INTRODUCTION
The Dark Web is a subsection of the Internet, distinguished by its clandestine nature, encrypted communication routes, and anonymity. Accessing it requires specialized software like TOR (The Onion Router) due to its operation beyond standard search engines. The Dark Web’s rigorous commitment to privacy and confidentiality enables users to navigate, interact, and transact with total anonymity. Global law enforcement agencies have distinct challenges in their efforts to navigate the Dark Web. [1]
Its anonymity renders it an optimal venue for illicit activities, encompassing the trade of narcotics, guns, stolen data, and cybercrime. The emergence of Bitcoin and the ensuing surge in traffic on the Tor network has resulted in the establishment of multiple black-market websites. The Dark Web is abundant with illegal services, prominently including hacking, which entails DDoS attacks, social media account breaches, website intrusions, and bespoke malware. The Dark Web is distinctly different from the more well-known Surface Web and Deep Web, which constitute the three levels of the Internet. The Surface Web comprises websites and webpages accessible by conventional web browsers and indexed by search engines such as Google, also referred to as the “visible” or “indexed” web. The general population readily accesses these websites, which fulfill many functions such as social networking, educational resources, e-commerce, and news dissemination. However, due to the fact that Deep Web information is not indexed by search engines, conventional search phrases will provide no results. [2]
CONTRAST OF THE DARK WEB WITH THE SURFACE WEB AND THE DEEP WEB
Content necessitating membership, concealed databases, password-secured websites, and dynamically created pages all belong to this classification. The Deep Web, albeit not intrinsically perilous, provides privacy and security attributes that hinder public access to its information. A clandestine and encrypted segment of the Internet referred to as the Dark Web. Platforms and discussion boards facilitating anonymous transactions and interactions reside on the Dark Web, accessible just through specialist software like TOR. It is frequently linked to illicit operations such as drug trafficking, hacking services, and the trade of illegal goods owing to its anonymity and absence of regulation. Peter Grabosky (2001) asserts that cybercrime on the Dark Web is analogous to conventional crime. Virtual criminality closely resembles traditional terrestrial crime, but with additional categories. Despite possessing certain unique characteristics, the majority of computer-related criminal activities fundamentally resemble other established offenses. [3]
The primary distinguishing factor is the medium of implementation. In essence, virtual crime is a novel interpretation of conventional criminal strategies rather than a total divergence from them; the nature of the crime persists unchanged despite advancements in efficiency and technology. Several categories of cybercrime encompass the utilization of Dark Web weaponry, exotic fauna, and narcotics; let us examine these. This technology enables a dark web marketplace where buyers and sellers can transact anonymously using cryptocurrency, away from public scrutiny. Notorious dark web marketplaces such as Silk Road, Alpha Bay, and Dream Market offer illicit goods and services, including firearms, powerful narcotics, and endangered animals. These services safeguard user identities and transactions through the use of encrypted networks. Similar to other online marketplaces such as Flipkart and Amazon, these sites include an image and a brief description of the product. Participants in the online prediction market Murder The Assassination Market can wager on the expected date of death of an individual. If the selected date coincides with the actual date of death, the superior participant receives a reward. This arrangement enables assassins to gain financially by identifying the precise moment of the victim’s demise, so incentivizing their actions. As the remuneration in this market hinges on forecasting the date rather than executing the act of murder, it is challenging to attribute criminal liability for the actual homicide. The unexpected proliferation of these illegal enterprises is exemplified by websites such as White Wolves and C’thuthlu, which facilitate the hiring of assassins. The obscurity and encryption of the Dark Web facilitate these activities.
[1]SubhajitBasu, Policy-Making, Technology and Privacy in India.
[2] Petra Hoepner, Linda Strick & Martin Löhe, Historical Analysis on European Data Protection Regulations
[3] Robert Hasty, Trevor W. Nagel & Mariam Subjally, Data Protection Law in USA, available at https://www.neighborhoodindicators.org/sites/default/files/coursematerials/A4ID_DataProtectionLaw%20.pdf.