Book Image

Combating Crime on the Dark Web

By : Nearchos Nearchou
Book Image

Combating Crime on the Dark Web

By: Nearchos Nearchou

Overview of this book

In today’s world, the crime-prevention landscape is impossible to navigate. The dark web means new frontiers of combat against bad actors that pop up daily. Everyone from narcotics dealers to human traffickers are exploiting the dark web to evade authorities. If you want to find your feet in this tricky terrain and fight crime on the dark web, take this comprehensive, easy-to-follow cyber security guide with you. Combating Crime on the Dark Web contains everything you need to be aware of when tackling the world of the dark web. Step by step, you’ll gain acumen in the tactics that cybercriminals are adopting and be equipped with the arsenal of strategies that are available to you as a cybersecurity specialist. This cyber security book ensures that you are well acquainted with all the latest techniques to combat dark web criminality. After a primer on cybercrime and the history of the dark web, you’ll dive right into the main domains of the dark web ecosystem, reaching a working understanding of how drug markets, child pornography, and human trafficking operate. Once well-versed with the functioning of criminal groups, you’ll be briefed on the most effective tools and methods being employed by law enforcement, tech companies, and others to combat such crimes, developing both a toolkit and a mindset that can help you stay safe from such criminal activities and can be applied in any sector or domain. By the end of this book, you’ll be well prepared to begin your pushback against the criminal elements of the dark web.
Table of Contents (15 chapters)
1
Part 1:Introduction to Cybercrime and Dark Web’s History
4
Part 2:The Dark Web’s Ecosystem and Major Crimes
9
Part 3:Efforts to Combat Crimes on the Dark Web

Why do terrorists use the Dark Web?

The idea of cyberterrorism has its origins in the early 1990s when studies on the possible hazards posed by the highly networked, high-tech-dependent United States were first published in response to the debate surrounding the burgeoning information society and the rapid development in internet use. We are at risk, the National Academy of Sciences declared in a 1990 report on computer security. US and the world are becoming more and more reliant on computers, and a terrorist of the future could be able to cause more destruction with a keyboard than with a bomb. For modern terrorists, cyberterrorism conducted through the Dark Web is an attractive option for several reasons:

  • It is cheaper than traditional terrorist tactics: Terrorists only need a computer and an internet connection. Instead of purchasing weapons such as guns and bombs, terrorists can construct and distribute computer viruses using phone lines, cables, Bluetooth technologies...