2016dark Web 101
2016dark Web 101
2016dark Web 101
Today’s internet has multiple webs. The surface web is what Google and other search engines index and
pull based on links. Essentially, the surface web is the master index of publically available indexes providing
returns to searches based on search terms and links. The surface web is small at only 4%. The second, called
the deep web, consists of roughly 96% or the rest of the web. The deep web consists of protected sites that re-
quire users to input data to get access (email or online banks), unlinked content (unpublished blogs or or-
ganizational databases), proprietary data (study results, financial records, research & development), and
personal data (medical records or legal documents). These are all deep web. Standard search engines don’t
have access to these sites and therefore cannot search them. The last web is the dark web, a part of the deep
web. It requires specific software, logins, and knowledge to access. This is home to hidden sites that prefer to
stay in the dark.
What is it?
Some call the dark web “the seedy underbelly of the Internet where you can buy drugs, weapons,
child pornography, [and] murders-for-hire.”1 Others highlight how “it helps political dissidents
who want to evade government censors.”2 In either case, the dark web is a collection of hard to
find websites because it’s “not indexed by search engines such as Google and not easily navigated
to using a standard web browser.”3 A quick outline of its technical development and evolution
give definition to this discussion. In a general sense, the dark web, aka darknet, hides internet
activity of the individuals that use it to communicate, host data or access a specific website. Tra-
ditionally, internet access depends on an internet service provider (ISP) to connect its users to
the internet. The ISPs assign Internet Protocol (IP) addresses to its users and data hosts. IP ad-
dresses provide organizational details about the ISP, its geographic location, closest city, websites
visited, and other identifying information called metadata. The dark web enables its users and
data hosts to anonymously surf the web, host a website or communicate using a global network
that obfuscates its users’ IP addresses. This anonymity concept relies on software the Naval Re-
search Lab (NRL) developed in 2002. In 2004, NRL released the second generation of ‘the on-
ion router’ or Tor as it’s more commonly known. By May 2004, Tor had “32 nodes (24 in the US,
8 in Europe).4”Today’s Tor network numbers over 6000 nodes5 making it the largest internation-
ally and the primary tool used to access the dark web.
While the anonymity Tor provided darknet users was beneficial, the dark web has since gained
other uses -- some legal, some not. For example, according to one of Tor’s original developers,
Michael Reed, Tor initially had legitimate aims “The *PURPOSE* [sic] was for DoD [US Depart-
3
4 AIR & SPACE POWER JOURNAL
Another common technique called spoofing makes it look like your IP is somewhere else. This is
quite useful for gaining access to specific online resources (TV shows, shopping, newsfeeds, etc.)
only available in a given physical location based on IP address. For example, using a VPN one can
access Netflix, a US-based company, while living in Italy and using an Italian ISP. VPNs allow
customers to choose IPs in multiple nations throughout the world enabling access to online re-
sources anonymously. VPNs are quite popular because they’re “free and are often faster than
browsing via the Tor network, as well as being much easier to use.” Anonymizing software and
encryption offer users and data hosts the ability to hide their identity securely. Because encryp-
tion ensures authorized access only to unique data, dark web users rely on it. When paired with
software like Tor or a VPN that hide one’s identity, the chances of remaining anonymous are
greatly increased thus protecting the identity of users or data hosts.
Increasing awareness of the dark web and how it works is not as difficult as defining who the
darknet community is. Originally, the darknet served legitimate US government purposes pro-
viding protection for individuals conducting investigations, fieldwork and intelligence collec-
tion. However, individuals seeking to capitalize on criminal activity enabled the darknet to flour-
ish primarily using Tor. Interestingly, Tor designers expected this to happen mentioning that
there “would be other unavoidable uses for the technology...and if those uses were going to give
us more cover traffic to better hide what we wanted to use the network for, all the better14.” The
darknet depends on encryption and anonymity to protect its users and data hosts. Data encryp-
tion is an ancient, gold-standard of protection assuring only authorized individuals gain access to
verifiable, unchanged data. The use of anonymizing software coupled with encryption provides
complex, powerful protection to the dark web community. When compared to the aggregate
number of internet users, darknet users are almost nonexistent. Additionally, the number of
available darknet web sites versus standard websites is paltry -- about the size of an electron on the
head of a pin in the hand of a basketball player standing at mid court in the Alamodome in San
Antonio, Texas. Given the nature of the dark web, defining its users is hard. Available informa-
tion suggests a few user types -- computer savvy individuals whose tactics help them avoid legal
tangles, computer savvy individuals motivated by altruism and plain old users simply interested
in protecting their personal information. In today’s interconnected global world, the darknet
community will most likely continue to grow in popularity reflecting a society of legal and moral
conundrums apparently deciphered by no one specifically.
Notas
1. https://www.iwf.org.uk/assets/media/annual-reports/IWF_Annual_Report_14_web.pdf, page 9, accessed 10 December
2015.
2. Ibid, page 17.
3. https://www.europol.europa.eu/content/global-action-against-dark-markets-tor-network, accessed 2 December 2015.
4. http://www.wired.com/2014/11/operation-onymous-dark-web-arrests/, accessed 10 December 2015.
5. http://www.wired.com/2014/11/feds-seize-silk-road-2/, accessed 15 December 2015.
6. Ibid.
7. http://www.digitalcitizensalliance.org/cac/alliance/content.aspx?page=Darknet, accessed 11 December 2015.
8. http://www.scmagazine.com/dark-website-agora-closes-over-tor-vulnerability-suspicions/article/435278/, accessed 15
December 2015.
9. http://www.bbc.com/news/technology-30637010, accessed 12 December 2015
10. http://techcrunch.com/2014/11/18/nearly-half-of-the-operation-onymous-takedowns-were-scam-or-clone-sites/, ac-
cessed 12 December 2015.
11. http://www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/, accessed 16
December 2015
12. http://motherboard.vice.com/read/what-firewall-chinas-fledgling-deep-web-community, accessed 2 December 2015
13. Ibid.
14. https://cryptome.org/0003/tor-spy.htm, accessed 10 December 2015.
15. http://www.nbcnews.com/storyline/paris-terror-attacks/are-isis-geeks-using-phone-apps-encryption-spread-terror-
n464131, accessed 8 December 2015.
16. http://www.wired.com/2014/11/hacker-lexicon-whats-dark-web/, accessed 25 November 2015.
17. Ibid.
18. Ibid.
19. http://motherboard.vice.com/read/what-firewall-chinas-fledgling-deep-web-community, accessed 2 December 2015
20. http://www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/, accessed 2 De-
cember 2015.
21. http://motherboard.vice.com/read/what-firewall-chinas-fledgling-deep-web-community, accessed 2 December 2015
22. http://www.internetlivestats.com/watch/internet-users/, accessed 9 December 2015.
23. http://www.wired.com/2015/06/dark-web-know-myth/, accessed 9 December 2015.
24. Ibid.
25. http://www.internetlivestats.com/total-number-of-websites/, accessed 12 December 2015.
26. Ibid.
27. Ibid.
28. https://www.torproject.org/about/torusers.html.en, accessed 11 December 2015.
8 AIR & SPACE POWER JOURNAL
29. http://www.forbes.com/sites/andygreenberg/2013/11/18/meet-the-assassination-market-creator-whos-crowdfund-
ing-murder-with-bitcoins/, accessed 11 December 2015.
30. http://www.ibtimes.co.uk/new-breed-lone-wolf-hackers-are-roaming-deep-web-their-prey-getting-bigger-1483347, ac-
cessed 11 December 2015.
31. http://www.ibtimes.co.uk/how-cyber-vigilantes-catch-paedophiles-terrorists-lurking-deep-web-1479291, accessed 11 De-
cember 2015.
32. Ibid..
33. https://www.iwf.org.uk/assets/media/annual-reports/IWF_Annual_Report_14_web.pdf, page 9, accessed 10 Decem-
ber 2015.
34. Ibid, page 17.
35. https://www.europol.europa.eu/content/global-action-against-dark-markets-tor-network, accessed 2 December 2015.
36. http://www.wired.com/2014/11/operation-onymous-dark-web-arrests/, accessed 10 December 2015.
37. http://www.wired.com/2014/11/feds-seize-silk-road-2/, accessed 15 December 2015.
38. Ibid.
39. http://www.digitalcitizensalliance.org/cac/alliance/content.aspx?page=Darknet, accessed 11 December 2015.
40. http://www.scmagazine.com/dark-website-agora-closes-over-tor-vulnerability-suspicions/article/435278/, accessed 15
December 2015.
41. http://www.bbc.com/news/technology-30637010, accessed 12 December 2015.
42. http://techcrunch.com/2014/11/18/nearly-half-of-the-operation-onymous-takedowns-were-scam-or-clone-sites/, ac-
cessed 12 December 2015.
43. http://www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/, accessed 16
December 2015.
44. http://motherboard.vice.com/read/what-firewall-chinas-fledgling-deep-web-community, accessed 2 December 2015.
45. Ibid.
46. https://cryptome.org/0003/tor-spy.htm, accessed 10 December 2015.
“The views expressed in this article are those of the author and do not necessarily reflect the official policy or position of the
Air Force, the Department of Defense, or the U.S. Government.”
Major Jeremy Cole (BA, Weber State University in Spanish, MA, University of Kan-
sas) is currently a Course Director for the eSchool of Graduate PME at Maxwell
AFB, AL. As a career intelligence officer, he has worked at multiple levels inclu-
ding Combatant Command.
DARPA
When you do a simple Web search on a topic, the results that pop up aren’t the whole story. The Internet contains a vast
trove of information -- sometimes called the “Deep Web” -- that isn’t indexed by search engines: information that would
be useful for tracking criminals, terrorist activities, sex trafficking and the spread of diseases. Scientists could also use it
to search for images and data from spacecraft. The Defense Advanced Research Projects Agency (DARPA) has been de-
veloping tools as part of its Memex program that access and catalog this mysterious online world. Researchers at NASA’s
Jet Propulsion Laboratory in Pasadena, California, have joined the Memex effort to harness the benefits of deep Web
searching for science. Memex could, for example, help catalog the vast amounts of data NASA spacecraft deliver on a
daily basis.
Elizabeth LandauJet
Propulsion Laboratory, Pasadena, California.