Navigating The Deep, Dark Web

from the dig-in dept

We recently ran an excerpt from Cole Stryker's new book, Hacking the Future about the importance of anonymity. Here's the second excerpt from this book, our latest book club selection. This time it's about navigating parts of the web that not everyone knows about... We'll be hosting a chat with Stryker in the near future, to be announced soon.

I first heard whispers of the deep Web on 4chan. It was often positioned by active users as a place where even the most hardened /b/tard (a nickname for heavy users who hang out on 4chan's "random" board a lot) can find things to shock the system. The deep Web is depicted there as the submerged portion of an iceberg. The Web that we know is the tip, and the massive portion underwater is the deep Web.

"I've just come back from the deep Web," they say, "and look what I found." They share ghastly images and stories, perpetuating the legend of this vast underbelly among underbellies. In these conversations I was led to believe that the deep Web—also called the invisible Web, the darknet, undernet, and several other sinister-sounding names—was home to the sort of content that would get you thrown in jail if it were ever traced back to you. This is true, to an extent, but technically the deep Web comprises anything that isn't crawlable by major search engines like Google. This can mean dynamic URLs that have a long string of parameters that might confuse spiders (the software that "crawls" Web sites to index them for search). Any content that's behind a pay wall or other password authentication is technically included in the deep Web. This would include your e-mail or a pay-to-view newspaper Web site. Any content that lies behind a form, like a survey or poll, often can't be crawled. Some sites purposefully exclude spiders using robots.txt, a file that tells spiders to steer clear of certain Web pages for various legitimate, legal reasons. Pages that are made up of flash content obviously can't be crawled because there's no raw text on the page. So to say that the deep Web is the seedy back alley of the Internet is not entirely accurate.

However, there are parts of the deep Web, accessible only with the use of certain anonymizing software, where baddies sometimes hang out. The deep Web is rife with readily available child pornography, terrorist rhetoric, drug and sex trade—all manner of taboo and hateful communication.

One such piece of anonymizing software is called the Onion Router, or Tor, briefly mentioned earlier. Tor reroutes communications coming from your computer around the world across a distributed network of volunteer-run nodes that make up the Tor Network. Tor passes users' traffic through three servers before sending it along to its destination. The network was originally sponsored by the U.S. Office of Naval Research to help military agents abroad bypass firewalls and other "censorware" in countries like China. For this reason, some speculate that the service is routinely monitored by the U.S. government and cannot be trusted.

Technically, Tor is not an anonymizing service so much as an obfuscating one. Tor alone can't keep anyone anonymous; it's merely one item in the smart anon's tool belt. Tor works to anonymize your Internet connection, but can also be applied to specific programs. The most popular program used in tandem with Tor is the Internet browser. The Tor team has built a Firefox extension that applies several "onion-like" layers of obfuscation to data communicated through Firefox. Because Tor routes your traffic around the world, it's not very fast. The more people volunteer to contribute their machines as nodes, the faster Tor will get.

I thought I'd check it out for myself. I downloaded the Tor software, ran the executable file, and installed the software. When I ran the program, within seconds a browser window opened saying, "Congratulations. Your browser is configured to use Tor. Please refer to the Tor Web site for further information about using Tor safely. You are now free to browse the Internet anonymously." I typed in a URL I found on 4chan for an underground deep Web portal called Hidden Wiki, waited about thirty seconds (an eternity in the era of Wideband and FIOS), and a blank page popped up, reading "Looking for Hidden Wiki?" The last two words were blue, indicating a hyperlink, so I clicked it, and up popped a page that looked just like Wikipedia. A sidebar listed the categories that are available to browse: blogs, books, political advocacy, but also drugs and underage erotica. I clicked on a link called "Killer for Hire."

This can't possibly be for real, can it?
You can call me Slate. All you need to know is that I am well trained and can perform what you need done. I do not need to know your situation with the hit and prefer not to. I’m hired when you want to make sure that the hit doesn’t get traced back to you.
  • Minimum age for hit is 18.
  • I do not care of the gender of the hit.
  • I do not kill pregnant women.
  • I do not torture the target.
  • If hit is a political figure, or is in law enforcement (judges, policemen) there will be an additional fee.
  • For an additional fee, I can set it up as a “suicide” or an “accident”
  • Hit will take place within 4 weeks.
  • Hits outside of the continental US will require an additional 2 weeks of logistics and $5000 in travel fees.
  • Once the hit has been made I will message you with a picture or a video and the remaining balance must be paid in full.
A second hit-man site sounds like a Hollywood Russian mafioso wrote it. "It is mutual interest to make everything anonymously," he warns, insisting, "it is not a joke." He gives careful instructions on how to pay through Bitcoins (more on this soon) and reiterates the need for total anonymity on both sides of the transaction. "I don't know you and you don't know me." If these sites are jokes, they are convincingly conceived. Moving on from the hit men, there are firearm salesmen, hackers for hire ("destroy your enemies!"), an extensive list of Bitcoin traders, illegal gambling sites, white supremacist blogs, whistle-blowing blogs, new world order conspiracy chat rooms, transnational activists, Anonymous operation forums, hacker/phreaker communities, and porn. Oh, the porn. Genital mutilation, necrophilia, zoophilia, watersports, etc. Anything you can imagine is at your fingertips. Which brings us to child pornography. I don't have the guts or inclination to click through to any of these sites, but they're there. And according to people hanging out on 4chan, the stuff available from the Hidden Wiki is only a shallow fraction of what's out there were one prone to dig deeper.

Perhaps the most notorious site available through Tor is the Silk Road, a black market where users can find 340 different illegal drugs: weed, cocaine, heroin—a digital bazaar of pills, tabs, and powders. If I wanted, I could easily order up a smorgasbord of illicit substances and have it delivered within a few days. You have to pay a Bitcoin just to browse the site—its inaccessibility keeps out most looky-loos. The site doesn't have everything, of course. You won't find any chemicals that are easily weaponized. Sellers promote their wares through a reputation system that isn't much different from the one popularized by eBay. The site only accepts Bitcoins, which, along with mandatory Tor usage, help to ensure the anonymity of buyers and sellers. The Silk Road is one of many hubs for black-market drug trade on the deep Web. It's difficult to tell if the DEA (Drug Enforcement Administration) is going to crack down on this sort of thing, or if we're peering into the future. Anonymizing applications and efforts to pierce such software seem to be progressing apace.

Freenet is another piece of software used to mask identity online. It's been downloaded over 2 million times. Freenet's creator, Ian Clarke, is concerned about the freedom to communicate. He grew up in the south of Ireland in the ‘80s in a family of Protestants, whom he says are fastidious about staying out of Irish politics. From a young age he was interested in understanding people who held different views.
I remember reading [Sinn Féin' leader] Gerry Adams's autobiography at a time when most people considered him a terrorist. I can remember that if he was interviewed on TV they had to use an actor to do a voiceover, because it was illegal to broadcast his actual voice. It wasn't that I agreed with Gerry Adams' beliefs or actions, but I did feel that it was far more productive to understand where people are coming from, to try to step into their shoes, rather than simply demonizing them, which was official government policy at that time. It left me with a strong sense of the futility of censorship, and the value of free communication.
My experience with Freenet's "Linkageddon," one of several directories, is similar to that of Tor's Hidden Wiki. Some of it is innocuous (Bob Chapman's Financial Analysis), some of it funny (Anti–Harry Potter fundamentalists), and some of it horrific (ubiquitous underage porn). Everything looks like an old Geocities page.

Clarke describes Freenet like a decentralized postal system, where people carry each other's mail. For instance, you need to get a letter to your friend Bob in Boston, and your friend Diane is going to Boston for a business trip. You give Diane your letter and have her hand off the letter to James, who happens to live in Bob's neighborhood. The system is decentralized and doesn't rely on any one person more than the others. If Bob can't deliver your letter, you might ask Cheryl, who will be passing through Boston as well. The advantages to this system are such that James doesn't have to know who's sending the letter, and there's no central postal hub that can restrict the delivery of mail through censorship or incapacity. According to research by Freedom House, Freenet is one of the most popular anonymity systems used in China. This was no accident. Clarke says that he intended for the software to be used by activists.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: anonymity, dark web, encryption, tor


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. identicon
    Anonymous Coward, 30 Oct 2012 @ 3:25pm

    Pretty scary when you mention how may times TOR applications have been downloaded.

    link to this | view in thread ]

  2. identicon
    stryx, 30 Oct 2012 @ 3:27pm

    Deutsche Homag

    Roger Dingledine and Jacob Appelbaum discuss TOR at the 28th Chaos Communication Congress.

    The whole thing is worth watching; one of my favorite parts starts at 1:05:44
    http://www.youtube.com/watch?v=GwMr8Xl7JMQ

    What if you didn't have to go back in time?

    link to this | view in thread ]

  3. icon
    Gothenem (profile), 30 Oct 2012 @ 4:18pm

    Ahh, the seedy underbelly of the web. Honestly, I know about Tor, but I have never had the need or inclination to download it. I worry that posting this here will increase awareness of it though.

    link to this | view in thread ]

  4. identicon
    Anonymous Coward, 30 Oct 2012 @ 4:23pm

    This excerpt is not amusing -- the writer skates too far into moral panic think-of-the-chilluns territory and seems intentionally gullible. /b? Really?

    But note that this sort of "evidence" will be prominent in ongoing government attempts to ban anonymity, TOR, bitcoin, and the like.

    link to this | view in thread ]

  5. identicon
    Anonymous Coward, 30 Oct 2012 @ 4:28pm

    Re:

    I am very interested why there are now two (and more coming, I'm sure!) that mention that exposure of this information is 'bad'.

    Yes, there are terrible things to be found on darknet, but these can be found on the normal web as well if one were to look hard enough.

    You must not forget that all of these are side-effects to what is essentially a life-saving service to both civilian and military people all over the world who are trying to pass information even in the most dire circumstances when detection would mean certain death.

    TOR, just like any other technology, is a tool. It's all about how it is used, and it has (and in case of Syria, Iran, China, etc...) is being used to relay what otherwise would be information that can lead to death.

    link to this | view in thread ]

  6. identicon
    Anonymous Coward, 30 Oct 2012 @ 4:56pm

    These 'expose' articles sound like something from the panic fear mongering traditional news media would write about. For shame Techdirt, I thought you were better then that.

    link to this | view in thread ]

  7. identicon
    liar, 30 Oct 2012 @ 4:56pm

    Navigating The Deep, Dark Web

    Isn't this the same area as was discussed by Gary Price et all back in 2001?

    link to this | view in thread ]

  8. identicon
    Anonymous Coward, 30 Oct 2012 @ 5:10pm

    Re:

    Because banning tor worked so well for those other dictatorships... ;)

    Here's a clue: Cryptography isn't going away and you're not going to stop it.

    link to this | view in thread ]

  9. identicon
    Anonymous Coward, 30 Oct 2012 @ 5:31pm

    Re:

    Honestly, TOR, Freenet, I2P, etc are well known. Probably not by the general populace, but anyone who has been dealing with internet security and police enforcement.
    While there is always going to be illegal activities on these dark webs, it's also a necessity. Child Porn might be horrible, but is Falun Gong also in the same category? The difference is subjective by where you live and the laws that you must abide to. When you hear of N. Korean kids listening to PSY, Tara, etc from S. Korea, this can only be possible because of these types of services. While it might not have much of an impact now, there could be a general change due to familiarity of culture later in life.
    Not all of the sites are for wacko's either, there's a well known site about the tunnels below Virgina Tech on TOR. People like Brian Krebs, also use these networks to help find vulnerabilities to protect the rest of us.
    I guess it's sort of like Chiba City in Neuromancer, a place known for illegal activities that is tolerated to see what is coming out of it.

    link to this | view in thread ]

  10. icon
    Zos (profile), 30 Oct 2012 @ 5:47pm

    this seems like half an article..the other half just regurgitated general knowledge crap everyone already knows.....

    was there a point?

    link to this | view in thread ]

  11. identicon
    The Ultimate Anonymous Coward, 30 Oct 2012 @ 5:55pm

    Seems like it wouldn't inconvenience law enforcement much.

    Seems like it wouldn't inconvenience law enforcement much. Not where it matters, anyway. The hitman has to go to his target. The drug mule has to deliver to some location. Both of them can walk right into a trap if the cops set up a sting, and the drug mule can be pressured (and offered witness protection) to roll on those higher up the food chain.

    Almost everything illicit except the kiddy smut, and everything that can do direct harm to people, can be dealt with similarly. As for the smut, that's not the harm, it's the evidence they can use to track down the ones doing actual harm.

    link to this | view in thread ]

  12. identicon
    Bengie, 30 Oct 2012 @ 6:11pm

    the fuck

    I personally believe that these "underbellies" are caused by society. There will always be come people who are f'd up, but by pushing them underground, you only make the matter worse.

    If we addressed the root of the problems, like lack of good education, people caring about each-other, etc, these issues would rarely happen.

    I guess what I'm saying is if people had good education, didn't grow up in a home with one parent that wasn't over-worked, and the law system was considered "fair", these corner case people would mostly disappear. All of these issues are because of society failing.

    link to this | view in thread ]

  13. identicon
    F!, 30 Oct 2012 @ 7:28pm

    freedom means freedom

    The article seems a bit sensationalist and more than a bit obsessed with child porn.

    So-called child porn is only a small slice of the darknet (just like the 'public' web techdirt.com is part of), and easily avoided if you're not looking for it. Again, just like the public web, just like real life.

    Using anonymity tools like Tor (which, as the article wisely notes, is only partially effective when used on it's own) is merely a way to access the web as it should be. We have already lost a large part of the free and open internet as it is.

    That old chestnut, "I may disiagree with what you say, but I'll defend your right to say it" applies not only to speech, but to every aspect of living in a free & open society. Child porn (to follow the article's lead) is a tragic and sad aspect of humanity, but a small price to pay for freedom. The alternative is what we see now - ever accelerating erosion of our rights.

    Freedom with limits is not freedom.

    link to this | view in thread ]

  14. identicon
    Anonymous Coward, 30 Oct 2012 @ 10:45pm

    Might pay to actually read all of the 'article'

    Why? Because at the beginning it explains that this is an excerpt from a book. That's right, tender lumplings, this is not an article, per se. It is an excerpt that we are meant to discuss as just that, yet we see people calling out Techdirt for 'sensationalist reporting.' Please, at least understand exactly what it is you are replying to when you do response.

    link to this | view in thread ]

  15. icon
    Mike Masnick (profile), 31 Oct 2012 @ 12:53am

    Re:

    These 'expose' articles sound like something from the panic fear mongering traditional news media would write about. For shame Techdirt, I thought you were better then that.

    As stated (clearly?) at the top, this is not a "Techdirt" article but an excerpt from a book, which we'll be discussing with the author.

    We don't have to agree with everything. Part of the point is to have a discussion about this with the author.

    link to this | view in thread ]

  16. icon
    nospacesorspecialcharacters (profile), 31 Oct 2012 @ 3:13am

    Dorknet?

    I've always wondered why the media, politicians, police and courts will make a brouhaha over things like inappropriate twitter jokes, organising protest and riots on facebook etc... when a world of torture, killing, abuse and anarchism is just a few clicks away.

    You don't even need a proxy, tor or vpn in most cases (that's to hide from the authorities - but the authorities don't need to hide).

    So when I see things like a twitter troll arrested... I just think to myself - wait they still don't know about 4chan?

    I have a few theories but none seem to fit universally.

    1) They really are that dumb. They're so technologically illiterate that they're think trolling is as bad as it gets (coupled with the fact they only seem to notice when a VIP is trolled).

    2) The authorities are technologically aware and are actively working with admins (voluntarily or involuntarily by dangling reduced sentences) to report and capture the crims. As observed with Craigslist, honeypots etc... They don't publicise it because they don't want to become the focus of the media and thus shine a light on their questionable evidence procedures.

    3) The authorities are aware but are sort of powerless to control it due to the aforementioned anonymising technologies outside of baiting the unaware and foolish. Therefore they don't mention these sites in the media as it would put more pressure on them to "something must be done" on something that can't be done, and the resulting Streisand Effect of giving these sites publicity (that assumes they even understand the concept of the Streisand Effect).

    4) They just don't care and there is plenty of low hanging fruit in the form of nabbing trolls, idiots and innocents on twitter and facebook for easy wins and good publicity.

    So perhaps less of a darknet and more of a dorknet, based on either sheer ignorance or cynical attempt to keep society at large ignorant.

    link to this | view in thread ]

  17. identicon
    Anonymous Coward, 31 Oct 2012 @ 4:19am

    Re: Seems like it wouldn't inconvenience law enforcement much.

    Ah, but the powers that be don't do those sorts of traps these days. They attack the digital infrastructure instead (e.g. Craigslist), letting the drug pushers and pedophiles get away scot-free to set up shop in an even more secure location.

    Whether they're on the take, trying to perpetuate the problem they're the solution to, or just plain stupid, is a matter of speculation. The fact remains that while all of those things could be dealt with by law enforcement, they won't be.

    link to this | view in thread ]

  18. identicon
    abc gum, 31 Oct 2012 @ 4:58am

    Sounds like a trailer for the new up and coming reality show "To Catch A Predator On The Internet". Better copyright that one.

    Soon we will have political mouthpieces claiming that only the nefarious use said software and therefore it should be illegal to possess and or use. Sounds a bit familiar.

    link to this | view in thread ]

  19. icon
    Ninja (profile), 31 Oct 2012 @ 5:04am

    And then we see moronic Govts advocating filters to tackle child porn. Next time we should slap them with TOR and Freenet. And yet, given enough time and investigative effort even these sources can be tracked.

    link to this | view in thread ]

  20. identicon
    Anonymous Coward, 31 Oct 2012 @ 1:06pm

    Re: the fuck

    Wrong. I thought the same thing in my travels across World of Warcraft. I thought if I was the mom that these people were missing that I could make them feel better and not be quite so mean. Boy was I wrong. Don't ever assume that just providing a 'perfect life' will always fix everything.

    link to this | view in thread ]

  21. identicon
    Anonymous Coward, 31 Oct 2012 @ 2:30pm

    Re: Re:

    I guess i missed it. Thanks for the explanation.

    link to this | view in thread ]

  22. identicon
    Anonymous Coward, 31 Oct 2012 @ 5:29pm

    Oh dear, a "hitman" with a conscience?
    Even the possibility of having to travel and live up to 6 weeks overseas can be covered by $5000?
    A guaranteed time frame?
    A device or account of yours will be associated with a photo of the murder?

    I hope people aren't actually stupid enough to give money to that guy.

    link to this | view in thread ]

  23. identicon
    Anonymous Coward, 31 Oct 2012 @ 6:48pm

    Dirty deeds and they're done dirt cheap.

    link to this | view in thread ]

  24. identicon
    Anonymous Coward, 2 Nov 2012 @ 10:37am

    All I got from this is "Get more than Tor if you want to hide your tracks", which I sort of already knew.

    link to this | view in thread ]

  25. identicon
    Craig Stadler, 3 Feb 2013 @ 3:02pm

    Deep web resource addition

    Please also include vertical search engine http://www.findthatfile.com which is a deep web tool for files across almost all protocols and also looks inside files for metadata, extractions etc..

    link to this | view in thread ]

  26. identicon
    Trav, 15 Feb 2013 @ 12:43pm

    That's some shocking news. I've heard various rumors about Tor and other hidden networks before, but I've never actually believed that the criminal activity there is so common. I thought this networks was for cryptography freaks and paranoids.
    What is also interesting is the legal side of using such software. I heard that you can be arrested for any content that passing your computer if you opened a node or a gate instead of just using it as a proxy. Is it true?
    Also it would be interesting to know if i2p is different from these two, being more network than obfuscating device.

    link to this | view in thread ]

  27. identicon
    Anonymous Coward, 7 Mar 2013 @ 8:59am

    gfdfgiufhgiogdgdiofgheuorigfnoieurggruhgugerihg iregjeigod eigujregoireig errgijeroigu eroiteurtet eoruteriotue wqowequrfdfhdk uosdufzwhwrtwiu453543344 wrsdfujsdfhsuahruizhfsdgssgefuieh25 owresgh wefwe dfwefu jefhui3h234ui23h4 sdufhsdfuishf qwjdz duqdqwiuzduqaidh 213122fdfuusssdhufkhwfeuirhuui324h3242344423442442dsdfhdkfdj wsfewsudhff vuidsfshfdhsfuifdshffu3242342 sudifhwuishfusddhfu hzws8dfzh3u242hu4j234h32iu4hjkewbf sufzhwuiwhuwzqIUQZWQWUWTZGDuhsdhuiewb2 424434423423423 ouijfeoijoijfewfhnuwekrjhwuefhaewuiafhuihsefuwiefh werzhu2h42344 wuizfhuihrkjhakjsdfh111 wuifhdsnfkujshdiaulhulearuihui suidh uisdfhksudhf oushdfuishdfu uukshdfuisdhfuishdfui24342344 uigighuzshbdzhgsfhuiwhueirhu245h34u5ih43 o3ujtjk34h u3iqrzweo8fas6o sesuifg weeb 2343uizh ui2h423ui4h2u24hui4 df c584892249844489237498 buwidnrfuierir28402447024854454011524120845 dsrguerigthrbzi4g4zu4423g34zug3zu2 oufhwernuihrurb 2iuh4j234gzu234gzu4g2z23444342424444242422422442
    234j4b4je r
    jg g0dogieorgjoitu 4534


    453489 ejt8oiurjtgisurguiwerhg3t 3t3408u tnj34ktt 34nm4 miuret90uejwtuiejkghnj4etrnd ghj3nm3j3344343434434
    mi23uh4wern8737472839ur 340ru20934 oifjrelurunfsdrkug nuie4h5j32k4b4ni23uzr78zf7df8 f345243099031u59ß847891457z8349z5h34ujkr1 j!(/(§"!/()/§()§ gtu szt89w4t89rtqe89rtz89u3i4u3489tzq98dzvherjt 34r 14r89ß4t z5h!=(& (ZGUJHJH)(=/&FFCZIJUK N§Z§(())§(§= nee03u4jf3t4uit f33fj8osfdudf89gzsed98fhh3q

    link to this | view in thread ]

  28. identicon
    Antonio, 7 Aug 2013 @ 11:23pm

    Apps

    Hidden messages and apps

    link to this | view in thread ]

  29. identicon
    antonio, 2 Nov 2013 @ 1:00am

    facebook.com

    an hidden sites ,app services,, etc,,,,any info

    link to this | view in thread ]

  30. identicon
    Anthony, 11 Feb 2014 @ 1:44am

    I should be banned

    I personly think that it should be banned if that is even possiable. not vary tech but that should not be allowed at all

    link to this | view in thread ]

  31. identicon
    Anonymous Coward, 12 Mar 2015 @ 12:54am

    lust lookinhgn for some info

    link to this | view in thread ]

  32. identicon
    Anonymous Coward, 9 Feb 2016 @ 9:28pm

    Re:

    Meh... I'd go on those guidelines. If I had to go overseas they should be doing the calculation for two weeks. If they don't line up the info correctly, that's on them. Sorry. No returns...

    link to this | view in thread ]

  33. identicon
    Morganlucy, 11 May 2019 @ 2:37pm

    I need help

    Please can someone here help me make quick cash through the dark web? I want to be a darkweb soldier. Am ready for any consequences.

    link to this | view in thread ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.