The Dark Web and the Role of Secure Human Behaviors

j21v2-The-Dark-Web
Author: Babur Kohy, Warren D. Holston and Ibrahim Waziri Jr., Ph.D.
Date Published: 26 February 2021
Related: ISACA Tech Brief: The Darknet | Digital | English

Dark web concepts are helpful for preserving the privacy and security of its users. These hidden corners of the Internet provide anonymity for people who are oppressed by their governments, free speech to journalists, and secure communication channels for the layman and the expert alike. These are a few ways the dark web is being used for ethical purposes. For example, The Onion Router (Tor) is a specially configured version of the Firefox web browser, which routes users browsing traffic through the Tor anonymous network, making it difficult to track a user’s actual Internet Protocol (IP) address.1 Tor provides its users anonymous communication capabilities when used as recommended by the Tor project. This free tool was developed to provide anonymity for its users through multilevel encryption and proxy connections throughout the world. There are several popular dark web gateways including, but not limited to:

  • Tor, again, is the most popular and easiest of all dark web gateways that support multiple platforms such as Android.2
  • ZeroNet was developed based on blockchain technology and a decentralized network model to give each user power over their instance of the platform.
  • Invisible Internet Project (I2P) was developed to provide secure messaging capabilities using garlic routing and method drives from onion routing.
  • Freenet is another highly encrypted, decentralized platform that provides capabilities for its users for secure and private communications.

It is important to spread awareness of dark web concepts by educating the community on understanding well-known gateways and the role secure behavior plays in the ethical or malicious use of these concepts.

Background

Dark web concepts are often discussed without context. This is mainly because the concepts are misunderstood and misrepresented. It takes research, practical experience and hands-on investigation to really understand what the dark web is.

The dark web most often makes headlines regarding breached data and illegal activity such as buying or selling drugs, pornography, financial data dumps, and selling or trading weapons. The dark web also serves as an anonymous communication platform to many in oppressed regions of the world. In fact, the layered networking and encryption concepts used for the dark web today were developed to promote anonymity at the US Naval Research Lab (NRL) in the 1990s.3 The well-known and most widely used of all gateways, the Tor browser, reported an average of 2 million users in November 2020.4

IT TAKES RESEARCH, PRACTICAL EXPERIENCE AND HANDS-ON INVESTIGATION TO REALLY UNDERSTAND WHAT THE DARK WEB IS.

For the purposes of this discussion, the web can be categorized into three main categories:

  1. Surface web—This is open access to anyone with an Internet connection and a web browser.
  2. Deep web—This refers to any website that cannot be readily accessed through any conventional search engine such as Google or Yahoo.5 The concept is used by businesses, academia, governments, and anyone who stores information that requires authentication and authorization. It is estimated that the deep web could be 500 times bigger than the normal web.6 This assumption comes from the fact that most of the content on the web is hidden behind some type of a gate and requires a key, such as a username and password, to access it.
  3. Dark web—This is a series of private portals running either on the open Internet backbone or on a private network that is not indexable to search engines.7 Governments, law enforcement professionals, activists, researchers, journalists and oppressed populations use the dark web for secure, private communications and anonymous searching. However, it is also used for illegal activity.

Early Days of Connecting Computers

The concept of connecting computers started in the late 1960s with the development of the Advanced Research Project Agency Network (ARPANET), a US Department of Defense (DoD) project.8 The purpose of this project was to connect the DoD-funded research and development institution computers to optimize communication and streamline information sharing. The United States developed this network of decentralized computers during the Cold War to make it impossible for the enemy to attack one central location to take out all communications systems in case of escalating of hostilities.9 The development and launch of the ARPANET digitized communication and information sharing between multiple DoD locations, which enabled agencies to share information like never before to aid them with their missions. Within a few years, a network of isolated and secretive connections began to appear; some of which were called the “darknets” or “dark web.”

Dark Web Gateways

There are four decentralized gateways: ZeroNet, FreeNet, Tor and I2P.

ZeroNet
ZeroNet is a newer gateway that uses bitcoin cryptography and the BitTorrent network.10 The platform user interface is modern and has many features such as the capability for email, message boards, web hosting and blogging, as shown in the ZeroNet landing page in figure 1. The network is completely decentralized, similar to blockchain technology concepts. Even though it is highly encrypted, that does not mean it is foolproof. Users need to be proactive and exercise good judgment by ensuring that they are not oversharing personal information, and their connections are further secured by turning on the Tor relay feature before engaging with the platform. Without critical thinking, good behavior and a well-developed plan, users can get entangled in unsecure and compromising situations very quickly.

Figure 1

FreeNet
Freenet is a free program that lets users anonymously browse the web, share files and chat on forums no matter where they are located.11 With FreeNet, users can browse websites, post on forums and publish files within the network with strong privacy protections.12 The developers of the platform describe it as censorship resistant, which means it is not completely censorship proof. Because the gateway is not censorship proof, it is vital for users to practice good behavior when investigating this gateway. Behaviors such as reading platform documents, understanding network communication security, and testing the capabilities between dark web and surface web configurations enhances the user experience and reduces the risk of being identified. The platform can be used successfully and with the utmost privacy as long as the user has a good plan of action before downloading and using.

Tor
Tor can help users defend against tracking and surveillance and circumvent censorship.13 Tor is arguably the easiest gateway to download, install, configure and use. This is mainly because most people are accustomed to using browsers to access the Internet. Dark web sites through Tor requires a .onion address for access. Tor uses a relay system for encryption with a minimum of three relays before the user exits the network and enters the Internet. This reduces the chance of attribution by anyone monitoring the network.

Even with all the technical capabilities Tor provides, it cannot protect the user from bad behavioral habits. The key to effective use of Tor is to practice sound cyberhygiene and follow the Tor project rules carefully. For example, Tor project has many recommendations on what not to do with the browser, and these recommendations should be closely followed. Historically, technology has not failed us, though humans have. Bad behavioral patterns such as using the same username across multiple platforms is one way Tor users can be deanonymized.

Figure 2 illustrates Tor browser use and the number of relays (hops) Tor uses before getting the user to its intended website (e.g., Google). The same action is done twice using two separate browsing sessions to showcase relay changes each time a site is requested.

Figure 2

I2P
The I2P network provides strong privacy protections for communication over the Internet.14 This gateway is set up as a peer-to-peer network where users can launch websites, start forums, and send and receive encrypted emails. Even though some features are similar to other gateways, the platform is much slower in performance than any other. Users need to ensure that the network is up and running for many hours before they can access the data. The highly secure encryption and routing makes the network extremely slow. The only way to investigate this platform securely is to practice secure behavior such as patience, critical thinking and fact-based investigation. Without good behavior and a solid plan of action, this platform has the potential to get the user in trouble quickly.

Governing the Dark Web

It is extremely difficult to govern the dark web, portals and networks because the concepts were developed with decentralization and peer-to-peer encrypted connections. Decentralized means there is not a single repository of registered domains, no single point of failure, complex networks of proxy servers and single key encryption. Since each user has control over the domain they deploy on the dark web, they avoid participating in any form of governance. Further, multiple layers of encryption are applied using private encryption keys. The use of bulletproof hosting providers further strengthens the user’s privacy and security because these domain service providers are more lenient with users about the types of content hosted or shared. Bulletproof hosting providers do not usually answer to government requests and do not share information about their customers. Decentralization, layered encryption and bulletproof hosting provide the user better control over their data and communications.

DECENTRALIZATION AND ADVANCED ENCRYPTION MAKE IT EXTREMELY DIFFICULT TO GOVERN THE DARK WEB.

Conclusion

Dark web concepts have been around for decades providing security, privacy and anonymity to its users. There are multiple gateways to access the dark web such as Tor, Freenet, ZeroNet and I2P. Each of these are layers that operate on top on the Internet enabling peer-to-peer networking. Dark web networks are highly decentralized and use advanced encryption during communication. Decentralization and advanced encryption make it extremely difficult govern the dark web. Secure behaviors, having a plan of action and critical thinking are keys to success while operating in the gateways. This research can be expended on by researching governance, ethical versus malicious use and content analysis for each individual gateway and resolving identities relating to the dark web.

Endnotes

1 Greenberg, A; “How to Use Tor and Go Anonymous Online,” Wired, 9 December 2017, www.wired.com/story/the-grand-tor/
2 “How to: Use Tor for Android,” Surveillance Self-Defense, 11 March 2020, ssd.eff.org/en/module/how-use-tor-android
3 The Tor Project, Inc., “History,” www.torproject.org/about/history/
4 Tor Metrics, “Users,” www.metrics.torproject.org/userstats-relay-country.html
5 Sheils, C.; “Enter the Deep and Dark Web if You Dare (and Get Ready for a Surprise),” Digital.com, 5 August 2020
6 Choudhury, S. R.; A. Kharpal; “The ‘Deep Web’ May Be 500 Times Bigger Than the Normal Web. Its Uses Go Well Beyond Buying Drugs,” CNBC, 7 September 2018, www.cnbc.com/2018/09/06/beyond-the-valley-understanding-the-mysteries-of-the-dark-web.html
7 Guccione, D.; “What Is the Dark Web? How To Access It and What You’ll Find,” CSO, 5 March 2020, http://www.csoonline.com/article/3249765/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html
8 Featherly, K.; “ARPANET: United States Defense Program;” Britannica, http://www.britannica.com/topic/ARPANET
9 Ibid.
10 ZeroNet, http://zeronet.io/
11 Gralla, P.; “Freenet Lets You Browse the Web Freely,” PCWorld, 25 November 2009, http://www.pcworld.com/article/174621/Freenet.html
12 Freenet, http://freenetproject.org/index.html
13 The Tor Project: Privacy and Freedom Online, http://www.torproject.org/
14 Invisible Internet Project, http://geti2p.net/en/about/intro

Babur Kohy

Is an accomplished cybersecurity professional in cyberdefense, cloud security, threat/risk management and organizational resilience. He lectures extensively on deep and dark web techniques for the identification and exploitation of dark net gateways to enhance personal security and anonymity. He is the ISACA® academics director for the Greater Washington DC Chapter. He is the founder of CyTalks.com, a platform for cybersecurity training and discussions.

Warren D. Holston

Is a technical operations officer and has worked in the intelligence and defense industry, including at the US Department of Defense (DoD), for more than 30 years. He has served as a US Navy explosive ordnance disposal diver, a collection officer and senior manager at the US Central Intelligence Agency (CIA), and a subject-matter expert for the US DoD Special Operations Command. He has managed and conducted counterterrorism, covert

Ibrahim Waziri Jr., Ph.D.

Is a senior manager with Microsoft Azure Government Engineering working on cloud security compliance engineering and automations. He is also an adjunct professor of cybersecurity at Marymount University (Arlington, Virginia, USA). His research focuses on cloud infrastructure security; virtualization and hypervisors; identity and access management; network security; robotics process automation (RPA); open-source intelligence (OSINT); secure digital development policies; and cybersecurity governance, risk management and compliance (GRC) strategies and policies. He has more than a decade of working experience within the industry, including in US federal and national security agencies in the defense, intelligence, treasury, international trade and health sectors.