Dark Web The Hub of Crime
Dark Web The Hub of Crime
Dark Web The Hub of Crime
https://doi.org/10.22214/ijraset.2022.46577
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IX Sep 2022- Available at www.ijraset.com
Abstract: Now days Internet plays a significant role in our daily life. It’s become an essential part of all daily lifestyle. Dark Web
is like an untraceable secret layer of the Internet which basically used to store and access the sensitive and confidential data. But
we can see the huge misuse of this platform for conducting the criminal and illegal activities in a hidden way. In this paper, we
are going to discuss about the overview of dark web and many browsers those are used to access dark web. We also discuss about
the methods used in Dark web for anonymity and confidentiality.
Here some interesting facts are also discussed about dark web and the different types of crimes to create awareness about this
type of activities and the preventive action for these activities.
Keywords: Dark Web, Tor Browser, Onion Routing, Silk Road, Red Room.
I. INTRODUCTION
In this technological world, web security has become a vital area of concern as most of users visit online for full fill their needs. As
the Internet continued to grow in the middle of 1990s it had come to transform so many things. The biggest change is instant
communication. If you have an Internet connection, you can talk to anyone instantly.
But the Internet was not structured with elements like privacy, security and anonymity in mind, it is the main concern. So, every
single thing can be tracked. But some people are very worried about their privacy and security. So, the dangerous, colossal secret od
internet is dark web.
Today’s number one source for stolen information and criminal services is as interesting a talking point as it is dangerous to browse.
Whether we are talking about the sensitive personal information stolen in the Equifax breach, personal healthcare information stolen
in the Anthem breach and the credit/debit card information stolen in the argot breach, they all have at least one thing in common:
this stolen information eventually makes its way to the dark web to be sold and purchased.
Dark web cannot be accessed by regular web browsers like google chrome, internet explorer or Mozilla Firefox. The most common
tool for accessing the dark web remains a browser called Tor, or “The Onion Router,” which was created by the military to protect
oversea communications.
1) Surface Web: The first part is surface web, the surface web which is also known as the visible web, index-able web, or clearnet
is content on the world wide web. The surface web is what users’ access in their regular day-to-day activity. It is available to
the general public using standard search engines and can be accessed using standard web browsers that do not require any
special configuration, such as Mozilla Firefox, Microsoft's Internet Explorer or Edge, and Google Chrome [1]. Some of the
examples of surface web are Google or Yahoo. Facebook, YouTube, Wikipedia, Regular Blogging Websites, and basically
everything that we can see on any search engine's result page.
2) Deep Web: The second part is deep web, the deep web which is also called as hidden web or invisible web, the deep web is
different from the surface web. The deep web helps people to maintain privacy and freely express their views. Privacy is
essential for many innocent people terrorized by stalkers and other criminals. It is used for keeping internet activity anonymous
and private, which can be helpful in both legal and illegal applications. While some use it to evade government censorship, it
has also been known to be utilized for highly illegal activity [2]. Example of Deep Web includes email messages, chat
messages, private content on social media sites, electronic bank statements, electronic health records (EHR) and other content
that is accessible one way or another over the internet.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 95
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IX Sep 2022- Available at www.ijraset.com
Surface Web
Deep Web
Dark Web
3) Dark Web: The final part is Dark Web, the dark web is known to have begun in 2000 with the release of Free net, the thesis
project of University of Edinburgh student Ian Clarke, who set out to create a "Distributed Decentralized Information Storage
and Retrieval System." Clarke aimed to create a new way to anonymously communicate and share files online [3]. The dark
web is a network that constitutes a part of the global Internet platform not indexed by search engines, which requires some form
of authentication to gain access. Such authorization may require using specific software, such as proxy software, to gain access
to the dark web websites. Some of the examples of dark web include human trafficking, drug trade, weapons dealing to name a
few. There are various reasons to stay off the dark web. However, at the same time, it's a place worth visiting too. The dark web
isn't for everyone, but some of it is worth exploring. Some examples for dark web websites include Tor, DuckDuckGo,
ProPublica, SecureDrop, Ahmia etc [4][5].
Now, the easiest way to use Tor is to get a Tor browser, which functions as any other browser would. Tor helps us to reroute our
web requests through a series of proxy nodes, chosen at random and located anywhere in the world. That way your connection
won’t be traced back to you [8].
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 96
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IX Sep 2022- Available at www.ijraset.com
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 97
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IX Sep 2022- Available at www.ijraset.com
6) Close Everything: All of the browser windows and any other related content that may be connected need to be closed properly.
Shut down the whole Tor browser. If we've used TAILS, quit the operating system and reboot back into our usual interface.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 98
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IX Sep 2022- Available at www.ijraset.com
VII. CONCLUSION
The dark web is a collection of thousands of websites that use anonymity tools like Tor and I2P to hide their IP address. While it's
most famously been used for black market drug sales and even child pornography, the dark web also enables anonymous
whistleblowing and protects users from surveillance and censorship.
In order to protect people’s privacy and security, it is necessary to take action and address the issue of the encrypted nature of the
dark web. The anonymity provided by complex algorithms which protect users’ identities and deletes traces of them being on
websites let to the most of the illegal and malicious activities to be performed on the dark web. The sheer difficulty of the dark web
regulation let to the establishment of weapons and drugs marketplaces, and whole networks of websites used by terrorists for
communication and propaganda.
There is a fine line between anonymity for the sake of privacy and anonymity as a cover for illegal activities. The encrypted nature
of the dark web is a major challenge for the governments, and establishing new measures for tracking and preventing illegal and
malicious activities on the dark web should be any countries’ priority.
REFERENCES
[1] Jamie, B. (2014). The Dark Net.
[2] Lightfoot, S., & Pospisil, F. (2017). Surveillance and privacy on the deep Web. ResearchGate, Berlin, Germany, Tech. Rep.
[3] Senker, C. (2016). Cybercrime & the Dark Net: Revealing the hidden underworld of the internet. Arcturus Publishing.
[4] Henderson, L. (2022). Tor and the dark art of anonymity (Vol. 1). Lance Henderson.
[5] Diodati, J., & Winterdyk, J. (2021). Dark Web: The Digital World of Fraud and Rouge Activities. In Handbook of Research on Theory and Practice of
Financial Crimes (pp. 477-505). IGI Global.
[6] Gehl, R. W. (2018). Weaving the dark web: legitimacy on freenet, Tor, and I2P. MIT Press.
[7] Ozkaya, E., & Islam, R. (2019). Inside the dark web. Crc Press.
[8] Inside the Dark Web – Erdal Ozkaya, 2019
[9] Beckstrom, M., & Lund, B. (2019). Casting light on the Dark Web: A guide for safe exploration. Rowman & Littlefield.
[10] Martin, J., Munksgaard, R., Coomber, R., Demant, J., & Barratt, M. J. (2020). Selling drugs on darkweb cryptomarkets: differentiated pathways, risks and
rewards. The British Journal of Criminology, 60(3), 559-578.
[11] Chesney, B., & Citron, D. (2019). Deep fakes: A looming challenge for privacy, democracy, and national security. Calif. L. Rev., 107, 1753.
[12] Davenport, D. (2002). Anonymity on the Internet: why the price may be too high. Communications of the ACM, 45(4), 33-35.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 99