Dark Hatred: Antisemitism on the Dark Web

Dark Hatred: Antisemitism on the Dark Web

JCA 2019 DOI: 10.26613/jca/2.2.31 Dark Hatred: Antisemitism on the Dark Web Lev Topor Abstract Antisemitism is racism. While it is not broadly accepted in modern societies, it does exist in the margins, in places with no norms or regulations. The key purpose of this article is to develop a new conceptual research framework for the study of both antisemitism and racism. The dark web hosts a great deal of offensive and criminal activity; it also hosts racist and antisemitic activity. It is necessary, then, to search the dark web, the dank underbelly of society, for activity which is not accepted in conventional life. In order to make this conceptual research framework available to other researchers, an overview of racist antise- mitic activity on the dark web will be presented and analyzed. As concluded, governments do not take sufficient action for the eradication of dark web racism as it is hidden from society and is very difficult to regulate. In contrast to the surface web, racists, antisemites, thrive there. Keywords: Antisemitism, Racism, Dark Web, Deep Web INTRODUCTION and racism. If antisemitism will not simply Antisemitism is racism. Even if it is not widely vanish, it is necessary to search the margins of and publicly accepted in modern liberal soci- modern society, trace it, analyze it, and even- eties, it exists in the margins.1 Antisemitism is tually combat and abolish it. This article aims present in the far left’s and postcolonial left’s to present researchers with new concepts and assertions that the state of Israel has commit- methods to study racist and antisemitic phe- ted crimes;2 it is present in the alt-right, with nomena in the digital safehouses of bigots. its neo-Nazi groups that use classic antisemitic Unregulated places such as the deep web and motifs and worship Hitler’s memory;3 it is pres- dark web host a lot of offensive and criminal ent within fundamentalist Islam, which accuses activity.7 Antisemites can express their racist both Israel and Jews in general of harming and ideas with almost complete anonymity and conspiring against Muslims.4 Contemporary security, and with no shame at all. They do not liberal society does not accept racist behavior: It need to fear “persecution” for their beliefs. In stands firm against extremism and tries to cast it fact, the real problem with antisemitism and out.5 However, such ideas, and their associated racism on the dark web is its normality. Such activity, do not disappear. A simple ban cannot online racism is likely to incite hatred in society banish racism. Instead, it moves to the edges of and serve as a “call to action” against those pre- society. sented as harmful by the racists.8 In the digital world, antisemitism finds This article aims to present and discuss plenty of crevices in which to hide.6 The key research on antisemitism, and racism per se, purpose of this article is to develop a new con- in a largely invisible area of society— the dark ceptual framework for the study of antisemitism web. Methodologically, a conceptual analysis Lev Topor of antisemitism combined with empirical evi- very like the Yellow Pages. ICANN gave dence from the dark web is utilized.9 Firstly, I names—IPs, and Domain Name Systems will present a nontechnical explanation of the (DNS)—to computers in every government, deep web and dark web, in order to provide industry, home, and eventually our mobile and researchers with ways to approach these enti- smart devices.11 Now, ICANN’s websites can ties. Secondly, I will present the conceptual be found easily. Instead of typing an IP address and methodological framework, with the aim (e.g., 192.0.32.7), people can simply type of explaining the reasons for this exploration “icann.org.”12 into “hidden worlds.” Thirdly, I will analyze Thus, ICANN began indexing every reg- antisemitic activity on the deep web and dark istered service, invited big tech giants (such as web, describing contemporary, anonymous, Google, Bing, Yahoo, AOL, Yandex.ru, and and shameless racist and antisemitic behavior. others) to index, sort, and manipulate/adapt all For comparison, I will examine antisemitic of the registered DNSs and IPs.13 That index- activity on the “surface web”—that is, the ing process raises some questions and con- web most commonly used in day-to-day life. cerns. First, who gets to be at the top of the I will conclude by sketching an image of the index list, and why? Manipulation the indexing future of research on racism and antisemitism process can be exploited by governments, com- and the role of the deep web and dark web in panies, and so forth. Second, if every address such research. is indexed, it can be monitored by the govern- ment, commercial players, and even malicious THE DEEP WEB AND DARK WEB: WHAT ARE players. In short, this is a danger to free speech THEY, HOW TO ACCESS THEM, AND WHAT (racist speech).14 Denying someone access to the TO LOOK FOR? internet is a violation of basic human rights.15 What They Are Moreover, oppressive countries use IP addresses to silence opposition simply by tracing them The deep web is everything that is not on the and arresting the owners.16 controlled and indexed surface web. The sur- Moreover, in Foucauldian terms, the hege- face internet began as the Arpanet, a project mony of US-based Arpanet, internet, and of the United States Department of Defense. indexing systems can lead to the exclusion of In 1983, the Arpanet switched from being a weaker, un-indexed, players; hence the popu- closed network, named the Network Control larity of the dark web.17 While the internet in Protocol (NCP), and became an open one— now global and can seem free and equal, it is the Transmission Control Protocol/Internet not. The ones who control the internet, such as Protocol (TCP/IP). Moving from a closed the United States or companies such as Google, circuit to an open one led to the expansion of promote their preferred sites, ideologies and these protocols and communication types. As information. When certain information is the number of networks and users grew, a classi- promoted other information is left behind. fication of networks began: National (Class A), Countries can restrict their internet networks as Regional (Class B), and Local (Class C). Today, well. Such is the Chinese case: China restricts every government and individual can design anti-Chinese sites in order to prevent its citizens and install his own network.10 from reaching it.18 Accelerating the internet’s development The deep web is everything that is not indexed and expansion, the Internet Corporation for by search engines and regulators: dynamic Assigned Names and Numbers (ICANN) web pages that are generated by requests; started designing the internet to be more acces- blocked sites that use authentication meth- sible to the public. It turned into something ods; unlinked sites which prevent an effective 26 Journal of Contemporary Antisemitism Dark Hatred indexing process; non-scriptural or contex- extortion, pedophile ring, drugs and arms dis- tual content (everything that is not based on tribution, human trafficking, cyberattacks, and, HTML); limited-access networks which are of course, extreme and malicious manifesta- placed in non-public infrastructures; and pri- tions such as fundamentalist Islam and neo- vate web platforms which require a password or Nazism. The dark web is a double-edged sword: a payment for access.19 It enables free speech, but spreads extremism.24 As mentioned above, it is important to note An example of unique deep web infrastruc- the role of search engines when comparing the ture is TOR—probably the best-known access deep web and the surface web. Currently, search tool. The TOR network originated in the US engines systematically exclude, either by design Naval Research Laboratory and was introduced or by accident, certain sites in favor of others. in 2002, with the aim of facilitating secure Nations and giant tech companies manipulate military and governmental communication and control the web when they refuse to index a worldwide.25 TOR allows anonymous commu- site or when they rank a certain site lower than nication between users, clients, and servers by other sites so the lower ranked site is harder using volunteer nodes (crossroads). All rout- to find. In this way, free speech is prevented. ing is encrypted and, while some nodes can be Certain groups of people, legitimate or not, exposed, it is almost impossible to retrieve all of turn to the deep web and the dark web to avoid the access points and nodes from server to client. this kind of political or corporate interference.20 Thus, if one were to enter a special address, the Lastly, dark webs and other alternative rout- last node accessing the address could be found ing infrastructures are hosted on platforms but not the original user. Search engines and which require special and specific software to governments can do very little to sort the dark reach them, such as the most commonly used web. The TOR network uses unique .onion dark web, TOR21 browser.22 Other examples for domain names that are not accessible by regular popular dark webs are I2P, Riffle, and Freenet. surface web browsers.26 In essence, if I (the author of this paper) set up a While network analysis can detect these private server in my house, for which special soft- kinds of connections, it cannot reach the con- ware is also required (such as a special browser) tent. Dark web users could be discovered by and give you (the reader) the address and the a simple deprivation methodology—every password, we would be on our own dark web.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    18 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us