Dark Web Explained: Shining a Light on Dark Web Activity

Dark Web Explained: Shining a Light on Dark Web Activity

September 6, 2017 • Stephen E. Arnold

The dark web is a subset of the World Wide Web accessible by means of special software, allowing users and website operators to remain anonymous or untraceable. Websites on the dark web operate in their own unique environment, separated from surface sites such as Amazon, eBay, or the Wall Street Journal.

Although strongly discouraged, it is possible to visit dark web sites that sell a wide range of products and offer services with any popular browser. Just navigate to www.tor2web.org and check out sites like the Dark Wiki or one of another 30,000 websites. Many of these offer access to contraband, controlled substances, forged passports, counterfeit currency, and information that is available on the surface web.

How to Access the Dark Web

The research team behind the “Dark Web Notebook: Investigative Tools and Tactics for Law Enforcement, Security, and Intelligence Organizations” recommends that dark web access be gated through the Tor software bundle.

This collection of a web browser and privacy-focused add-ons flips on the dark web’s overhead lights. You can download the Tor bundle at www.torproject.org/download/download.html.

Keep in mind that law enforcement and intelligence authorities may monitor Tor downloads, and in some countries, downloading Tor is a signal of possible wrongdoing.

The dark web operates without many controls. Average shoppers can place an order after supplying only minimal information. Some vendors, however, require a referral or positive ratings from other vendors.

Several important features of the dark web are:

  • The Tor software is a bundle of tools that help limit a website’s interactions with the user’s system — including a version of the Firefox browser, encryption features, components to route traffic through multiple Tor relay servers (which makes tracking user behavior more difficult), and utilities like NoScript. “Dark Web Notebook” recommends what it calls “the full Snowden,” which is the use of the TAILS operating system and other tools such as the Tor Browser.
  • For now, the dark web is a digital location where secrecy is enforced through encryption, reputation, and systems designed to prevent law enforcement, security, and intelligence personnel from eavesdropping on communications or having direct access to network traffic among Tor users, servers, and websites.

Two points about the dark web to note:

  • First, encryption and routing across Tor relays can make dark web access sluggish. Impatience can lead to errors, and those mistakes can compromise the security of the session.
  • Second, some dark web sites are operated by law enforcement and intelligence entities. The idea is to obtain the identity of the site visitors and take appropriate legal action. The FBI operated a child pornography website for a period of time. The data collected allowed authorities to make hundreds of arrests worldwide.

3 Little-Known Facts

During the course of research for the notebook, the study team uncovered a number of little-known facts about the dark web.

The dark web is going to become more important. As companies like Facebook and Google filter for hate speech, those who want to disseminate this type of information will look for alternative outlets. Countries are also stepping up their censorship efforts. China’s aggressive program will attempt to monitor comprehensively real-time content streams. The dark web offers social media, video, and communication tools comparable to those in use by people who routinely access the surface web. The dark web attracts about two million users per month, but the censorship squeezing of the surface web will force those looking for terrorism-related information, contraband, and more secure ways to exchange content to migrate to the dark web.

Dealing with the security and obfuscated packets requires specialized tools. The “Dark Web Notebook” provides a discussion of free and open source tools. A special feature of the book is a listing of the Defense Advanced Research Projects Agency’s open source MEMEX program software. The book also profiles a number of companies offering specialized indexing and analytic services for dark web content. Among the companies highlighted are IBM and its Analyst Notebook tool,* Palantir Technologies and its Gotham system, and Recorded Future’s threat intelligence product.

Analysts — whether in government or commercial enterprises — will have to become familiar with the dark web. It is critical to understand the type and degree of security threat posed by sites which sell Uber accounts, valid credit cards and PayPal accounts, and confidential company information, as well as the readily available exploits, malware, and hacks offered on dark web forums. Because more aggressive censorship of the surface web is now taking place, understanding the dark web’s positive and negative aspects will fill in a knowledge gap for those unfamiliar.

Learn More

To discover more insights into the dark web, the table of contents for the “Dark Web Notebook” is available at www.xenky.com/darkwebnotebook.

Stephen E. Arnold

Stephen E. Arnold’s career includes work at Halliburton Nuclear Utility Services and Booz Allen Hamilton. He built and sold several start-up ventures including The Point Internet Service. He and his team built the online system for the Threat Open Intelligence Gateway (TOSIG) for the US government. He is the author of “The Google Legacy” (2005), “Google Version 2” (2007), and “Google: The Digital Gutenberg” (2009). In 2015, he published “CyberOSINT: Next Generation Information Access.” He is a Summa cum laude graduate of Bradley University and he has completed work on his PhD at the University of Illinois.

* Disclosure: The author of the “Dark Web Notebook” was an adviser to i2 Group Ltd., the developer of the Analyst’s Notebook system. The book provides a list of more than 18 other companies with dark web capabilities for business, financial, and government applications. Many of these firms are not “household names.”

New call-to-action

Related Posts

How Predict 2020 Disrupted the Status Quo

How Predict 2020 Disrupted the Status Quo

October 9, 2020 • The Recorded Future Team

While Predict 2020 looked a bit different this year, the world’s largest security intelligence...

What to Expect at Predict 2020

What to Expect at Predict 2020

September 30, 2020 • The Recorded Future Team

On October 5–8, 2020, more than 5,000 security professionals from the most influential...

Elite Security Intelligence That Moves at the Speed of Business

Elite Security Intelligence That Moves at the Speed of Business

September 1, 2020 • The Recorded Future Team

All security and IT teams are tasked with keeping up with the speed of their business while...