Jump to content

Dark web: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Tag: section blanking
Tag: extraneous markup
Line 4: Line 4:
The darknets which constitute the dark web include small, [[friend-to-friend]] [[peer-to-peer]] networks, as well as large, popular networks like [[Freenet]], [[I2P]], and [[Tor (anonymity network)|Tor]], operated by public organizations and individuals. Users of the dark web refer to the regular web as the [[Clearnet (networking)|Clearnet]] due to its unencrypted nature.<ref>{{cite web|title=Clearnet vs hidden services – why you should be careful|url=http://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/clearnet-vs-hidden-services-why-you-should-be-careful/|website=[[DeepDotWeb]]|accessdate=4 June 2015}}</ref> The Tor dark web may be referred to as '''onionland''',<ref name="darknetthing">{{cite news|last1=Chacos|first1=Brad|title=Meet Darknet, the hidden, anonymous underbelly of the searchable Web|url=http://www.pcworld.com/article/2046227/meet-darknet-the-hidden-anonymous-underbelly-of-the-searchable-web.html|accessdate=16 August 2015|date=12 August 2013}}</ref> a reference to the network's top level domain suffix [[.onion]] and the traffic anonymization technique of [[onion routing]].
The darknets which constitute the dark web include small, [[friend-to-friend]] [[peer-to-peer]] networks, as well as large, popular networks like [[Freenet]], [[I2P]], and [[Tor (anonymity network)|Tor]], operated by public organizations and individuals. Users of the dark web refer to the regular web as the [[Clearnet (networking)|Clearnet]] due to its unencrypted nature.<ref>{{cite web|title=Clearnet vs hidden services – why you should be careful|url=http://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/clearnet-vs-hidden-services-why-you-should-be-careful/|website=[[DeepDotWeb]]|accessdate=4 June 2015}}</ref> The Tor dark web may be referred to as '''onionland''',<ref name="darknetthing">{{cite news|last1=Chacos|first1=Brad|title=Meet Darknet, the hidden, anonymous underbelly of the searchable Web|url=http://www.pcworld.com/article/2046227/meet-darknet-the-hidden-anonymous-underbelly-of-the-searchable-web.html|accessdate=16 August 2015|date=12 August 2013}}</ref> a reference to the network's top level domain suffix [[.onion]] and the traffic anonymization technique of [[onion routing]].


''LHX'''''Bold text'''
==Terminology==

The dark web has often been confused with the [[deep web]], the parts of the web not searched by search engines. This confusion dates to at least 2009.<ref>{{cite news|last1=Beckett|first1=Andy|title=The dark side of the internet|url=http://www.theguardian.com/technology/2009/nov/26/dark-side-internet-freenet|accessdate=9 August 2015|date=26 November 2009}}</ref> Since then, especially in reporting on [[Silk Road (marketplace)|Silk Road]], the two terms have often been conflated,<ref>[[Deep Web (film)]]</ref><ref>{{cite news|last1=Daily Mail Reporter|url=http://www.dailymail.co.uk/news/article-2454735/The-disturbing-world-Deep-Web-contract-killers-drug-dealers-ply-trade-internet.html|title=The disturbing world of the Deep Web, where contract killers and drug dealers ply their trade on the internet|accessdate=25 May 2015|date=11 October 2013}}</ref><ref>{{cite web|url=http://fusion.net/story/145885/nasa-is-indexing-the-deep-web-to-show-mankind-what-google-wont/|title=NASA is indexing the 'Deep Web' to show mankind what Google won't|work=Fusion}}</ref> despite recommendations that they be distinguished.<ref name="npr.org"/><ref name="confusion">{{cite web|url=http://www.brightplanet.com/2014/03/clearing-confusion-deep-web-vs-dark-web/|title=Clearing Up Confusion – Deep Web vs. Dark Web|work=BrightPlanet}}</ref><ref>{{cite news|last1=Solomon|first1=Jane|title=The Deep Web vs. The Dark Web|url=http://blog.dictionary.com/dark-web/|accessdate=26 May 2015|date=6 May 2015}}</ref><ref>{{cite news|last1=Greenberg|first1=Andy|title=Hacker Lexicon: What Is the Dark Web?|url=http://www.wired.com/2014/11/hacker-lexicon-whats-dark-web/|accessdate=6 June 2015|date=19 November 2014}}</ref>


== Content ==
== Content ==

Revision as of 13:48, 23 September 2016

The dark web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but which require specific software, configurations or authorization to access.[1][2] The dark web forms a small part of the deep web, the part of the Web not indexed by search engines, although sometimes the term "deep web" is used to refer specifically to the dark web.[3][4][5][6][7]

The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks like Freenet, I2P, and Tor, operated by public organizations and individuals. Users of the dark web refer to the regular web as the Clearnet due to its unencrypted nature.[8] The Tor dark web may be referred to as onionland,[9] a reference to the network's top level domain suffix .onion and the traffic anonymization technique of onion routing.

LHXBold text

Content

Web-based onion services in January 2015[10]
Category Percentage
Gambling
0.4
Gun
1.4
Chat
2.2
New
(not yet indexed)
2.2
Abuse
2.2
Books
2.5
Directory
2.5
Blog
2.75
Porn
2.75
Hosting
3.5
Hacking
4.25
Search
4.25
Anonymity
4.5
Forum
4.75
Counterfeit
5.2
Whistleblower
5.2
Wiki
5.2
Mail
5.7
Bitcoin
6.2
Fraud
9
Market
9
Drugs
15.4
Web-based onion services in February 2016[11][12]
Category % of total % of active
Violence
0.3
0.6
Arms
0.8
1.5
Illicit Social
1.2
2.4
Hacking
1.8
3.5
Illicit links
2.3
4.3
Illicit pornography
2.3
4.5
Extremism
2.7
5.1
Illicit Other
3.8
7.3
Illicit Finance
6.3
12
Illicit Drugs
8.1
15.5
Non-illicit+Unknown
22.6
43.2
Illicit total
29.7
56.8
Inactive
47.7
Active
52.3

A December 2014 study by Gareth Owen from the University of Portsmouth found that the most commonly requested type of content on Tor was child pornography, followed by black markets, while the individual sites with the highest traffic were dedicated to botnet operations (see attached metric).[13] Many whistleblowing sites maintain a presence[14] as well as political discussion forums.[15] Sites associated with Bitcoin, fraud related services and mail order services are some of the most prolific.[13] To counter the trend of controversial content, the artist collective Cybertwee held a bake sale on an onion site.[16]

A more recent February 2016 study from researchers at King's College London gives the following breakdown of content by an alternative category set, highlighting the illicit use of .onion services:[17][18]

Botnets

Botnets are often structured with their command and control servers based on a censorship resistant hidden service, creating a large amount of bot related traffic.[13][19]

Bitcoin services

Bitcoin services such as tumblers are often available on Tor, and some – such as Grams – offer darknet market integration.[20][21] A research study undertaken by Jean-Loup Richet, a research fellow at ESSEC, and carried out with the United Nations Office on Drugs and Crime, highlighted new trends in the use of Bitcoin tumblers for money laundering purposes. A common approach was to use a digital currency exchanger service which converted Bitcoin into an online game currency (such as gold coins in World of Warcraft) that will later be converted back into money.[22][23]

Darknet markets

Commercial darknet markets, which mediate transactions for illegal drugs and other goods, attracted significant media coverage starting with the popularity of Silk Road and its subsequent seizure by legal authorities.[24] Other markets sell software exploits[25] and weapons.[26]

Hacking groups and services

Many hackers sell their services there individually or as a part of groups.[27] Such groups include hackforum, Trojanforge, Mazafaka, dark0de and the TheRealDeal darknet market.[28] Some have been known to track and extort apparent pedophiles.[29]

Fraud services

There are numerous carding forums, as well as fraud and counterfeiting services.[30] Many such sites are scams themselves.[31]

Hoaxes and unverified content

There are reports of crowdfunded assassinations and hitmen for hire,[26][32] however these are believed to be exclusively scams.[33][34] The creator of Silk Road was arrested by Homeland Security investigations (HSI) for his site and allegedly hiring a hitman to kill six people, although the charges were later dropped.[35][36]

There is an urban legend that one can find live murder on the dark web. The term "Red Room" has been coined based on the Japanese animation and urban legend of the same name. However the evidence points towards all reported instances being hoaxes.[37][38]

On June 25, 2015, a creepy indie game Sad Satan was reviewed by Youtubers Obscure Horror Corner which they claimed to have found via the dark web. Various inconsistencies in the channel's reporting cast doubt on the reported version of events.[39]

Phishing and scams

Phishing via cloned websites and other scam sites are numerous,[40][41] with darknet markets often advertised with fraudulent urls.[42][43]

Puzzles

Puzzles such as Cicada 3301 and successors will sometimes use hidden services in order to more anonymously provide clues, often increasing speculation as to the identity of their creators.[44]

Illegal and ethically disputed pornography

There is regular law enforcement action against sites distributing child pornography[45][46] – often via compromising the site by distributing malware to the users.[47][48] Sites use complex systems of guides, forums and community regulation.[49]

Other content includes sexualised torture and killing of animals[50] and revenge porn.[51]

Terrorism

There are at least some real and fraudulent websites claiming to be used by ISIL, including a fake one seized in Operation Onymous.[52] In the wake of the November 2015 Paris attacks an actual such site was hacked by an Anonymous affiliated hacker group GhostSec and replaced with an advert for Prozac.[53]

Commentary

Although much of the dark web is innocuous, some prosecutors and government agencies, among others, are concerned that it is a haven for criminal activity.[54] In 2014, journalist Jamie Bartlett in his book The Dark Net used the dark net and dark web to describe a range of underground and emergent sub cultures, including social media racists, cam girls, self harm communities, darknet drug markets, cryptoanarchists and transhumanists.[55]

Specialist news sites such as DeepDotWeb[56][57] and All Things Vice[58] provide news coverage and practical information about dark web sites and services. The Hidden Wiki and its mirrors and forks hold some of the largest directories of content at any given time.

Popular sources of dark web .onion links include Pastebin, YouTube, Twitter, Reddit and other Internet forums.[59] Specialist companies with Darksum and Recorded Future track dark web cybercrime goings on for law enforcement purposes.[60]

In 2015 it was announced that Interpol now offers a dedicated dark web training program featuring technical information on Tor, cybersecurity and simulated darknet market take downs.[61]

In October 2013 the UK's National Crime Agency and GCHQ announced the formation of a 'Joint Operations Cell' to focus on cybercrime.[62] In November 2015 this team would be tasked with tackling child exploitation on the dark web as well as other cybercrime.[63]

  • The dark web is a key plot element in Lee Child's novel Make Me (2015).[64]
  • Character Lucas Goodwin uses the dark web to find a hacker in the American television series House of Cards (2013).[65]
  • The dark web is a major plot element in the German techno-thriller film Who Am I (2014).[66] The film also visualizes secret darknet chatrooms with rundown subways in which masked people exchange messages.[67][68]
  • Killer.com (2015) is a novel by Kenneth G. Eade about a cyber bullying mob who hires a killer for hire over the darknet for an anonymous murder.[69][70]
  • CSI: Cyber (2015) follows the work of Mary Aiken inspired Special Agent in Charge Avery Ryan, who leads an FBI division tasked with working on the dark web, investigating everything from online baby auctions ("Kidnapping 2.0"), to the disabling of roller-coaster safeguards ("CMND:\CRASH"), the world of black market weaponry ("Ghost in the Machine"), the death of those using a transport app ("Killer En Route"), and a design flaw in a printer ("Fire Code").
  • Thomas Pynchon's Bleeding Edge dives deep into the dark web to untangle a conspiratorial plot linked to the bombing of the twin towers.
  • The 2016 game titled "Welcome to the Game" is entirely based on the deep/dark web.[71]
  • The dark web is a key plot point in the 2016 movie "Nerve", which is based upon a YA novel of the same name by Jeanne Ryan.[72][dubiousdiscuss]
  • In the episode "eps2.3_logic-b0mb.hc" (ep. 5 of season 2) of the drama–thriller television series Mr. Robot the protagonist Elliot is supposed to be repairing a Tor hidden site which turns out to be a darknet market called "Midland City" styled after the Silk Road for the sale of guns, sex trafficked women, rocket launchers, drugs and hitmen for hire. When he learns about this his conscience shows. Later he is dragged out of bed and beaten up by two goons and reminded by Ray, the site's administrator, that he was told not to look at the site's content.[73][74]

References

  1. ^ Greenberg, Andy (19 November 2014). "Hacker Lexicon: What Is the dark web?". Wired. Retrieved 27 August 2015.
  2. ^ Egan, Matt (12 January 2015). "What is the dark web? How to access the dark web - How to turn out the lights and access the dark web (and why you might want to)". Retrieved 18 June 2015.
  3. ^ Solomon, Jane (6 May 2015). "The Deep Web vs. The dark web". Retrieved 26 May 2015.
  4. ^ Greenberg, Andy (19 November 2014). "Hacker Lexicon: What Is the dark web?". Wired. Retrieved 6 June 2015."Clearing Up Confusion – Deep Web vs. dark web". BrightPlanet.
  5. ^ NPR Staff (25 May 2014). "Going Dark: The Internet Behind The Internet". Retrieved 29 May 2015.
  6. ^ The dark web Revealed. Popular Science. . pages 20-21
  7. ^ Greenberg, Andy (19 November 2014). "Hacker Lexicon: What Is the dark web?". Wired. Retrieved 6 June 2015.
  8. ^ "Clearnet vs hidden services – why you should be careful". DeepDotWeb. Retrieved 4 June 2015.
  9. ^ Chacos, Brad (12 August 2013). "Meet Darknet, the hidden, anonymous underbelly of the searchable Web". Retrieved 16 August 2015.
  10. ^ Owen, Gareth. "Dr Gareth Owen: Tor: Hidden Services and Deanonymisation". Retrieved 20 June 2015.
  11. ^ Moore, Daniel. "Cryptopolitik and the Darknet". Survival: Global Politics and Strategy. Retrieved 2016-03-20.
  12. ^ Cox, Joseph (2016-02-01). "Study Claims Dark Web Sites Are Most Commonly Used for Crimes". Retrieved 2016-03-20.
  13. ^ a b c Mark, Ward (30 December 2014). "Tor's most visited hidden sites host child abuse images". BBC News. Retrieved 28 May 2015.
  14. ^ "Everything You Need to Know on Tor & the Deep Web". whoishostingthis. Retrieved 18 June 2015.
  15. ^ Cox, Joseph (25 February 2015). "What Firewall? China's Fledgling Deep Web Community". Retrieved 19 June 2015.
  16. ^ Paul, Kari (9 December 2015). "I Bought Adorable Cookies on the Deep Web". Retrieved 10 December 2015.
  17. ^ Moore, Daniel. "Cryptopolitik and the Darknet". Survival: Global Politics and Strategy. Retrieved 20 March 2016.
  18. ^ Cox, Joseph (1 February 2016). "Study Claims Dark Web Sites Are Most Commonly Used for Crime". Retrieved 20 March 2016.
  19. ^ Reeve, Tom (30 September 2015). "Extortion on the cards". Retrieved 8 December 2015.
  20. ^ Allison, Ian (11 February 2015). "Bitcoin tumbler: The business of covering tracks in the world of cryptocurrency laundering". Retrieved 8 December 2015.
  21. ^ "Helix Updates: Integrated Markets Can Now Helix Your BTC". 5 August 2015. Retrieved 8 December 2015.
  22. ^ Richet, Jean-Loup (June 2013). "Laundering Money Online: a review of cybercriminals methods". arXiv:1310.2368.
  23. ^ Richet, Jean-Loup (2012). "How to Become a Black Hat Hacker? An Exploratory Study of Barriers to Entry Into Cybercrime". 17th AIM Symposium.
  24. ^ Burleigh, Nina (19 February 2015). "The Rise and Fall of Silk Road, the dark web's Amazon". Retrieved 25 May 2015.
  25. ^ Greenberg, Andy (17 April 2015). "New Dark-Web Market Is Selling Zero-Day Exploits to Hackers". Wired. Retrieved 24 May 2015.
  26. ^ a b Holden, Alex (10 February 2015). "Ukraine crisis: Combatants scouring dark web for advice on bridge bombing and anti-tank missiles". Retrieved 28 May 2015.
  27. ^ Holden, Alex (15 January 2015). "A new breed of lone wolf hackers are roaming the deep web - and their prey is getting bigger". Retrieved 19 June 2015.
  28. ^ "Hacking communities in the Deep Web". 15 May 2015. Retrieved 5 September 2015.
  29. ^ Cox, Joseph (12 November 2015). "A dark web Hacker Is Hunting Potential Pedophiles to Extort Them for Money". Retrieved 12 November 2015.
  30. ^ Cox, Joseph (14 January 2016). "Dark Web Vendor Sentenced for Dealing Counterfeit Coupons". Retrieved 24 January 2016.
  31. ^ DeepDotWeb (28 May 2015). "Secrets to Unmasking Bitcoin Scams – 4 Eye Opening Case Studies". Retrieved 12 November 2015.
  32. ^ Greenberg, Andy (18 November 2013). "Meet The 'Assassination Market' Creator Who's Crowdfunding Murder With Bitcoins". Forbes. Retrieved 29 August 2015.
  33. ^ Cox1, Joseph (18 May 2016). "This Fake Hitman Site Is the Most Elaborate, Twisted Dark Web Scam Yet". Retrieved 20 June 2016.{{cite news}}: CS1 maint: numeric names: authors list (link)
  34. ^ Ormsby, Eileen (3 August 2012). "Conversation with a hitman (or not)". Retrieved 29 August 2015.
  35. ^ Nicole Hong, "Silk Road Founder Ross Ulbricht Sentenced to Life in Prison", Wall Street Journal, May 29, 2015.
  36. ^ Andy Greenberg, "Silk Road Creator Ross Ulbricht Sentenced to Life in Prison", Wired, May 29, 2015.
  37. ^ Ormsby, Eileen (29 August 2015). "Waiting in the Red Room". Retrieved 29 August 2015.
  38. ^ Howell O'Neill, Patrick (28 August 2015). "Dark Net site promised to livestream torture and execution of 7 ISIS jihadists". Retrieved 29 August 2015.
  39. ^ Barton, Hannah (25 October 2015). "The spooky, twisted saga of the Deep Web horror game 'Sad Satan'". Retrieved 22 November 2015.
  40. ^ Stockley, Mark (1 July 2015). "Hundreds of Dark Web sites cloned and "booby trapped"". Retrieved 8 December 2015.
  41. ^ Fox-Brewster, Thomas (18 November 2014). "Many Sites That Fell In Epic Onymous Tor Takedown 'Were Scams Or Legit'". Forbes. Retrieved 19 June 2015.
  42. ^ "Beware of Phishing Scams On Clearnet Sites! (darknetmarkets.org)". DeepDotWeb. 3 July 2015. Retrieved 8 December 2015.
  43. ^ "Warning: More Onion Cloner Phishing Scams". 22 April 2015. Retrieved 8 December 2015.
  44. ^ Bell, Chris (25 November 2013). "The internet mystery that has the world baffled". Retrieved 8 December 2015.
  45. ^ Willacy, Mark (26 August 2015). "Secret 'dark net' operation saves scores of children from abuse; ringleader Shannon McCoole behind bars after police take over child porn site". Retrieved 26 August 2015.
  46. ^ Conditt, Jessica (8 January 2016). "FBI hacked the Dark Web to bust 1,500 pedophiles". Retrieved 8 January 2016.
  47. ^ Cox, Joseph (5 January 2016). "The FBI's 'Unprecedented' Hacking Campaign Targeted Over a Thousand Computers". Retrieved 8 January 2016.
  48. ^ Farivar, Cyrus (16 June 2015). "Feds bust through huge Tor-hidden child porn site using questionable malware". Retrieved 8 August 2015.
  49. ^ Evans, Robert (16 June 2015). "5 Things I Learned Infiltrating Deep Web Child Molesters". Retrieved 29 August 2015.
  50. ^ Cox, Joseph (11 November 2014). "As the FBI Cleans the Dark Net, Sites Far More Evil Than Silk Road Live On". Retrieved 3 August 2015.
  51. ^ Markowitz, Eric (10 July 2014). "The Dark Net: A Safe Haven for Revenge Porn?". Retrieved 3 August 2015.
  52. ^ Cub, Nik (17 November 2014). "FBI seizes fake Tor hosted Jihad funding website as part of Operation Onymous, leaves up real site". Retrieved 25 November 2015.
  53. ^ Cuthbertson, Anthony (25 November 2015). "Hackers replace dark web Isis propaganda site with advert for Prozac". Retrieved 25 November 2015.
  54. ^ Lev Grossman (11 November 2013). "The Secret Web: Where Drugs, Porn and Murder Live Online". TIME.com.
  55. ^ Ian, Burrell (28 August 2014). "The Dark Net:Inside the Digital Underworld by Jamie Bartlett, book review". The Independent. London. Retrieved 3 June 2015.
  56. ^ Swearingen, Jake (2 October 2014). "A Year After Death of Silk Road, Darknet Markets Are Booming". Retrieved 24 May 2015.
  57. ^ Franceschi-Bicchierai, Lorenzo (13 May 2015). "Hackers Tried To Hold a Darknet Market For a Bitcoin Ransom". Retrieved 19 May 2015.
  58. ^ Solon, Olivia (3 February 2013). "Police crack down on Silk Road following first drug dealer conviction". Retrieved 27 May 2015.
  59. ^ Koebler, Jason (23 February 2015). "The Closest Thing to a Map of the Dark Net: Pastebin". Retrieved 14 July 2015.
  60. ^ Simonite, Tom (18 March 2016). "The Surprising Light Side of the Dark Web". Retrieved 20 March 2016.
  61. ^ Ricard (2 August 2015). "Interpol dark web Training Course". Retrieved 8 August 2015.
  62. ^ Rose, David (13 October 2013). "Secrets of the UK's new FBI: Police chief reveals elite force of 5,000 'super' agents will wage a high-tech manhunt for Britain's most wanted criminals". Retrieved 9 November 2015.
  63. ^ Box, Joseph (8 November 2015). "The UK Will Police the dark web with a New Task Force". Retrieved 9 November 2015.
  64. ^ "Book Review: Make Me by Lee Child".
  65. ^ Auerbach, David (20 February 2014). "Not So Deep". Slate. Retrieved 16 January 2016.
  66. ^ Pilarczyk, Hannah (September 2014). "Hacker-Thriller mit Tom Schilling: Willkommen im Darknet". DER SPIEGEL. Retrieved 27 January 2016.
  67. ^ Jerzy, Nina (25 September 2014). "Who Am I - Kein System ist sicher - Hacker mit Minderwertigkeitskomplexen". N-TV. Retrieved 28 January 2016.
  68. ^ "Who am I – kein System ist sicher - Didaktisierungsvorschlag des Goethe-Instituts Frankreich" (PDF). Goethe-Instituts Frankreich. Retrieved 28 January 2016.
  69. ^ Vinny O'Hare. "Featured Author Kenneth Eade". Book Reader Magazine. Retrieved 2 October 2015.
  70. ^ "The Devil and the Dark Net". dissidentvoice.org. Retrieved 2 October 2015.
  71. ^ "Welcome to the Game on Steam". Retrieved 5 August 2016.
  72. ^ Formo, Brian. "'Nerve' Review: Dave Franco and Emma Roberts Gotta Catch 'Em All". Collider. Retrieved 5 August 2016.
  73. ^ Varmazis, Maria. "Mr. Robot eps2.3logic-b0mb.hc – the security review". Retrieved 6 August 2016.
  74. ^ Jensen, Jeff. "Mr. Robot recap: 'eps2.3logic-b0mb.hc'". Retrieved 6 August 2016.

Further reading