Professional Documents
Culture Documents
www.batblue.com
Contents
The Darknet: Introduction . . . . . . . . . . . . . . . . . . . . 3
What is ToR?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
How to Access the Darknet . . . . . . . . . . . . . . . . . . . 6
Anonymous Mobility. . . . . . . . . . . . . . . . . . . . . . . . . 7
The Markets of the Darknet. . . . . . . . . . . . . . . . . . . 9
Cryptocurrency. . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Government Responses to the Darknet. . . . . . . . . 15
The Darknets Effect on Cybersecurity . . . . . . . . . 16
Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
About Bat Blue . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
www.batblue.com
Deep Web
What is ToR?
The Onion Router (ToR) is a technology that anonymizes users and allows
them to browse the Internet without revealing their identities, developed by
the U.S. Navy Research Laboratory in the mid-1990s to hide communication.
The Laboratory released the code for ToR under a free license in 2004.
When a user peruses the web with a ToR-based
browser, his or her communications are automatically
bounced off of several other ToR servers before they
reach their destination. The process makes it almost
impossible for anyone to trace the traffic.
Politically
Oppressed
Socially
Disenfranchised
Whistle
Blowers
Illicit Product/
Service Buyers
Criminals
xHATs
Agencies
Drug Cartels
Script Kiddies
Political Terrorists
Contractors
Organized Crime
White Hats
Environmental
Terrorists
Researchers
Human Trafficking
Government
Vulnerability
Researchers
Ethical Hackers
Terrorists
Religious Terrorists
Gray Hats
Hacktivists
Black Hats
Botmasters
Financial Hackers
Hackers
Trolls
www.batblue.com
DARKNET SECTORS
Marketplace
Cyber Warfare
Spying/Monitoring
Communication
Drugs
System Compromise
Governments
Bypass Censorship
Money Laundering
Information
Disclosure
Terrorists
Political Dissent
Corporate
Stalkers
Terrorists
Human Trafficking
Malware/Exploits
Denial of Service
Assassins/Hit Men
Delivery &
Distribution
Weapons
Ransomware
Socially
Disenfranchised
Common-cause
Collaboration
ACTORS
www.batblue.com
www.batblue.com
Anonymous Mobility
The major attraction to the Darknet is the benefit of anonymity. However,
the Darknet is not only anonymous, it is also highly mobile. The typical static
Domain Name System (DNS) of the traditional Internet has given way to a
dynamic process where Darknet sites update the ToR network to deliver an
anonymous service known as a Hidden Service. Furthermore, the traditional
process of acquiring domains from a registrar is replaced with a self-generated
public / private key pair address.
The public key is used to generate a sixteen character
hash (a one-way mathematical operation that creates
a reference to the public key) that ends in a .onion.
Here is an example of a .onion hash of a public key:
batblue4y5flmoji.onion. The .onion hash serves
as an address to access the Hidden Service much
like a Fully Qualified Domain Name (FQDN) on the
traditional Internet such as: www.BatBlue.com.
Time to Generate
Sub Second
Sub Second
Sub Second
2 Seconds
60 Seconds
30 Minutes
1 Day
25 Days
2.5 Years
10
40 Years
11
640 Years
12
10 Millenia
13
160 Millenia
14
www.batblue.com
www.batblue.com
www.batblue.com
of the Darknet
Ross Ulbricht,
creator of the
Silk Road
on the Darknet
10
www.batblue.com
www.batblue.com
11
Cryptocurrency
All goods and services on the Darknet are traded using
Cryptocurrency rather than traditional forms of currency.
Cryptocurrencies are anonymous and adaptable
digital currency. They were introduced by computer
experts looking to explore alternatives to traditional
nation-based currency systems. Bitcoin was the
first Cryptocurrency introduced to the market, and
since then dozens of other Cryptocurrencies
sometimes called Altcoinshave entered the
field. Cryptocurrencies are stored in digital wallets
without identifying signatures and used for Darknet
transactions, as well as some traditional transactions.
Cryptocurrencies are celebrated by libertarians
and privacy advocates as alternatives to traceable
currency controlled by central governments.
Cryptocurrencys anonymity allows individuals to
use Bitcoin and Altcoins to buy illegal substances
and services, send money anonymously, or simply
bypass taxes and regulation. Terrorist groups have
begun using Bitcoin as part of terrorist financing; an
ISIS member under the pseudonym Amreeki Witness
published an article entitled Bitcoin wa Sadaqat
al-Jihad: Bitcoin and the Charity of Violent Physical
Struggle.
12
www.batblue.com
EXCHANGES
Cryptocurrencies are almost
exclusively used in all transactions
on the Darknet. Bitcoins, Litecoins
and Dogecoins are just three
Cryptocurrencies of many which grease the
wheels of Darknet commerce.
Cryptocurrencies are not only an alternative
monetary note, they also serve as a mechanism for
the transfer of funds. These qualities differentiate
Cryptocurrencies from other notes as Bitcoin and
other Altcoins, alternative Cryptocurrencies to
www.batblue.com
13
14
www.batblue.com
Government Responses
to the Darknet
Governments around the world have tried to find ways to suppress the
Dark Web and the illicit activities that take place on its platform. Many law
enforcement agencies, especially the FBI and Europol, have launched raids
to shut down Darknet websites, marketplaces, and hosts.
In November 2014, U.S. and European authorities
seized more than 400 secret website addresses and
arrested sixteen people in a sweep across eighteen
countries targeting black markets for drugs and
other illegal services. This major operation is just one
of many raids targeting Darknet websites and site
administrators. Other raids have targeted distributers
of child pornography, insider trading schemes and
other illegal activities.
The United States government has a complex
relationship with the Darknet. As previously
mentioned, the U.S. Naval Research Laboratory
originally created and released ToR browser. The
U.S. government continues to research ways to
anonymously browse the Internet and release new
www.batblue.com
15
16
www.batblue.com
Conclusion
The Darknet provides a marketplace for a wide variety of illegal substances,
services, and communications. But it is more than just a black marketthe
Darknet also houses the most controversial political debates and sharing of
information between dissidents, journalists, whistleblowers, extremists and
trolls. Just like the black markets that have existed for centuries, the Darknet
is dynamic and grows organically. It is near impossible for law enforcement
or governments to contain or control it with the tools available today; in fact,
nation-states even play a role in helping it thrive.
However, governments and a range of other actors
will continue to engage in Darknet marketplaces,
to pursue information, obtain data, and even act on
exploits, malware and other cyber-related tools. The
weaponization of cybersecurity is gaining substantial
momentum as actors realize the profitability of
vulnerabilities associated with a range of industries.
In fact, the Darknet is the underground platform for
a cyber arms race as well as mechanism for various
actors to communicate and coordinate schemes.
The Darknet is also a platform for new and innovative
ways to commit crime. Empowered by the Darknets
global reach and emboldened by the anonymity
it offers, gamification and crowdfunding of crimes
like murder and human trafficking represent an
increasingly grim aspect of the Darknet.
www.batblue.com
17
18
www.batblue.com
www.batblue.com
info@batblue.com
@BatBlue
Bat Blue
Bat Blue