Combating Crime on the Dark Web

Book description

Know your enemy and counter the dark web criminality with this easy-to-follow guide, including a detailed tour of the dark web ecosystem and the tools and tactics used to mitigate cyber threats

Key Features

  • Get up to speed with the ins and outs of cybercriminal activity on the dark web
  • Become familiar with the tools and techniques that are used to fight serious crime
  • Gain a keen understanding of the crime ecosystem on the dark web and the best practices to keep it in check

Book Description

In today’s world, the crime-prevention landscape is impossible to navigate. The dark web means new frontiers of combat against bad actors that pop up daily. Everyone from narcotics dealers to human traffickers are exploiting the dark web to evade authorities. If you want to find your feet in this tricky terrain and fight crime on the dark web, take this comprehensive, easy-to-follow cyber security guide with you.

Combating Crime on the Dark Web contains everything you need to be aware of when tackling the world of the dark web. Step by step, you’ll gain acumen in the tactics that cybercriminals are adopting and be equipped with the arsenal of strategies that are available to you as a cybersecurity specialist.

This cyber security book ensures that you are well acquainted with all the latest techniques to combat dark web criminality. After a primer on cybercrime and the history of the dark web, you’ll dive right into the main domains of the dark web ecosystem, reaching a working understanding of how drug markets, child pornography, and human trafficking operate. Once well-versed with the functioning of criminal groups, you’ll be briefed on the most effective tools and methods being employed by law enforcement, tech companies, and others to combat such crimes, developing both a toolkit and a mindset that can help you stay safe from such criminal activities and can be applied in any sector or domain. By the end of this book, you’ll be well prepared to begin your pushback against the criminal elements of the dark web.

What you will learn

  • Understand the history of cybercrime, the dark web, and the use of Tor
  • Discover the ecosystem of dark web drug markets
  • Become familiar with the methods law enforcement use to stop child abusers
  • Dive deep into real-life human trafficking cases and how they were tackled
  • Explore sting operations, honeypots, and cybercrime prevention methodologies
  • Gain expertise in Pipl Search, MEMEX, BITCRIME, and other anti-crime tools
  • Investigate open-source intelligence and intelligence-led policing
  • Set up a framework for disrupting organized crime on the dark web

Who this book is for

This book is for aspiring cybercrime investigators, cybersecurity enthusiasts, and anyone else who is interested in learning about this dark side of the internet. The book mainly focuses on preventing crimes on the dark web and is written in a simple way so that you can understand it with ease.

Table of contents

  1. Combating Crime on the Dark Web
  2. Contributors
  3. About the author
  4. About the reviewer
  5. Disclaimer
  6. Preface
    1. Who this book is for
    2. What this book covers
    3. Conventions used
    4. Get in touch
    5. Share Your Thoughts
    6. Download a free PDF copy of this book
  7. Part 1:Introduction to Cybercrime and Dark Web’s History
  8. Chapter 1: An Introduction to Cybercrime
    1. Classification of major cybercrimes
      1. Types of cyberattacks 
      2. Evolution of cybercrime
      3. The internet’s three primary levels 
    2. Dark Web access tools
    3. Summary
  9. Chapter 2: An Introduction to the Dark Web
    1. History of the Dark Web
    2. The TOR browser and other Dark Web technologies
      1. How the TOR network works
      2. Orbot – the mobile version of the TOR browser
      3. Conclusion to the TOR network
      4. I2P
      5. Freenet
    3. The use of cryptocurrencies on the Dark Web
      1. Introduction to cryptocurrencies
      2. The use of cryptocurrencies on the Dark Web
      3. Conclusion to cryptocurrencies
    4. Summary
  10. Part 2:The Dark Web’s Ecosystem and Major Crimes
  11. Chapter 3: Drug Markets on the Dark Web
    1. Drug markets’ ecosystem
    2. What enables transactions between buyers and sellers
    3. Ways law enforcement, the private sector, and the public fight Dark Web drug markets
      1. BITCRIME
      2. More fluid jurisdictional laws and shared data
    4. The impact of the Dark Web on drug trafficking
    5. Summary
  12. Chapter 4: Child Pornography on the Dark Web
    1. Child sexual abuse and child sexual exploitation terms
    2. Offenders’ behaviors, tactics, and methods
    3. Efforts to reduce child abuse on the Dark Web
      1. Project Arachnid
      2. Project Safe Childhood
      3. Stop Child Abuse – Trace an Object
      4. MFScope
      5. Collaborative approach
    4. Summary
  13. Chapter 5: Human Trafficking on the Dark Web
    1. Types of human trafficking
    2. Offenders’ behaviors, tactics, and methods
      1. Offenders’ behaviors
      2. Offenders’ tactics
      3. Offenders’ methods
    3. Efforts to mitigate Dark Web human trafficking
      1. Intelligence-led policing
      2. Pipl Search
      3. Banks and fintech
      4. Collaborative approach
    4. Summary
  14. Chapter 6: Cyberterrorism on the Dark Web
    1. What is terrorism?
    2. Why do terrorists use the Dark Web?
    3. How do terrorists operate on the Dark Web?
    4. Countering Dark Web terrorism
    5. Summary
  15. Part 3:Efforts to Combat Crimes on the Dark Web
  16. Chapter 7: Efforts for Combating Crime on the Dark Web
    1. Law enforcement techniques
      1. Sting operations
      2. Honeypot traps
    2. Tools for combating crime on the Dark Web
      1. Traffic confirmation attack
      2. OSINT
      3. The MEMEX project
    3. Recommendations
    4. General needs and challenges
    5. Summary
  17. Chapter 8: System for Combating Crime on the Dark Web
    1. Problem identification
    2. Problem handling
    3. The feasibility of creating a universal system
    4. Steps to creating a system
    5. Final system proposal
    6. Centralized system design – IDH
      1. Considerations for central intelligence hub system design
      2. Hub control
      3. Hub functions
    7. Summary
  18. Chapter 9: Discussion and Evaluation
    1. Structure of the research
      1. Research process
      2. Philosophical paradigm
    2. Overview of the research
    3. Final tips on how to use the Dark Web
    4. Summary
  19. Index
    1. Why subscribe?
  20. Other Books You May Enjoy
    1. Packt is searching for authors like you
    2. Share Your Thoughts
    3. Download a free PDF copy of this book

Product information

  • Title: Combating Crime on the Dark Web
  • Author(s): Nearchos Nearchou
  • Release date: February 2023
  • Publisher(s): Packt Publishing
  • ISBN: 9781803234984