The New Zealand Herald

Good and evil thrive in dark web

Freedom fighters and criminals alike work undercover in internet anonymity

- Daniel Prince theconvers­ation.com.au Daniel Prince is Associate Director Security Lancaster, Lancaster University.

We often hear about the dark web being linked to terrorist plots, drug deals, knife sales and child pornograph­y, but beyond this it can be hard to fully understand how the dark web works and what it looks like.

So just for a minute imagine that the whole internet is a forest — a vast expanse of luscious green as far as the eye can see. And in the forest are well worn paths — to get from A to B. Think of these paths as popular search engines, such as Google, allowing users the option to essentiall­y see the wood from the trees and be connected. But away from these paths — and away from Google — the trees of the forest mask your vision.

Off the paths it is almost impossible to find anything, unless you know what you’re looking for, so it feels a bit like a treasure hunt. Really the only way to find anything in this vast forest is to be told where to look.

This is how the dark web works — and it is essentiall­y the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well — it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it.

It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

Dark web technologi­es are robustly built without central points of weakness, making it hard for authoritie­s to infiltrate. Another issue for law enforcemen­t is that — like most things — the dark web and its technologi­es can also be used for both good and evil.

So in the same way criminals use it to hide what they are up to, it can also help groups fight oppression or individual­s to whistle blow and exchange informatio­n completely anonymousl­y. In fact, Tor — “free software and an open network that helps you defend against traffic analysis” and a critical part of the socalled dark web — has been funded by a range of Western government­s, including the US.

A service like Tor is global, in no one physical location, and is operated by no one commercial entity which is typical of these technologi­es.

Theoretica­lly, the only way to intercept communicat­ions sent via something like Tor is to install a “backdoor” in the applicatio­n everyone uses. A backdoor is meant to provide a secret way to bypass an applicatio­n’s protection systems.

However, the use of a backdoor could also allow any government­s — even oppressive ones — to intercept communicat­ions.

Indeed, cyber breaches have shown us that any backdoor or weakness can be found and exploited by hackers to steel people’s informatio­n, pictures and data.

Of course, none of this is new — criminals have always found ways to communicat­e with each other under the radar. Mobile phones have been used by criminal gangs to organise themselves for a long time, and as a society we are comfortabl­e with laws enabling police to tap telephones and catch criminals.

Unfortunat­ely, infiltrati­ng the dark web is not quite as easy as tapping the local telephone exchange or

Dark web technologi­es are robustly built without central points of weakness, making it hard for authoritie­s to infiltrate.

phone network.

The dark web is quite unlike the telephone system, which has fixed exchanges and is operated by a small set of companies, making intercepti­on easier.

Even if tapping the dark web was a straightfo­rward exercise, morally it is still fraught with questions. In the UK, the Draft Investigat­ory Powers Bill, dubbed the snoopers’ charter, sets out the powers and governance for Law Enforcemen­t over communicat­ions systems.

However, the discussion of the bill has been impacted by the Snowden revelation­s which have demonstrat­ed that society is not comfortabl­e with mass, unwarrante­d surveillan­ce.

This public distrust has led to many technology companies pushing back when it comes to accessing users’ devices. We have seen Microsoft take on the US Government over access to email and Apple against the FBI when petitioned to unlock an iPhone of a known terrorist. And yet some of these same communicat­ions companies have been harvesting user data for their own internal processes.

For now, though, it is clear that we still have a long way to go until society, government, law enforcemen­t and the courts settle on what is appropriat­e use of surveillan­ce both on and offline.

And until then we will have to live with the fact that the one person’s freedom-fighting dark web is another’s criminal paradise.

 ??  ?? The dark web is often used for illegal activity and is hard to police.
The dark web is often used for illegal activity and is hard to police.
 ??  ??

Newspapers in English

Newspapers from New Zealand