Reader small image

You're reading from  Combating Crime on the Dark Web

Product typeBook
Published inFeb 2023
PublisherPackt
ISBN-139781803234984
Edition1st Edition
Right arrow
Author (1)
Nearchos Nearchou
Nearchos Nearchou
author image
Nearchos Nearchou

Nearchos Nearchou is a determined person and 1st Class BSc (Hons) Computer Science and MSc Cyber Security graduate. He is a big tech-lover and spent several years exploring new innovations in the IT field. Driven by his passion for learning, he is pursuing a career in the Cyber Security world. Passionate about learning new skills and information that can be used for further personal and career development. As well as working individually, he enjoys working as part of a team, in order to deliver projects on time and to the highest possible standard.
Read more about Nearchos Nearchou

Right arrow

Preface

The Dark Web is the content of the Internet that has been intentionally concealed and users need special software and authorization to access it. The main Dark Web access tool is Tor Browser, and it works by hiding your IP address through the onion routing technology. The Dark Web can be used for legitimate purposes, that is, news leaks, whistleblowing, anonymous browsing, and to conduct illegal activities related to narcotics distribution, human trafficking, child pornography, terrorism, and many others.

This book will give you an opportunity to understand how Dark Web crime works and how to avoid the risks associated with it. You will learn how to safely access this hidden part of the Internet and not fall victim to it. Finally, you will learn how to protect your personal data and how to build a strong private online presence.

Disclaimer

Some of the content in this book may be sensitive and may or may not be the opinions, ideas, or beliefs of the author who collected the materials or their informants. The information in this book is for general informational purposes only. Packt makes no representation or warranty, express or implied. Your use of the book is solely at your own risk. This book may contain links to third-party content, which we do not warrant, endorse, or assume liability for.

Who this book is for

This book is targeted at cybersecurity enthusiasts or anyone who is interested in learning about this dark part of the internet. The book mainly focuses on preventing crimes on the Dark Web and is written in a simple way so that literally anyone can understand it.

What this book covers

Chapter 1, An Introduction to Cybercrime, covers a wide range of topics related to cybercrime. It starts with the main types of cybercrime and how you can protect yourself from it. Subsequently, it describes the evolution of cybercrime and how it can affect people’s lives. Finally, the chapter concludes with the three main levels of the internet and the tools you can use to access the Dark Web.

Chapter 2, An Introduction to the Dark Web, starts with a history of the Dark Web and how it has evolved through the years. Additionally, this chapter describes in detail the three main tools used to access the Dark Web, which are the Tor Browser, the Invisible Internet Project (I2P), and Freenet software. Finally, the chapter explains the world of cryptocurrencies and how they are used to conduct illegal activities and transactions on the Dark Web.

Chapter 3, Drug Markets on the Dark Web, goes into detail about the world of narcotics on the Dark Web. The chapter covers a wide range of topics, including the drug market’s ecosystem and what enables transactions between buyers and sellers. Additionally, the chapter describes the ways law enforcement, the private sector, and the public use to fight the Dark Web drug markets.

Chapter 4, Child Pornography on the Dark Web, covers in detail the aspects of this heinous crime. The chapter discusses the issues surrounding Dark Web child pornography and explains the difference between child abuse/exploitation terms. Additionally, the chapter describes the behaviors of pedophiles on the Dark Web and what techniques they use to conduct their illegal activities. The chapter concludes with the various ways law enforcement and the private sector use to detect and capture child offenders on the Dark Web.

Chapter 5, Human Trafficking on the Dark Web, goes through the types of human trafficking and how traffickers behave on this hidden part of the Internet. The chapter covers the tactics and methods offenders use when exploiting vulnerable humans on the Dark Web. Subsequently, the chapter covers the impact Dark Web human trafficking has on society and the ways authorities use it to capture offenders.

Chapter 6, Cyberterrorism on the Dark Web, covers the issues surrounding terrorism on the Dark Web. The chapter starts with an explanation of the various types of cyber terrorists. Next, the chapter describes the reasons why terrorists use the Dark Web and how they can benefit from it. Finally, the chapter concludes with the methods law enforcement uses to prosecute terrorists on the Dark Web.

Chapter 7, Efforts for Combating Crime on the Dark Web, describes the various ways and tools law enforcement and the private sector use to mitigate crime on the Dark Web. The chapter goes into detail about honeypot traps and sting operations, two widely used cybersecurity disruption methods. Additionally, it covers the three best tools (traffic confirmation attack, open source intelligence (OSINT), and the MEMEX project) to effectively combat crime on the Dark Web.

Chapter 8, System for Combating Crime on the Dark Web, describes in detail an efficient system for combating crime on the Dark Web. It utilizes the collaborative approach and suggests that all entities must come together to achieve better results.

Chapter 9, Discussion and Evaluation, provides an overview of the overall research done on crimes that happen on the Dark Web.

Conventions used

There are a number of text conventions used throughout this book.

Code in text: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: “Specifically, websites accessed through the Tor Browser have the .onion domain suffix, a special top-level domain name referring to an anonymous onion service.”

Get in touch

Feedback from our readers is always welcome.

General feedback: If you have questions about any aspect of this book, email us at customercare@packtpub.com and mention the book title in the subject of your message.

Errata: Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you have found a mistake in this book, we would be grateful if you would report this to us. Please visit www.packtpub.com/support/errata and fill in the form.

Piracy: If you come across any illegal copies of our works in any form on the internet, we would be grateful if you would provide us with the location address or website name. Please contact us at copyright@packt.com with a link to the material.

If you are interested in becoming an author: If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, please visit authors.packtpub.com.

Share Your Thoughts

Once you’ve read Combating Crime on the Dark Web, we’d love to hear your thoughts! Please click here to go straight to the Amazon review page for this book and share your feedback.

Your review is important to us and the tech community and will help us make sure we’re delivering excellent quality content.

Download a free PDF copy of this book

Thanks for purchasing this book!

Do you like to read on the go but are unable to carry your print books everywhere? Is your eBook purchase not compatible with the device of your choice?

Don’t worry, now with every Packt book you get a DRM-free PDF version of that book at no cost.

Read anywhere, any place, on any device. Search, copy, and paste code from your favorite technical books directly into your application. 

The perks don’t stop there, you can get exclusive access to discounts, newsletters, and great free content in your inbox daily

Follow these simple steps to get the benefits:

  1. Scan the QR code or visit the link below

https://packt.link/free-ebook/9781803234984

  1. Submit your proof of purchase
  2. That’s it! We’ll send your free PDF and other benefits to your email directly
lock icon
The rest of the chapter is locked
You have been reading a chapter from
Combating Crime on the Dark Web
Published in: Feb 2023Publisher: PacktISBN-13: 9781803234984
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Nearchos Nearchou

Nearchos Nearchou is a determined person and 1st Class BSc (Hons) Computer Science and MSc Cyber Security graduate. He is a big tech-lover and spent several years exploring new innovations in the IT field. Driven by his passion for learning, he is pursuing a career in the Cyber Security world. Passionate about learning new skills and information that can be used for further personal and career development. As well as working individually, he enjoys working as part of a team, in order to deliver projects on time and to the highest possible standard.
Read more about Nearchos Nearchou