Dark Web 2017
Dark Web 2017
Shining Light
on the Dark Web
George Hurlburt, STEMCorp
O
Ultimately, the proliferation of net-
n 6 August 1991, almost a year and a half after works led to the classification of networks as national
proposing the World Wide Web (WWW), phys- (Class A), regional (Class B), or local (Class C) in scope. As the
icist and computer scientist Tim Berners-Lee number of Internet hosts grew, the Domain Name Service
published the fi rst website from his computer (DNS) permitted scalable resolution of hierarchically orga-
at CERN. Today, more than a billion websites continue to nized host names to workable Internet addresses. Today’s
fuel this highly disruptive and transformative technology Internet has 3.5 billion users, which accounts for almost
(www.internetlivestats.com/total-number-of-websites). 45 percent of the world’s 7 billion people (www.statista
To many, the WWW is a wondrous place. We follow the .com/topics/1145/internet-usage-worldwide). It subsumes
news and weather online, often in near real time. Stream- many networks, only a fraction of which can be seen by
ing videos entertain us or show us how to fi x that pesky the average WWW user.
leaking faucet. We gather data from Wikipedia and other
knowledge banks to answer questions. We keep in touch BEYOND THE WWW:
with distant loved ones and close friends via social media. THE DEEP WEB AND DARK WEB
We increasingly rely on the WWW to purchase goods and The openly searchable Internet, including the entire
services—to the point that the global ecommerce market, WWW, comprises only 6–10 percent of the whole Inter-
estimated to reach $2.3 trillion this year,1 is putting tradi- net.2 The remaining 90–94 percent holds content that is
tional retailers at risk of obsolescence. neither indexed nor cataloged. Much of this private data
The WWW resides on the Internet, whose transforma- includes holdings on corporate Class B and C internal
tive effect is far more immense. In January 1983, the Inter- networks (intranets), email and/or databases, academic
net became a reality when the Arpanet switched from the journals, or individually held information. This region,
Contextual Web Elements of value can be discovered through a history of navigation across websites with common
contextual threads. For example, a unique semantic identity can be linked to an individual based on that
person’s online activity.
Dynamic content A dynamic page appears as a hidden response to a specific query or through submission of a specific element
or set of elements on a form. In either case, the resulting text fields are hard links to discover, much less
navigate, without direct reference to a domain.
Limited access Many websites use a mechanism to limit access to or prevent duplication of their content.
content » The Robots Exclusion Standard or the Robot Standard serves to discourage searching.
» A Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA) requires
users to mimic a random code to assure they aren’t robots.
» A no-store directive serves to prohibit creating cached copies.
Non-HTML content The World Wide Web depends on Hypertext Markup Language (HTML) to perpetuate linkages. Non-HTML
pages are hard to discover and access, as the accepted links are absent.
» Textual content encoded as images, video fi les, or similar visual fi le formats, not discoverable via
search engines, are also difficult to isolate by other means.
» Scripted content involves links produced by JavaScript that are only accessible through links produced
by JavaScript or content that is dynamically downloaded from webservers via Flash or Ajax solutions.
» Specialized software, such as The Onion Router (TOR) or the Invisible Internet Project (I2P)
anonymous peer-to-peer distributed communication network, are required to access content not
otherwise discoverable on the WWW or Internet.
known as the Deep, Hidden, or Invisi- extortion; pedophiles circulating child organized, the Dark Web lacks an
ble Web, tends toward security by ob- pornography; drug, arms, and human ethos except, perhaps, that of “honor
scurity. As such, search and direct ac- traffickers; terrorists spreading propa- among thieves.” Trade is anonymous:
cess aren’t as straightforward as is the ganda, recruiting fighters, and plan- unknown buyers and sellers often
case in the WWW. Table 1 describes the ning attacks; digital media pirates; transact business using bitcoin and
wide range of techniques used to con- and cybermercenaries for rogue-state other crypto currencies. Ironically,
trol access to Deep Web holdings. intelligence services—communicate however, the Dark Web is readily ac-
Embedded within the Deep Web with one another and trade in hacking cessible via The Onion Router (TOR)—
is the Dark Web or Dark Net. It’s here tools, malware, ransomware, and var- freely downloadable, open source
that bad actors of all stripes—script ious illegal goods and services. This software that assures user anonymity
kiddies out to deface websites; pro- underground market is vast enough by disguising actual IP addresses (see
fessional hackers who break into cor- to contain its own search engines, Figure 1).3
porate and government networks to community forums, and rating sys- The Dark Web is a hub of botnet
steal data, wreak havoc, and commit tems just like the WWW. While highly activity. According to the most recent
and disseminates data from publicly crisis. Cybercrime is a cancer, spread- /sites/andygreenberg/2013/11/06
disclosed breaches in an open format ing from the Dark Web into the rest of /silk-road-2-0-launches-promising-a
from various government agencies, the Internet. Eradicating this disease -resurrected-black-market-for-the
media reports, and press releases, will require understanding dynamic, -dark-web/#7280363161c5.
and Gemalto’s Breach Level Index nonlinear network mechanics to pre- 8. A. Greenberg, “Global Web Crack-
(breachlevelindex.com). vent sick cells from clustering into down Arrests 17, Seizes Hundreds
Beyond the goal of detecting and malignant growths that threaten to of Dark Net Domains,” Wired, 7 Nov.
gaining information about cybercrim- stifle the exchange of goods and ser- 2014; www.wired.com/2014/11
inals hiding in the Dark Web, there’s vices worldwide. It ultimately calls for /operation-onymous-dark-web-arrests.
the question of what to do about exploiting advances in big data min- 9. D. Kravets, “Playpen Moderator
them. It’s impractical to root out ev- ing and analytics to create automated Sentenced to 20 Years in Prison,” Ars
ery perpetrator—investigations are mechanisms that systematically iden- Technica, 7 Feb. 2017; arstechnica
time-consuming and expensive and tify and eliminate cybercriminals. .com/tech-policy/2017/02/moderator
often require simultaneous raids by -for-darknet-child-porn-site-playpen
multiple law enforcement agencies at REFERENCES -gets-20-years.
locations around the world as well as 1. “Worldwide Retail Ecommerce Sales 10. J. Greuel, “It Took 4 Years to Take
costly, lengthy legal proceedings. In Will Reach $1.915 Trillion This Year,” Down ‘Avalanche,’ a Huge Online
many cases, the criminal enterprise eMarketer, 22 Aug. 2016; www Crime Ring,” Wired, 2 Dec. 2016;
itself is small but, because of its huge .emarketer.com/Article/Worldwide www.wired.com/2016/12/took
online reach, does far more extensive -Retail-Ecommerce-Sales-Will-Reach -4-years-take-avalanche-huge
economic damage than comparable -1915-Trillion-This-Year/1014369. -online-crime-ring.
syndicates in the pre-Internet days. 2. M.K. Bergman, “The Deep Web: 11. A. Verma, “20% of the Dark Web
Consequently, we might have no Surfacing Hidden Value,” J. Electronic Taken Down by Hacker, Here’s How
alternative than to fight fire with fire Publishing, vol. 7, no. 1, 2001; quod.lib He Did It,” Fossbytes, 6 Feb. 2017;
and employ the same tactics used by .umich.edu/j/jep/3336451.0007.104 fossbytes.com/20-dark-web-taken
Dark Web sites against them, includ- %20?view=text;rgn=main. -anonymous-hackers.
ing DDoS attacks and malware infiltra- 3. M. Chertoff and T. Simon, The Impact 12. Center for Strategic and Int’l Studies,
tion. This approach, however, would of the Dark Web on Internet Governance Net Losses: Estimating the Global Cost
require carefully crafted guidelines and Cyber Security, Centre for Int’l of Cybercrime; Economic Impact of Cy-
to avoid ensnaring legitimate users Governance Innovation and Cha- bercrime II, June 2014; www.mcafee
or causing other unintended negative tham House, Feb. 2015; www.our .com/us/resources/reports/rp
consequences. Although most Dark internet.org/sites/default/files -economic-impact-cybercrime2.pdf.
Web content is illicit,29 not all TOR us- /publications/GCIG_Paper_No6.pdf. 13. J. Moar, The Future of Cybercrime &
ers are cybercriminals; journalists, po- 4. “Cybersecurity Experts Uncover Security: Financial & Corporate Threats
litical activists, and citizens in coun- Dormant Botnet of 350,000 Twitter & Mitigation 2015–2020, Juniper Re-
tries with extreme censorship also use Accounts,” MIT Technology Rev., 20 search, 5 Dec. 2015; www.juniper
the software to provide anonymity. Jan. 2017; www.technologyreview research.com/researchstore/strategy
.com/s/603404/ cybersecurity -competition/cybercrime-security
-experts-uncover-dormant-botnet /financial-corporate-threats
W
ith the Internet’s explosive -of-350000-twitter-accounts. -mitigation.
growth, vast, intertwined 5. D. Segal, “Eagle Scout. Idealist. Drug 14. A. Ross, “Want Job Security? Try
networks now underlie ev- Trafficker?,” The New York Times, 18 Online Security,” Wired, 25 Apr. 2016;
ery facet of life, from commerce to en- Jan. 2014; www.nytimes.com/2014 www.wired.co.uk/article
tertainment to communication. Such /01/19/business/eagle-scout-idealist /job-security-cybersecurity-alec-ross.
networks are continually changing, -drug-trafficker.html. 15. S. Morgan, Cybersecurity Market
making it difficult to predict their evo- 6. A. Greenberg, “Silk Road Creator Report: Q 1 2017, Cybersecurity Ven-
lution. This reality can be unsettling— Ross Ulbricht Sentenced to Life in tures, 17 Feb. 2017; cybersecurity
even scary—when applied to activity Prison,” Wired, 29 May 2015; www ventures.com/cybersecurity
driven by humanity’s darker side. .wired.com/2015/05/silk-road-creator -market-report.
In dealing with cybercrime, the -ross-ulbricht-sentenced-life-prison. 16. Endpoint Security Market by Solution
security community must rethink 7. A. Greenberg, “‘Silk Road 2.0’ (Anti-Virus, Antispyware/Antimal-
its approach. Endpoint protection is Launches, Promising a Resurrected ware, Firewall, Endpoint Device Control,
important but will never address the Black Market for the Dark Web,” Intrusion Prevention, Endpoint Appli-
source of the growing cybersecurity Forbes, 6 Nov. 2013; www.forbes.com cation Control), Service, Deployment
got flaws?
Design: What and Why?,” ACM SIG-
COMM Computer Communication Rev.,
vol. 37, no. 3, 2007, pp. 59–64.
22. Safety and Security on the Internet:
Challenges and Advances in Member
States, World Health Org., 2011; www
.who.int/goe/publications/goe
_security_web.pdf.
23. A. Greenberg, “It’s About to Get Even
Easier to Hide on the Dark Web,”
Wired, 20 Jan. 2017; www.wired.com
/2017/01/get-even-easier-hide-dark
-web.
24. A. Greenberg, “Monero, the Drug
Dealer’s Cryptocurrency of Choice, Is
on Fire,” Wired, 25 Jan. 2017; www Find out more and get involved:
.wired.com/2017/01/monero-drug
-dealers-cryptocurrency-choice-fire.
cybersecurity.ieee.org
25. E. Nunes et al., “Darknet and
Deepnet Mining for Proactive
Cybersecurity Threat Intelligence,”
arXiv:1607.08583, 2016; arxiv.org
/pdf/1607.08583.pdf.
26. C. Farivar, “Feds May Let Playpen
Child Porn Suspect Go to Keep