Published on 4th February 2025
Authored By: Tanya
Bharati Vidyapeeth, New law college, Pune
Introduction
Everyone in the modern world has access to the internet, and everything can be found there. The internet is a huge and amazing resource that offers a wealth of entertainment, knowledge, and chances for interaction and business. It allows a million computers to be linked by establishing a network on which each device can communicate with other computers as long as it is linked to the Internet. With this, you can talk to anyone in this world. However, there is a hidden world, a region of dubious websites, private forums, and illegal marketplaces, beneath the surface of the regular internet. The norms of the regular internet do not apply on the dark web, where secrecy and anonymity are paramount[1]Â
Conversely, the Dark Web is a particular section of the Deep Web that is likewise concealed but only reachable with the use of specialist software and tools because activities on the Dark Web are anonymous, it serves as a haven for criminal’s activities including drug sales and cybercrime. Law enforcement finds it challenging to ensure safety and security on the Dark Web because of the anonymity it offers, which also makes it harder to identify illicit activity.
The Dark Web is unaccountable since users cannot be identified on this site.
In this blog post, we’ll delve into the world of the dark web, exploring its history, its inner workings, and the secrets it holds. We’ll also examine the risks and dangers of the dark web, and also provide high profile cases involving the Dark Web in the recent years.
What is the Dark Web?
The dark web is a part of the internet that is intentionally hidden and not indexed by search engines like Google or Bing. It is a network of websites and forums that are accessible only
through specialized software, such as Tor (The Onion Router) or I2P (Invisible Internet Project).[2]
Though it offers far more privacy, the dark web is very similar to the standard World Wide Web that we are all accustomed with. It’s well known that the dark web is a location to locate and get in touch with hitmen and drug dealers.Â
While this is true, the dark web also provides a welcome haven from intrusive government monitoring and corporate capitalism, which follows you around the internet.Â
The dark web gets its name because it offers seclusion, which may be used for both good and bad, not because it is intrinsically terrible.Â
Without a question, criminals take advantage of the additional seclusion provided by the dark web to host illicit information, trade narcotics, swindle people, and more.
The dark web is often associated with illicit activities, such as the sale of drugs, weapons, and stolen data. However, it also has a number of legitimate uses, such as providing a platform for whistle blowers and activists to communicate anonymously, and allowing people in repressive regimes to access information and connect with others.[3]
History of the Dark Web
The dark web, a term used to describe the hidden and anonymous corners of the internet, has a rich and fascinating history. From its early beginnings as a tool for anonymous communication to its current status as a hub for illicit activity, the dark web has evolved significantly over the years.
Early Beginnings: The Onion Routing Project (1990s) The concept of the dark web began to take shape in the 1990s, when the US Navy developed the Onion Routing project. This project, led by Paul Severson, David Goldstar, and Michael
Reed, aimed to create a system for anonymous communication over the internet[4]
The Onion Routing project used a technique called “onion routing” to encrypt and anonymize internet traffic. This technique involved encrypting data in multiple layers, like an onion, and then routing it through a network of servers to conceal the user’s identity and location.Â
The Birth of the Dark Web: The Launch of Freenet (2000)
In 2000, a computer scientist named Ian Clarke launched Freenet, a decentralized network that allowed users to share files and communicate anonymously. Freenet was one of the first networks to use onion routing to anonymize internet traffic, and it quickly gained popularity among those seeking anonymity online.[5]
The Rise of the Dark Web: The Launch of Tor (2002)
In 2002, the US Naval Research Laboratory launched Tor, a free and open-source software that allowed users to browse the internet anonymously. Tor used onion routing to encrypt and anonymize internet traffic, making it difficult for anyone to track the user’s identity and location.6
The Silk Road and the Rise of Dark Web Marketplaces (2011)
In 2011, a dark web marketplace called Silk Road was launched, allowing users to buy and sell illicit goods and services anonymously. Silk Road quickly gained popularity, and it became one of the largest and most well-known dark web marketplaces.Â
The Shutdown of Silk Road and the Rise of New Dark Web Marketplaces (2013)
In 2013, the FBI shut down Silk Road, and its founder, Ross Ulbricht, was arrested and sentenced to life in prison. However, the shutdown of Silk Road did not mark the end of the dark web. Instead, it led to the rise of new dark web marketplaces, such as Alpha Bay and Hansa.[6]
The Current State of the Dark Web (2020)
Today, the dark web is a thriving ecosystem of anonymous websites, forums, and marketplaces. It is estimated that there are over 2 million websites on the dark web, ranging from legitimate platforms for whistle-blowers and activists to illicit marketplaces for drugs, weapons, and stolen data.Â
How the Dark Web Works
The dark web is a complex and decentralized network, made up of thousands of websites and forums. It is accessible only through specialized software, such as Tor[7] or I2P, which allows users to browse the internet anonymously[8]
To access the dark web, users must first download and install the Tor browser, which is available for free from the Tor Project website. Once the browser is installed, users can access the dark web by typing in the URL of a dark web website, or by using a search engine like DuckDuckGo.[9]Â
How Tor Works
Here’s a step-by-step explanation of how Tor works:
- The User Installs Tor: The user downloads and installs the Tor browser on their computer.
- The User Requests a website: The user requests a website on the dark web by typing in the website’s URL.
- The Request is Encrypted: The request is encrypted in multiple layers, like an onion, using a technique called onion routing.
- The Request is Routed Through the Tor Network: The encrypted request is routed through the Tor network, which consists of thousands of volunteer-run servers around the world.
- The Request is Decrypted: The request is decrypted at each server in the Tor network, revealing only the IP address of the previous server.
- The Request is Forwarded: The request is forwarded to the next server in the Tor network, where it is re-encrypted and forwarded again.
- The Request Reaches the Destination Server: The request finally reaches the destination server, which is the website the user requested.
- The Response is Sent Back: The website sends a response back to the user, which is encrypted and routed through the Tor network in the same way as the original request.[10]
Risks and Dangers of the Dark Web
While the dark web can be a powerful tool for anonymity and freedom of speech, it also poses a number of risks and dangers. Some of the most significant risks include:
- Malware and viruses: The dark web is a breeding ground for malware and viruses, which can infect your computer and steal your personal data.
- Scams and phishing: The dark web are full of scams and phishing sites, which can trick you into revealing your personal data or sending money to scammers.
- Illicit activities: The dark web is often associated with illicit activities, such as the sale of drugs, weapons, and stolen data. Participating in these activities can put you at risk of arrest and prosecution.
- Anonymity risks: While the dark web provides anonymity, it also poses risks to your anonymity. If you’re not careful, you can reveal your identity or location, which can put you at risk of harassment or prosecution.
Cases Relating to Dark Web
- Eleven of their email accounts were hijacked in a cyberattack discovered by the International Monetary Fund (IMF) in February 2024. Investigations into the attackers and their motivations are ongoing. Thankfully, the IMF was able to swiftly secure the hacked accounts and has not discovered any indications of a more extensive incident. This event serves as a reminder of how susceptible email systems are to cyberattacks, especially phishing scams, in which hackers attempt to fool staff members disclosing login information. Organizations like the IMF can use multi-factor authentication and regularly train staff on cybersecurity best practices to stop such instances from happening again[11].
- In September 2014, JPMorgan Chase, one of the largest banks in the US, disclosed that cyberattacks compromised accounts of over 76 million households and 7 million small businesses. Although the attack was initially thought to have only affected 1 million accounts, investigations found that the attack was much worse, lasting about an entire month from June to July. JPMorgan Chase customers luckily didn’t suffer any financial fraud, as the data breach was limited to names, emails, and phone numbers. However, further investigations found that the hack also reached JPMorgan servers by stealing a bank employee’s identity. Gigabytes of sensitive data were stolen and later linked to a Russian attack by the FBI. Following the incident, JPMorgan executives pledged to spend $250 million annually to secure their data properly.[12]
- Balnmeet Singh ‘s $100M+ Dark Web Empire gets brought to light. Starting with a fairly recent case, Balnmeet Singh of Haldwani, Northern India was sentenced to eight years in prison in late January 2024 after he was found to have created and led a multi-million dollar drug enterprise. The Indian national also forfeited $150 million in cryptocurrency. This proved to be illegal drug money that was laundered into cryptocurrency.[13]
Conclusion
The Dark web is a hidden and secretive part of the internet that poses a threat to our online safety. With its anonymous nature and lack of regulation, the dark web has become a breeding ground for cybercrime, malware, and other illicit activities.
In light of the risks and dangers, its strongly advised that you avoid using the dark web altogether.Â
Remember, your safety and security is paramount. By avoiding the use of dark web and taking steps to protect yourself online, you can significantly reduce your risk of falling victim to cybercrime and other online threats.
Â
References
[1] R. Basheer, B. AL khatib
Threats from the dark: a review over dark web investigation research for cyber threat intelligence Journal of Computer Networks and Communications (2021)
[2] A Research Paper on Dark Web”, International Journal of Emerging Technologies and Innovative Research
(www.jetir.org), ISSN:2349-5162, Vol.6, Issue 4, page no.322-327, April-2019, Available: http://www.jetir.org/papers/JETIREQ06074.pdf
[3] Unveiling Shadows: Exploring the Dark Web’s Impact on Indian Law and Society
 Jul 5, 2024 Information Technology/Cyber Law- Manupatra
[4] Severson, P., Goldstar, D., & Reed, M. (1997). Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4), 482-494.
[5] Goldstar, D., Reed, M., & Severson, P. (1996). Onion routing for anonymous communication.
Proceedings of the 2nd International Workshop on Designing Privacy Enhancing Technologies, 1-15. 6 Christin, N. (2013). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. Proceedings of the 22nd International Conference on World Wide Web, 213-224
[6] Greenberg, A. (2013). Silk Road shutdown: How the FBI took down the world’s biggest online black market.
Forbes.
[7] Tor Project, Tor: Overview, < https://www.torproject.org/about/overview.html.en. >
[8] Raman, Raghu, et al. “Dark web research: Past, present, and future trends and mapping to sustainable development goals.” Helion 9.11 (2023).
[9] Finkle, K.M., 2015. Dark web [online]
[10] Finkle, Kristin M. Dark web. 2015.
[11] Top data breaches < https://strobes.co/blog/top-data-breaches-in-2024-month-wise/ >
[12] Biggest data breaches available on: < https://www.upguard.com/blog/biggest-data-breaches-us >
[13] VRN cases of dark web < https://vpnoverview.com/privacy/anonymous-browsing/notorious-dark-web-cases/ >