Dark Web 2
Dark Web 2
Dark Web 2
3049
Authorized licensed use limited to: Dayananda Sagar University. Downloaded on September 08,2023 at 10:27:51 UTC from IEEE Xplore. Restrictions apply.
IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017)
It is because of the dark web’s total anonymity which According to Cryptorials, other free anonymous, peer-
has become and preferred place of choice for people to-peer networks with layered encryption include I2P
or groups wanting to stay hidden from government or (Invisible Internet Project), Freenet, GNUNet, FAI
local law enforcement agencies. On the other hand, (Free Anonymous Internet), and ZeroNet. The use of
there have been people who communicate with such networks to access the Internet created the “dark
journalists to provide confidential information web,” the portion of the web that is not indexed and
anonymously. whose content is protected by firewalls, hidden IP
addresses, and layers of encryption.
Depending on what each person intends to do on the
dark web, it is recommended that users should place
tape over their machine webcam to prevent some 5. PRECAUTIONS TAKEN BEFORE
ACCESSING THE DARK WEB AND RISKS
people from the dark web capable of watching you. INVOLVED
British Prime Minister David Cameron had announced For the average Internet user, the dark web can be a
a new intelligence agency on December 10, 2014, to dangerous place. Browsing its hidden sites without
monitor the “Dark Web,” as reported by The precautions might be compared to trying to get safely
Independent. According to Cameron, “The dark net is through a village infected by Ebola. The power of
the next side of the problem, where pedophiles and anonymity frequently encourages illicit activities
including the sale of drugs, weapons, fake IDs and
perverts are sharing images, not using the normal parts passports, and stolen electronics. Websites on the dark
of the Internet we all use.” web advertise services of hackers, counterfeiters, and
hitmen [6]
Independent web consultant Mark Stockley concurs,
claiming in Naked Security that the dark web “attracts At the same time, many of the websites in the dark web
people who want to engage in things like robbery, sex are also fakes to attract vulnerable victims or are
trafficking, arms trafficking, terrorism and distributing established by law enforcement to identify and track
child pornography.” In the International Business actual and potential criminal activity. Since anonymity
Times, writers Charles Paladin and Jeff Stone claim exists on both sides, users can never be 100% sure of
electronic goods, contract killers, guns, passports, fake the intentions of those with whom they interact with in
IDs, and hackers for hire are readily available on the the dark web. As researchers, we made it a point to
dark web, in addition to illegal drugs and child completely remove the drivers for both microphone
pornography. and webcam from our laptops. The researchers made
3050
Authorized licensed use limited to: Dayananda Sagar University. Downloaded on September 08,2023 at 10:27:51 UTC from IEEE Xplore. Restrictions apply.
IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017)
x Vawtrack: Designed to gain access to victims’ 1. Exercise Common Sense. If something seems
financial accounts too good to be true, it probably is. If someone
x Skynet: Used to steal bitcoins or engage in is being unusually friendly, ask yourself
DDoS (distributed denial of service) attacks on why. Be aware of the possible consequences of
other websites using the victim’s computer a web interaction and trust your instincts.
x Nionspy: Can capture keystrokes, steal
documents, and record audio and video using 2. Protect Your Identity. Create a throwaway
the infected computer email address. Don’t use a username you’ve
5.2 Government Surveillance used with any website before in your email
address. Never use your real name or provide
In addition to the dangers of malware, a dark web
personal data unless you are dealing with a
visitor to politically oriented sites should be concerned
trusted site that uses encryption. Do not use the
about attracting the attention of government
same password for every online account.
authorities and becoming the subject of unwanted
official surveillance[6]. In Rolling Stone, Jeremy
3. Avoid Use of Personal Credit Cards. Rather
Gillula, a staff technologist with the Electronic
than using a credit card that can be traced
Frontier Foundation (EFF), claims, “There are
directly to you and make your financial
countries where browsing a political website about
information visible, use prepaid, single use
democracy can get you thrown in jail. That’s the most
cards for Internet purchases. If a using a credit
life-and-death reason why Tor needs to exist.” Visitors
card is necessary, be sure the website is secure
to Tor websites dealing with illegal goods or
by checking the web address. The address
promoting dissident political views in the eyes of
should begin with “https://,” rather than
government should be aware that dark websites are
“http://.” The “s” on the former stands for
regularly penetrated and taken down by cyber-police
“secure socket layer,” and it means that sent
and their owners and visitors exposed, including at
and received data is encrypted.
least three versions of the most famously known site,
The Silk Road.
4. Do Not Download or Open Files Online,
Software tools to make the dark web more transparent
Especially from the Dark Net. If you must
are constantly evolving, as is the software criminals
download something, scan it with antivirus
use to hide their activity. Government agencies and
software (or at least a free service
law enforcement can now use Memex, a recently
like VirusTotal) before opening to detect
developed search engine that was developed by
viruses, worms, trojans, and other malware. Do
DARPA and designed specifically for the dark web, to
not click on suspicious links, especially
find sites and store data that can be analyzed later. Law
anything that advertises illegal activities.
enforcement credits the software for the exposure and
prosecution of human trafficking rings in the U.S. and
6. USAGE OF DARK WEB
abroad, according to Scientific American.
5.3 Best Practises To Browse The Net While the dark web has many details around it. Based
on the research conducted, several findings can be
Many web professionals claim the surface net (that is
documented. The dark web has its own good and bad.
the portion of the Internet most users visit) is not
In terms of spreading awareness and the truth about
unlike the dark web, and contains many of the same
government atrocities or illegal findings about
dangers. There are thousands of sites devoted to
incidents or perhaps activities done under a legal name
violent and racist causes. Advertisers collect and sell
but an illegal act, the dark web provides whistle
personal data, as well as your growing history.
blowers with means to have their information securely
Malicious software is as likely to arise from a public
transferred to journalist who are on the dark web as
website as a website on the dark web, while
well. Apart from that, there are many excellent e-
governments around the world currently monitor
books available on the dark web especially for those
Internet traffic and messages. Therefore, as a
consequence, many Internet professionals recommend
that web visitors on all levels of the Internet implement
the following practices:
3051
Authorized licensed use limited to: Dayananda Sagar University. Downloaded on September 08,2023 at 10:27:51 UTC from IEEE Xplore. Restrictions apply.
IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017)
3052
Authorized licensed use limited to: Dayananda Sagar University. Downloaded on September 08,2023 at 10:27:51 UTC from IEEE Xplore. Restrictions apply.
IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017)
8. LIST OF WEBSITES
http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_P
age
http://kpvz7ki2v5agwt35.onion
Includes lots and lots and lots of links to child
pornography and real rape.
Figure 6.0 Seller’s profile
Page for beginners in the dark web that provides an
The above "Fig.6” is a seller profile found on the Silk outline of dark web links to sites based on descriptions
Road. and its primary functions. Several categories to be
selected from e commerce market place, to dark web
library with many e books, child pornography and all
the way to guns for hire and other forms of illegal
activity as shown Table 1 and Table 2.
3053
Authorized licensed use limited to: Dayananda Sagar University. Downloaded on September 08,2023 at 10:27:51 UTC from IEEE Xplore. Restrictions apply.
IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017)
3054
Authorized licensed use limited to: Dayananda Sagar University. Downloaded on September 08,2023 at 10:27:51 UTC from IEEE Xplore. Restrictions apply.
IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017)
11. REFERENCES
[5] Ahmed, H., 2011. What is the Deep/Dark web
and how do you access it. [Online]
[1] Britannica , 2017. Internet. [Online]
Available at: https://www.quora.com/What-is-the-
Available at:
deep-dark-web-and-how-do-you-access-it
https://www.britannica.com/technology/Internet
[Accessed 30 July 2017].
[Accessed 3 July 2017].
[6] Lewis, M., 2016. What Is the Dark Web – Who
[2] Edwards, S., 2017. REVEALED: How many Uses It, Dangers & Precautions to Take. [Online]
Brummie identity details are for sale on the dark Available at: http://www.moneycrashers.com/dark-
web. [Online] web/
Available at: [Accessed 30 July 2017].
http://www.birminghammail.co.uk/news/midlands-
news/revealed-how-many-brummie-identity- [7] Ferrier, S., 2016. Melbourne man admits using
13395699 dark web to advise paedophiles on kidnap, rape and
[Accessed 31 July 2017]. torture. [Online]
Available at: http://www.abc.net.au/news/2016-02-
[3] Egan, M., 2017. What is the Dark web and Deep 03/melbourne-man-used-dark-web-to-advise-
web. [Online] paedophiles-court-hears/7137216
Available at: http://www.techadvisor.co.uk/how- [Accessed 15 July 2017].
to/internet/what-is-dark-web-deep-web-3593569/
[Accessed 30 July 2017]. [8] Koebler, J., 2015. Six Ways Law Enforcement
Monitors the Dark Web. [Online]
[4] Glance, D., 2016. What is the Dark Web. [Online] Available at:
Available at: https://motherboard.vice.com/en_us/article/jp5a9g/si
http://www.iflscience.com/technology/what-dark-
x-ways-law-enforcement-monitors-the-dark-web
web/all/
[Accessed 14 July 2017].
[Accessed 30 July 2017].
3055
Authorized licensed use limited to: Dayananda Sagar University. Downloaded on September 08,2023 at 10:27:51 UTC from IEEE Xplore. Restrictions apply.