Barbara Idaerla Santos Calderon REDE TOR E ATORES NÃO

Total Page:16

File Type:pdf, Size:1020Kb

Barbara Idaerla Santos Calderon REDE TOR E ATORES NÃO Barbara Idaerla Santos Calderon REDE TOR E ATORES NÃO-ESTATAIS: UMA ANÁLISE DE DIFUSÃO DE PODER EM TRÊS DIMENSÕES Dissertação submetida ao Programa de Pós-Graduação em Relações Internacionais da Universidade Federal de Santa Catarina para a obtenção do Grau de Mestre em Relações Internacionais. Orientadora: Profª. Drª. Iara Costa Leite Florianópolis 2018 Ficha de identificação da obra elaborada pelo autor através do Programa de Geração Automática da Biblioteca Universitária da UFSC. Barbara Idaerla Santos Calderon REDE TOR E ATORES NÃO-ESTATAIS: UMA ANÁLISE DE DIFUSÃO DE PODER EM TRÊS DIMENSÕES Esta Dissertação foi julgada adequada para obtenção do Título de “Mestre” e aprovada em sua forma final pelo Programa de Pós- Graduação em Relações Internacionais da Universidade Federal de Santa Catarina. Florianópolis, 26 de junho de 2018. ________________________ Prof. Helton Ricardo Ouriques, Dr. Coordenador do Curso Banca Examinadora: ________________________ Prof.ª Iara Costa Leite, Dr.ª Orientadora Universidade Federal de Santa Catarina ________________________ Prof. Marco Cepik, Dr. Universidade Federal do Rio Grande do Sul (Videoconferência) ________________________ Prof. Jaime Coelho, Dr. Universidade Federal de Santa Catarina ________________________ Prof. Gilson Geraldino Silva Júnior, Dr. Universidade Federal de Santa Catarina Este trabalho é dedicado aos meus pais. AGRADECIMENTOS Eu não poderia iniciar estes agradecimentos sem, sobretudo, agradecer extensamente ao Programa de Pós-Graduação em Relações Internacionais da Universidade Federal de Santa Catarina por ter confiado no tema desta pesquisa e permitido que eu pudesse ocupar uma das vagas do mestrado. Eu, igualmente, gostaria de agradecer a Universidade Federal de Santa Catarina por ter me oferecido, desde a graduação, ensino superior gratuito e de qualidade. Como cidadã brasileira, eu me empenho, diariamente, em fornecer à sociedade o retorno desta educação a mim concedida e que considero grande privilégio. Agradeço também aos meus pais, Jorge e Japonaira, sem os quais nada disto seria possível. Meu pai, que desde pequena idade, me ensinou a relevância da educação para a vida em sociedade e soube, com paciência, mostrar-me o caminho das respostas para as dúvidas mais inquietantes. Como engenheiro, abriu-me os olhos para as ciências exatas: quando pequena, questões sobre a luz e buracos negros; quando adolescente, fórmulas matemáticas e a física da ficção científica; quando adulta, física quântica e universos paralelos. Minha mãe, desde muito cedo, conduziu-me ao caminho dos valores, propósitos e das emoções. Como professora, abriu-me os olhos para as ciências sociais: quando pequena, questões sobre o amor ao próximo e a família; quando adolescente, o valor do perdão e do convívio em sociedade; quando adulta, o aprendizado que deriva dos erros e o equilíbrio da liberdade. Eu sei que, onde quer que eu esteja, carregarei comigo traços de ambos – razão e emoção; exatidão e transbordamento; cérebro e coração. Obrigada por confiarem em mim e permitir-me sonhar tão alto quanto um pássaro, sem desconsiderar a importância da terra. Meus agradecimentos também se estendem aos meus irmãos Maggie e Júlio. Devo agradecer a minha orientadora, Prof. Dra. Iara Costa Leite, por ter concordado em orientar-me em tema desafiador e ter mostrado- me os princípios do ator de pesquisar. Sua críticas relevantes conduziram me ao desenho desta dissertação. Sou muito agradecida por seu apoio, pelas reuniões que tivemos e experiência comigo compartilhada. Muito obrigada. Agradeço também ao prof. Dr. Gilson Geraldino Silva que compartilhou comigo um pouco de seu conhecimento estatístico e ofertou-me uma parte de seu tempo para que eu pudesse aprender um pouco mais. Isto mostrou-se fundamental para o caminhar desta pesquisa. Meus sinceros agradecimentos. Agradeço também ao prof. Dr. Jaime Coelho por participar como membro da banca de defesa e retirar um pouco do seu tempo para leitura do trabalho e ofertar contribuições. Prof. Dr. Jaime, amigo desde os tempos da minha graduação, foi quem me permitiu, pela primeira vez, trabalhar com o tema que hoje segue. Obrigada mais uma vez. Meus agradecimentos também se estendem ao prof. Dr. Marco Cepik por, também, participar como membro da banca de defesa e, assim, dedicar tempo de leitura e brindar-me com críticas e contribuições. Sou bastante agradecida pela sua presença desde a banca de qualificação – momento importante para esta pesquisa pois permitiu-me refletir com paciência sobre suas colocações. Obrigada, professor. Agradecimento especial aos meus queridos amigos da vida que, com bastante paciência, carinho e apoio, me proporcionaram um chão especialmente importante durante esta caminhada acadêmica. Vocês sabem quem são. Eu não poderia deixar de mencionar: Bianka Zimmer, sua importância e apoio não podem ser mensurados – minha melhor amiga, nos dias de chuva e sol, você sempre esteve lá e serei eternamente grata. Seu apoio diário foi fundamental para a produção desta dissertação e concretização de um sonho. Fernando de Bona Santiago, meu queridíssimo amigo que sempre me ofereceu apoio e a quem eu sei que posso contar para o que der e vier, que caminha nesta jornada comigo desde a graduação em Relações Internacionais pela UFSC e que, com maestria, sempre tem as melhores palavras pra acalmar um coração ansioso. Rulza da Silva, minha amiga há anos e quem sempre me proporciona conversas que me lembram o que é realmente importante na vida, muito obrigada, amiga minha. E à todos os demais que de alguma forma estiveram comigo nesta caminhada feliz e árdua: Ana Paula Althoff, sempre presente, longe ou perto; Camila Antunes da Luz, pelas noites de Masterchef que me trouxeram calmaria e bom-humor durante este trabalho; Luiz Fernando Guerreiro, meu amigo Loki, que sempre apareceu quando menos esperava-se e trouxe alegria e bom-humor no meio de conversas profundas sobre a vida; e a todos os meus outros amigos que de alguma forma me apoiaram durante esta pesquisa. Agradeço também aos queridos amigos e colegas do prédio da pós-graduação que durante bom tempo dividiram o espaço comigo, as risadas, a alegria e o privilégio de aprender a pesquisar. Obrigada Lúcia da Secretaria, uma pessoa iluminada e que com bastante carinho ofertou aconchego, cafezinho e apoio a mim e todos os demais que, em algum momento, precisaram. Obrigada a Dona Bete que tornou as tardes mais divertidas e compartilhou comigo almoços e cafés. Agradecimento aos meus colegas de laboratório, Mamadou de Guiné Bissau, e meu ex- veterano da graduação em RI, Júlio. Obrigada vocês dois pelas conversas instigantes e curiosas acerca do mundo social, pela companhia no laboratório (especialmente no período de férias acadêmicas) e, sobretudo, pelo apoio nesta jornada de pesquisa. Muito obrigada. Obrigada aos meus amigos e colegas de mestrado que me apoiaram durante esta pesquisa e, principalmente, durante os dois anos em que recebi educação de qualidade neste programa de pós-graduação. Juntos nós crescemos, aprendemos, rimos e choramos com os prazeres e dissabores da vida acadêmica. Vocês contribuíram e foram essenciais para esta caminhada – marcaram este período de extenso aprendizado com as alegrias que surgem dos sonhos, anseios e expectativas. Obrigada aos queridos: Ana Luci, Alice Borba, Bruno Haeming, Karol Krespi, Diogo Oliveira, Guilherme Fasolin, Guilherme Mattos, Jonathan Hassel, Jozi Lawrence, Mari Almeida, Renan Jark, Roberta Prata, Terecita Gill, Tiago Mocellin, Tom dos Santos e Ricardo Kotz. Finalmente, agradeço todos aqueles que direta ou indiretamente contribuíram para que esta pesquisa fosse realizada. They are [these examples], by way of being, a signpost pointing not along an open well-trodden track but rather into a mysterious forest of the unknown. Just where the path will lead, I am not sure. That is the nature of exploration – and its appeal to the mentally adventurous. (Susan Strange, 1996) RESUMO A difusão de poder foi um fenômeno primeiramente descrito por Susan Strange no contexto da Economia Política Internacional (EPI) em 1996. O fenômeno abarca em si os conceitos de poder relacional e estrutural, relevantes para o entendimento da disciplina de EPI. Embora descrito na década de 1990, a difusão de poder não discorreu acerca do domínio cibernético e muito menos, explicitamente, sobre as revoluções tecnológicas que culminaram com a rede mundial de computadores. No domínio do ciberespaço, diversos atores operam de modo a impor sua autoridade sobre indivíduos e serviços. Neste contexto, no começo do século XXI, surgiu a rede anônima de baixa latência “The Onion Router” que compõe a chamada “Dark Web”, região do ciberespaço onde ocorre esforço ativo de blindagem da comunicação, privacidade e usuários específicos. Esta pesquisa busca, por meio de artigos jornalísticos publicados entre os anos de 2007 e 2017, analisar a difusão de poder na rede TOR em três dimensões: autoridade, controle e resultados. Palavras-chave: Difusão de Poder. Dark Web. Rede TOR. Poder Estrutural. Poder Relacional. Economia Política Internacional. ABSTRACT The diffusion of power was a phenomenon firstly described by Susan Strange in the context of International Political Economy (IPE) back in 1996. The phenomenon encompasses concepts of relational and structural power relevant to the understanding of the IPE discipline. Although described in the 1990s, the diffusion of power did not address the cyber domain, much less explicitly the technological revolutions that culminated in the global computer network.
Recommended publications
  • The Internet and Drug Markets
    INSIGHTS EN ISSN THE INTERNET AND DRUG MARKETS 2314-9264 The internet and drug markets 21 The internet and drug markets EMCDDA project group Jane Mounteney, Alessandra Bo and Alberto Oteo 21 Legal notice This publication of the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) is protected by copyright. The EMCDDA accepts no responsibility or liability for any consequences arising from the use of the data contained in this document. The contents of this publication do not necessarily reflect the official opinions of the EMCDDA’s partners, any EU Member State or any agency or institution of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). More information on the European Union is available on the internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2016 ISBN: 978-92-9168-841-8 doi:10.2810/324608 © European Monitoring Centre for Drugs and Drug Addiction, 2016 Reproduction is authorised provided the source is acknowledged. This publication should be referenced as: European Monitoring Centre for Drugs and Drug Addiction (2016), The internet and drug markets, EMCDDA Insights 21, Publications Office of the European Union, Luxembourg. References to chapters in this publication should include, where relevant, references to the authors of each chapter, together with a reference to the wider publication. For example: Mounteney, J., Oteo, A. and Griffiths, P.
    [Show full text]
  • An Evolving Threat the Deep Web
    8 An Evolving Threat The Deep Web Learning Objectives distribute 1. Explain the differences between the deep web and darknets.or 2. Understand how the darknets are accessed. 3. Discuss the hidden wiki and how it is useful to criminals. 4. Understand the anonymity offered by the deep web. 5. Discuss the legal issues associated withpost, use of the deep web and the darknets. The action aimed to stop the sale, distribution and promotion of illegal and harmful items, including weapons and drugs, which were being sold on online ‘dark’ marketplaces. Operation Onymous, coordinated by Europol’s Europeancopy, Cybercrime Centre (EC3), the FBI, the U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) and Eurojust, resulted in 17 arrests of vendors andnot administrators running these online marketplaces and more than 410 hidden services being taken down. In addition, bitcoins worth approximately USD 1 million, EUR 180,000 Do in cash, drugs, gold and silver were seized. —Europol, 20141 143 Copyright ©2018 by SAGE Publications, Inc. This work may not be reproduced or distributed in any form or by any means without express written permission of the publisher. 144 Cyberspace, Cybersecurity, and Cybercrime THINK ABOUT IT 8.1 Surface Web and Deep Web Google, Facebook, and any website you can What Would You Do? find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located 1. The deep web offers users an anonym- on the surface web. It is likely that when you ity that the surface web cannot provide. use the Internet for research and/or social What would you do if you knew that purposes you are using the surface web.
    [Show full text]
  • Privacy in Atlantis*
    Harvard Journal of Law & Technology Volume 18, Number 1 Fall 2004 PRIVACY IN ATLANTIS* Jerry Kang & Benedikt Buchner** TABLE OF CONTENTS INTRODUCTION.................................................................................230 SCENE I: PRIVACY’S FORM...............................................................231 A. Market-Talk..............................................................................231 B. Dignity-Talk .............................................................................234 SCENE II: PRIVACY’S SUBSTANCE....................................................236 A. The Core Similarities ...............................................................237 1. Dignity’s Consent (or the Market’s Initial Allocation) .........237 2. Data Protection Regulations (or Intangible Property Regulations) ....................................................................240 B. Too Little Control.....................................................................244 1. The Problem: Hard Choices ..................................................244 2. The Response: Fortifying the Individual...............................246 C. Too Much Control....................................................................251 1. The Problem: Societal Overrides ..........................................251 2. The Response: Interest Balancing .........................................252 CONCLUSION ....................................................................................255 APPENDIX .........................................................................................257
    [Show full text]
  • USA -V- Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • Says a Friend of Benthall's
    54 I At 3:15 P.M. on October 1, 2013, Ross Ulbricht’s career as a drug kingpin came to an end in the science- fiction section of San Francisco’s Glen Park Library. The 29-year- old had walked up the steps just inside the modern stone building, passed the librarian working at the circula- tion desk and taken a seat at a far corner table near a window. It was a sunny day, but the small community library was filled with people. Ulbricht, with his easy smile and thick mop of brown hair, was dressed in blue jeans web of lies_ AN UNDERGROUND, ANONYMOUS INTERNET— THE DEEP WEB—IS THE LAST LAWLESS FRONTIER ON EARTH. BUT NOTHING COULD SAVE ITS KINGPINS FROM THE PAINFUL CONSEQUENCES OF HUMAN ERROR BY JOSHUA HUNT and a T-shirt. The hand- ful of people reading and wandering among rows of novels nearby weren’t dressed much differently, but beneath their shirts and jackets they wore vests that identified them as FBI agents. Until the moment they rushed Ulbricht, pushing him up against a window to handcuff him as other agents seized his laptop before he could lock it down, nobody suspected anything out of place. The cuffs went on and a small crowd gathered, but Ulbricht just looked out at the afternoon sun. Ulbricht was an educated person, with a master’s degree in 55 materials science and engi- neering from Penn State. He was a good son from a good Texas family, an un- likely addition to the list of men who had changed the shape and scale of drug distribution in Amer- ica.
    [Show full text]
  • Deepweb and Cybercrime It’S Not All About TOR
    A Trend Micro Research Paper Deepweb and Cybercrime It’s Not All About TOR Vincenzo Ciancaglini, Marco Balduzzi, Max Goncharov, and Robert McArdle Forward-Looking Threat Research Team Trend Micro | Deepweb and Cybercrime Contents Abstract ..................................................................................................................................................3 Introduction ...........................................................................................................................................3 Overview of Existing Deepweb Networks ......................................................................................5 TOR ............................................................................................................................................5 I2P ...............................................................................................................................................6 Freenet .......................................................................................................................................7 Alternative Domain Roots ......................................................................................................7 Cybercrime in the TOR Network .......................................................................................................9 TOR Marketplace Overview ..................................................................................................9 TOR Private Offerings ..........................................................................................................14
    [Show full text]
  • Troll Hunting
    For my father, Brian, who taught me to love wor ds. Hell is empty, and all the devils are here. William Shakespeare, The Tempest, Act 1, Scene 2 THIS IS A work of nonfiction, researched and documented to the best of my ability. There were significant security risks in writing this book. I sought expert advice and wrote according to it. Therefore, some of the trolling syndicates mentioned within these pages have been given pseudonyms or go unnamed. Likewise, some of the trolls themselves are discussed only with a pseudonym. A few of the trolls who spoke to me behind the scenes are not named at all and others are composites or have been segmented. Some readers may be critical of the decision to provide anonymity for people who are hurting others so much. However, sometimes access to information comes at a cost – and, all things being equal, the trolls gave me great access. By the same token, some predator-troll victims are in physical danger. This is especially true where domestic violence is involved. In those cases, names and other identifying details may have been altered but the facts of the stories are unchanged. I have worked hard to quote all interviewees verbatim, but for the sake of readability have corrected some spelling errors and syntax. When I’m messaging with trolls in the United States, I use Australian spelling and they use American spelling. For authenticity, I’ve left this as is. This is a book about the internet and how it bleeds into real life. When quoting links and screenshots, I’ve aimed for accuracy.
    [Show full text]
  • Smooth As Silk: the Story of the Internet's Largest Drug Marketplace
    Smooth as Silk: The Story of the Internet's Largest Drug Marketplace Krzysztof Danielewicz [email protected] Mentor: Ming Chow Abstract On October 2 2013, the largest illegal online marketplace in the world was shut down by the FBI, and its founder arrested. Ross William Ulbricht, the “Dread Pirate Roberts” and founder of Silk Road, had spent 2½ years escaping the efforts of the United States Government to take down his creation, with great success. During this time, Silk Road offered the ability to solicit and purchase a staggering number of blatantly criminal substances and services within minutes, from practically anywhere in the world: it was well known as “the Amazon.com of illegal drugs.” Silk Road was run through Tor, a service which offers online anonymity and security. Which brings the question: how did the FBI manage to take down a supposedly anonymous online drug empire, arrest its owner, and seize over $3 million in Bitcoin? Will these actions by the United States Government make a significant difference in the online proliferation of illegal goods, or do the alternatives to Silk Road (already in full swing) make their efforts fruitless? And do these alternatives suffer from the same vulnerabilities that took down Ulbricht? This paper will explore the above questions and discuss the implications of this take down on illegal trade over the internet and, more generally, the anonymity and potential flaws of the Tor network as it exists today. To The Community Silk Road and Tor showcase a side of the Internet that is not well known to the general public, but is nonetheless a growing force in the proliferation of illegal goods worldwide.
    [Show full text]
  • The Dark Web and Anonymity Who’S Speaking?
    The Dark Web and Anonymity Who’s Speaking? Brian Pichman Justin Denton • President & Chief Education Officer, LibChalk • President & Chief Innovation Officer, Libchalk • • Director of Strategic Innovation, Evolve Project Director of the Personal Support Center, Collegis Education • Manager of the Personal Support Center, Collegis Education Justin Denton is a driven new technology adopter that utilizes Brian is a presenter, a collaborator, an innovator, and a his vast experience within the technology industry to implement technology expert/trend spotter. Brian is able to provide and manage solutions based environments. Driven by the technology audits, make library design recommendations, and passion to learn Justin also co-focuses on developmental provide solutions to problems all with an effective cost strategy. learning activities through his efforts as Faculty Member and Leader. The Dark Web and Privacy • The term the dark web is often used - but what does it mean? While its often associated with the under-belly of the Internet. It goes beyond the under-belly and can provide resources to protect your users privacy. • In this session, we will explore: • The origins of the Dark Web • Anonymous Browsing tools like the Tor Project • Navigating the Dark Web - Including the pitfalls • Explore tools hackers use to exploit companies and us • Whether you plan to implement new tools at your library or educate your users - this workshop will help you become knowledgeable on the Dark Web. Disclaimer • Technology is inherently neutral. • It can be used by bad people to bad things • It can be used by good people to do good things. • This presentation is provided for informational and technical training purposes only.
    [Show full text]
  • Battle Against Anonymous Browsing
    The Battle Against Anonymous Browsing: The Security Challenges Presented by Tor Brief Introduction • David A. Vargas – Work • President, VATG, Inc. – Teaching • Professor of Networking and Network Security – Education • BA, The George Washington University • MS, The Johns Hopkins University – Training: • Navy Cryptography • Army Counterintelligence • Security Audit, Malware Analysis, Digital Forensics, etc. – Primary certs: • CISSP, CISM, and CEHv7 Presentation Outline • Introduction to the Dark Web - Hiding in Darkness • What is Tor? • Detecting Tor • Chinks in the Armor - The Exit Node Problem • Tor Attacks and Takedowns • Does Tor Have a Future? Introduction to the Dark Web - Hiding in Darkness Introduction to the Dark Web - Hiding in Darkness • Surface Web: – The visible web that we are most familiar with Introduction to the Dark Web - Hiding in Darkness • What you find when you look deeper: Introduction to the Dark Web - Hiding in Darkness • Dark Web: – Consists of sites that are private or at least accessible only by those who know what they are looking for – Because of its anonymity, frequently used by deviant subcultures (criminals, pedophiles, etc.) Aside: A comment on the terms Introduction to the Dark Web - Hiding in Darkness Surface Web (where most of you surf) Dark Web (where only some of you surf – in some cases the FBI would like to meet with you) Estimates have suggested that the deep web is 4,000 to 5,000 times larger than the surface web. Searching the Dark • Although the dark web exists on the very same Grams Darknet
    [Show full text]
  • Classifying Illegal Activities on Tor Network Based on Web Textual Contents Mhd Wesam Al Nabki1,2, Eduardo Fidalgo1,2, Enrique Alegre1,2, and Ivan De Paz1,2
    Classifying Illegal Activities on Tor Network Based on Web Textual Contents Mhd Wesam Al Nabki1,2, Eduardo Fidalgo1,2, Enrique Alegre1,2, and Ivan de Paz1,2 1Department of Electrical, Systems and Automation, University of Leon,´ Spain 2 Researcher at INCIBE (Spanish National Cybersecurity Institute), Leon,´ Spain mnab, eduardo.fidalgo, ealeg, ivan.paz.centeno @unileon.es { } Abstract indexed by the standard search engines, such as Google or Bing. However, despite their existence, The freedom of the Deep Web offers a there is still an enormous part of the web remained safe place where people can express them- without indexing due to its vast size and the lack selves anonymously but they also can of hyperlinks, i.e. not referenced by the other web conduct illegal activities. In this pa- pages. This part, that can not be found using a per, we present and make publicly avail- search engine, is known as Deep Web (Noor et 1 able a new dataset for Darknet active do- al., 2011; Boswell, 2016). Additionally, the con- mains, which we call it ”Darknet Usage tent might be locked and requires human interac- Text Addresses” (DUTA). We built DUTA tion to access e.g. to solve a CAPTCHA or to en- by sampling the Tor network during two ter a log-in credential to access. This type of web months and manually labeled each ad- pages is referred to as ”database-driven” websites. dress into 26 classes. Using DUTA, Moreover, the traditional search engines do not ex- we conducted a comparison between two amine the underneath layers of the web, and con- well-known text representation techniques sequently, do not reach the Deep Web.
    [Show full text]