Book Image

Combating Crime on the Dark Web

By : Nearchos Nearchou
Book Image

Combating Crime on the Dark Web

By: Nearchos Nearchou

Overview of this book

In today’s world, the crime-prevention landscape is impossible to navigate. The dark web means new frontiers of combat against bad actors that pop up daily. Everyone from narcotics dealers to human traffickers are exploiting the dark web to evade authorities. If you want to find your feet in this tricky terrain and fight crime on the dark web, take this comprehensive, easy-to-follow cyber security guide with you. Combating Crime on the Dark Web contains everything you need to be aware of when tackling the world of the dark web. Step by step, you’ll gain acumen in the tactics that cybercriminals are adopting and be equipped with the arsenal of strategies that are available to you as a cybersecurity specialist. This cyber security book ensures that you are well acquainted with all the latest techniques to combat dark web criminality. After a primer on cybercrime and the history of the dark web, you’ll dive right into the main domains of the dark web ecosystem, reaching a working understanding of how drug markets, child pornography, and human trafficking operate. Once well-versed with the functioning of criminal groups, you’ll be briefed on the most effective tools and methods being employed by law enforcement, tech companies, and others to combat such crimes, developing both a toolkit and a mindset that can help you stay safe from such criminal activities and can be applied in any sector or domain. By the end of this book, you’ll be well prepared to begin your pushback against the criminal elements of the dark web.
Table of Contents (15 chapters)
1
Part 1:Introduction to Cybercrime and Dark Web’s History
4
Part 2:The Dark Web’s Ecosystem and Major Crimes
9
Part 3:Efforts to Combat Crimes on the Dark Web

Countering Dark Web terrorism

The ability to research and combat Dark Web terrorism has been hampered by the secrecy of this area of the web and the absence of practical methodology built for data collecting and analysis on the Dark Web. The possibility of cyberattacks from the Dark Web employing TOR networks was emphasized in IBM’s security division’s report on security threats for the third quarter of 2015. It is extremely essential to offer proof that the Dark Web has evolved into a significant hub for international terrorism and criminal activity in order to inspire the creation of the tools required to combat it. Based on the characteristics of cyberterrorism, it is possible to reconstruct the criminological dimensions of terrorist attacks on the Dark Web. But first, the following questions must be analyzed:

  • Who are the offenders of cyberterrorism (whether the state discards them, whether they are supported by a state, whether they are quasi-public formations...