logo

Cyber Crime - Pros and Cons of Dark Net

Rubric for evaluating an essay on the potential consequences of politically motivated hacking, pros and cons of the Dark Net, or the effectiveness of outlawing payments in ransomware attacks.

9 Pages3265 Words11 Views
   

Added on  2022-08-17

Cyber Crime - Pros and Cons of Dark Net

Rubric for evaluating an essay on the potential consequences of politically motivated hacking, pros and cons of the Dark Net, or the effectiveness of outlawing payments in ransomware attacks.

   Added on 2022-08-17

ShareRelated Documents
CYBER CRIME
STUDENT DETAILS
STUDENT DETAILS
Cyber Crime - Pros and Cons of Dark Net_1
Dark Web 1
Internet has the primary elements that operates all over the server. Surface internet, deep
internet and dark internet. Dark Web is the sub part of the internet which is entirely different
as compare to the general internet surfing web serves such as http://firefox.com ,
http://chorme .com, etc. Dark Net is the part of the Dark Web that operates for hidden or
anonymous communication. Dark Web and Dark internet are two different concepts. Dark
Web contains customized software and information that is for internal use or limited to the
access of their management only (Anderson, et. al., 2019). For example: a student can easily
fill his/her exam registration form over the internet but they cannot access to the internal
database of the exam department that stores sophisticated information, licenses, research
papers, etc. Dark Web provides them the medium through which private web can be accessed
for entering into hidden networks. In this essay, there will be discussion about the pros and
cons of Dark Net with sophisticated arguments about their utilization.
Origin of Dark Net and its fundamental purpose
Dark Net (DN) was coined at first in the digital networking era of 1970s. It was design to
designate isolated networks from ARPANET (legal military operations website). At that time
DN server received data from ARPANET but it do not appears in the listed network. DN was
actually created by the government of United States with a prime motive of sharing
information in completely anonymously way. Fundamentally, this technological server was
developed by the US military researchers and DN can only be accessed through TOR (The
Onion Router) browser. TOR was developed by three computer scientists name as Paul
Syversin, Mike Reed, and David Goldshlag. Initially, it was design to fulfil the expectations
of US Defence Advance Research Projects Agency. However, the working of DN has come
far away from the expectations of the US governments. As while creating DN, US military
expects that the functioning of DN will only limited to the anonymous military activities but
DN has crossed their expectations because in today’s era DN is also utilizing for carrying
illegal activities such as drug dealing, child pornography peddlers, killing someone, hacking
bank accounts, etc (Benjamin, Valacich & Chen, 2019).
However, the primary purpose of creating TOR browser is to provide anonymous access and
it was creating for a positive motive but with the help of Deep Web, advanced browser like
TOR started incorporating the norms of Dark Net. Currently, in DN activities like contracting
killing or hiring hitmen (it is true and it is also possible that by the time I am writing about
contracting killing on DN, someone is making contract with hitmen for killing someone),
Cyber Crime - Pros and Cons of Dark Net_2
Dark Web 2
hacking an individual’s PayPal account, weapon dealing, child pornography, terrorist
activities, buying or selling all kind of drugs, leaked private videos of an individual, etc.
Since the origin, numerous changes are made in the payment methods and from long time all
the payments are transferring through bitcoins and others forms of crypto currency (Fidalgo,
et. al., 2019).
For making it untraceable or next to impossible to trace, it incorporates the Onion Router
because it incorporates the structure of onion (layer after layer) which resultant in making
websites completely anonymous. Over 30,000 websites are primarily host on the “.onion”
domain in effective and efficient way. This onion like structure programming of the DN
server helps TOR for making information completely non traceable. However, United States
is the only country which is currently started working in their research centre for making
program which can trace the locations of the users (Finlay & Payne, 2019).
Pros of Dark Net
Dark Net and server like TOR have various benefits which empower a user to enhance the
quality of their life in effective and efficient way possible. DN allows people to circumvent
censorship, it also allows them to access illegal market to improve their quality of life, deep
web or DN also allows students to study various research papers. Apart from this, major pros
of DN also includes political dissidents as when an individual disallowed to put his/her views
because of dictatorial ships then with the help of DN or deep web users can share their
thoughts about the functioning of their respective governments without having the fear of
being noticed or traced by the government officials. Moreover, not only this, DN is also used
for showing shadow of any public or private limited companies. As people can get
information about the internal misconduct, mismanagement or malfeasance related activities
of an organization by analysing their internal database. All these benefits are effectively
incorporates because of the applications of TOR project site. As TOR is the Onion Router
which is a home to a network (Gioe, Goodman & Wanless, 2019).
By understanding above section, it can be said that Dark Net also has a positive side but it is
true that the side of DN is only 10 to 15% positive and rest of the side of DN incorporates
deep negativity which empower illegal activities. Although, even after having a little bit
positive side, it is strongly advised that people should stay away from the Dark Net. If they
require any material for study purpose (like research paper) and entertainment purpose (like
Netflix passwords) then it is advisable to them that purchase that specific content instead of
Cyber Crime - Pros and Cons of Dark Net_3

End of preview

Want to access all the pages? Upload your documents or become a member.