Nitin Pandey, Rahul Pandey
The Dark Web is a small part of the WWW (World Wide Web) whose activities are purposefully covered up and cannot be accessed by normal browsers or search engines and require some particular programs like Tor browser. As the dark web hides the client's identity, it very well may be utilized for legal reasons just as illegal. From sneaking drugs and weapons to other illegal things, from hacking other's data to utilizing those for manufacturing, from duplicating cash to utilizing cryptographic money, the dark web can play various parts in malevolent movements. Then again, the government and other law enforcement agencies utilize the dark web for military applications like online intelligence gathering, sting activity and for other confidential purposes. This paper depicts dark web underlining on how it is accessed, how the tor network works to provide anonymity to its clients, how one can utilize TOR to get to dark web, subtleties on use of dark web for example how unique noxious activities are done utilizing dark web, how the dark web is utilized by terrorist communities to spread terrorism, how the law enforcements are utilizing dark web to reveal some client's real identity and to stop the illegal exercises and the future extent of dark web. Keywords: Dark Web, Tor, Tor browser, Surface Web, Deep Web, Silk Road, Terrorism, Cyber Warfare, Data Leaks, Dark Net, Dominos India Server
The Internet can be an unnerving spot. Between phishing, malware and a scope of tricks, there are numerous threats. Yet, there's an even darker corner of the web where not many individuals try to wander: The Dark Web. The Dark Web is a little piece of a much bigger Deep Web–a typical name for an assortment of websites that aren't accessible through ordinary Internet browsers, for example Google chrome. These websites are hidden away from ordinary Internet, or Clearnet. They are based on the frameworks of networks that as of now exist—and there are loads of them. Truth be told, the Deep Web makes up most of the data on the web. It's a territory past the compass of law authorization (henceforth there are no guidelines or security). Although not every person who utilizes the Dark Web participates in illegal exercises, it has a history of being a stage for political protesters and corporate informants.
Most know the Dark Web for its virtual marketplaces loaded with items going from illicit Drugs, stolen credit/debit card details, PayPal accounts, child pornography (pedo films) to prepared malwares and hackers for hire. On the dark web underground markets, a youngster can purchase and sell nearly anything while at the same time remaining absolutely unknown. We're talking about a wide range of illicit drugs (heroin, benzos, Ecstasy, weed, to give some examples), firearms, and Child pornography. Fake cash, taken Visa data, hacked financial data, frauds, taken craftsmanship. To pay for these, one uses bitcoin or different types of cryptographic money.
Teenagers who have fallen prey to sex dealing are publicized here. There are likewise benefits for things like PC hacking and contract killers recruiting. Recordings of creature mercilessness, torture, and murders. It's all stuff that would scare your soul. As anyone might expect, the dark web is mainstream with lawbreakers, pedophiles, and other offensive characters. A raid by the FBI and resulting conclusion of one the most scandalous of these organizations, Silk Road, first made numerous individuals aware of the presence of the Dark Web. The Silk Road was one of the biggest open commercial centers, working similarly like Amazon where outsider vendors could sell their items. In spite of the fact that Silk Road is shut down, and its originator is in jail forever, other illicit businesses still thrive on the dark web.
“Abduction of Chloe Ayling.” Wikipedia, Accessed Date 11th June 2021, Accessed from en.wikipedia.org/wiki/Abduction_of_Chloe_Ayling.
“Artificial Intelligence Shines Light on the Dark Web.” MIT News | Massachusetts Institute of Technology, 13 May 2019, Accessed Date 11th June 2021, Accessed from news.mit.edu/2019/lincoln-laboratory-artificial-intelligence-helping-investigators-fight-dark-web-crime-0513.
BBC News. “Hackers Take down Child Pornography Sites.” BBC News, 24 Oct. 2011, Accessed Date 11th June 2021, Accessed from www.bbc.com/news/technology-15428203.
“Deep and Dark Web Monitoring.” CYFIRMA, 1 June 2020, Accessed Date 11th June 2021, Accessed from www.cyfirma.com/deep-and-dark-web-monitoring.
“Memex (Archived).” Defense Advanced Research Projects Agency, 2014, Accessed Date 11th June 2021, Accessed from www.darpa.mil/program/memex.
“Memex: The next Generation of Deep-Web Search? -.” Defense Systems, 11 Feb. 2014, Accessed Date 11th June 2021, Accessed from defensesystems.com/articles/2014/02/11/darpa-memex-next-gen-search.aspx.
Online, F. “Govt Working on Developing System to Track, Analyse Data from Dark Web.” The Financial Express, 19 Feb. 2018, Accessed Date 11th June 2021, Accessed from www.financialexpress.com/industry/technology/govt-working-on-developing-system-to-track-analyse-data-from-dark-web/1072111.
Orru, Mauro. “Dubious Covid-19 Shots, Fake Vaccination Certificates Proliferate on Dark Web.” WSJ, 5 May 2021, Accessed Date 11th June 2021, Accessed from www.wsj.com/articles/dubious-covid-19-shots-fake-vaccination-certificates-proliferate-on-dark-web-11620207001.
“Playpen” (Website). Wikipedia, Accessed Date 11th June 2021, Accessed from en.wikipedia.org/wiki/Playpen_(website).
Rnewsauthor. “Why Should Domino’s Data Leak Concern Me?– EXCLUSIVE.” Resonant News, Accessed Date 11th June 2021, Accessed from resonantnews.com/2021/06/14/why-should-dominos-data-leak-concern-me.
Silk Road (Marketplace). Wikipedia, 11 June 2011, Accessed Date 11th June 2021, Accessed from en.wikipedia.org/wiki/Silk_Road_(marketplace).
Weimann, Gabriel. “Going Dark: Terrorism on the Dark Web.” Studies in Conflict & Terrorism, vol. 39, no. 3, 2015, pp. 195–206. Crossref, doi:10.1080/1057610x.2015.1119546.
How to cite this article?
|APA Style||Pandey, N., & Pandey, R. (2021). Dark Web – The Hidden Cyberspace. Academic Journal of Forensic Sciences, 04(02), 06–14.|