Dark Web Dynamics: Investigating Cybercrime Trends And Regulatory Responses In The Digital Age

  • Tripti Singh
Keywords: cyber-crime, dark web, Contemporary Challenges, Digital Landscape, Emerging Technologies VG

Abstract

Cybercriminals, terrorists, and state-sponsored spies use the Dark Web, which is notoriously difficult to track, to further their illegal goals. There is no difference between traditional crimes and cybercrimes committed on the Dark Web. Dark Web services pose important difficulties tracing criminals because of their scale, uncertain environment, and anonymity. An essential first step in finding answers to cybercrimes is assessing the dangers of the Dark Web. According to the report, more thorough investigations are needed to uncover criminals operating on the Dark Web's crypto exchanges and discussion forums. Forensic investigations rely heavily on analysis. The anonymity of the dark Web services can be a tool in the fight against crime, but only if digital evidence is processed to keep up with law enforcement's efforts to apprehend criminals and shut down illegal sites on the Dark Web.

Author Biography

Tripti Singh

research scholar, institute of legal studies,  shree ramswaroop memorial University, Lucknow

References

1. R. Basheer, B. Alkhatib, Threats from the dark: a review over darkweb investigation research for cyber threat intelligence, Journal of Computer Networks and Communications (2021).
2. A. Gupta, S.B. Maynard, A. Ahmad, The Darkweb Phenomenon: A Review and Research Agenda, 2021 arXiv preprint arXiv:2104.07138.
3. M. Chertoff, A public policy perspective of the Darkweb, Journal of Cyber Policy 2 (1) (2017) 26–38.
4. H. Chen, W. Chung, J. Qin, E. Reid, M. Sageman, G. Weimann, Uncovering the Darkweb: a case study of Jihad on the web, J. Am. Soc. Inf. Sci. Technol. 59 (8) (2008) 1347–1359.
5. M. Bernaschi, A. Celestini, S. Guarino, F. Lombardi, Exploring and analyzing the tor hidden services graph, ACM Trans. Web 11 (4) (2017) 1–26.
6. E. Nunes, A. Diab, A. Gunn, E. Marin, V. Mishra, V. Paliath, P. Shakarian, Darknet and deepnet mining for proactive cybersecurity threat intelligence, in: 2016 IEEE Conference on Intelligence and Security Informatics (ISI), IEEE, 2016, pp. 7–12
7. F.J. García-Corral, J.A. Cordero-García, J. de Pablo-Valenciano, J. Uribe-Toril, A bibliometric review of cryptocurrencies: how have they grown? Financial innovation 8 (1) (2022) 1–31
8. R.N.U.D. Jalal, I. Alon, A. Paltrinieri, A Bibliometric Review of Cryptocurrencies as a Financial Asset, Technology Analysis & Strategic Management, 2021, pp. 1–16.
9. R. Broadhurst, D. Lord, D. Maxim, H. Woodford-Smith, C. Johnston, H.W. Chung, B. Sabol, Malware Trends on ’Darknet’crypto-Markets: Research Review, Available at: SSRN 3226758, 2018
10. A.S. Beshiri, A. Susuri, Darkweb and its impact in online anonymity and privacy: a critical analysis and review, J. Comput. Commun. 7 (3) (2019) 30.
11. S. Nazah, S. Huda, J. Abawajy, M.M. Hassan, Evolution of Darkweb threat analysis and detection: a systematic approach, IEEE Access 8 (2020) 171796–171819
12. E.D.A. Sonmez, ¨ K. Seçkin Codal, Terrorism in Cyberspace: A Critical Review of Darkweb Studies under the Terrorism Landscape, 5, Sakarya University Journal of Computer and Information Sciences, 2022.
13. R. Rawat, V. Mahor, M. Chouhan, K. Pachlasiya, S. Telang, B. Garg, Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb, in: International Conference on Network Security and Blockchain Technology, Springer, Singapore, 2022, pp. 181–205.
14. Y. She, D. Xu, Z. Tan, J. Zhao, Research hotspot and trend analysis of anonymous communication based on Citespace, in: 2022 3rd International Conference on Information Science, Parallel and Distributed Systems (ISPDS), IEEE, 2022, pp. 58–62.
15. H.T. Luong, Preliminary findings of the trends and patterns of darknet-related criminals in the last decade, Secur. J. (2023)
16. L. Orsolini, D. Papanti, J. Corkery, F. Schifano, An insight into the deep web; why it matters for addiction psychiatry? Hum. Psychopharmacol. Clin. Exp. 32 (3) (2017), e2573.
17. J.R. Harrison, D.L. Roberts, J. Hernandez-Castro, Assessing the extent and nature of wildlife trade on the Darkweb, Conserv. Biol. 30 (4) (2016) 900–904.
18. D. Décary-Hétu and L. Giommoni, ‘‘Do police crackdowns disrupt drug cryptomarkets? A longitudinal analysis of the effects of operation onymous,’’ Crime, Law Social Change, vol. 67, no. 1, pp. 55–75, Feb. 2017
19. L. Greenemeier. (Feb. 8, 2015). Human traffickers caught on hidden Internet. Scientific American. [Online]. Available: https://www.scientificamerican.com/article/human-traffickers-caughton-hidden-internet/
20. R. Konrad and A. Trapp. (2017). Data Science Can Help Us Fight Human Trafficking. [Online]. Available: https://theconversation.com/datascience-can-help-us-fight-human-trafficking-81647
21. Geneva. (Sep. 19, 2017). Forced Labour, Modern Slavery and Human Trafficking. [Online]. Available: https://www.ilo. org/global/topics/forced-labour/lang–en/index.htm
22. C. Reilly. (Jul. 29, 2015). Human Trafficking: A Crime Hard to Track Proves Harder to Fight. [Online]. Available: https://www.pbs. org/wgbh/frontline/article/what-is-human-trafficking-and-why-is-it-sohard-to-combat/
23. H. J. Clawson and N. Dutch, ‘‘Addressing the needs of victims of human trafficking: Challenges, barriers, and promising practices: Department of health and human services, office of the assistant secretary,’’ Dept. Health Hum. Services, Washington, DC, USA, Tech. Rep., 2008.
24. D. Rathod, ‘‘Darknet forensics,’’ Future, vol. 11, no. 4, p. 12, 2017
25. ConvenantEyes. (Sep. 7, 2011). The Connections Between Pornography and Sex Trafficking. [Online]. Available: https://www. covenanteyes.com/2011/09/07/the-connections-between-pornographyand-sex-trafficking
26. H. Grant, ‘‘Cathryn Lavery of Iona College’ Social Media and the New Generation of ‘Computerated’ Criminals,’’ Crim Forensic Studies, vol. 2, no. 1, 2019, Art. no. 180022
27. K. Beckham and A. Prohaska ‘‘Deviant men, prostitution, and the Internet: A qualitative analysis of men who killed prostitutes whom they met online,’’ Int. J. Criminal Justice Sci., vol. 7, no. 2, pp. 635–648, 2012.
28. M. Chertoff and T. Simon, ‘‘The impact of the dark Web on Internet governance and cyber security,’’ Centre Int. Governance Innovation (CIGI), Waterloo, ON, Canada, Tech. Rep. 6, 2015
29. Daily Mail. (Oct. 12, 2013). The Disturbing World of the Deep Web, Where Contract Killers and Drug Dealers Ply Their Trade on the Internet. [Online]. Available: https://www.dailymail.co.uk/news/article2454735/The-disturbing-world-Deep-Web-contract-killers-drugdealers-ply-trade-internet.html
30. K. M. Finklea, ‘‘Dark Web,’’ in Proc. Congressional Res. Service, 2015, pp. 1–16.
31. B. Backman, ‘‘Follow the white rabbit: An ethnographic exploration into the drug culture concealed within the ‘deep web,’’’ Univ. Nebraska Omaha, Omaha, NE, USA, Tech. Rep. UMI 1551711, 2013
32. J. Lane, ‘‘Bitcoin, silk road, and the need for a new approach to virtual currency regulation,’’ Charleston L. Rev., vol. 8, no. 5, p. 511, 2013
33. D. Moore and T. Rid, ‘‘Cryptopolitik and the Darknet,’’ Survival, vol. 58, no. 1, pp. 7–38, 2016.
34. S. Pfeifer, S. Li, and W. Hamilton. (Oct. 2, 2013). End of Silk Road for Drug Users as FBI Shuts Down Illicit Website. [Online]. Available: https://www.latimes.com/business/la-fi-silk-road-bitcoin-20131003- story.htm’
35. N. Christin, ‘‘Traveling the silk road: A measurement analysis of a large anonymous online marketplace,’’ presented at the 22nd Int. Conf. World Wide Web, 2013.
36. J. Aldridge and D. Décary-Hétu, ‘‘Hidden wholesale: The drug diffusing capacity of online drug cryptomarkets,’’ Int. J. Drug Policy, vol. 35, pp. 7–15, Sep. 2016.
37. A. Celestini, G. Me, and M. Mignone, ‘‘Tor marketplaces exploratory data analysis: The drugs case,’’ presented at the Int. Conf. Global Secur., Saf., Sustainability, 2017.
38. D. Rhumorbarbe, L. Staehli, J. Broséus, Q. Rossy, and P. Esseiva, ‘‘Buying drugs on a darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data,’’ Forensic Sci. Int., vol. 267, pp. 173–182, Oct. 2016.
39. DeepDotWeb. (2015). Interview: ‘Mr. Nice Guy’ Market Admin Tells His Story. [Online]. Available: https://gir. pub/deepdotweb/2015/06/03/interview-with-mr-niceguy-market-admin/
40. C. Cranford. (Feb. 21, 2015). Dangerous Apps on Your Teen’s Mobile Device. [Online]. Available: https://www. cybersafetycop.com/dangerous-apps-on-your-teens-mobile-device
41. K. M. Finklea, ‘‘Dark Web,’’ in Proc. Congressional Res. Service, 2015, pp. 1–16.
42. FBI. (May 5, 2017). Playpen’ Creator Sentenced to 30 Years. [Online]. Available: https://www.fbi.gov/news/stories/playpen-creator-sentencedto-30-years
43. K. V. Açar, ‘‘Webcam child prostitution: An exploration of current and futuristic methods of detection,’’ Int. J. Cyber Criminol., vol. 11, no. 1, pp. 98–109, 2017
44. E. Puffer, K. McDonald, M. Pross, and D. Hudson, ‘‘Webcam child sex tourism: An emerging global issue,’’ Cedarville Univ., Cedarville, OH, USA, Tech. Rep., 2014
45. K. Poulsen. (Sep. 9, 2013). FBI Admits it Controlled Tor Servers Behind Mass Malware Attack. [Online]. Available: https://www.wired.com/2013/09/freedom-hosting-fbi/
46. The Bitcoin News. (Feb. 9, 2017). Anonymous Hacks Freedom Hosting II, Bringing Down Almost 20% of Active Darknet Sites. [Online]. Available: https://thebitcoinnews.com/anonymous-hacks-freedom-hosting-iibringing-down-almost-20-of-active-darknet-sites/
47. L. H. Newman. (Oct. 16, 2019). How a bitcoin trail led to a massive dark Web child-porn site takedown. Wired. [Online]. Available: https://www.wired.com/story/dark-web-welcome-to-video-takedownbitcoin/
48. G. Weimann, ‘‘Going dark: Terrorism on the dark Web,’’ Stud. Conflict Terrorism, vol. 39, no. 3, pp. 195–206, Mar. 2016.
49. P. Tucker. (Feb. 24, 2015). How the Military Will Fight ISIS on the Dark Web. [Online]. Available: https://www.defenseone.com/ technology/2015/02/how-military-will-fight-isis-dark-web/105948/
50. P. W. Singer and E. T. Brooking, LikeWar: The Weaponization of Social Media. New York, NY, USA: Eamon Dolan Books, 2018.
51. G. Weimann, ‘‘Going dark: Terrorism on the dark Web,’’ Stud. Conflict Terrorism, vol. 39, no. 3, pp. 195–206, Mar. 2016
52. P. W. Singer and E. T. Brooking, LikeWar: The Weaponization of Social Media. New York, NY, USA: Eamon Dolan Books, 2018
53. Y. Wu, F. Zhao, X. Chen, P. Skums, E. L. Sevigny, D. Maimon, and M. J. Feizollahi, ‘‘Python scrapers for scraping cryptomarkets on tor,’’ presented at the Int. Conf. Secur., Privacy Anonymity Comput., Commun. Storage, 2019
54. D. Shinder, ‘‘What makes cybercrime laws so difficult to enforce,’’ Tech. Rep., 2011
55. R. Surette, ‘‘Performance crime and justice,’’ Current Issues Criminal Justice, vol. 27, no. 2, pp. 195–216, 2015
56. H. Bleau. (Apr. 24, 2019). Social Media and the Digital Transformation of Cybercrime. RSA Security. [Online]. Available: https://www.rsa.com/enus/blog/2019-04/social-media-and-the-digital-transformation-ofcybercrim
57. N. Lindsey (Mar. 12, 2019). Cyber criminals have turned social media cyber crime into a $3 billion business. CPO Magazine. [Online]. Available: https://www.cpomagazine.com/cyber-security/cyber-criminalshave-turned-social-media-cyber-crime-into-a-3-billion-business/
58. M. Tsikerdekis and S. Zeadally, ‘‘Multiple account identity deception detection in social media using nonverbal behavior,’’ IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1311–1321, Aug. 2014
59. P. Dughi. (Jun. 26, 2016). 17 times social media helped police track down thieves, murderers, and gang criminals. Medium. [Online]. Available: https://medium.com/the-mission/17-times-social-media-helped-policetrack-down-thieves-murderers-and-gang-criminals-a814b6c40fb
Published
2024-09-04
How to Cite
Tripti Singh. (2024). Dark Web Dynamics: Investigating Cybercrime Trends And Regulatory Responses In The Digital Age. Revista Electronica De Veterinaria, 25(1S), 612-618. https://doi.org/10.69980/redvet.v25i1S.791