The dark web, also known as darknet websites, are accessible only through networks such as Tor ("The Onion Routing" project) that are created specifically for the dark web. Tor browser and Tor-accessible sites are widely used among the darknet users and can be identified by the domain ".onion". Tor browsers create encrypted entry points and pathways for the user, allowing their dark web searches and actions to be anonymous.
Identities and locations of darknet users stay anonymous and cannot be tracked due to the layered encryption system. The darknet encryption technology routes users' data through a large number of intermediate servers, which protects the users' identity and guarantees anonymity. The transmitted information can be decrypted only by a subsequent node in the scheme, which leads to the exit node. The complicated system makes it almost impossible to reproduce the node path and decrypt the information layer by layer. Due to the high level of encryption, websites are not able to track geolocation and IP of their users, and users are not able to get this information about the host. Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially.
As of December 2020, the number of active Tor sites in .onion was estimated at 76,300 (containing a lot of copies). Of these, 18 000 would have original content.
The dark web is also used in certain extortion-related processes. It is common to observe data from ransomware attacks on several dark web sites, for example data sales sites or public data repository sites.
Examination of price differences in dark web markets versus prices in real life or over the World Wide Web have been attempted as well as studies in the quality of goods received over the dark web. One such study was performed on Evolution, one of the most popular crypto-markets active from January 2013 to March 2015. Although it found the digital information, such as concealment methods and shipping country, "seems accurate", the study uncovered issues with the quality of illegal drugs sold in Evolution, stating that, "the illicit drugs purity is found to be different from the information indicated on their respective listings." Less is known about consumer motivations for accessing these marketplaces and factors associated with their use. Darknets markets also sell leaked credit cards that can be downloaded for free or purchased for use in illegal activities.
Due to its relevance in the digital world, bitcoin has become a popular product for users to scam companies with. Cybercriminal groups such as DDOS"4" have led to over 140 cyberattacks on companies since the emergence of bitcoins in 2014. These attacks have led to the formation of other cybercriminal groups as well as Cyber Extortion.
Recently, around 100,000 compromised ChatGPT users' login information was sold on the dark web in 2023. Additionally, the logs showed, in the opinion of the researchers, that the majority of the compromised ChatGPT passwords had been extracted by the data-stealing virus Raccoon.
Scott Dueweke the president and founder of Zebryx Consulting states that Russian electronic currency such as WebMoney and Perfect Money are behind the majority of the illegal actions. In April 2015, Flashpoint received a 5 million dollar investment to help their clients gather intelligence from the deep and dark web. There are numerous carding forums, PayPal and bitcoin trading websites as well as fraud and counterfeiting services. Many such sites are scams themselves. Phishing via cloned websites and other scam sites are numerous, with darknet markets often advertised with fraudulent URLs.
The type of content that has the most popularity on the dark web is illegal pornography—more specifically, child pornography. About 80% of its web traffic is related to accessing child pornography despite it being difficult to find even on the dark web. A website called Lolita City, which has since been taken down, contained over 100 GB of child pornographic media and had about 15,000 members.
Terrorist organizations took to the internet as early as the 1990s; however, the birth of the dark web attracted these organizations due to the anonymity, lack of regulation, social interaction, and easy accessibility. These groups have been taking advantage of the chat platforms within the dark web to inspire terrorist attacks. Groups have even posted "How To" guides, teaching people how to become and hide their identities as terrorists.
The dark web became a forum for terrorist propaganda, guiding information, and most importantly, funding. With the introduction of Bitcoin, an anonymous transactions were created which allowed for anonymous donations and funding. By accepting Bitcoin, terrorists were now able to fund purchases of weaponry. In 2018, an individual named Ahmed Sarsur was charged for attempting to purchase explosives and hire snipers to aid Syrian terrorists, as well as attempting to provide them financial support, all through the dark web.
Within the dark web, there exists emerging social media platforms similar to those on the World Wide Web, this is known as the Dark Web Social Network (DWSN). The DWSN works a like a regular social networking site where members can have customizable pages, have friends, like posts, and blog in forums. Facebook and other traditional social media platforms have begun to make dark-web versions of their websites to address problems associated with the traditional platforms and to continue their service in all areas of the World Wide Web. Unlike Facebook, the privacy policy of the DWSN requires that members are to reveal absolutely no personal information and remain anonymous.
There have been arguments that the dark web promotes civil liberties, like "free speech, privacy, anonymity". Some prosecutors and government agencies are concerned that it is a haven for criminal activity. The deep and dark web are applications of integral internet features to provide privacy and anonymity. Policing involves targeting specific activities of the private web deemed illegal or subject to internet censorship.
When investigating online suspects, police typically use the IP (Internet Protocol) address of the individual; however, due to Tor browsers creating anonymity, this becomes an impossible tactic. As a result, law enforcement has employed many other tactics in order to identify and arrest those engaging in illegal activity on the dark web. OSINT, or Open Source Intelligence, are data collection tools that legally collect information from public sources. OSINT tools can be dark web specific to help officers find bits of information that would lead them to gaining more knowledge about interactions going on in the dark web.
"Going Dark: The Internet Behind The Internet". NPR. 25 May 2014. Archived from the original on 27 May 2015. Retrieved 29 May 2015. https://www.npr.org/sections/alltechconsidered/2014/05/25/315821415/going-dark-the-internet-behind-the-internet
Greenberg, Andy (19 November 2014). "Hacker Lexicon: What Is the Dark Web?". Wired. Archived from the original on 7 June 2015. Retrieved 6 June 2015. https://www.wired.com/2014/11/hacker-lexicon-whats-dark-web/
"Clearing Up Confusion – Deep Web vs. Dark Web". BrightPlanet. 2014-03-27. Archived from the original on 2015-05-16. http://www.brightplanet.com/2014/03/clearing-confusion-deep-web-vs-dark-web/
Egan, Matt (12 January 2015). "What is the dark web? How to access the dark website – How to turn out the lights and access the dark web (and why you might want to)". Archived from the original on 19 June 2015. Retrieved 18 June 2015. http://www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-3593569/
Ghappour, Ahmed (2017-09-01). "Data Collection and the Regulatory State". Connecticut Law Review. 49 (5): 1733. Archived from the original on 2021-05-01. Retrieved 2020-09-06. https://scholarship.law.bu.edu/faculty_scholarship/255
Ghappour, Ahmed (2017-04-01). "Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web". Stanford Law Review. 69 (4): 1075. Archived from the original on 2021-04-20. Retrieved 2020-09-06. https://scholarship.law.bu.edu/faculty_scholarship/204
Solomon, Jane (6 May 2015). "The Deep Web vs. The Dark Web: Do You Know The Difference?". Archived from the original on 9 May 2015. Retrieved 26 May 2015. http://blog.dictionary.com/dark-web/
Greenberg, Andy (19 November 2014). "Hacker Lexicon: What Is the Dark Web?". Wired. Archived from the original on 7 June 2015. Retrieved 6 June 2015. https://www.wired.com/2014/11/hacker-lexicon-whats-dark-web/
"The dark web Revealed". Popular Science. pp. 20–21. Archived from the original on 2015-03-18. Retrieved 2021-04-15. https://www.popsci.com/dark-web-revealed/
Ghappour, Ahmed (2017-04-01). "Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web". Stanford Law Review. 69 (4): 1075. Archived from the original on 2021-04-20. Retrieved 2020-09-06. https://scholarship.law.bu.edu/faculty_scholarship/204
"Clearnet vs hidden services – why you should be careful". DeepDotWeb. Archived from the original on 28 June 2015. Retrieved 4 June 2015. https://web.archive.org/web/20150628204337/https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/clearnet-vs-hidden-services-why-you-should-be-careful/
Chacos, Brad (12 August 2013). "Meet Darknet, the hidden, anonymous underbelly of the searchable Web". PC World. Archived from the original on 12 August 2015. Retrieved 16 August 2015. http://www.pcworld.com/article/2046227/meet-darknet-the-hidden-anonymous-underbelly-of-the-searchable-web.html
Hatta, Masayuki (December 2020). "Deep web, dark web, dark net: A taxonomy of "hidden" Internet". Annals of Business Administrative Science. 19 (6): 277–292. doi:10.7880/abas.0200908a. https://doi.org/10.7880%2Fabas.0200908a
Lacey, David; Salmon, Paul M (2015). "It's Dark in There: Using Systems Analysis to Investigate Trust and Engagement in Dark Web Forums". In Harris, Don (ed.). Engineering Psychology and Cognitive Ergonomics. Lecture Notes in Computer Science. Vol. 9174. Cham: Springer International Publishing. pp. 117–128. doi:10.1007/978-3-319-20373-7_12. ISBN 978-3-319-20372-0. 978-3-319-20372-0
Beckett, Andy (26 November 2009). "The dark side of the internet". Archived from the original on 8 September 2013. Retrieved 9 August 2015. https://www.theguardian.com/technology/2009/nov/26/dark-side-internet-freenet
"NASA is indexing the 'Deep Web' to show mankind what Google won't". Fusion. Archived from the original on 2015-06-30. http://fusion.net/story/145885/nasa-is-indexing-the-deep-web-to-show-mankind-what-google-wont/
"Going Dark: The Internet Behind The Internet". NPR. 25 May 2014. Archived from the original on 27 May 2015. Retrieved 29 May 2015. https://www.npr.org/sections/alltechconsidered/2014/05/25/315821415/going-dark-the-internet-behind-the-internet
Solomon, Jane (6 May 2015). "The Deep Web vs. The Dark Web: Do You Know The Difference?". Archived from the original on 9 May 2015. Retrieved 26 May 2015. http://blog.dictionary.com/dark-web/
Lacey, David; Salmon, Paul M (2015). "It's Dark in There: Using Systems Analysis to Investigate Trust and Engagement in Dark Web Forums". In Harris, Don (ed.). Engineering Psychology and Cognitive Ergonomics. Lecture Notes in Computer Science. Vol. 9174. Cham: Springer International Publishing. pp. 117–128. doi:10.1007/978-3-319-20373-7_12. ISBN 978-3-319-20372-0. 978-3-319-20372-0
"The Deep Web and Its Darknets – h+ Media". h+ Media. 2015-06-29. Archived from the original on 2015-07-06. Retrieved 2016-11-18. https://web.archive.org/web/20150706093936/http://hplusmagazine.com/2015/06/29/the-deep-web-and-its-darknets/
Lacson, Wesley; Jones, Beata (2016). "The 21st Century Darknet Market: Lessons From The Fall Of Silk Road" (PDF). International Journal of Cyber Criminology. 10: 40–61. doi:10.5281/zenodo.58521. Archived from the original (PDF) on 2020-12-12. Retrieved 2019-10-02. https://web.archive.org/web/20201212034310/http://cybercrimejournal.com/Lacson%26Jonesvol10issue1IJCC2016.pdf
Lacey, David; Salmon, Paul M (2015). "It's Dark in There: Using Systems Analysis to Investigate Trust and Engagement in Dark Web Forums". In Harris, Don (ed.). Engineering Psychology and Cognitive Ergonomics. Lecture Notes in Computer Science. Vol. 9174. Cham: Springer International Publishing. pp. 117–128. doi:10.1007/978-3-319-20373-7_12. ISBN 978-3-319-20372-0. 978-3-319-20372-0
Moore, Daniel (2016). "Cryptopolitik and the Darknet". Survival. 58 (1): 7–38. doi:10.1080/00396338.2016.1142085. https://doi.org/10.1080%2F00396338.2016.1142085
Wimmer, Andreas. "Dark net, Social Media and Extremism: Addressing Indonesian Counter terrorism on the Internet". Archived from the original on June 4, 2017 – via www.academia.edu. https://web.archive.org/web/20170604003640/http://www.academia.edu/20813843/DARKNET_SOCIAL_MEDIA_AND_EXTREMISM_ADDRESSING_INDONESIAN_COUNTERTERRORISM_ON_THE_INTERNET
Moore, Daniel. "Cryptopolitik and the Darknet". Survival: Global Politics and Strategy. Retrieved 2016-03-20. http://www.tandfonline.com/doi/abs/10.1080/00396338.2016.1142085
Cox, Joseph (2016-02-01). "Study Claims Dark Web Sites Are Most Commonly Used for Crimes". Retrieved 2016-03-20. https://www.vice.com/en/article/study-claims-dark-web-sites-are-most-commonly-used-for-crimes/
Mark, Ward (30 December 2014). "Tor's most visited hidden sites host child abuse images". BBC. Archived from the original on 25 April 2015. Retrieved 28 May 2015. https://www.bbc.co.uk/news/technology-30637010
"Everything You Need to Know on Tor & the Deep Web". whoishostingthis. 17 December 2013. Archived from the original on 2 July 2015. Retrieved 18 June 2015. http://www.whoishostingthis.com/blog/2013/12/17/tor-deep-web/
Cox, Joseph (25 February 2015). "What Firewall? China's Fledgling Deep Web Community". Archived from the original on 20 June 2015. Retrieved 19 June 2015. https://www.vice.com/en/article/what-firewall-chinas-fledgling-deep-web-community/
Mark, Ward (30 December 2014). "Tor's most visited hidden sites host child abuse images". BBC. Archived from the original on 25 April 2015. Retrieved 28 May 2015. https://www.bbc.co.uk/news/technology-30637010
"Le Dark web en chiffres". 28 January 2021. Archived from the original on 2021-02-01. https://www.aleph-networks.com/le-dark-web-en-chiffres/
Thomson, Iain. "Dark web doesn't exist, says Tor's Dingledine. And folks use network for privacy, not crime". The Register. Archived from the original on 2017-07-31. Retrieved 2017-07-31. https://www.theregister.co.uk/2017/07/29/tor_dark_web/
Moore, Daniel (2016). "Cryptopolitik and the Darknet". Survival. 58 (1): 7–38. doi:10.1080/00396338.2016.1142085. https://doi.org/10.1080%2F00396338.2016.1142085
Cox, Joseph (1 February 2016). "Study Claims Dark Web Sites Are Most Commonly Used for Crime". Archived from the original on 12 March 2016. Retrieved 20 March 2016. https://www.vice.com/en/article/study-claims-dark-web-sites-are-most-commonly-used-for-crime/
"Ransomwares, divulgation de données et malware-as-a-service dans le Dark Web. Partie 1/2". 21 May 2021. Archived from the original on 2021-05-21. https://www.aleph-networks.com/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-1-2/
"Ransomwares, divulgation de données et malware-as-a-service dans le Dark Web. Partie 2/2". 3 June 2021. Archived from the original on 2021-06-04. https://www.aleph-networks.com/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2/
Mark, Ward (30 December 2014). "Tor's most visited hidden sites host child abuse images". BBC. Archived from the original on 25 April 2015. Retrieved 28 May 2015. https://www.bbc.co.uk/news/technology-30637010
Reeve, Tom (30 September 2015). "Extortion on the cards". Archived from the original on 10 December 2015. Retrieved 8 December 2015. http://www.scmagazineuk.com/extortion-on-the-cards/article/440385/
ElBahrawy, Abeer; Alessandretti, Laura; Rusnac, Leonid; Goldsmith, Daniel; Teytelboym, Alexander; Baronchelli, Andrea (December 2020). "Collective dynamics of dark web marketplaces". Scientific Reports. 10 (1): 18827. arXiv:1911.09536. Bibcode:2020NatSR..1018827E. doi:10.1038/s41598-020-74416-y. PMC 7608591. PMID 33139743. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7608591
Burleigh, Nina (19 February 2015). "The Rise and Fall of Silk Road, the dark web's Amazon". Archived from the original on 25 May 2015. Retrieved 25 May 2015. http://www.newsweek.com/2015/02/27/silk-road-hell-307732.html
ElBahrawy, Abeer; Alessandretti, Laura; Rusnac, Leonid; Goldsmith, Daniel; Teytelboym, Alexander; Baronchelli, Andrea (December 2020). "Collective dynamics of dark web marketplaces". Scientific Reports. 10 (1): 18827. arXiv:1911.09536. Bibcode:2020NatSR..1018827E. doi:10.1038/s41598-020-74416-y. PMC 7608591. PMID 33139743. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7608591
ElBahrawy, Abeer; Alessandretti, Laura; Rusnac, Leonid; Goldsmith, Daniel; Teytelboym, Alexander; Baronchelli, Andrea (December 2020). "Collective dynamics of dark web marketplaces". Scientific Reports. 10 (1): 18827. arXiv:1911.09536. Bibcode:2020NatSR..1018827E. doi:10.1038/s41598-020-74416-y. PMC 7608591. PMID 33139743. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7608591
ElBahrawy, Abeer; Alessandretti, Laura; Rusnac, Leonid; Goldsmith, Daniel; Teytelboym, Alexander; Baronchelli, Andrea (December 2020). "Collective dynamics of dark web marketplaces". Scientific Reports. 10 (1): 18827. arXiv:1911.09536. Bibcode:2020NatSR..1018827E. doi:10.1038/s41598-020-74416-y. PMC 7608591. PMID 33139743. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7608591
ElBahrawy, Abeer; Alessandretti, Laura; Rusnac, Leonid; Goldsmith, Daniel; Teytelboym, Alexander; Baronchelli, Andrea (December 2020). "Collective dynamics of dark web marketplaces". Scientific Reports. 10 (1): 18827. arXiv:1911.09536. Bibcode:2020NatSR..1018827E. doi:10.1038/s41598-020-74416-y. PMC 7608591. PMID 33139743. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7608591
ElBahrawy, Abeer; Alessandretti, Laura; Rusnac, Leonid; Goldsmith, Daniel; Teytelboym, Alexander; Baronchelli, Andrea (December 2020). "Collective dynamics of dark web marketplaces". Scientific Reports. 10 (1): 18827. arXiv:1911.09536. Bibcode:2020NatSR..1018827E. doi:10.1038/s41598-020-74416-y. PMC 7608591. PMID 33139743. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7608591
Rhumorbarbe, Damien; Staehli, Ludovic; Broséus, Julian; Rossy, Quentin; Esseiva, Pierre (2016). "Buying drugs on a Darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data". Forensic Science International. 267: 173–182. doi:10.1016/j.forsciint.2016.08.032. PMID 27611957. Archived from the original on 2018-09-17. Retrieved 2018-09-10. https://serval.unil.ch/notice/serval:BIB_670B021B4620
Rhumorbarbe, Damien; Staehli, Ludovic; Broséus, Julian; Rossy, Quentin; Esseiva, Pierre (2016). "Buying drugs on a Darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data". Forensic Science International. 267: 173–182. doi:10.1016/j.forsciint.2016.08.032. PMID 27611957. Archived from the original on 2018-09-17. Retrieved 2018-09-10. https://serval.unil.ch/notice/serval:BIB_670B021B4620
"Characterising dark net marketplace purchasers in a sample of regular psychostimulant users". International Journal of Drug Policy. 35.
"One Million Credit Cards Leaked in a Cybercrime Forum for Free". Cyble. August 8, 2021. Archived from the original on November 12, 2023. Retrieved August 9, 2023. https://cyble.com/blog/one-million-credit-cards-leaked-in-a-cybercrime-forum-for-free/
Kaur, Shubhdeep; Randhawa, Sukhchandan (June 2020). "Dark Web: A Web of Crimes". Wireless Personal Communications. 112 (4): 2131–2158. doi:10.1007/s11277-020-07143-2. S2CID 212996728. /wiki/Doi_(identifier)
Kirkpatrick, Keith (2017-02-21). "Financing the dark web". Communications of the ACM. 60 (3): 21–22. doi:10.1145/3037386. S2CID 32696030. /wiki/Doi_(identifier)
Richet, Jean-Loup (June 2013). "Laundering Money Online: a review of cybercriminals methods". arXiv:1310.2368 [cs.CY]. /wiki/ArXiv_(identifier)
Richet, Jean-Loup (2012). "How to Become a Black Hat Hacker? An Exploratory Study of Barriers to Entry Into Cybercrime". 17th AIM Symposium. Archived from the original on 2017-01-05. http://aim.asso.fr/index.php/mediatheque/finish/26-aim-2012/816-how-to-become-a-black-hat-hacker-an-exploratory-study-of-barriers-to-entry-into-cybercrime/0
* Allison, Ian (11 February 2015). "Bitcoin tumbler: The business of covering tracks in the world of cryptocurrency laundering". International Business Times. Archived from the original on 24 September 2015. Retrieved 8 December 2015. http://www.ibtimes.co.uk/bitcoin-tumbler-business-covering-tracks-world-cryptocurrency-laundering-1487480
"Helix Updates: Integrated Markets Can Now Helix Your BTC". 5 August 2015. Archived from the original on 21 February 2016. Retrieved 8 December 2015. https://web.archive.org/web/20160221052629/https://www.deepdotweb.com/2014/08/05/helix-updates-integrated-markets-can-now-helix-your-btc/
Kaur, Shubhdeep; Randhawa, Sukhchandan (June 2020). "Dark Web: A Web of Crimes". Wireless Personal Communications. 112 (4): 2131–2158. doi:10.1007/s11277-020-07143-2. S2CID 212996728. /wiki/Doi_(identifier)
Kaur, Shubhdeep; Randhawa, Sukhchandan (June 2020). "Dark Web: A Web of Crimes". Wireless Personal Communications. 112 (4): 2131–2158. doi:10.1007/s11277-020-07143-2. S2CID 212996728. /wiki/Doi_(identifier)
Kaur, Shubhdeep; Randhawa, Sukhchandan (June 2020). "Dark Web: A Web of Crimes". Wireless Personal Communications. 112 (4): 2131–2158. doi:10.1007/s11277-020-07143-2. S2CID 212996728. /wiki/Doi_(identifier)
Holden, Alex (15 January 2015). "A new breed of lone wolf hackers are roaming the deep web – and their prey is getting bigger". International Business Times. Archived from the original on 28 June 2015. Retrieved 19 June 2015. http://www.ibtimes.co.uk/new-breed-lone-wolf-hackers-are-roaming-deep-web-their-prey-getting-bigger-1483347
"Hacking communities in the Deep Web". 15 May 2015. Archived from the original on 28 April 2016. Retrieved 5 September 2017. http://resources.infosecinstitute.com/hacking-communities-in-the-deep-web/
Cox, Joseph (12 November 2015). "A Dark Web Hacker Is Hunting Potential Pedophiles to Extort Them for Money". Archived from the original on 15 November 2015. Retrieved 12 November 2015. https://www.vice.com/en/article/a-dark-web-hacker-is-hunting-potential-pedophiles-to-extort-them-for-money/
"The Dark Net: Policing the Internet's Underworld". World Policy Journal. 32. /wiki/World_Policy_Journal
"Large-Scale Monitoring for Cyber Attacks by Using Cluster Information on Darknet Traffic Features". Procedia Computer Science. 53.
Fachkha, Claude; Bou-Harb, Elias; Debbabi, Mourad (2015). "Inferring distributed reflection denial of service attacks from darknet". Computer Communications. 62: 59–71. doi:10.1016/j.comcom.2015.01.016. /wiki/Doi_(identifier)
Cluley, Graham (June 20, 2023). "100,000 hacked ChatGPT accounts up for sale on the dark web". Bitdefender. Archived from the original on September 2, 2023. Retrieved September 2, 2023. https://www.bitdefender.com/blog/hotforsecurity/100-000-hacked-chatgpt-accounts-up-for-sale-on-the-dark-web/
Kirkpatrick, Keith (2017-02-21). "Financing the dark web". Communications of the ACM. 60 (3): 21–22. doi:10.1145/3037386. S2CID 32696030. /wiki/Doi_(identifier)
"Flashpoint, Leading Deep and Dark Web Intelligence Provider, Raises $5 Million in Financing Round" (Press release). New York: PRNewswire. April 17, 2015. Archived from the original on October 2, 2019. Retrieved October 2, 2019. https://www.prnewswire.com/news-releases/flashpoint-leading-deep-and-dark-web-intelligence-provider-raises-5-million-in-financing-round-300067671.html
Cox, Joseph (14 January 2016). "Dark Web Vendor Sentenced for Dealing Counterfeit Coupons". Archived from the original on 24 January 2016. Retrieved 24 January 2016. https://www.vice.com/en/article/dark-web-vendor-sentenced-for-dealing-counterfeit-coupons/
"Secrets to Unmasking Bitcoin Scams – 4 Eye Opening Case Studies". 28 May 2015. Archived from the original on 16 November 2015. Retrieved 12 November 2015. https://web.archive.org/web/20151116122618/https://www.deepdotweb.com/2015/05/28/secrets-to-unmasking-bitcoin-scams-4-eye-opening-case-studies/
Stockley, Mark (1 July 2015). "Hundreds of Dark Web sites cloned and "booby trapped"". Archived from the original on 11 December 2015. Retrieved 8 December 2015. https://nakedsecurity.sophos.com/2015/07/01/hundreds-of-dark-web-sites-cloned-and-booby-trapped/
Fox-Brewster, Thomas (18 November 2014). "Many Sites That Fell In Epic Onymous Tor Takedown 'Were Scams Or Legit'". Forbes. Archived from the original on 19 June 2015. Retrieved 19 June 2015. https://www.forbes.com/sites/thomasbrewster/2014/11/18/tor-takedown-misinformation/
"Beware of Phishing Scams On Clearnet Sites! (darknetmarkets.org)". DeepDotWeb. 3 July 2015. Archived from the original on 22 February 2016. Retrieved 8 December 2015. https://web.archive.org/web/20160222003543/https://www.deepdotweb.com/2015/07/03/beware-of-phishing-scams-on-clearnet-sites-darknetmarkets-org/
"Warning: More Onion Cloner Phishing Scams". 22 April 2015. Archived from the original on 20 December 2015. Retrieved 8 December 2015. https://web.archive.org/web/20151220111815/https://www.deepdotweb.com/2015/04/22/reminder-onion-cloner-phishing-scams/
Kaur, Shubhdeep; Randhawa, Sukhchandan (June 2020). "Dark Web: A Web of Crimes". Wireless Personal Communications. 112 (4): 2131–2158. doi:10.1007/s11277-020-07143-2. S2CID 212996728. /wiki/Doi_(identifier)
Kaur, Shubhdeep; Randhawa, Sukhchandan (June 2020). "Dark Web: A Web of Crimes". Wireless Personal Communications. 112 (4): 2131–2158. doi:10.1007/s11277-020-07143-2. S2CID 212996728. /wiki/Doi_(identifier)
Kaur, Shubhdeep; Randhawa, Sukhchandan (June 2020). "Dark Web: A Web of Crimes". Wireless Personal Communications. 112 (4): 2131–2158. doi:10.1007/s11277-020-07143-2. S2CID 212996728. /wiki/Doi_(identifier)
Willacy, Mark (26 August 2015). "Secret 'dark net' operation saves scores of children from abuse; ringleader Shannon McCoole behind bars after police take over child porn site". Archived from the original on 26 August 2015. Retrieved 26 August 2015. http://www.abc.net.au/news/2015-08-26/secret-anti-paedophile-operation-saves-children-from-abuse/6720304
Conditt, Jessica (8 January 2016). "FBI hacked the Dark Web to bust 1,500 pedophiles". Archived from the original on 8 January 2016. Retrieved 8 January 2016. https://web.archive.org/web/20160108092655/http://www.engadget.com/2016/01/07/fbi-hacked-the-dark-web-to-bust-1-500-pedophiles/
*Cox, Joseph (5 January 2016). "The FBI's 'Unprecedented' Hacking Campaign Targeted Over a Thousand Computers". Archived from the original on 8 January 2016. Retrieved 8 January 2016. https://www.vice.com/en/article/the-fbis-unprecedented-hacking-campaign-targeted-over-a-thousand-computers/
Farivar, Cyrus (16 June 2015). "Feds bust through huge Tor-hidden child porn site using questionable malware". Ars Technica. Archived from the original on 9 August 2015. Retrieved 8 August 2015. https://arstechnica.com/tech-policy/2015/07/feds-bust-through-huge-tor-hidden-child-porn-site-using-questionable-malware/
Kaur, Shubhdeep; Randhawa, Sukhchandan (June 2020). "Dark Web: A Web of Crimes". Wireless Personal Communications. 112 (4): 2131–2158. doi:10.1007/s11277-020-07143-2. S2CID 212996728. /wiki/Doi_(identifier)
Kaur, Shubhdeep; Randhawa, Sukhchandan (June 2020). "Dark Web: A Web of Crimes". Wireless Personal Communications. 112 (4): 2131–2158. doi:10.1007/s11277-020-07143-2. S2CID 212996728. /wiki/Doi_(identifier)
Evans, Robert (16 June 2015). "5 Things I Learned Infiltrating Deep Web Child Molesters". Archived from the original on 26 August 2015. Retrieved 29 August 2015. /wiki/Robert_Evans_(journalist)
Cox, Joseph (11 November 2014). "As the FBI Cleans the Dark Net, Sites Far More Evil Than Silk Road Live On". Archived from the original on 26 July 2015. Retrieved 3 August 2015. https://www.vice.com/en/article/as-the-fbi-cleans-the-dark-net-sites-far-more-evil-than-silk-road-live-on/
Markowitz, Eric (10 July 2014). "The Dark Net: A Safe Haven for Revenge Porn?". Archived from the original on 26 November 2015. Retrieved 3 August 2015. http://www.vocativ.com/tech/internet/dark-net-safe-haven-revenge-porn/?PageSpeed=noscript
"4 arrested in takedown of dark web child abuse platform with some half a million users". Europol. 3 May 2021. Archived from the original on 3 May 2021. Retrieved 3 May 2021. https://www.europol.europa.eu/newsroom/news/4-arrested-in-takedown-of-dark-web-child-abuse-platform-some-half-million-users
"Child sexual abuse: Four held in German-led raid on huge network". BBC. 3 May 2021. Archived from the original on 3 May 2021. Retrieved 3 May 2021. https://www.bbc.com/news/world-europe-56969414
Weimann, Gabriel (2016-03-03). "Going Dark: Terrorism on the Dark Web". Studies in Conflict & Terrorism. 39 (3): 195–206. doi:10.1080/1057610X.2015.1119546. ISSN 1057-610X. https://doi.org/10.1080%2F1057610X.2015.1119546
Weimann, Gabriel (2016-03-03). "Going Dark: Terrorism on the Dark Web". Studies in Conflict & Terrorism. 39 (3): 195–206. doi:10.1080/1057610X.2015.1119546. ISSN 1057-610X. https://doi.org/10.1080%2F1057610X.2015.1119546
Weimann, Gabriel (2016-03-03). "Going Dark: Terrorism on the Dark Web". Studies in Conflict & Terrorism. 39 (3): 195–206. doi:10.1080/1057610X.2015.1119546. ISSN 1057-610X. https://doi.org/10.1080%2F1057610X.2015.1119546
Weimann, Gabriel (2016-03-03). "Going Dark: Terrorism on the Dark Web". Studies in Conflict & Terrorism. 39 (3): 195–206. doi:10.1080/1057610X.2015.1119546. ISSN 1057-610X. https://doi.org/10.1080%2F1057610X.2015.1119546
Weimann, Gabriel (2016-03-03). "Going Dark: Terrorism on the Dark Web". Studies in Conflict & Terrorism. 39 (3): 195–206. doi:10.1080/1057610X.2015.1119546. ISSN 1057-610X. https://doi.org/10.1080%2F1057610X.2015.1119546
Weimann, Gabriel (2016-03-03). "Going Dark: Terrorism on the Dark Web". Studies in Conflict & Terrorism. 39 (3): 195–206. doi:10.1080/1057610X.2015.1119546. ISSN 1057-610X. https://doi.org/10.1080%2F1057610X.2015.1119546
Kaur, Shubhdeep; Randhawa, Sukhchandan (June 2020). "Dark Web: A Web of Crimes". Wireless Personal Communications. 112 (4): 2131–2158. doi:10.1007/s11277-020-07143-2. S2CID 212996728. /wiki/Doi_(identifier)
Cub, Nik (17 November 2014). "FBI seizes fake Tor hosted Jihad funding website as part of Operation Onymous, leaves up real site". Archived from the original on 14 January 2016. Retrieved 25 November 2015. https://www.nikcub.com/posts/fbi-seizes-fake-tor-hosted-jihad-funding-website-as-part-of-operation-onymous-leaves-up-real-site/
Vilić, Vida M. (December 2017). "Dark Web, Cyber Terrorism and Cyber Warfare: Dark Side of the Cyberspace" (PDF). Balkan Social Science Review. 10 (10): 7–24. Archived from the original on 2019-10-02. Retrieved 2019-10-02. http://js.ugd.edu.mk/index.php/BSSR/article/download/1939/1708
Cuthbertson, Anthony (25 November 2015). "Hackers replace dark web Isis propaganda site with advert for Prozac". International Business Times. Archived from the original on 26 November 2015. Retrieved 25 November 2015. http://www.ibtimes.co.uk/hackers-replace-dark-web-isis-propaganda-site-advert-prozac-1530385
"Jihadist cell in Europe 'sought recruits for Iraq and Syria'". BBC. 12 November 2015. Archived from the original on 18 April 2016. https://www.bbc.com/news/world-europe-34802317
Gehl RW (August 2016). "Power/freedom on the dark web: A digital ethnography of the Dark Web Social Network". New Media & Society. 18 (7): 1219–1235. doi:10.1177/1461444814554900. https://doi.org/10.1177%2F1461444814554900
Brooke, Zach (Spring 2016). "A Marketer's Guide to the Dark Web". Marketing Insights. 28 (1): 23–27.
Gehl RW (August 2016). "Power/freedom on the dark web: A digital ethnography of the Dark Web Social Network". New Media & Society. 18 (7): 1219–1235. doi:10.1177/1461444814554900. https://doi.org/10.1177%2F1461444814554900
Holden, Alex (10 February 2015). "Ukraine crisis: Combatants scouring dark web for advice on bridge bombing and anti-tank missiles". International Business Times. Archived from the original on 29 May 2015. Retrieved 28 May 2015. http://www.ibtimes.co.uk/ukraine-combatants-turn-dark-web-advice-bridge-bombing-anti-tank-missiles-1487256
Greenberg, Andy (18 November 2013). "Meet The 'Assassination Market' Creator Who's Crowdfunding Murder With Bitcoins". Forbes. Archived from the original on 5 September 2015. Retrieved 29 August 2015. https://www.forbes.com/sites/andygreenberg/2013/11/18/meet-the-assassination-market-creator-whos-crowdfunding-murder-with-bitcoins/
* Cox, Joseph (18 May 2016). "This Fake Hitman Site Is the Most Elaborate, Twisted Dark Web Scam Yet". Archived from the original on 21 June 2016. Retrieved 20 June 2016. https://www.vice.com/en/article/this-fake-hitman-site-is-the-most-elaborate-twisted-dark-web-scam-yet/
Ormsby, Eileen (3 August 2012). "Conversation with a hitman (or not)". Archived from the original on 4 September 2015. Retrieved 29 August 2015. http://allthingsvice.com/2012/08/03/conversation-with-a-hitman-or-not/
Hong N (May 29, 2015). "Silk Road Founder Ross Ulbricht Sentenced to Life in Prison". The Wall Street Journal. Archived from the original on 2017-06-13. https://web.archive.org/web/20170613152211/https://www.wsj.com/articles/silk-road-founder-ross-ulbricht-sentenced-to-life-in-prison-1432929957
Greenberg A (May 29, 2015). "Silk Road Creator Ross Ulbricht Sentenced to Life in Prison". Wired. Archived from the original on 2015-05-29. https://web.archive.org/web/20150529215648/http://www.wired.com/2015/05/silk-road-creator-ross-ulbricht-sentenced-life-prison/
Ormsby, Eileen (29 August 2015). "Waiting in the Red Room". Archived from the original on 29 August 2015. Retrieved 29 August 2015. http://allthingsvice.com/2015/08/29/waiting-in-the-red-room/
Howell O'Neill, Patrick (28 August 2015). "Dark Net site promised to livestream torture and execution of 7 ISIS jihadists". Archived from the original on 11 September 2015. Retrieved 29 August 2015. http://www.dailydot.com/politics/isis-red-room-dark-net-live-stream/
Barton, Hannah (25 October 2015). "The spooky, twisted saga of the Deep Web horror game 'Sad Satan'". Archived from the original on 23 November 2015. Retrieved 22 November 2015. http://kernelmag.dailydot.com/issue-sections/features-issue-sections/14763/sad-satan-deep-web-horror-game/#sthash.axwtQ6De.dpuf
"The Deep Web and its Darknets". 2015-06-29. Archived from the original on 2015-07-06. Retrieved 2016-11-22. http://hplusmagazine.com/2015/06/29/the-deep-web-and-its-darknets/
Ghappour, Ahmed (2017-09-01). "Data Collection and the Regulatory State". Connecticut Law Review. 49 (5): 1733. Archived from the original on 2021-05-01. Retrieved 2020-09-06. https://scholarship.law.bu.edu/faculty_scholarship/255
Lev Grossman (11 November 2013). "The Secret Web: Where Drugs, Porn and Murder Live Online". Time. Archived from the original on 28 February 2014. http://content.time.com/time/magazine/article/0,9171,2156271,00.html
Davies, Gemma (October 2020). "Shining a Light on Policing of the Dark Web: An Analysis of UK Investigatory Powers". The Journal of Criminal Law. 84 (5): 407–426. doi:10.1177/0022018320952557. https://doi.org/10.1177%2F0022018320952557
"7 Ways the Cops Will Bust You on the Dark Web". Vice.com. 26 June 2016. Archived from the original on 2021-03-09. Retrieved 2021-03-20. https://www.vice.com/en/article/7-ways-the-cops-will-bust-you-on-the-dark-web/
Davies, Gemma (October 2020). "Shining a Light on Policing of the Dark Web: An Analysis of UK Investigatory Powers". The Journal of Criminal Law. 84 (5): 407–426. doi:10.1177/0022018320952557. https://doi.org/10.1177%2F0022018320952557
Davies, Gemma (October 2020). "Shining a Light on Policing of the Dark Web: An Analysis of UK Investigatory Powers". The Journal of Criminal Law. 84 (5): 407–426. doi:10.1177/0022018320952557. https://doi.org/10.1177%2F0022018320952557
Ricard (2 August 2015). "Interpol Dark Web Training Course". Archived from the original on 28 April 2016. Retrieved 8 August 2015. https://archive.today/20160428194934/http://darkwebnews.com/news/interpol-dark-web-training-course/
Cox, Joseph (8 November 2015). "The UK Will Police the Dark Web with a New Task Force". Archived from the original on 10 November 2015. Retrieved 9 November 2015. https://www.vice.com/en/article/the-uk-will-police-the-dark-web-with-a-new-task-force/
Finklea, Kristin (2017-03-10). "Dark Web" (PDF). Archived (PDF) from the original on 2017-03-20. https://fas.org/sgp/crs/misc/R44101.pdf
Johnson, Tim (2017-08-02). "Shocked by gruesome crime, cyber execs help FBI on dark web". Idaho Statesman. http://www.idahostatesman.com/news/nation-world/national/article164797842.html
Burrell, Ian (August 28, 2014). "The Dark Net: Inside the Digital Underworld by Jamie Bartlett, book review". The Independent. Archived from the original on June 20, 2015. https://www.independent.co.uk/arts-entertainment/books/reviews/the-dark-netinside-the-digital-underworld-by-jamie-bartlett-book-review-9696473.html
"The Growth of Dark Subcultures On the Internet, The Leonard Lopate Show". WNYC. June 2, 2015. Archived from the original on October 20, 2016. http://www.wnyc.org/story/growth-dark-subcultures-internet/
Gehl RW (August 2016). "Power/freedom on the dark web: A digital ethnography of the Dark Web Social Network". New Media & Society. 18 (7): 1219–1235. doi:10.1177/1461444814554900. https://doi.org/10.1177%2F1461444814554900
Attrino, Anthony G. (2020-12-22). "N.J. man charged with surfing 'Dark Web' to collect nearly 3K images of child porn, prosecutor says". nj. Archived from the original on 2021-04-21. Retrieved 2021-04-21. https://www.nj.com/bergen/2020/12/nj-man-charged-with-surfing-dark-web-to-collect-nearly-3k-images-of-child-porn-prosecutor-says.html
Pagliery, Jose (March 10, 2014). "The Deep Web you don't know about". CNN Business. Archived from the original on March 3, 2021. Retrieved March 27, 2021. https://money.cnn.com/2014/03/10/technology/deep-web/
Gehl RW (August 2016). "Power/freedom on the dark web: A digital ethnography of the Dark Web Social Network". New Media & Society. 18 (7): 1219–1235. doi:10.1177/1461444814554900. https://doi.org/10.1177%2F1461444814554900
* Swearingen, Jake (2 October 2014). "A Year After Death of Silk Road, Darknet Markets Are Booming". Archived from the original on 25 May 2015. Retrieved 24 May 2015. https://finance.yahoo.com/news/death-silk-road-darknet-markets-142500702.html
Franceschi-Bicchierai, Lorenzo (13 May 2015). "Hackers Tried To Hold a Darknet Market For a Bitcoin Ransom". Archived from the original on 17 May 2015. Retrieved 19 May 2015. https://www.vice.com/en/article/hackers-tried-to-hold-a-darknet-market-for-a-bitcoin-ransom/
Solon, Olivia (3 February 2013). "Police crack down on Silk Road following first drug dealer conviction". Archived from the original on 28 May 2015. Retrieved 27 May 2015. https://arstechnica.com/tech-policy/2013/02/police-crack-down-on-silk-road-following-first-drug-dealer-conviction/
Kan, Michael (May 7, 2019). "Feds Seize DeepDotWeb for Taking Money From Black Market Sites". PCMAG. Archived from the original on 2019-05-07. Retrieved 2019-12-28. https://www.pcmag.com/news/368198/feds-seize-deepdotweb-for-taking-money-from-black-market-sit
Viney, Steven (January 27, 2016). "What is the dark net, and how will it shape the future of the digital age?". ABC. Archived from the original on October 20, 2016. http://www.abc.net.au/news/2016-01-27/explainer-what-is-the-dark-net/7038878
"The Other Internet". Vanity Fair. Vol. 58. /wiki/Vanity_Fair_(magazine)