Cybercrime: Internet Driven Illicit Activities and Behavior

Cybercrime: Internet Driven Illicit Activities and Behavior

Land Forces Academy Review Vol. XXV, No. 4(100), 2020 CYBERCRIME: INTERNET DRIVEN ILLICIT ACTIVITIES AND BEHAVIOR Maurice DAWSON Illinois Institute of Technology, Chicago, United States of America [email protected] ABSTRACT Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further. KEYWORDS: cybercrime, human trafficking, dark web, online marketplace, cryptocurrency, disinformation 1. Introduction name a few (Deibert, 2009). Meanwhile, The Internet has allowed for many more countries have been known to use the technological advances that have brought Internet to target political dissidents such as forth positive outcomes. In retrospect, the Cuba, Ethiopia, Eritrea, Gambia, Morocco, Internet has also allowed for criminal North Korea, Russia, and more (Committee activities to flourish. And while both to Protect Journalists, 2020). Even with this positive and negative effects are expected, mentioned censorship and oversight, illicit the use of the Internet by a criminal activities remain on the rise through the organization, nation-states, terrorists, Internet. extremists, and others finds another means In recent years, police and other law to market their illegal activity. As the enforcement organizations have shut down introduction of the technological pages that advocate prostitution. Originally phenomenon is no longer seen as a luxury websites such as Craiglist were known for but rather a basic need in some parts of the the infamous ads that asked for donations in world (Reglitz, 2020; Greenwood, 2013). exchange for time (Hemmingson, 2008). However, some nations heavily regulate This was the beginning of a new age for sex Internet activities under the umbrella for work, which took prostitution off the streets terrorism, maintaining a political and created an atmosphere where the buyer stronghold, censorship, or enforcement of could purchase a wanted service online that country’s religious laws (Ayalew, (Cunningham & Kendall, 2011). From 2019; Deibert, 2009). A handful of nations Craigslist, Backpage became the new have been known to engage in censorship, marketplace for sex with a sophistication, such as China, Iran, and Saudia Arabia, to unlike others. Sites alike followed to assist DOI: 10.2478/raft-2020-0043 © 2017. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 License. 356 in identifying law enforcement target through careful analysis of that masquerading as prostitutes to warm others information. Unprotected and uncontrolled before they finalized an arrangement. This data enable an attacker to target entities included keywords, emojis, and code talk through careful selection (Martinez & that avoided communicating in a manner Dawson, 2019). that didn’t incriminate them. Other measures Social media pages such as Facebook, that modern computing platforms had using Instagram, Twitter, and others create an cloud services that were used as an environment that enables personalized untraceable telephone, voicemail, and text social engineering (Stewart & Dawson, messaging. Previously, a telephone number 2018). Information such as a birth month, could be used to identify a person. Still, with home address, location, and even a public Google Voice services, this allowed people network allows an attacker to begin to create an email and cloud-based telephone working on exploitation techniques. These service to avoid using their actual provider. can be in the form of someone carefully And if confronted by law enforcement, it selecting a target to a third party having was easier to hide the number with removing access to the account through a developed the application or now having the cloud application in which you have granted service forward the call to their phone. In rights to your information to use it. turn, this made it challenging for law Researchers have looked at what factors enforcement entities to use that as a sure lead to gullibility in an individual faced means to locate the person providing with social engineering threats based on services as now individuals could screen personality traits. For human trafficking, it potential customers. has been uncovered that some tactics are through the promise of work overseas with 2. Human Trafficking the hopes of escape from an oppressive or Websites such as Backpage was not dangerous environment. only known for prostitution but human trafficking. Encrypted currency such as 3. Online Marketplace Bitcoin has allowed for illegal transactions While human tracking has mostly of human sales to remain undetected and moved to the Internet, so has other illicit nearly untraceable (Portnoff, Huang, activities such as the purchase of narcotics, Doerfler, Afroz, & McCoy, 2017). government documents such as United And even when the Federal Bureau took States of America (USA) driver licenses, down Backpage for Investigation (FBI) passports from multiple countries, and shortly after similarly named sites popped services such as contract killers. Former up. Thus taking down the page served only sites such as the Silk Road served as a as a quick win as one can use cached pages crypto market for illegal drug trading until and repost information used previously. it was closed two years later (Maddox, For those involved in more Barratt, Allen, & Lenton, 2016). Since Silk sophisticated methods, the Dark Web Road has been taken down, numerous pages remains the best avenue to stay undetected. have taken its place. And the problem with As hyperconnected systems create a unique shutting down the operations on these pages problem solving this matter becomes is that the Dark Web consists of unindexed complex (Martinez, 2019). This means pages that are not found using an everyday when you have multiple social media pages, browser such as Firefox, Chrome, or Internet of Things (IoT) devices, public Internet Explorer. To even access these information, and data revealed through pages, The Onion Router (Tor) is required. breaches, it allows someone to become a Figure no. 1 displays a screenshot of an 357 onion page accessed with the Tor Browser on the Dark Web to be accessed, describing using Hidden Wiki to locate the page. its service (Sinha, 2017). The Hidden Wiki serves as a guide to pages Figure no. 1: Example of Online Marketplace on Dark Web Sites such as USfakeIDs provide their browsing a storefront of illegal services and customers to purchase a driver’s license goods. from any state. These licenses are advertised as being near authentic to 4. Navigating the Dark Web including the hologram. This site could The Dark Web requires Tor Browser serve underage teens in the purchase of to be installed on the system. While alcohol, illegal’s who require proper installing the browser allows someone to be documentation, or individuals who seek safe, the other issues remain around the something much more sinister as privacy of an Internet Service Provider maintaining an identity to plan a terrorist (ISP) viewing activities. So the installation attack. Other items sold are passport, birth and the use of additional services of Virtual documents, and other government-provided Private Network (VPN), encryption, and documents that are used to establish an other security tools to altogether cloak identity on similar sites. activities. If the user uses Ubuntu or While the Hidden Wiki is not all- another Debian based Linux distribution, inclusive, it does provide a starting point then installing the necessary Personal for those getting familiarized with the Package Archives (PPAs) must be done shadowy marketplace. Some sites that through the Command Line Interface (CLI). provide auctions and other services require After that typing, the below installs and Bitcoin payment before giving the actual runs Tor. onion link. This action is to show a real sudo apt update desire to participate rather than just sudo apt install torbrowser-launcher 358 And once Tor Browser is installed, Other forums may not give into then in the CLI typing torbrowser-launcher online disinformation or spread hate but will launch Tor. If you navigate to show the instead, inform those on how to obtain application, then one could locate the information for a service or good that may application as well. Operating Systems be deemed illegal. With gun crime high in (OS) such as Kali Linux and Tails have a some US cities, law enforcement must be number of these applications prebuilt. able to track down firearms that are used in These OSs can do more than navigating the crimes. With 3D printed guns and gun Dark Web while others are developed with parts, anyone can manufacture unlicensed digital crime and cyber warfare (Dawson & and untraceable weapons. One such 3D gun Omar, 2015). that started this discussion was the Liberator gun (Walther, 2015). The federal 5. Online Forums government moved swiftly to have the file Countries have laws in place to removed from the web, but hundreds of protect and provide rights, such as freedom downloads occurred before this happens. of speech. Therefore online forums provide Since then, the file has been shared on a medium where people can freely share selected channels and still available today. how they feel with likewise people. When discussing human trafficking, However, alt-right groups, nationalists, and sex work is one area where women and domestic terrorist groups use them routinely children are trafficked into where they work to spread violence and hatred filled under the cloak of a legitimate business. messages. In 2019, sites such as 8chan were Massage parlors have been known to traffic removed from their host provider as three people illegally.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us