The Deep and Dark Web

The Dark Web

The Deep and Dark Web, hidden in the depths of the internet, sounds like something out of a nail-biting thriller, but is, in fact, a very real part of our world. Just as drug cartels and human trafficking networks exist and thrive on the fringes of our society, so endures an encrypted network used primarily for reprehensible activities and transactions, accessible only by specialist servers such as Tor. Not to be confused with the Deep Web, simply the content of myriad unindexed databases, the Dark Web is home to just about every atrocity imaginable, from pedophilia rings to terrorist organizations to run-of-the-mill cyber criminals; but then, according to its advocates, the Dark Web is also the final digital realm still able to assure privacy and freedom of speech.

Tor

Tor, or The Onion Router, is the most well-known and oft-used anonymity network linked with the Dark Web, but this free software shouldn’t be confused with the nefarious factions which utilize it. It is merely an open network that prevents traffic surveillance and makes it almost impossible for anyone to track locations or retrieve browsing information. Developers and proponents will tell you regular people use it to protect their dignity while using the internet, businesses to research competition while maintaining strategic confidentiality, and activists, media, and military and law enforcement for a host of privacy and secure communication reasons. The Tor project page doesn’t mention its most famous users, the criminal underworld, but then, that’s neither necessary nor good business.

The Bad

Earlier this year, an Anonymous-linked hacker took control of a fifth of the Dark Web wherein much of the content featured child pornography. A laudable action, but sadly not a lasting or workable solution to the lawless bodies utilizing the Dark Web. Some years ago the FBI shut down Silk Road, an online black market best known for drug vending, but of course, various alternatives have popped up suggesting that though a marketplace is not forever, its market probably is. Among the gun runners, drug dealers, and sex traders, Government and law enforcement agencies also track terrorist activity, pursuing threats and seeking insight into their organizations and philosophies. And inevitably, the cyber crime of the Dark Web is a risk to business; data routed through such channels can’t be traced, and most experts agree that there’s no legitimate reason for Dark Web browsers to be loaded on company computers. With the global cost of data breaches expected to hit a couple trillion dollars by 2019, and the value of stolen information from financial to healthcare categories increasing, there are many strong reasons for reputable businesses to keep their noses clean and well out of the Dark Web.

The Good

But knowledge is power, and understanding the Dark Web, its objectives both good and bad, and at least a little of its inner workings, can facilitate a safer environment. Tor, for Instance, was developed for legitimate reasons, allowing law enforcement agencies to communicate in secret; and for those opposed to governments that severely limit freedom of speech and heavily sensor information, anonymous networks are the last-standing freedom fighters. Our world’s history is peppered with examples of atrocities committed when too few people second-guessed the status quo, and too many followed orders, and so perhaps applications and networks that allow for greater privacy and freedom of speech shouldn’t be trampled into the dust just yet.

Unfortunately, such democratic discretion leaves holes for the less moral to subsist, forcing legitimate businesses and upstanding individuals to protect themselves from attack. With many ransomware and DDoS attacks relying on Dark Web resources, organizations are acknowledging the importance of well-trained security personnel and informed staff, and recognizing the Dark Web and anonymity networks for any potential benefits and detriments to ensure a safer business network moving forward.

By Jennifer Klostermann

Brad Thies

System Vulnerabilities Are an Issue for Everyone

System Vulnerabilities Are an Issue for Everyone Over the past decade, we have seen a drastic increase in the number of companies relying on cloud ...
Anita Raj

Coronavirus: Can technology help fight the pandemic?

Coronavirus and Telemedicine Technology COVID-19 has brought the world to a near standstill. From NBA to Met Ball and Coachella, all major events and festivals ...
Darach Beirne

Raising the Bar for Business Communications with Deep Customization of WebRTC

Business Communications and WebRTC By Darach Beirne, Vice President of Customer Success at Flowroute, now part of Intrado, and Julien Chavanton, Voice Platform Architecture Lead ...
Matt Holleran

Cloud Platforms, Marketplaces, and Startups

Cloud Platforms, Marketplaces, and Startups One of the most exciting recent developments in the cloud software business is the proliferation of partner ecosystems, with large ...
Sergey lypchenko 

The Top 7 Latest DevOps Trends to Follow

DevOps Trends to Follow Awareness of the latest DevOps trends is important for companies which consider the integration of DevOps into their development processes as ...
Ajay

Explainable Intelligence Part 2 – Illusion of the Free Will

Illusion of the Free Will Explainable Artificial Intelligence (XAI) is getting a lot of attention these days, and like most people, you're drawn to it because ...