Topic [002]: the Dark Web

Total Page:16

File Type:pdf, Size:1020Kb

Topic [002]: the Dark Web Southern Ontario Model United Nations Assembly XLVIII World Intellectual Property Organization: The Dark Web Topic [002]: The Dark Web Introduction: The Dark Web encompasses encrypted online content which is not indexed by conventional search engines. 1 As a component of the deep web it encapsulates a wider breadth of content which does not appear in typical internet browsing activities. A 2019 study, Into the Web of Profit, conducted by Dr. Michael McGuires at the University of Surrey found that the number of dark web listings that hold the potential to harm an enterprise has risen by 20% since 2016. While the Dark Web’s anonymity allows for free speech where individuals can communicate without government interference, it also creates a haven for illicit activity such as, the buying and selling of drugs, child pornorgraphy, distribution of private information and human trafficking. By threatening the security of individuals and offering unrestricted access, the Dark Web holds the potential to jeopardize national security. 1 https://www.investopedia.com/terms/d/dark-web.asp / Southern Ontario Model United Nations Assembly XLVIII World Intellectual Property Organization: The Dark Web Due to the complex nature of this issue, it requires an innovative, multidimensional and implementable solution. Solutions must encompass both short term and long term implications while presenting a legislative perspective. One should bear in mind that standardized legislation is imperative in adapting to the ever changing technological community. Furthermore, mechanisms allowing the accumulation of information about the dark web users and their actions should be discussed. Definitions and Key Terms: World Wide Web: The World Wide Web (WWW) is a network of online content in which all interlinked pages can be accessed through hypertext links. It was originally designed in 1991 by Tim Berners-Lee.2 Deep Web: The portion of the Internet that is hidden from conventional search engines, through encryption; the aggregate of unindexed websites 3 Dark Web: The part of the Deep Web that is intentionally hidden from search engines and uses masked IP addresses. It is accessible only with a special web browser. 4 Onion Routing: Onion Routing (TOR) is a technique for anonymous communication over a computer network in which messages are encapsulated in layers of encryption, analogous to layers of an onion. 5 2 https://www.techopedia.com/definition/5217/world-wide-web-www 3 https://www.dictionary.com/browse/deep-web 4 https://www.dictionary.com/browse/dark-web 5 https://www.geeksforgeeks.org/onion-routing/ / Southern Ontario Model United Nations Assembly XLVIII World Intellectual Property Organization: The Dark Web Darknet Markets: Any market on the dark web intended for illegal purposes. To access such markets, the user requires specific software such as The Onion Routing (TOR) or the Invisible Internet Project (I2P). Transactions take place through bitcoin in order to protect the identity of the buyer and seller.6 Background Information: The early versions of the Dark web, known as ARPANET, were developed in the early 1970’s, when students at Stanford sold an undetermined amount of marijuana to students at MIT.7 As the globe shifted towards digitization, the internet became more prominent allowing for a plethora of opportunities within the Dark Web. In March 2000, Freenet was launched, an open-source software used for data sharing,protected with privacy protections. Due to its decentralized network, it allows for total anonymity, enabling freedom of speech without censorship. 8 It was the first online platform which attracted “dark” or illegal activity. Perhaps the most pivotal point in Dark Web development was the release of TOR or The Onion Router. It was created by the US government as a tool to aid their own operatives to remain untraceable and also is a fundamental aspect of accessing the Dark Web. The introduction of Bitcoin in the late 2000’s allowed for the maturation of the Dark Web and its Darknet black markets. It is imperative to note that the Dark Web’s use is not illegal per se; however, it holds the potential to host illegal activity such as pedophelia, and terrorism which make it particularily dangerous. If implemented online, these activities fall under the notion of cybercrime. In many cases 6 https://www.investopedia.com/terms/d/darknet-market-cryptomarket.asp 7 https://www.theguardian.com/science/2013/apr/19/online-high-net-drugs-deal 8 https://hackwarenews.com/the-dark-web-a-history-lesson/ / Southern Ontario Model United Nations Assembly XLVIII World Intellectual Property Organization: The Dark Web cybercrime is negated under the notion of the right to privacy and TOR or any other software enable the right to anonymity. However, in recent times there has been a significant shift in the usage of resources within the Deep Web from purely repression based into illicit activities. In a study conducted by the University of Luxembourg in 2013 they found that out of 40,000 unique onion addresses, 56% were on anonymity, politics, human rights violations and other aspects of political anonymity. However, 44% of the resources were about drugs, adult content, counterfeit products and weapons. The researchers arrived at the conclusion that the “number of hidden services related to illegal activities was equal to the number of resources focusing on legal activities.” 9 Today, despite the decrease in overall usage the Dark Web offers an unprecedented variety of hidden services, which allow its impact to be disproportionately large to its size. Small groups of hackers have the ability to significantly impact multi-billion dollar corporations along with their users. The Hidden Wiki and TOR The Hidden Wiki is the name used by ample censorship-resistant wikis which operate as Tor hidden services that users can anonymously edit after registering on the site. 10 TOR holds two crucial features which make it imperative for access to the Dark Web: 9 https://read.un-ilibrary.org/human-rights-and-refugees/deep-web-going-beneath-the-surface_a9373199-en#page1 10 https://en.wikipedia.org/wiki/The_Hidden_Wiki / Southern Ontario Model United Nations Assembly XLVIII World Intellectual Property Organization: The Dark Web (1) Anonymous access to all websites, making it nearly impossible to track users (2) Access to websites or hidden services which are blocked for those who try to access them without TOR This is accomplished by making the connection between two users hop from one server to another. Within TOR, the messages sent and responses received are encrypted with different keys, providing a unique key for encryption for every different server visit. Due to the sheer amount of layers of encoding, even if someone is trying to intercept the message all they will receive is the address of the input node and a thrice encrypted message. 11 Originally TOR was created by the United States government, specifically the Navy, purposed to protect the communication of the military. In certain cases TOR has proven to be valuable, specifically during the Arab Spring. During that time, TOR usage went from 7,000 in 2010 to 40,000 users in 2012 in Iran. In 2014 Turkey, after the government blocked Twitter and Youtube, TOR usage reached an all-time high. Today, approximately two million people use TOR on a daily basis worldwide. In many countries, TOR has become a tool for activism, allowing minorities to escape persecution while providing a platform which protects freedom of expression. However, the particular concern comes with the notion of unrestricted anonymity. According to RSA, a digital risk assessment firm, the predominant uses of TOR are: 12 ● Trade of stolen financial data (credit cards) ● Financial fraud ● Illegal sexual content 11 https://www.geeksforgeeks.org/onion-routing/ 12 https://www.rsa.com/en-us/blog/2016-02/role-tor-cybercrime / Southern Ontario Model United Nations Assembly XLVIII World Intellectual Property Organization: The Dark Web ● Bypassing censorship: banned political activity, surfing to blocked sites (for example in countries like Russia and China) ● Drug trafficking and weapons trading ● Gambling ● The sale of stolen goods ● Anonymous instant messaging Commercial Services in the Dark Web: Darknet markets, or cryptomarkets are dark web sites with goods for sale. Although some products are legal, illicit goods such as stolen information, weapons and drugs are common items in these markets. A crucial feature of darknet markets is the anonymity in transactions, as they take place via Bitcoin using dark wallets. The mainstay of darknet markets is the sale of illegal drugs and in 2015 The Economist found that between $150 and $180 million worth of drugs were sold through darknet transactions. Not only do these markets provide the items, but also the resources to get these products through the mail, including supplies needed to disguise shipments. In addition to drugs, darknet markets offer a wide variety of products and services ranging from stolen information to pornographic content to weapons or poisons. 13 Case Study: Silk Road One of the most controversial commercial services in the history of the dark web is the “Silk Road.”.The Silk Road was founded on an anarcho-libertarian 13 https://www.investopedia.com/terms/d/darknet-market-cryptomarket.asp / Southern Ontario Model United Nations Assembly XLVIII World Intellectual Property Organization: The Dark Web philosophy, believing that anything not violent should not be criminalized. In 2013, Silk Road counted 13,000 items listed and in two and a half years of operation their sales totalled to 9.5 million in Bitcoin which is equivalent to 1.2 billion dollars. 14 Silk Road was a paradigm-shifting innovation as it provided more security and easier access to drugs. Silk Road was seized in 2013 by the FBI, however that only insighted more development of niche darknet markets. According to Deepdotweb, analogous to TripAdvisor for black markets, said that in 2017 there were at least 20 well established black market sites.
Recommended publications
  • Cyber Security in a Volatile World
    Research Volume Five Global Commission on Internet Governance Cyber Security in a Volatile World Research Volume Five Global Commission on Internet Governance Cyber Security in a Volatile World Published by the Centre for International Governance Innovation and the Royal Institute of International Affairs The copyright in respect of each chapter is noted at the beginning of each chapter. The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of the Centre for International Governance Innovation or its Board of Directors. This work was carried out with the aid of a grant from the International Development Research Centre (IDRC), Ottawa, Canada. The views expressed herein do not necessarily represent those of IDRC or its Board of Governors. This work is licensed under a Creative Commons Attribution — Non-commercial — No Derivatives License. To view this licence, visit (www.creativecommons.org/licenses/ by-nc-nd/3.0/). For re-use or distribution, please include this copyright notice. Centre for International Governance Innovation, CIGI and the CIGI globe are registered trademarks. 67 Erb Street West 10 St James’s Square Waterloo, Ontario N2L 6C2 London, England SW1Y 4LE Canada United Kingdom tel +1 519 885 2444 fax +1 519 885 5450 tel +44 (0)20 7957 5700 fax +44 (0)20 7957 5710 www.cigionline.org www.chathamhouse.org TABLE OF CONTENTS About the Global Commission on Internet Governance . .iv . Preface . v Carl Bildt Introduction: Security as a Precursor to Internet Freedom and Commerce . .1 . Laura DeNardis Chapter One: Global Cyberspace Is Safer than You Think: Real Trends in Cybercrime .
    [Show full text]
  • Bitcoin in the Dark Web: a Shadow Over Banking Secrecy and a Call for Global Response
    10 - Piazza Book Proof.docx (Do Not Delete) 4/27/17 3:59 PM BITCOIN IN THE DARK WEB: A SHADOW OVER BANKING SECRECY AND A CALL FOR GLOBAL RESPONSE FIAMMETTA PIAZZA* I. INTRODUCTION Revolution and evolution are often two sides of the same coin. Since the industrial revolution, law and technology are in constant chase of each other like a statue and its shadow. The Internet – just as the telegraph, the telephone, and airplanes before it – has become as easy to access as it is hard to grasp. This discrepancy may be considered as one of the reasons for the current lack of comprehensive regulation of the Web. However one wishes to approach the regulation of the Internet, the Internet is not no man’s land and as such, especially the remote and least known area of the Dark Web, requires more detailed regulation, particularly when lack thereof frustrates goals generally pursued outside cyberspace. Virtual currencies play a key role in the transformational change affecting the world economy given the expanded venues available to consumers to access goods and services since the advent of the Web.1 Indeed, virtual currencies offer a peer-to-peer exchange mechanism whereby traditional central clearinghouses are avoided.2 However, while virtual currencies are not legal tender, they may have equivalent traditional currency value.3 Within this category, Bitcoin has developed and gained a primary status among virtual currencies that can be exchanged for traditional currencies.4 This reality is complicated considering the role of * Fiammetta S. Piazza is a J.D. candidate at Loyola Law School, Los Angeles, class of 2017.
    [Show full text]
  • The Deep Dark
    THE DEEP DARK WEB Pierluigi Paganini—Richard Amores Published by Paganini Amores at Smashwords Copyright 2012 Paganini–Amores The Deep Dark Web - paganini/amores publishing 212 providence St, West Warwick, RI 02893 - 401-400-2932 ALL RIGHTS RESERVED. This book contains material protected under International and Federal Copyright Laws and Treaties. Any unauthorized reprint or use of this material is prohibited. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system without express written permission from the author / publisher. The information in this book is distributed on an “As Is and for educational only” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor Paganini-Amores publishing. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this book. ISBN: 9781301147106 Publisher – Paganini – Amores For information on book distributors or translations, please contact Publisher Paganini –Amores 212 Providence St Rhode Island 02893 Or Via Dell'Epomeo 180 Parco del Pino Fab.C Sc. A 80126 - Napoli (ITALY) Phone 401-400-2932 – [email protected] deepdarkweb.com – uscyberlabs.com – securityaffairs.co Graphics Designer – Gianni Motta was born in Naples in 1977. He is a creative with over ten years in the field of communication, graphic and web designer. Currently he is in charge for Communication Manager in a cyber security firm.
    [Show full text]
  • ARTICLE Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web
    Stanford Law Review Volume 69 April 2017 ARTICLE Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web Ahmed Ghappour* Abstract. The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote “searches” and “seizures.” The result may well be the greatest extraterritorial expansion of enforcement jurisdiction in U.S. law enforcement history. This Article examines how the government’s use of hacking tools on the dark web profoundly disrupts the legal architecture on which cross-border criminal investigations rest. These overseas cyberoperations raise increasingly difficult questions regarding who may authorize these activities, where they may be deployed, and against whom they may lawfully be executed. The rules of criminal procedure fail to regulate law enforcement hacking because they allow these critical decisions to be made by rank-and-file officials despite potentially disruptive foreign relations implications. This Article outlines a regulatory framework that reallocates decisionmaking to the institutional actors who are best suited to determine U.S. foreign policy and avoids sacrificing law enforcement’s ability to identify and locate criminal suspects who have taken cover on the dark web.
    [Show full text]
  • Busted, but Not Broken
    BUSTED, BUT NOT BROKEN THE STATE OF SILK ROAD AND THE DARKNET MARKETPLACES A DIGITAL CITIZENS ALLIANCE INVESTIGATIVE REPORT Ten months ago, the Digital Citizens Alliance began researching illicit online marketplaces, including Silk Road (pre- and post-arrest of Ross Ulbricht, accused of being Silk Road’s notorious operator “Dread Pirate Roberts”). This report details the findings of Digital Citizens researchers, including the following key takeaways: Key takeaways: • Approximately 13,648 listings for drugs are now available on Silk Road compared to the 13,000 that were listed shortly before the FBI arrested Ulbricht and shut down the site. In comparison, Silk Road’s closest competitor, Agora, has just roughly 7,400 drug listings. • There is significantly more competition today than when the original Silk Road was seized. Silk Road 2.0 currently contains 5% more listings for drugs than its predecessor held at the time of its seizure. By comparison, the Darknet drug economy as a whole contains 75% more listings for drugs. • Silk Road and other Darknet marketplaces continue to do steady business despite the arrests of additional alleged operators who authorities say worked for Ulbricht. • A series of scam markets, which appeared as opportunists tried to fill the void while the original Silk Road was shut down, created distrust among customers after the operators allegedly stole tens of millions of dollars worth of bitcoin. It is speculated that the resulting distrust may be one of the factors helping Silk Road rebuild its user base so quickly. • In chat rooms used by both operators and customers, many believe that the fallout from Ulbricht’s arrest is complete.
    [Show full text]
  • Law Enforcement Jurisdiction on the Dark Web Ahmed Ghappour
    University of California, Hastings College of the Law UC Hastings Scholarship Repository Faculty Scholarship 2017 Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web Ahmed Ghappour Follow this and additional works at: https://repository.uchastings.edu/faculty_scholarship Recommended Citation Ahmed Ghappour, Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web, 69 Stan. L. Rev. 1075 (2017). Available at: https://repository.uchastings.edu/faculty_scholarship/1583 This Article is brought to you for free and open access by UC Hastings Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of UC Hastings Scholarship Repository. ARTICLE Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web Ahmed Ghappour" Abstract. The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals' devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote "searches" and "seizures." The result may well be the greatest extraterritorial expansion of enforcement jurisdiction in U.S. law enforcement history. This Article examines how the government's use of hacking tools on the dark web profoundly disrupts the legal architecture on which cross-border criminal investigations rest.
    [Show full text]
  • Blockchain Empowers Social Resistance and Terrorism Through Decentralized Autonomous Organizations
    Journal of Strategic Security Volume 13 Number 1 Article 3 Blockchain Empowers Social Resistance and Terrorism Through Decentralized Autonomous Organizations Armin Krishnan East Carolina University, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss pp. 41-58 Recommended Citation Krishnan, Armin. "Blockchain Empowers Social Resistance and Terrorism Through Decentralized Autonomous Organizations." Journal of Strategic Security 13, no. 1 (2020) : 41-58. DOI: https://doi.org/10.5038/1944-0472.13.1.1743 Available at: https://scholarcommons.usf.edu/jss/vol13/iss1/3 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Blockchain Empowers Social Resistance and Terrorism Through Decentralized Autonomous Organizations Abstract The invention of the Internet has changed the way social resistance, revolutionary movements and terror groups are organized with new features such as loose network organization, netwars, social media campaigns, and lone wolf attacks. This article argues that blockchain technology will lead to more far-reaching changes in the organization of resistance to authority. Blockchain is a distributed ledger that records transactions using a consensus protocol, and when it meets objective conditions, it also enables smart contracts that execute transactions. Blockchain technology is not only a system for transferring value, but also it is a trustless system in which strangers can cooperate without the need for having to trust each other, as computer code governs their interactions.
    [Show full text]
  • BITCOIN: Cryptography, Economics, and the Future
    BITCOIN: Cryptography, Economics, and the Future by Starry Peng Advisor: Nadia Heninger EAS499 Senior Capstone Thesis School of Engineering and Applied Science University of Pennsylvania December 10, 2013 1. INTRODUCTION In today’s world, the increased connectivity provided by the Internet has changed the nature of financial transactions. With recent developments in social media, peer-to-peer software, and smartphone technology, we have seen the definition of money extend beyond the traditional, physical tender of government-backed currencies to include mobile payments, digital currencies, and virtual goods [15]. Joining this revolution of payment technologies is Bitcoin, “the world’s first completely decentralized digital currency”, created by an unidentified programmer named Satoshi Nakamoto in 2008 [1]. What is unique about Bitcoin is its deregulated nature—it is neither controlled nor supervised by any commercial authority, government, or financial institution. Rather, a peer-to- peer network of users controls the creation and transfer of coins. Bitcoin’s independence from 3rd party intermediaries provides its users a highly desired level of privacy and convenience. Since its inception in 2008, Bitcoin has gradually gained traction around the world. While its early adopters consisted mostly of technology enthusiasts, libertarians, and cryptography experts, Bitcoin has slowly entered the mainstream consciousness. As of December 10, a single Bitcoin is worth $918 US Dollars (USD). In this paper, we explore the Bitcoin phenomenon on several facets. Section 2 will provide a detailed overview of how Bitcoin works and its underlying cryptographic protocols. Section 3 will contextualize Bitcoin by providing a history of digital currencies as well as a holistic landscape of different types of electronic currencies.
    [Show full text]
  • Ross Chalmers, RA S2076365 MA
    Ross Chalmers, R.A. S2076365 MA International Relations W/Global Political Economy The Politics Of Cryptography: How Has Cryptography Transformed Power Relations Between Citizens And The State Through Privacy & Finance? Supervisor: Roshni Sengupta Word Count: 15,637 1 Contents Introduction ............................................................................................................................................ 4 Methodology ........................................................................................................................................... 8 Literature Review .................................................................................................................................. 10 The Theory Of Crypto Anarchy.......................................................................................................... 10 The Relationship Between Crypto Anarchism, Libertarianism And Silicon Valley ............................ 13 Crypto Anarchism Research .............................................................................................................. 14 Chapter 1 - History Of Encryption And Crypto Anarchy........................................................................ 17 Advances In Cryptography: The Academics And The NSA ................................................................ 17 Cryptography Without The State ...................................................................................................... 21 The Birth Of The CypherPunks .........................................................................................................
    [Show full text]
  • Dark Web 101
    Dark Web 101 MAJOR JEREMY COLE, USAF Today’s internet has multiple webs. The surface web is what Google and other search engines index and pull based on links. Essentially, the surface web is the master index of publically available indexes providing returns to searches based on search terms and links. The surface web is small at only 4%. The second, called the deep web, consists of roughly 96% or the rest of the web. The deep web consists of protected sites that re- quire users to input data to get access (email or online banks), unlinked content (unpublished blogs or or- ganizational databases), proprietary data (study results, financial records, research & development), and personal data (medical records or legal documents). These are all deep web. Standard search engines don’t have access to these sites and therefore cannot search them. The last web is the dark web, a part of the deep web. It requires specific software, logins, and knowledge to access. This is home to hidden sites that prefer to stay in the dark. What do a hacker, a government investigative agency, EUROPOL, an anonymous source re- porting to a journalist, a dissident in a country where free speech is repressed, drug dealers, pe- dophiles, hit men for hire, a whistle blower, a privacy zealot, and terrorists have in common? They all depend on online anonymity to ensure privacy, protect personal information, enable freedom of expression, or paradoxically, to censor it. Additionally, they also rely on online ano- nymity to conduct illicit activities. Whether to communicate, surf the web or host data, these in- dividuals and organizations conduct their activities on the dark web to keep hidden from public view.
    [Show full text]
  • Tor and Dark Web
    Tor and Dark Web Rafael Lugo Universidad Catolica de la Asuncion, Ingenieria Informatica Asuncion, Paraguay [email protected] Abstract. Tor is a free software that lets you surf the web anonymously making impossible to track the origins of the packets. The dark web is the World Wide Web content which use the Internet but require specific software, configurations or authorization to access. The dark web forms a small part of the deep web, the part of the Web not indexed by search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web. Key words: Tor, anonymously, dark web, access, deep web 1 Introduction Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". [12] Tor directs Internet traffic through a free, worldwide, volunteer overlay net- work consisting of more than seven thousand relays [1] to conceal a user's lo- cation and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored. Tor does not prevent an online service from determining when it is being accessed through Tor. Tor protects a user's privacy, but does not hide the fact that Tor is being used.
    [Show full text]
  • Technologie Wspierające Prywatność – Ideologia, Prawo, Wdrożenia
    DANIEL MIDER ORCID: 0000-0003-2223-5997 EWA ALEKSANDRA ZIEMAK ORCID: 0000-0003-2516-3247 DOI: 10.4467/20801335PBW.21.003.13560 Technologie wspierające prywatność – ideologia, prawo, wdrożenia Związek technologii kryptograficznych z terroryzmem był przedmiotem analiz pro- wadzonych pod koniec lat 90. XX w.1 Obszernych opracowań doczekały się również powiązania między Internetem a terroryzmem2. W anglo- i polskojęzycznej litera- turze przedmiotu brakuje natomiast analiz skupionych na ocenie praktycznego wy- korzystania w działalności terrorystycznej dostępnych i szeroko używanych narzę- dzi informatycznych. Nie pozwala to na realną ocenę zagrożeń, jakie stwarza mariaż kryptoanarchizmu i terroryzmu. Niebezpieczeństwa z tym związane są sygnalizowane ogólnikowo, brakuje pogłębionych analiz (zazwyczaj poprzestaje się na stwierdzeniu popartym przykładami, że w działalności terrorystycznej Internet jest wykorzystywany do szerzenia propagandy, prowadzenia rekrutacji i zdobywania środków finansowych, bez choćby pobieżnego omówienia używanych narzędzi informatycznych)3. Autorzy niniejszego artykułu postawili następujące pytania badawcze: • Jakimi zasobami koncepcyjnymi i technologicznymi mogą dysponować rady- kalni zwolennicy prywatności w Internecie oraz cyberprzestępcy? 1 D.E. Denning, W.E. Baugh, Encryption and evolving technologies: Tools of organized crime and ter- rorism, Washington 1997, s. 1–64. 2 United Nations Office on Drugs and Crime, The use of the Internet for terrorist purposes, New York 2012; N. Malik, Terror in the Dark. How terrorists use encryption, the darknet, and cryptocur- rencies, Millbank 2018; B. Clifford, H. Powell, Encrypted Extremism. Inside the English-Speaking Islamic State Ecosystem on Telegram, Washington 2019; C. Dion-Schwarz, D. Manheim, P.B. John- ston, Terrorist Use of Cryptocurrencies. Technical and Organizational Barriers and Future Threats, Santa Monica 2019. 3 United Nations Office on Drugs and Crime, The use of the Internet…, s.
    [Show full text]