The Dark Side: The “Dark Web”- You’ve heard about it, now LET’S TALK ABOUT IT.

Share This Post

The Dark Side: The “Dark Web”- You’ve heard about it, now LET’S TALK ABOUT IT.

Your web. My web. Deep web. DARK web….. The dark web, by now I am certain that you’ve heard the term at least a time or two, if not, let’s just say you’re welcome in advance. The dark web is not a new concept, yet for those unfamiliar it may seem as though it is. The dark web is a branch of the deep web, the portion of the web that cannot be accessed through search engines such as Google or Bing. In fact, much of the criminal activity that takes place on the internet lies within the dark web largely due to the fact that the environment is private and accessible only through a private web browser that basically deidentifies the user, completely (well criminals think so).

How exactly does The Dark Web work?

To understand how the dark web operates, you first must understand the components that make it accessible, like the tor browser. A tor browser allows users to browse the internet privately in manner in which they can explore the internet and each website that they visit is isolated, making it impossible for ads and trackers to identify browsing history. The tor browser typically has multi-layer encryption and reduces the risk of surveillance and fingerprinting. The tor browser is then coupled with VPN access to provide an extra layer of privacy. The VPN encryption secures the users privacy by preventing the Tor entry node from identifying user details that can pin point the users IP address. The VPN server does store data that is essential (identifiable information), so users typically use a VPN network that they are familiar with and that they feel they can trust.

Once the user has successfully installed a tor browser and a VPN network, they are ready to access the dark web. When a user becomes familiar with the dark web, they will typically change the location or URL of their illegal offering frequently, further increasing their level of privacy and decreasing their chances of being surveillanced.

The Dark Web, how dangerous is it?

Like everything else you can imagine, tor browsers and the dark web were not created to provide easier access to illicit activities, but the reality is the dark web is like a communal playground for criminals. The opportunity to conduct criminal activity in an environment where a user is likely untraceable is a recipe for disaster. Most people would be surprised by the amount of illegal “things” that are readily available on the dark web, you can literally purchase anything. We completed all the steps to access the dark web and some of our findings throughout our research were quite disturbing. Our results:

  • Illegal drugs (prescription and street) for sale, can be shipped to any global location.
  • Doxing – the release of personal information on a specific individual (including address, telephone, email, social security num. etc) .
  • Human trafficking (willing and non-willing prostitution, child pornography/sex/kidnapping).
  • The sale of human organs (kidney’s, liver’s, etc).
  • The sale of personal information for identity theft (credit card numbers, social, date of birth, etc.).

Due to its criminal nature, the dark web is a complicated and dangerous environment. Law enforcement both state/local and federal are fully aware of the dark web, its marketplaces, and its illegal activities and they are using advanced technologies to easier access the dark web and monitor its activities. The issue is because the dark web is a global tool that can be accessed by anyone from anywhere, it makes it difficult to assign a jurisdiction to a specific criminal act, which allows illegal activity to continue for longer periods of time. Bottom line, authorities are watching and in theory the “bad guys” will eventually get caught. The top dark web monitoring tools (assessible to anyone with purchase) that we have discovered are:

  • Echosec Beacon
  • SpyCloud ATO Prevention
  • WhatsUp Gold
  • DigitalStakeout Scout
  • Alert Logic Dark Web Scanner
  • DarkOwl Vision
  • ACID Cyber Intelligence
  • Dashlane Business
  • Have I Been Pwned?

The Reality. The Realization. The Threat.

This is the Dark Web.

The Dark Web and Malware/Ransomware

Malware. To many in technology, malware is like a curse word. There is nothing fun, optimistic or positive about malware because it can literally destroy a device or even an entire network. Unfortunately malware can be easily spread over the dark web which places users at risk of coming into contact with malware or even ransomware. Malware can do more damage in a couple of seconds than most people can’t accomplish in a lifetime. And just to think, malware basically resides in the dark web.

For those who don’t frequent it, such as business users, malware is the largest potential danger of the dark web. Considering that malware shows no prejudice, the dark web is not a safe place for any user, however some experienced users can access the dark web with no issues depending on their level of experience. Being educated on the techniques and the concepts of cybersecurity is the best way to help organizations and individuals fight the dark web’s impact.

Government Monitoring

The government is more than aware of dark web and the activity that takes place on the dark web, but the reality is that it is a very difficult environment to track because things such as IP addresses and URL’s change frequently, slowing down criminal investigations or stopping them completely. What’s done in the dark, always comes to light! Therefore a dark web visitor should be cautious because it is not uncommon for a user to attract unwanted attention from government authorities’, you could easily become the focus of unwelcomed official surveillance.

Remember; to be cautious when accessing the dark web, to avoid illegal postings and solicitations, conceal personal identifiable information, and ultimately to always conduct yourself in a manner that will not jeopardize your freedom. The authorities are watching, waiting, and ready to infiltrate on any party or groups that are participating in criminal activity.

As for us at Syntech, we’ll stick with Chrome and Edge.

More To Explore

Let’s Talk About IT

Syntech Group is an Inland Empire technology solutions provider focused on Outsourced IT Support, IT Security, Consulting, Disaster Recovery, Cloud Service, Managed IT Services, Backup Solutions, B2B IT product sales and professional services.