wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Digital black market or dark net poses a national security threat?

profile
Akanksha Rathod
Feb 15, 2023
0 Likes
0 Discussions
152 Reads

Digital black market or dark net poses a national security threat

Abstract—The dark web, sometimes known as the darknet, is constantly in the headlines. It is critical to comprehend the various terminologies linked with the subject. As simple as it is to use, the sheer intricacy of it in the cyber world is perplexing and difficult to detect or regulate. Because dark web forums dedicated to freely discussing privacy-enabling technologies, intrusion software, and vulnerable code are easily accessible, global law enforcement organizations are continually engaged. The introduction of the dark web has resulted in a significant surge in negative internet activities such as money laundering, drug trafficking, child abuse, murder, and so on. This has had a negative impact on cybersecurity efficacy [1]

Introduction

The invention of the world wide web and other search engines such as Google has made it possible to obtain information at any time. The majority of this material is publicly accessible on the surface web, which is easily searchable with a standard search engine [1]. On the other hand, certain websites are difficult to reach using regular search engines because the data embedded in these websites is strongly encrypted. Similarly, these websites, often known as the dark web, are very similar to black markets in that their main purpose is to avoid taxes and laws while trading in dangerous illicit commodities. 

As a result, we now see that black markets have spread online, where a pool of cybercriminals can make a lot of money by selling or exchanging data, purchasing forbidden data, or purchasing things that are prohibited by government restrictions [2]. As a result, the growth of these online black markets has had a significant impact on the effectiveness of cybersecurity and internet governance, as people and businesses are increasingly affected by these activities, while cybercriminals are becoming more difficult to catch and prosecute. 

Cybersecurity is defined as the process of preventing unauthorized access and alteration of computers, software, hardware, data, information, and computer networks by hackers, terrorists, and cyber criminals. Cybercrime refers to criminal activities that involve the use of the Internet, computers, or other types of IT infrastructure. Cybercrime is classified into three types [5]:

  • Against Person: This category of crime includes computer-based harassment, such as email harassment, cyberstalking, and pornography, among other things.
  • Against Property: Computer vandalism, possession of unlawful computer information, and unauthorized computer infringement via cyberspace are all crimes.
  • Against the government: This is known as cyber terrorism. For example, an individual or group of people gaining unauthorized access to a government website.

Blackmarket and Darknet

The black market is an illegal, free market that is emerging in nations where commodities are scarce or severely taxed [8]. It is essentially a shadow market that operates outside of any government regulations or sanctions in order to dodge price controls and taxes. These marketplaces, sometimes known as shadow markets, are locations where one can purchase assets or property that is not publicly available [9]. "No good deed is done in the dark," as the proverb goes. The Black Market is a perfect illustration of this. In a nutshell, the major motive for dealing through the Black market is to trade contraband, avoid paying high taxes, and be subject to price volatility.

The Darknet is an example of a Black Market that arose as a result of the web's development. The Darknet is made up of a plethora of black-market websites where everyone's identity is concealed from authorities and law enforcement. The collective bandwidth, usability, amount of shared library, and availability of search engines on the darknet have all increased dramatically in recent years [11]. Participants must be computer literate enough to install the unique software required by the black market websites in order to gain access to them.

Furthermore, the Darknet employs complex encryption techniques to conceal people's identities and bounces network traffic around several servers around the world, making tracing impossible.

Cybercrime on the dark web

Virtual crime is not different from real-world crime; it simply uses a different medium to do the crime. Computers and the Internet are also used to conduct virtual crimes.

  • Exotic Animals, Drugs, and Weapons

The Silk Road website is an anonymous marketplace for the sale of clothing, books, and illegal products such as firearms and drugs. On the Tor network, these websites appear to be just like any other shopping website on the internet, with a brief description of the goods and accompanying images.

  • Stolen Property and Information

The dark web encourages users to exchange sensitive information such as login and password, credit card information, PayPal password, and so on. 

  • Murder

Assassination websites on the dark web allow users to forecast the day of death of a certain individual and receive a reward if the date of death is correctly predicted. The dark web also includes websites where assassins can be hired, such as White Wolves. [27].

  • Terrorism

Terrorists use the dark web because it is an anonymous and inaccessible network. Terrorists cannot use the public internet because their site can be simply shut down and the administrator can be identified. They use the dark web for propaganda, recruitment, and planning [28].

  • Illegal financial transactions

Some dark web websites, such as Banker & Co and Instacard, undertake untraceable financial transactions. They conduct their business by issuing a bank anonymous debit card to the user or a virtual credit card that is used by trusted dark web operators [29].

  • The hidden wiki

The dark web's primary inventory is the hidden wiki. This website promotes cyber-attacks, money laundering, contract killing, and other illegal activities. The link to the hidden wiki, like any other website on the dark web, is frequently altered to avoid detection [30].

Illicit activities and services  

The Dark Web has been implicated in a wide range of crimes. Drugs, firearms, exotic animals, and stolen products and information are all sold for a profit. There are gambling websites, hired thieves and killers, and troves of child pornography (Chertoff, Simon, 2015). However, data on the presence of these Dark Web sites are scarce. According to Tor, only about 1.5% of Tor users visit hidden services/Dark Web pages (Tor Project Blog, 2015) [2]

Illicit internet markets, both on the surface and deep webs allow criminal vendors to sell a wide range of illicit commodities, with those of a more severe nature often located deeper, in the dark web. Many of these illegal goods and services, such as cybercrime toolkits or forged documents, serve as enablers for additional criminal activity (EUROPOL, 2018). Cybercriminals can victimize both individuals and organizations, and they have no regard for borders. How criminals abuse borders is a constant source of concern for law enforcement, especially as the concept of borders and boundaries has evolved (Finklea, 2017).

Such activities include drug trafficking, weapons trafficking, child abuse, trading sensitive information, malware, and spyware, sharing Software Exploits information discovered in computer systems, and renting a Botnet, which is a fully-equipped network connected to the internet that hackers can use to perform a wide range of security breaches. In addition to trade documents, phony IDs, stolen credit cards, medical records of patients, and any other Personally Identifiable Information (PII). It also includes financial fraud, propagating criminal ideology, and even hiring hitmen, among other things. Dark Web Hidden Service also has a stake in the Dark Web; these are special services that host security breach operations and serve as a hosting environment for malware (Hawkins, 2016).

The Role of the Dark Web in Future Cyber Wars to Come

This study will limit its scope by focusing primarily on the national security implications of the Dark Web, rather than concerns involving domestic law enforcement. This document defines law enforcement as issues such as drug trafficking, financial fraud, counterfeit goods, illicit pornography, and so on. Weapons proliferation, terrorism, intelligence collection and extortion, malicious services-for-hire, and other challenges are classified as national security in this article. We recognize that there is not always a clear distinction between matters of law enforcement and national security concern; once again, our goal here is to focus on risks with particular national security consequences. In an effort to characterize the Dark Web from a national security perspective, below are a series of Dark Web case studies that detail issues of national security relevance [3].

  • Kinetic Weapons Proliferation

The anonymity provided by the Dark Web creates an ideal trading environment for would-be purchasers and sellers of hazardous weapons. This is more than just a theory; it is a truth that has been confirmed time and again via observation. Uranium, hazardous chemical compounds, and military-grade weaponry are just a few of the weapons that have been listed on the Dark Web. As a result of these ads, the international law enforcement community has been aggressively chasing would-be buyers and sellers of weapons on the Dark Web — and in many cases, they have been successful in averting possible assaults [3].

  • Intelligence - Insider Threat, Extortion, and Source Operations

The expanding amount of public data that intelligence officers can use to coerce potential sources for information is the second reason that the Dark Web will likely grow in popularity among intelligence officials. National security professionals may observe a wave of impending extortion efforts by combining information gathered through normal cybersecurity breaches and integrating it with other information that can be used to blackmail an individual [3].

 

  • Terrorism is facilitated via facilitation.

Terrorists may use Dark Web marketplaces in the future to purchase enabling goods that will aid in the execution of their objectives. In addition to weapons and funds, enabling materials such as counterfeit identifications, non-attributable communications equipment, and falsified documents can help a terrorist organization achieve its aims by facilitating travel, securing communications, establishing proof of residency, and so on. This is especially problematic when we consider how a potential terrorist could utilize these enabling materials to adopt a pseudo-persona in order to avoid detection by authorities [3].

 

  • Facilitation - Hire of Malicious Services

The Dark Web is home to a variety of dangerous services that potential threat actors looking to cause harm could exploit. Separating out the noise and refining our focus, as with other parts of the Dark Web, is crucial to determining the nature of the threat. Malicious services for hire enable threat actor organizations with relatively low-level cyber capabilities to essentially pay their way to achieve their goals. This idea could explain how North Korea has been able to rapidly advance the development of its cyberwarfare program in recent years. Prior to the Sony Pictures assault in 2014, North Korea was not seen as a prominent cyber superpower [3].

Conclusion

The Dark Web, like other developing technologies, is one of these complexities. National security experts who read this article should examine how the stated Dark Web dangers may impact their different areas of responsibility. Furthermore, potential countermeasures and monitoring capabilities, such as Dark Web-focused threat intelligence, should be considered to acquire a better knowledge of Dark Web related dangers.

 

Whatever methods are used to gain a better understanding of this developing threat, the overarching goal should be to raise collective awareness among the national security community. We aim to leverage this awareness to lessen the risk of strategic surprise while also facilitating a predictive understanding of how our enemies are likely to use the Dark Web in the course of their own harmful activities. While this understanding may not necessarily prevent national security risks from the Dark Web, it may surely bring the matter to light and promote a bigger discussion about how the global community might address these new threats.

Acknowledgement

I would like to express my gratitude to my research supervisor Mr. Sohrabh Vakharia from Patkar Varde College for providing me with guidance throughout. 

I would like to thank him for giving me the opportunity to do my research work on this topic. His positive attitude and helpful nature have always motivated and inspired me. I am always grateful to my parents for all their love and care toward me, making me capable to pursue my higher education. 

Finally, I owe deep gratitude to all the people who were directly or indirectly involved in my research work and supported me throughout. 










Comments ()


Sign in

Read Next

Linux Threads:

Blog banner

FILE SHARING

Blog banner

Virtual Machine

Blog banner

THE ACTORS LIFE

Blog banner

Concept and definition of m-commerce

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

File Allocation Methods

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Evolution of Operating Sytems

Blog banner

Fitness

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Big Data Architecture

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

What are Virtual Machines

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Deadlock in Operating System

Blog banner

Different Types of Data

Blog banner

Virtual Memory

Blog banner

Modern Operating System

Blog banner

Multiprocessor

Blog banner

How to make Pancakes

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Deadlock

Blog banner

The art of being alone

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

My favourite food

Blog banner

What is M-commerce and how it's work

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

File sharing

Blog banner

Deadlock

Blog banner

Risk mitigation and management

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Understanding - Proof of Work!

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Why Summer Break Is Important for Emotional and Cognitive Growth?

Blog banner

Theads

Blog banner

Uber

Blog banner