The Deep and Dark Web

The Dark Web

The Deep and Dark Web, hidden in the depths of the internet, sounds like something out of a nail-biting thriller, but is, in fact, a very real part of our world. Just as drug cartels and human trafficking networks exist and thrive on the fringes of our society, so endures an encrypted network used primarily for reprehensible activities and transactions, accessible only by specialist servers such as Tor. Not to be confused with the Deep Web, simply the content of myriad unindexed databases, the Dark Web is home to just about every atrocity imaginable, from pedophilia rings to terrorist organizations to run-of-the-mill cyber criminals; but then, according to its advocates, the Dark Web is also the final digital realm still able to assure privacy and freedom of speech.

Tor

Tor, or The Onion Router, is the most well-known and oft-used anonymity network linked with the Dark Web, but this free software shouldn’t be confused with the nefarious factions which utilize it. It is merely an open network that prevents traffic surveillance and makes it almost impossible for anyone to track locations or retrieve browsing information. Developers and proponents will tell you regular people use it to protect their dignity while using the internet, businesses to research competition while maintaining strategic confidentiality, and activists, media, and military and law enforcement for a host of privacy and secure communication reasons. The Tor project page doesn’t mention its most famous users, the criminal underworld, but then, that’s neither necessary nor good business.

The Bad

Earlier this year, an Anonymous-linked hacker took control of a fifth of the Dark Web wherein much of the content featured child pornography. A laudable action, but sadly not a lasting or workable solution to the lawless bodies utilizing the Dark Web. Some years ago the FBI shut down Silk Road, an online black market best known for drug vending, but of course, various alternatives have popped up suggesting that though a marketplace is not forever, its market probably is. Among the gun runners, drug dealers, and sex traders, Government and law enforcement agencies also track terrorist activity, pursuing threats and seeking insight into their organizations and philosophies. And inevitably, the cyber crime of the Dark Web is a risk to business; data routed through such channels can’t be traced, and most experts agree that there’s no legitimate reason for Dark Web browsers to be loaded on company computers. With the global cost of data breaches expected to hit a couple trillion dollars by 2019, and the value of stolen information from financial to healthcare categories increasing, there are many strong reasons for reputable businesses to keep their noses clean and well out of the Dark Web.

The Good

But knowledge is power, and understanding the Dark Web, its objectives both good and bad, and at least a little of its inner workings, can facilitate a safer environment. Tor, for Instance, was developed for legitimate reasons, allowing law enforcement agencies to communicate in secret; and for those opposed to governments that severely limit freedom of speech and heavily sensor information, anonymous networks are the last-standing freedom fighters. Our world’s history is peppered with examples of atrocities committed when too few people second-guessed the status quo, and too many followed orders, and so perhaps applications and networks that allow for greater privacy and freedom of speech shouldn’t be trampled into the dust just yet.

Unfortunately, such democratic discretion leaves holes for the less moral to subsist, forcing legitimate businesses and upstanding individuals to protect themselves from attack. With many ransomware and DDoS attacks relying on Dark Web resources, organizations are acknowledging the importance of well-trained security personnel and informed staff, and recognizing the Dark Web and anonymity networks for any potential benefits and detriments to ensure a safer business network moving forward.

By Jennifer Klostermann

Or Lenchner

Destination IPPN: why the travel sector must harness a global IP proxy network

Destination IPPN While massive growth in the travel sector has been predicted, the digital environment has also massively upped competition amongst service providers, keen to offer travellers the best personalized online booking and buying experience ...
Hacker Cloud

Pandemic and Cybersecurity: Top Threats to Businesses

Pandemic and Cybersecurity The worldwide spread of the COVID-19 virus is coming to naught (or at least we hope so). But the impact that this virus produced on the whole world, and specifically on businesses, ...
David Friend

Cloud 2.0 will not be Ushered in by AWS or other Cloud Giants

Cloud 2.0 Trends Amazon, Google, and Microsoft are all pursuing similar business strategies: they want it all. ‘It,’ in this case, means the entire IT infrastructure in their cloud. Furthermore, they want you to buy ...
Al Castle E911

Businesses Need E911 for Remote Employees

E911 for Remote Employees Remote working is no longer a luxury or a distant possibility – it’s the norm for enterprises around the world. The “trend” of telecommuting is not new; for example, the number ...
Martin Mendelsohn

The Growth of Third Party Risk Management (TPRM) Firms

Cybersecurity and the Continued Risks Back in the day, we played cops and robbers with sticks and plastic squirt guns.  Sometimes you were pursued, at other times you were the pursuer.  There wasn’t much more ...
Lauren Brunson

The Growing Need to Consolidate Multi-Tenant Environments

Consolidate Multi-Tenant Environments Over the past four months, countless businesses and universities have scrambled to the cloud to enable their employees and students to work remotely during the global coronavirus pandemic. Managed service providers (MSPs) ...