Abstract
The dark web consists of those websites that cannot be accessed except through special anonymizing software, most commonly the Tor package. Web services hidden this way have proved extremely difficult for authorities to track down. While there are many legitimate hidden sites, the dark web has also attracted a wide range of criminal enterprises, often enabled by the availability of anonymous cryptocurrency payments. While Tor has some theoretical weaknesses, most law-enforcement actions against hidden sites (the Silk Road, Playpen, etc.) have succeeded only because of operational mistakes by the sites’ administrators.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
“B”, David. (2014, January 29). Common darknet weaknesses 3: DNS leaks and application level problems, privacy PC. Available at http://privacy-pc.com/articles/common-darknet-weaknesses-3-dns-leaks-and-application-level-problems.html. Accessed Mar 2018.
Bearman, J., & Hanuka, T. (2015, April). The rise and fall of silk road. Wired Magazine. Available at https://www.wired.com/2015/04/silk-road-1/.
Brandom, R. (2013, December 18). FBI agents tracked Harvard bomb threats despite Tor. The Verge. Available at https://www.theverge.com/2013/12/18/5224130/fbi-agents-tracked-harvard-bomb-threats-across-tor. Accessed Feb 2018.
Brandom, R. (2015, January 21). Feds found Silk Road 2 servers after a six-month attack on Tor. The Verge. Available at https://www.theverge.com/2015/1/21/7867471/fbi-found-silk-road-2-tor-anonymity-hack. Accessed Feb 2018.
Chaum, D. (1981, February). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84–89.
Crocker, A. (2016, September 28). Why the warrant to hack in the playpen case was an unconstitutional general warrant. Electronic Frontier Foundation. Available at https://www.eff.org/deeplinks/2016/09/why-warrant-hack-playpen-case-was-unconstitutional-general-warrant. Accessed Feb 2018.
Dingledine, R., Nick Mathewson, N., & Syverson, P. (2004, August). Tor: The second-generation onion router. In Proceedings of the 13th USENIX security symposium, San Diego, California.
Dutch National Police Corps. (2017, July 20). Underground Hansa Market taken over and shut down. Available at https://www.politie.nl/en/news/2017/july/20/underground-hansa-market-taken-over-and-shut-down.html. Accessed Mar 2018.
FBI. (2017, July 20). Darknet takedown: Authorities shutter online criminal market AlphaBay, Federal Bureau of Investigation announcement. Available at https://www.fbi.gov/news/stories/alphabay-takedown. Accessed Mar 2018.
Federal Rules of Criminal Procedure. Rule 41: Search and seizure. Available at https://www.law.cornell.edu/rules/frcrmp/rule_41. Accessed Mar 2018.
Greenberg, A. (2015, April). Silk road boss’ first murder-for-hire was his mentor’s idea. Wired Magazine. Available at https://www.wired.com/2015/04/silk-road-boss-first-murder-attempt-mentors-idea. Accessed Mar 2018.
Greenberg, A. (2018, March). Operation bayonet: Inside the sting that hijacked an entire dark web drug market. Wired Magazine. Available at https://www.wired.com/story/hansa-dutch-police-sting-operation. Accessed Mar 2018.
Hern, A. (2013, October 3). Five stupid things dread pirate Roberts did go get arrested, The Guardian. Available at https://www.theguardian.com/technology/2013/oct/03/five-stupid-things-dread-pirate-roberts-did-to-get-arrested. Accessed Feb 2018.
Hintz, A. (2013). Fingerprinting websites using traffic analysis. In Proceedings of the 2nd international conference on Privacy Enhancing Technologies (PET), 2003.
Johnson, A., Chris, W., Jansen, R., Sherr, M., & Syverson, P. (2013, November). Users get routed: Traffic correlation on tor by realistic adversaries. In Proceedings of the 2013 ACM SIGSAC conference on computer & communications security.
Judge Katherine Forrest. (2015, May 29). United States of America v Ross Ulbricht, 14 Cr. 68 (KBF) (sentencing hearing). Available at https://freeross.org/wp-content/uploads/2015/05/Sentencing_2015-May-29.pdf. Accessed Feb 2018.
Judge Richard Voorhees. (2017, April 19). U.S. v. Chase, Amended Preliminary Order of Forfeiture (Docket No. 5:15cr15). Available at https://www.leagle.com/decision/infdco20170420c76. Accessed Apr 2018.
Krebs, B. (2014). Silk road lawyers poke holes in FBI’s story. KrebsonSecurity. Available at https://krebsonsecurity.com/2014/10/silk-road-lawyers-poke-holes-in-fbis-story. Accessed Mar 2018.
Krebs, B. (2015). Dark web’s “evolution market” Vanishes. KrebsonSecurity. Available at https://krebsonsecurity.com/2015/03/dark-webs-evolution-market-vanishes. Accessed Mar 2018.
Krebs, B. (2017). Exclusive: Dutch cops on AlphaBay “Refuges”. KrebsonSecurity. Available at https://krebsonsecurity.com/2017/07/exclusive-dutch-cops-on-alphabay-refugees. Accessed Mar 2018.
Levine, Y. (2014, July 16). Almost everyone involved in developing Tor was (or is) funded by the US government. Pando.com. Available at https://pando.com/2014/07/16/tor-spooks. Accessed Mar 2018.
Newman, L. H. (2017, March 7). The feds would rather drop a child porn case than give up a Tor exploit. Wired Magazine. Available at https://www.wired.com/2017/03/feds-rather-drop-child-porn-case-give-exploit. Accessed Mar 2018.
O’Neill, P. H. (2014, November 7). The police campaign to scare everyone off Tor. The Daily Dot. Available at https://www.dailydot.com/layer8/tor-crisis-of-confidence/. Accessed Mar 2018.
Popper, N. (2015, December 25). The tax sleuth who took down a drug lord. The New York Times. Available at https://www.nytimes.com/2015/12/27/business/dealbook/the-unsung-tax-agent-who-put-a-face-on-the-silk-road.html. Accessed Mar 2018.
Popper, N (2017, July 18). Hansa market, a dark web marketplace, bans the sale of fentanyl. The New York Times. Available at https://www.nytimes.com/2017/07/18/business/dealbook/hansa-market-a-dark-web-marketplace-bans-the-sale-of-fentanyl.html. Accessed Mar 2018.
Rumold, M. (2016, September 15). Playpen: The story of the FBI’s unprecedented and illegal hacking operation. Electronic Frontier Foundation. Available at https://www.eff.org/deeplinks/2016/09/playpen-story-fbis-unprecedented-and-illegal-hacking-operation. Accessed Feb 2018.
Syverson, P., David Goldschlag, D., & Michael Reed, M. (1997, May). Anonymous connections and onion routing. In Proceedings of the 1997 IEEE symposium on security and privacy.
Syverson, P., Tsudik, G., Reed, M., & Landwehr, C. (2000, July). Towards an analysis of onion routing security, international workshop on designing privacy enhancing technologies: design issues in anonymity and unobservability (pp. 96–114). Berkeley/New York: Springer.
Tarbell, C. (2014, September 5). Declaration of Christopher Tarbell, United States v Ross Ulbricht, US District Court, Southern District of New York (S1 14 Cr. 68 (KBF)). Available at https://freeross.org/wp-content/uploads/2018/01/140905-Tarbell-Declaration.pdf. Accessed Mar 2018.
The Tor Project, Exit Notice. (undated). This is a tor exit router. https://gitweb.torproject.org/tor.git/plain/contrib/operator-tools/tor-exit-notice.html. Accessed Feb 2018.
The Tor Project, Inc. (undated). Tor: Onion Service Protocol. https://www.torproject.org/docs/onion-services.html.en. Accessed Feb 2018.
The Tor Project, Metrics. (2018). Welcome to tor metrics. https://metrics.torproject.org. Accessed Apr 2018.
Ulbricht, R. (by assumption) (2013). https://stackoverflow.com/questions/15445285/how-can-i-connect-to-a-tor-hidden-service-using-curl-in-php, March 2013. Accessed Mar 2018.
Ulbricht, R. (2015 [estimated]). https://www.linkedin.com/in/rossulbricht. Accessed Mar 2018.
Wikipedia. (undated). Operation onymous. https://en.wikipedia.org/wiki/Operation_Onymous. Accessed Feb 2018.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Dordal, P.L. (2018). The Dark Web. In: Jahankhani, H. (eds) Cyber Criminology. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-97181-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-97181-0_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-97180-3
Online ISBN: 978-3-319-97181-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)