer En Route"), and a design flaw in a printer ("Fire Code").
Thomas Pynchon's Bleeding Edge dives deep into the dark web to untangle a conspiratorial plot linked to the bombing of the twin towers.
The 2016 game titled "Welcome to the Game" is entirely based on the deep/dark web.[103]
The dark web is a key plot point in the 2016 movie "Nerve", which is based upon a YA novel of the same name by Jeanne Ryan.[104][dubious – discuss]
In the episode "eps2.3_logic-b0mb.hc" (ep. 5 of season 2) of the drama–thriller television series Mr. Robot the protagonist Elliot is supposed to be repairing a Tor hidden site which turns out to be a darknet market called "Midland City" styled after the Silk Road for the sale of guns, sex trafficked women, rocket launchers, drugs and hitmen for hire. When he learns about this his conscience shows. Later he is dragged out of bed and beaten up by two goons and reminded by Ray, the site's administrator, that he was told not to look at the site's content.[105][106]
Aphex Twin's album Syro was announced on the dark web
Comments