Gateways to the Underworld: The Dark Web Connection


Girish Linganna

Mar 26: The dark web is recognized for hosting a wide array of harmful activities. This includes arranging for murders, trading weapons and banned substances, distributing exploitative content of children, and orchestrating crimes like theft, kidnapping, extortion, and attacks on essential infrastructure.

Despite its notoriety as a domain of illicit deeds, it operates under a set of unwritten rules and norms. This insight is provided by the Spanish media outlet Elpais.

According to the Spanish media outlet, despite having a unique set of rules, it's important to remember that these individuals are still engaged in criminal activities. They report that 84% of all scams occur on the internet. Interestingly, the same dark web also hosts charity events, observes holidays, enforces norms against unacceptable conduct, and even has its form of a "court system."

The familiar internet referred to as the "Surface Web" we navigate daily via mainstream browsers constitutes merely 5% of the entire online world. This is merely the tip of the iceberg of the vast deep web, a reservoir of data that is deliberately kept hidden or isn't readily accessible.

The familiar internet, often accessed daily through mainstream browsers, includes popular websites and services such as:

1. Search Engines - Google, Bing, Yahoo

2. Social Media Platforms - Facebook, Twitter, Instagram, LinkedIn

3. E-commerce Sites - Amazon, eBay, Flipkart

4. News and Information Sites - BBC, CNN, The New York Times

5. Streaming Services - Netflix, YouTube, Hulu

6. Educational Resources - Wikipedia, Khan Academy, Coursera

7. Financial Services - PayPal, online banking websites

8. Email Services - Gmail, Outlook, Yahoo Mail

These examples represent the easily accessible part of the internet, often referred to as the "Surface Web."

Hidden Web Insights:

The deep web encompasses content that standard search engines do not index, such as websites that require login credentials and confidential materials. Conversely, the dark web, a section of the deep web, utilizes concealed networks to maintain the anonymity of its users and websites. It is frequently linked to illicit activities.

The explanation delves into the various levels of the internet that extend beyond the content we usually find using standard search engines like Google or Bing.

1. Deep Web: This part of the internet consists of all the data and websites that are not indexed by standard search engines. This means you can't just search for these pages or content; you usually need a direct URL or login credentials to access them. Examples include private databases, personal email accounts, and secure bank accounts. Essentially, it's a vast amount of data that is kept private or protected for various reasons.

2. Dark Web: The dark web is a smaller portion of the deep web. It's made up of websites that are intentionally hidden and require specific software, configurations, or authorization to access. The dark web is known for its high level of anonymity, which is why it's often associated with illegal activities such as the sale of drugs, weapons, and other illicit goods and services. However, not everything on the dark web is illegal; it also hosts privacy-focused forums and services.
In summary, the deep web includes a huge amount of hidden or protected information that is not accessible through regular search engines, while the dark web is a more secretive subset of the deep web known for its anonymity and, often, illegal activities.

The deep web is used for both legitimate and dubious reasons. It houses secure platforms for information exchange, unrestricted social networks, and support groups. It provides entry to exclusive content such as academic or governmental papers, dedicated forums for the sharing of expertise, and entertainment options including digital marketplaces, betting websites, and online gaming portals.

Residing in the most concealed depths of the deep web is a compact network of criminals responsible for initiating 90 million cyberattacks globally, incurring costs of 10.5 billion euros (approximately $11.5 billion) reports the Spain media house.

If cybercrime were to be viewed as a country, it would have the world's third-largest economy, trailing only behind the United States and China. This part of the web is explored using isolated computers and technical precautions to shield against the prevalent malware found there.

To get into the hidden areas of the internet known as the deep and dark web, special browsers such as Tor, Subgraph, Waterfox, and I2P are needed. Tor, which stands for "The Onion Router," works by making a random connection to a starting point, and then passes your data through a series of secure, encrypted steps to keep your information safe. This is kind of like sending a secret message through a series of friends where each friend adds another layer of wrapping, making it hard for anyone outside the circle to see the message. Within this secure pathway, the identity of the data flow remains hidden, with the initial connection point and the final exit point posing the greatest security risks.

Originally, Tor was not intended for illicit activities; however, criminals swiftly saw its potential and started to exploit it. One of the earliest examples is Silk Road, a dark web marketplace established by Ross Ulbricht in 2011, which the FBI closed down two years later. Ulbricht, who went by the alias Dread Pirate Roberts, is currently serving a life sentence for crimes including money laundering, hacking, and conspiring to traffic drugs.

Getting onto the dark web isn't hard – you only need to install a specific browser. However, it comes with risks. The dark web is filled with malware, scams, and other dangers. It's important to be careful and safeguard yourself with antivirus software, a firewall, and a VPN to maintain your privacy.

Accessing Exclusive Dark Web Communities: A Guide

Entering the dark web's more concealed areas often requires an invitation from a member of the criminal underworld or passing their scrutiny. While some forums are open to all, allowing anyone to sign up, others are private, with a rigorous vetting process for new members. Typically, entry methods involve invitations from current members or administrators, depending on endorsements from those already within the community. Certain forums might request that users complete an application or participate in an interview to evaluate their fit. Additionally, some may ask users to prove their expertise on a particular subject through tests or trial posts or to secure a recommendation from trusted users of the dark web.

Upon clearing these barriers,
the hidden layers of the internet reveal a world not so different from the one we're familiar with. They have their chat forums and even utilize secretive Telegram channels to recruit services or boast about their achievements, openly sharing the identities of their targets.

An arbitration system exists to settle conflicts among users, such as the one that led to the disbanding of the LockBit extortion ring when they did not fairly share the ransom from a kidnapping incident. Dark web platforms conducted a trial, entertained an appeal, and delivered a definitive verdict. Following this, the group faced significant challenges in operating once more due to a loss of trust, a crucial element for activity on the dark web.

The LockBit extortion ring is a cybercriminal group known for its ransomware attacks, where they encrypt victims' data and demand ransom for decryption keys. Active since at least 2019, LockBit targets businesses and organizations worldwide, causing significant financial and operational damage. Their sophisticated attacks and demand for ransom payments have made them notorious in the cybersecurity world.

In the digital underworld, it's simple to come across information related to ordinary internet users. Services like Google One can determine whether your accounts have been compromised or are accessible on the dark web. Web pages on the dark web are usually basic, as there's no need for marketing tactics or search engine optimization. Similar to the surface web, the dark web also features forums for users and chat applications.

Conti, a group known for kidnapping and extortion, reportedly dissolved following a data breach. At its peak, the organization employed around 200 individuals and operated from physical offices in Moscow. Analysis of exposed conversations revealed discussions that varied from updates on newly painted doors to cautions against talking about malware in the office cafeteria.

"The dark web isn't so dissimilar from the everyday world," highlighting that individuals within it partake in normal activities like hosting parties, going on vacations, and fundraising for charitable causes such as orphanages. Despite their criminal status, they are still human, with families and a personal sense of morality.

Certain ransomware groups strictly avoid targeting hospitals and also refrain from attacking countries that were part of the former Soviet Union. However, it's important to remember that despite these boundaries, they remain criminals.

In an environment where successful thefts and kidnappings are touted for their promotional value, targeting healthcare institutions is regarded with profound contempt."Being a hacker is akin to operating a business devoid of ethics. They engage in kidnapping and extortion. However, the most egregious act is when they attack hospitals, risking lives in the process. Their actions, driven purely by the pursuit of money," is a viewpoint expressed by the Spanish media outlet ELPAIS.

 

 

 

 

(The author Girish Linganna of this article is a Defence, Aerospace & Political Analyst based in Bengaluru. He is also the Director of ADD Engineering Components, India, Pvt. Ltd, a subsidiary of ADD Engineering GmbH, Germany. You can reach out to him at: girishlinganna@gmail.com)

 

 

  

Top Stories


Leave a Comment

Title: Gateways to the Underworld: The Dark Web Connection



You have 2000 characters left.

Disclaimer:

Please write your correct name and email address. Kindly do not post any personal, abusive, defamatory, infringing, obscene, indecent, discriminatory or unlawful or similar comments. Daijiworld.com will not be responsible for any defamatory message posted under this article.

Please note that sending false messages to insult, defame, intimidate, mislead or deceive people or to intentionally cause public disorder is punishable under law. It is obligatory on Daijiworld to provide the IP address and other details of senders of such comments, to the authority concerned upon request.

Hence, sending offensive comments using daijiworld will be purely at your own risk, and in no way will Daijiworld.com be held responsible.