Book Image

Combating Crime on the Dark Web

By : Nearchos Nearchou
Book Image

Combating Crime on the Dark Web

By: Nearchos Nearchou

Overview of this book

In today’s world, the crime-prevention landscape is impossible to navigate. The dark web means new frontiers of combat against bad actors that pop up daily. Everyone from narcotics dealers to human traffickers are exploiting the dark web to evade authorities. If you want to find your feet in this tricky terrain and fight crime on the dark web, take this comprehensive, easy-to-follow cyber security guide with you. Combating Crime on the Dark Web contains everything you need to be aware of when tackling the world of the dark web. Step by step, you’ll gain acumen in the tactics that cybercriminals are adopting and be equipped with the arsenal of strategies that are available to you as a cybersecurity specialist. This cyber security book ensures that you are well acquainted with all the latest techniques to combat dark web criminality. After a primer on cybercrime and the history of the dark web, you’ll dive right into the main domains of the dark web ecosystem, reaching a working understanding of how drug markets, child pornography, and human trafficking operate. Once well-versed with the functioning of criminal groups, you’ll be briefed on the most effective tools and methods being employed by law enforcement, tech companies, and others to combat such crimes, developing both a toolkit and a mindset that can help you stay safe from such criminal activities and can be applied in any sector or domain. By the end of this book, you’ll be well prepared to begin your pushback against the criminal elements of the dark web.
Table of Contents (15 chapters)
1
Part 1:Introduction to Cybercrime and Dark Web’s History
4
Part 2:The Dark Web’s Ecosystem and Major Crimes
9
Part 3:Efforts to Combat Crimes on the Dark Web

An Introduction to the Dark Web

This chapter covers a wide range of topics about the Dark Web. It starts with an introduction to the history of the Dark Web, as well as how this hidden part of the internet evolved throughout the years. Subsequently, this chapter describes in detail the three most used tools for accessing the Dark Web, which are The Onion Router (TOR) network, the Invisible Internet Project (I2P), and the Freenet software. Finally, this chapter concludes with a description of cryptocurrencies and how they are used to conduct criminal activities on the Dark Web. The main objective of this chapter is to give an overview of how the Dark Web works and how regular people can access it. Additionally, it helps to understand how the combination of Dark Web accessing tools along with the use of cryptocurrencies allows criminals to expand their activities on the internet. Specifically, this chapter covers the following topics:

  • History of the Dark Web
  • The TOR browser...