User:CatherineMITassignment/Dark Web Markets IT Assignment

THIS BLOG IS ONLY TO SHOW I CAN CREATE A BLOG FOR CLASS, IN ORDER FOR THIS TO UPLOAD, I HAD TO DELETE PARTS OF MY ORIGINAL ESSAY AND REFERENCES BECAUSE IT KEPT POPPING UP AS SPAM. AFTER THIS ASSIGNMENT IS GRADED IT WILL BE DELETED



Dark Web Markets

Catherine Madden

Due: February 20th, 2018

George Mason University

Introduction

            “The Internet or the "GRID" as it is commonly known is a sea of data and information that is sent, received, stored and viewed by multiple people whether incognito (private), anonymous or open. No one actually owns the Internet, and no single person or organisation controls the Internet in its entirety.” (Aschmann, M.) In the late 1960’s, internet was first used by experts and scientists, then came more and more into public use by 1990..  The origin of the deep web was actually created by the U.S government for the Department of Defense for use on their computer’s networks, and also for military usage. The knowledge of the Dark Web was brought to the public in 2013, when the Silk Road’s (an illegal dark web market) operator Ross William Ulbricht, or known online as the Dread Pirate Roberts, was arrested (Chertoff, M.). Services such as Tor, while meant to give worldwide internet freedom have created avenues for illegal activity, such as the Silk Road. Tor (The Onion Router) is essential to many users.

Current Use

The deep web is actually used by most people for many things such as everyday use with social media. It is also used by the actual media to check up on the government discreetly, and for users to have better privacy when online. In regards to illegal use, the dark web has “cryptomarkets”, which uses encryption to protect customers who browse through their products. Every day the usage of the dark web, TOR, and the deep web increases. Usage increased back then as a result of concern of being spied on by the U.S government, and is still increasing rapidly.

Security Aspects

            The U.S. military is able to conduct searches and internet work without being tracked since it is hard to pinpoint which is being done by the military or by regular civilians. The deep web is a lot safer for regular civilians to use due to the anonymity it grants them as well. The dark web, in regards to security aspects, is even harder to find out who a user is. “Some Dark Web sites have an additional layer of security and may also require users to input a password. The reason most of the Deep Web is not considered part of the Dark Web is because it can be accessed through Surface Web applications.” (Chertoff M.). Most of the websites use encryption to hide their users. Users exchange online currency known as bitcoin, they use TOR, and use the Pretty Good Privacy (PGP) cryptosystem that hides their identity (Broséus, J). Online currency is essential so that the money doesn’t trace users to their source, and is discreet When making transactions, dealers will request payment during transaction so that it makes it much safer for them to mail products to customers at a very low risk. Additionally, some of the dealers have access to other places so that when a customer requests a product, it can be sent quickly in order to get a good approval rating. Approval ratings are important to the consumer, so that the consumer knows that they are getting a good and “safer” product. Dealers and consumers are given “usernames”, and are given a unique identifier- a PGP key. This allows for users to know that they are dealing with the same entites.

Ethical and Social Implications 

The dark web, which is a part of the deep web, has made it much easy for criminals to anonymously conduct and search up illegal activity. However, there are also positives with the negatives. While the usage of illegal drugs is wanted by the U.S government to completely cease, Tor has databases by its community on advice and information about various drugs, which does prevent overdoses or some bodily harm. In regards to negatives, on Tor and the dark web, there are lots of child abuse websites, the website making it hard to track the source, owners, and users. In addition to child pornography, the dark web also contains illegal porn websites and is involved with human trafficking.

Future Use

Possible future uses for Tor is finding out ways to track down criminals and being able to arrest them. The U.S has learned from China’s mistake of trying to block Tor, which is now much harder to track down users as a result. The U.S government is now trying to find out ways it can help regulate it. “In response to this challenge, federal authorities are actively implementing comprehensive strategies and measures in order to achieve the three objectives identified in the “National Strategy for Homeland Security” report (Office of Homeland Security 2002): (1) preventing future terrorist attacks, (2) reducing the nation’s vulnerability, and (3) minimizing the damage and recovering from attacks that occur. State and local law enforcement agencies, likewise, are becoming more vigilant about the criminal activities that harm public safety and threaten national security.” (Chen H.). The military will also use the dark web to be able to do counter-terrorism, by being able to find out before hand of a possible attack. Also, while it is definitely not encouraged, much information can be gained from users who share knowledge on new and untested drugs that they buy from these illegal markets. It is sort of a “guinea pig”, in the sense that it allows people to see the effects various drugs have on people. In the future, cyber terrorism will also most likely increase. “Cyberterrorists may use hacking techniques to reach the end state of the specific terrorist mission. Although one can argue that hacktivism does not amount to counter-terrorism because hacktivists do not endeavour to kill, maim or terrify, it should be considered that terrorists can hire hacktivists to execute a certain objective in the terror campaign.” (Aschmann, M.)  Cyber terrorism is now a major threat to the world; this endangers companies, governments and more. Hackers would be able to do many things that could devastate civilians.