Subscribe to RSS  |  Advertise on this Blog

  • HOME
  • ABOUT
    • RESUME
Alberto Matus
  • SERVICES
  • CONTACT
  • HOME
  • ABOUT
    • RESUME
  • SERVICES
  • CONTACT
November 4, 2019  |  By ajMatus In Cybercrime, Cybersecurity, Technology

The Dark Web As a Data Source

Observational research is defined as research focusing on the observation of behavior in an unobtrusive manner (Bryant, n.d). In essence, it allows researchers to experience a specific aspect of social life and get a firsthand look at a trend, institution, or behavior. While this is nothing new, it would be ideal to observe the reactions in the rich data source known as the “dark web” together with anonymous behavioral tracking methods. 

We’re all accustomed to the typical search engines such as Google, Yahoo, and Bing. However, there are unlimited reaches of cyberspace which are not visited by the average user. The dark web is the “part of the internet that isn’t visible to search engines and requires the use of an anonymizing browser” (Guccione, 2019). Sheldon (2015) points out that we only experience about 5% of the entire reaches of cyberspace. Basically, cyberspace is huge with unlimited reaches and latitude to grow and move around in obscurity. Hence, I believe if we’re dealing with cybercrime and wish to look at sources of data; the dark web is one of the most ideal places to look at. Additionally, the dark web provides a “safe haven for those with nefarious intentions” and this is whereby the majority of cyber crimes take place. These range from drug deals, human trafficking, child pornography and just about any other illegal underhanded activity that can be conducted through cyberspace (Sheldon, 2015).

My main argument is that if we want to learn about cybercrime, or obtain relevant data then one of the most ideal places to look at as a source is where it occurs or is being conducted. Of course, this would be a rather complex approach because it’s not like we can go to the dark web and have one on one interviews. Additionally, in order to traverse the dark web, we must be capable of conducting much of the technical requirements.

However, there are existing proven methods that can help us gain raw facts and statistics. Osborne (2015) explains that a security team of Bitglass conducted an experiment with a fake document of fake employee data with a special watermark. Even if it was copied, pasted, or corrupted the watermark would persist and remain trackable. This was then uploaded to anonymous file-sharing sites within the dark web and within days it had made its way to North America, South America, Asia, Europe, and Africa with time, location, and IP addresses. Specific details showed that time, location, and addresses uncovered high rates of activity among two groups of viewers which possibly indicated crime syndicates in Nigeria and Russia.

Methods such as these show us that we can gather raw data from the dark web. In turn, through careful analysis, we can begin to dissect and interpret the data which shows relevant information of most sought crimes, trends, and test theories. We can also look at where and when the possibilities of the crime emerge and so much more. With careful modifications, these can be manipulated to study the different forms of cybercrimes such as Cyber (Trespass, Deception & Theft, Violence, Pornography & Obscenity). Ultimately, the dark web is a rich data source that can help tremendously in the study of cybercrime which can help uncover and understand cybercrime from a social science perspective.

References

Bryant, M. (n.d). Conducting Observational Research. Retrieved from https://www.deakin.edu.au/__data/assets/pdf_file/0004/681025/Participant-observation.pdf

Guccione, D. (2019). What is the Dark Web? How to Access it and What You’ll Find. Retrieved from https://www.csoonline.com/article/3249765/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html

Osborne, C. (2015). Diving into the Dark Web: Where Does Your Stolen Data Go? Retrieved from https://www.zdnet.com/article/diving-into-the-dark-web-where-does-your-stolen-data-go-in-the-underground/

Sheldon, R. (2015). Cybercrime – The Dark Edges of the Internet. Retrieved from https://www.red-gate.com/simple-talk/cloud/security-and-compliance/cybercrime-the-dark-edges-of-the-internet/

Cybercrime cybersecurity dark web

Article by ajMatus

Related Articles

  • alberto-matus-digital-piracy
    An Overview of Digital Piracy
  • belize cybersecurity strategy
    Belize National Cybersecurity Strategy 2020-2023

Leave your comment Cancel Reply

(will not be shared)

WELCOME

Hello, and welcome! I'm Alberto - a Cyber Security & Digital Forensics professional specializing in Digital forensics, Incident Response & Vulnerability Assessment. I hold a Master's degree in Cybersecurity with a concentration in Digital Forensics from the University of South Florida and a Bachelor degree in Information Technology from the University of Belize. Through this blog I hope to share tips, information about cybersecurity, cybercrime, digital forensics, open source technologies, business, and a bit of my amazing country. For those interested in any of my services please feel free to contact me using any of the associated contact details on this blog.

SEARCH

ARCHIVE

  • October 2022 (1)
  • July 2021 (2)
  • November 2020 (2)
  • October 2020 (1)
  • September 2020 (2)
  • August 2020 (2)
  • July 2020 (6)
  • June 2020 (6)
  • April 2020 (5)
  • February 2020 (1)
  • November 2019 (2)
  • October 2019 (1)
  • September 2019 (1)
  • June 2019 (1)
  • May 2019 (1)
  • November 2018 (6)
  • September 2018 (3)
  • August 2018 (4)
  • February 2018 (1)
  • January 2018 (3)
  • December 2017 (1)
  • October 2017 (5)
  • September 2017 (1)
  • December 2016 (2)
  • November 2016 (4)
  • October 2016 (1)
  • September 2016 (2)
  • August 2016 (5)
  • July 2016 (2)
  • June 2016 (2)

CALENDAR

March 2023
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Oct    

RECENT POSTS

  • Capture
    WordPress Empty template: Index Friday, 7, Oct
  • Belize – Benque Viejo to San Ignacio Town Drive Tuesday, 6, Jul
  • alberto-matus-digital-piracy
    An Overview of Digital Piracy Thursday, 1, Jul

REMOTE WORK

Remote work is my preferred way or working as I have a home office set up where all the magic happens. This method allows me to work with businesses, organizations, and all brands across the globe. I can manage projects via my own management applications or your own internal project management app. Any calls and meetings can be done through whatever tools fits your business, and I’m flexible to work on your time zone.

ON-SITE

Not every job assignment can be done via remote working methods, and so if it requires me to be on-site for the duration of the work then this can be done based on agreements or contractual work. I prefer doing these types of consultancies or hands-on types of work on the weekends but I am flexible enough depending on the terms. I am also open to traveling outside of Belize. All further afield work requires accommodation and travel expenses.

RETAINER

Sometimes clients are looking for long term partners that share a closer connection to their visions and goals. As such I am open to retainers. A retainer hires me for a certain amount of hours per month at a discounted rate. These discounted rates are usually between 10%-20% off depending on the contractual agreements.

Alberto - open source | technology | belize -Matus

Copyright ©2020. All Rights Reserved

en_USEnglish
en_USEnglish