Cybercrime: Evaluating Pros and Cons of the Dark Net's Impact

Verified

Added on  2022/11/25

|11
|3542
|203
Essay
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBERCRIME
Evaluating Pros and Cons of Dark Net
Name of the Student:
Name of the University:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBERCRIME
Table of Contents
1. Introduction............................................................................................................2
2. Concept of Dark Net as a secure form of communication.....................................2
3. Pros of Dark Net.....................................................................................................3
4. Cons of Dark Net....................................................................................................4
5. Evaluation of Dark Net value to society.................................................................6
6. Conclusion.............................................................................................................8
References...................................................................................................................9
Document Page
2CYBERCRIME
1. Introduction
Dark Net is known as computer network using limited access, which is utilized
mostly the unlawful peer-to-peer contribution of files. It is overlay network to the
Internet which is only accessed by particular software, configurations as well as
authorizations. It is used as non-standard communication protocols to purposely
unreachable by Internet (Bartlett,2015). The purpose of Dark Net is collecting
thousands of websites, which is used anonymity tools such as Tor, I2P for hiding
the IP addresses. It enables anonymous whistleblowing as well as protects the
users from the surveillance plus censorship. It is such a network which is not
indexed by the search engines like Google and Yahoo. The systems are
accessible to particular group of people as well as not to the popular internet
community. It is only available using approval, software, plus configurations
(Spagnoletti, Ceciand Bygstad, 2018). The harmless places by use of dark net
are academic databases, corporate sites, hacking as well as piracy.
The paper is based on the advantages and disadvantages of Dark Net and
summarizes the concept using a secured form of communication. There is an
evaluation of the dark net as value for society. It is a form of communication
among whistleblowers plus journalists which are facilitated using Dark Net Tor
Network through using the applications included SecureDrop.
2. Concept of Dark Net as a secure form of
communication
The term Dark Net was coined in the year 1970 for referring to the computer
networks which are remoted from “Advanced Research Projects Agency Network
(ARPANET)” for safety purposes. The dark nets obtain communication from
ARPANET. The sites of dark net are not being indexed using search engines as it
is not accessible to them (Owen and Savage, 2015). The academic databases
are available to the facility plus students, while the commercial networks are only
accessible to the workers. As a part of the dark net, the selected sites are peer-
to-peer networks plus self-hosted internet sites.
Buxton and Bingham(2015) pointed that dark net is portrayed as a domain
which is frequently used by the criminal elements and created plus used by
Document Page
3CYBERCRIME
people those are required privacy for the legal reasons like sharing of business
information related to proprietary. The data is being exchanged throughout
connections of an encrypted peer-to-peer network and use of overlay networks
like Tor. The dark net is a type of virtual private network with measures to
formulate that the , as well as IP addresses of customers, are not discoverable.
The purpose of this is to hide the communications so that it is secured (Moore
and Rid, 2016). The members those are joined with expectations can share
information and also files with the risk of detections. The complex routing system
is made difficult to trace the communication among two users.
The purpose of the dark net is to offer a location for private communication
when the community communication is being unwanted as well as not permitted.
For example, in Egypt, the Mubarak regime had shut down the Internet of their
nation; therefore, political dissidents are being used Tor dark net for maintaining
communications with the entire world. Van Buskirk et al. (2017) concluded that
dark nets are being used for network security testing. The manager is set apart
with a piece of the unused IP addresses gap for dark net as well as configured
network monitoring devices for detecting the traffic headed to IP addresses in the
range. As no such legitimate systems are running on dark net, therefore traffic for
addresses in it is from malicious plus misconfigured system (Bancroft and Reid,
2016). Dark nets are used to detect system which is infected by worms plus
malicious programs as well as an attempt to spread over the network.
3. Pros of Dark Net
The dark net is a hidden network which is not accessed and found on the
standard search engines as well as browsers. Access to the particular software is
required Tor Browser, which can allow the users to hide identity plus the online
activities behind various layers of the encryption method (Omand, 2015).
Following are the advantages of the dark net usage, which are summarized
below:
Freedom of information: Accessing the background information is not only
benefited surfing to the dark net. Another advantage is that it can promote
freedom of information while it unlocks the hidden information (Nunes et al.
2016). Knowledge is a power as well as a network of dark net of the cloud
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CYBERCRIME
servers; encrypted information plus hidden webpages are allowed people to hit in
huge virtual libraries. For example, the bank account holder has not wanted
others to Google the bank account number (Hurlburt, 2017). The bank related
information are hidden as well as encrypted by the bank. Each time the user logs
on the account, it can access to dark net for checking the balances.
Anonymity: The dark net provides with anonymity which is a part of freedom
of speech into cases where it is destructive to voice the opinions. It is co-
operative for those whose are regular wronged by the dictators for the political
stances. The users are preferred to hide the identities in order to avoid political, ,
plus social harassments (Maddox et al. 2016). In order to ensure that IP
addresses are not tracked, there is additional extra layer of security where there
is a log in to Tor via the VPN network. Anonymity is not an offence; it is identified
as legal documented rights.
Political activism: The dark net results in speaker for the noble causes. The
information is considered as powerful data for regimes, and movements of
citizens on www are being monitored to escapediffusion of the innovatory ideas.
Blocking of websites is one which is connected to social media is a main degree
in repressive situations (Ozkayaand Islam, 2019). It is such a context where the
browser like Tor is appeared as solution to enable safe and secure
communication. It also permits international denounce for certain environments.
The dark net is playing a key role in the historical events like Arab Spring.
Knowledge: The dark net is stored larger virtual libraries that the user can
imagine (Fachkhaand Debbabi, 2015). It is a space for the researchers, students
plus teachers as they are finding in dark net will more credible and not available
from the standard search engines.
Amazing individuals: The dark net community plays a key role to have
access to the concerns of the individual’s responsibilities plus judgements
(Biswas, Fidalgoand Alegre, 2017).
4. Cons of Dark Net
The dark net is some of the cases are damaging to the psychological states.
The underground communities are sources of illegal materials such as drugs and
Document Page
5CYBERCRIME
others which are done through using the website of dark net. Coming to the
contract with those materials, there is negative effect on people and the
organization for its usage among the public (Bayoumy, Melandand Sindre, 2018).
Following are the disadvantages of the dark net usage which are summarized as
below:
Unverified content: Using the dark net, there are many unverified things are
happened which are illegal. Creator of Silk Road was being under arrest by the
Homeland security investigations for their place as well as hired hitman to murder
six persons even though the chargers were crashed. In the dark net, there is
urban legend which one can search for live murders on dark net (Cortes, 2018).
“Red Room” was being coined dependent on Japanese animation as well as
urban tale of similar name. The evidences are pointed towards reported
situations being hoaxes. Therefore the dark net sites are also used in case of
hiring of contract killers.
Phishing and scams:The phishing as well as websites are the scam sites
which are numerous with the dark net markets and are advertised by means of
fraudulent URLs (Lacsonand Jones, 2016).
Terrorism:There are some of the real as well as fraudulent websites which
are claimed to use by means of ISIL, included fake one seized into the operation
Onymous (Everett, 2015). There are many terrorism groups which are found to
be operated on the dark net at once a time.
Buying of drugs:There is a notorious dark net site known as Silk Road which
was alleged to the virtual market of the narcotics, where the users are buying the
drugs of their choice into smaller amounts plus wholesale lots (Martin et al.
2018). Once FBI has taken down the site, while after that the site is called as Silk
Road 2.0 which is appeared again and resumed the business as possible.
Difficulty in regulation: It is critical to regulate the dark net, therefore the
user should browse as well as interact with people at its own risks (Moore and
Rid, 2016). As there are many content to be analyzed, dark web search engines
are tend to be slower as compared to standard search engines. The dark web
searches are reserved for painstaking research, and not for easy questions as
well as basic web surfing (Maddox et al. 2016). The dark net searchers are
Document Page
6CYBERCRIME
required to provide with sensitive personal information from the restricted
database and create ethical dilemmas. It leaves the individuals to be susceptible
towards fraud as well as identify of the thefts.
Computer security:The dark net is such a place where there is hacking of
information as well as data in the computer, and the interested parties are
required to learn about, as well as stop the digital attacks along with crime. The
users should concern about the computer security by downloading of binary files
from untrusted sources as they are dangerous for the new strains of malware
(Fachkhaand Debbabi,2015). The damaging malware can infect the computers
throughout the dark net before it can spread over the machines by means of
networks plus distribution channels. Only the knowledgeable computer users
should able to look through the dark net as they should alert of dangers such as
viruses by means of JavaScript extension that can wait there. Tor Browser is an
application which is used to access to the dark net but it is not secured. ( Owen
and Savage, 2015)There are various vulnerabilities which can affect security of
the users of Tor Browser as well as its nodes.
Privacy concerns: The new users of the dark net are identified that they
should employ secured alias when registering to the examination on subversive
network. It is created new as well as random names which is not associated with
real names and recognized or email accounts. It becomes easier for someone for
tracking down if they are using identical alias on various networks or services
(Bancroft and Reid, 2016).Paying to the users should identify that they can
evaluate the decision by means of compensation card at the time of processing
transactions. Bitcoins is considered as standard payment method.
5. Evaluation of Dark Net value to society
Dark Net is 99% of Internet which the internet users are not able to Google.
The Internet is contained 4.5 billion of websites which are indexed by the search
engines as per the researchers. There are small number of users those are
accessing to the dark net (Bayoumy et al. 2018). The Tor Project has claimed
that there are 1.5% of entire traffic on anonymity network is to perform with the
hidden sites as well ad there are around 2 million of people per day used of Tor
Browser in total number. The Tor web browser is used to access to the dark net
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CYBERCRIME
as it can provide the users with anonymity while there is browsing of the Internet.
The society and policy makers can gain an understanding of the dark net so that
they can enact with an effective policy of the dark net (Moore and Rid, 2016). The
dark net is a popular topic into the cyber security circles as it discusses
anonymous nature of dark net for facilitating the criminal activities. There is an
achievement of dark net in the society by a variety of characteristics which are
entrenched into the technical structure of Dark net like privacy along with usage
of cryptocurrencies (Owen and Savage, 2015). It is seen that anonymous nature
of dark net is amplified towards threats of losing of identity. The dark net is
division of deep web which is estimated to be 400-500 times outsized as
compared to surface web or Internet which is mostly used by the users.
The dark net is used for various social purposes as well as activities such as
criminal activities into the virtual market, cyber security threats and whistle
blowing. Online anonymity is offered by dark net is being used for various
common purposes. The individuals can able to share social beliefs and also
disagreements with prospects, and governments lacking of fear to the retributions
(Spagnoletti, Ceciand Bygstad, 2018). The journalists, and whistle blowers are
used dark net for communicating with outside of the world and encourage social
changes plus political reforms without need to disclose the identity. The
organizations are required to keep the electronic data exchange into secured
places. It is used a social activity threats towards cyber security as hacking tools
can use to attack the organizations and other individuals those are trading in the
dark net markets. Malware is a threat and it is used to communicate as well as
exchange of data and information. The Mevade Bolnet is increased to around 5
million of daily users after incorporation of the Tor network (Buxton and Bingham,
2015). The ChewBacca malware is used tor network for getting victims IP
addresses as well as record the keyword strokes. I2Ninja malware is used for
maintaining a secured communications among infected devices, control servers
as well as command throughout I2P hidden networks. The Tor Network is being
indispensable to prevalence towards the ransomware applications. The dark nets
plus bitcoins are offered with profitable businesses for the criminals.
Document Page
8CYBERCRIME
6. Conclusion
It is concluded that dark net is a portrayed of den of the mysterious as well as
illicit activities. It is an anonymous which creates sanctuary for the cybercriminals
as well as political dissidents. It is required to understand the concept of dark net
so that its usage is monitored. The site is able to access throughout service like
Tor and it is not accessed throughout Internet. The dark site is required users to
input to its innovative Tor address. The dark webs sites consist of extra layer of
the safety as well as it is required users to input the password. It is required to
identify that most of Tor’s users are not required to access dark net for illegal
conditions. It is used to surf the surface web as they are situated in the state and
it is not have free as well as open admission to the Internet. It is just to be a
isolation minded. The Tor users are used the dark net platform to access
personal information and for criminal purposes.
Document Page
9CYBERCRIME
References
Bancroft, A. and Reid, P.S., (2016). Concepts of illicit drug quality among darknet
market users: Purity, embodied experience, craft and chemical
knowledge. International Journal of Drug Policy, 35, pp.42-49.
Bartlett, J., (2015). The dark net: Inside the digital underworld. Melville House.
Bayoumy, Y.F.F., Meland, P.H. and Sindre, G., (2018), June. A Netnographic Study
on the Dark Net Ecosystem for Ransomware. In (2018) International Conference On
Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA) (pp. 1-8).
IEEE.
Biswas, R., Fidalgo, E. and Alegre, E., (2017). Recognition of service domains on
TOR dark net using perceptual hashing and image classification techniques.
Broséus, J., Rhumorbarbe, D., Mireault, C., Ouellette, V., Crispino, F. and Décary-
Hétu, D., (2016). Studying illicit drug trafficking on Darknet markets: structure and
organisation from a Canadian perspective. Forensic science international, 264, pp.7-
14.
Buxton, J. and Bingham, T., (2015). The rise and challenge of dark net drug
markets. Policy brief, 7, pp.1-24.
Cortes, S., (2018). Anatomy of a Crime: Secure DevOps or Darknet Early Breach
Detection.
Everett, C., (2015). Should the dark net be taken out?. Network Security, (2015)(3),
pp.10-13.
Fachkha, C. and Debbabi, M., (2015). Darknet as a source of cyber intelligence:
Survey, taxonomy, and characterization. IEEE Communications Surveys &
Tutorials, 18(2), pp.1197-1227.
Hurlburt, G.F., (2017). Shining Light on the Dark Web. IEEE Computer, 50(4),
pp.100-105.
Lacson, W. and Jones, B., (2016). The 21st Century DarkNet Market: Lessons from
the Fall of Silk Road. International Journal of Cyber Criminology, 10(1).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10CYBERCRIME
Maddox, A., Barratt, M.J., Allen, M. and Lenton, S., (2016). Constructive activism in
the dark web: cryptomarkets and illicit drugs in the digital ‘demimonde’. Information,
Communication & Society, 19(1), pp.111-126.
Martin, J., Cunliffe, J., Décary-Hétu, D. and Aldridge, J., (2018). The international
darknet drugs trade-a regional analysis of cryptomarkets. Australasian
Policing, 10(3), p.25.
Moore, D. and Rid, T., (2016). Cryptopolitik and the Darknet. Survival, 58(1), pp.7-
38.
Nunes, E., Diab, A., Gunn, A., Marin, E., Mishra, V., Paliath, V., Robertson, J.,
Shakarian, J., Thart, A. and Shakarian, P., (2016), September. Darknet and deepnet
mining for proactive cybersecurity threat intelligence. In (2016) IEEE Conference on
Intelligence and Security Informatics (ISI) (pp. 7-12). IEEE.
Omand, D., (2015). The dark net: policing the Internet’s underworld. World Policy
Journal, 32(4), pp.75-82.
Owen, G. and Savage, N., (2015). The Tor dark net.
Ozkaya, E. and Islam, R., (2019). Inside the Dark Web.
Spagnoletti, P., Ceci, F. and Bygstad, B., (2018). An investigation on the generative
mechanisms of Dark Net markets.
Van Buskirk, J., Griffiths, P., Farrell, M. and Degenhardt, L., (2017). Trends in new
psychoactive substances from surface and “dark” net monitoring. The Lancet
Psychiatry, 4(1), pp.16-18.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]