Skip to main content

The Dark Web & What It Means to Your Identity

The Dark Web & What It Means to Your Identity

What is the “Dark Web” ? 

Whether you’re an expert, or know nothing about it, something in our brain rightfully associates the term “Dark Web” with criminal activity. 
The Dark Web can be a scary place. It’s home to thousands of Web pages used to facilitate virtually any illegal activity you could imagine. But, it’s not that simple – the World Wide Web is massive, and the Dark Web is just one part of it. 
Confused yet? Great! Let’s learn more about the Dark Web, how it plays a role in the World Wide Web, and find out what really goes down in the online underground.  


Understanding Web Layers: Surface & Deep Web

Before we get into the fun part, we need to first understand how the World Wide Web is structured. It’s divided into two main layers – the Surface Web and the Deep Web. The two layers are differentiated by the way in which webpages layers can be accessed, viewed and shared with and by others.

Surface Web

The Surface Web refers to the most familiar area of the Web. Pages that live on the Surface Web can be indexed and aggregated by search engines using keywords, URLs and the content within the page itself.

Search Engines & Web Crawling

We turn to search engines like Google when we want to find information quickly. Search engines work by using a process called “Web crawling” to look for sites that could be relevant to your specified search terms (or what you’ve typed in the search box). The search engine will “crawl” the Web looking for bits of information on Web pages to give you a list of related sites based on your search terms. The end result? The search engine provides us with an aggregated list of sites in a matter of seconds.
The Surface Web is what we’re used to. We use the Surface Web for almost everything we visit online. At the end of 2016, there were approximately 334.6 million registered Web domains on the Surface Web. Just two months later in February 2017, there were over 1.2 billion.
However, the Surface Web is by far the smallest layer when compared to the Deep Web. In fact, over 90 percent of websites on the World Wide Web live in what’s known as the Deep Web.

Deep Web

The Deep Web is reportedly 4,000 to 5,000 times larger than the Surface Web. Unlike Surface Web pages, Deep Web pages are not indexed by search engines.
While the term may seem ominous, you’ve probably used the Deep Web without knowing it. If you’ve logged into an online banking account and viewed your bank statement or accessed a secure online portal for healthcare or academic purposes, you’ve surfed the Deep Web.
Don’t be alarmed! The Deep Web can be used for legitimate purposes as well as illicit business. Think of it as a way we keep certain information away from public view. Pages that allow you to view your bank account statement, medical information or other pages that are governed by secured access limitations will not be included in search engine results.

Dark Web
The relationship between the Deep Web and the Dark Web is critical in understanding how the online underground works. While the Deep Web refers to any webpage that cannot be indexed by search engines, the Dark Web refers to the deepest part of the Deep Web.
We see URLs like .com, .org and .net all over the Surface Web. These URL endings are used to tell us information about where the page was originated. But on the Dark Web, URLs end in .onion to indicate that they are hidden sites and cannot be accessed without a special Web browser like The Onion Router
OR). 

Deep Web vs. Dark Web

Understanding the Dark Web can be confusing. But, it’s important to know that the Dark Web is not “technically” its own Web layer. However, many refer to the Dark Web as its own entity because of how different it is when compared to the Deep Web.
The Dark Web can only be accessed through certain Web browsers designed specifically for surfing the Dark Web. Unlike normal Web browsers, browsers like TOR will randomize the information coming both to and from your device, which allows all participating parties on the Dark Web to remain anonymous. As a result, most illegal activity online is conducted on the Dark Web.
You may be thinking: “If the Dark Web requires a special browser, why would anyone do it in the first place?” But, research shows that there are more people surfing the Dark Web than you may think. In fact, 20 percent of all global TOR browser users within the first two months of 2017 were from the United States. 

The Online Black Market

The Online Black Market is not a place, but simply the network of sites used to carry out illegal trades. These sites often function like conventional online shopping sites with a few small differences:
1. Online Black Market sites offer items and services like stolen credit card information, guns, drugs, hacking services, malicious software and more.
2. Customers pay with an online currency known as “bitcoin,” which is simply an online token that can be exchanged for traditional money.

The Dark Web & Identity Crime

Criminals often profit from data breaches by trading stolen information on Black Market websites. However, the Dark Web can play many roles when it comes to identity crime – especially in data breach events.


Acquiring the “Goods”

Data breaches are often caused by malicious software, or “malware,” installed by criminals to capture sensitive information. One common type of malware used in data breaches is one that collects payment card data from point-of-sale systems. Criminals use the Dark Web to acquire the malware they’ll need.

Profit from Data

There’s no question that data breaches are profitableto identity thieves. One way that criminals capitalize on breached information is by selling it through Online Black Market sites. Prices vary based on the type of information and how the information is bundled. For example, one report found that a batch of 1,000 Gmail accounts went for $200. However, the same report found that stolen health insurance information ranged from $1,200 to $1,300. Another example is specific to credit card data. A random chip card could be priced at $5-8 per card, but when paired with a bank ID number, date of birth and other identifying information, the cost can go up to $30.


Dumping the Data

Another way that criminals use breached information is by dumping it on the Dark Web. Data dumping is exactly how it sounds – criminals take large batches of information and “dump” it online, allowing access to that information for anyone on the Web. Like the rest of the Internet, information travels far and wide at extremely high speeds. One security vendor who dumped a batch of fake information on the Dark Web found that it was viewed over 1,100 times across 22 countries in just 12 days.


How to: Keep Your Information Off the Dark Web

* If your information reaches the Dark Web, it’s very likely that it’s already been misused. Preventive steps and awareness are key in protecting your information from falling into the wrong hands:
* Create strong passwords that include upper and lowercase letters, numbers and special characters. Be sure to change them every 90 days, and avoid reusing them for multiple online accounts.
* If a data breach occurs, act sooner rather than later. If you believe you’ve been impacted by a data breach event, take the following steps to properly secure your information to prevent any further damage:
* Find out which parts of your information were compromised.
* Regularly review your bank statements for signs of suspicious activity.
* Request your credit reports from the three major credit bureaus to look for suspicious credit activity on your file.
* Consider placing credit freezes or fraud alerts to add an extra layer of protection to your credit files.
Continue following Fighting Identity Crimes to receive the latest breach and scam news, as well as identity protection tips from our industry experts.

Comments

Post a Comment

Popular posts from this blog

10 Gadgets To Survive Working From Home

10 Gadgets To Survive Working From Home Microsoft Surface Book 2 It goes without saying that you're going to want a good PC for working from home. If your home machine isn't quite up to the task of remote work needs—such as videoconferencing and multi-tasking across multiple applications and browser tabs—then you might consider getting a PC with a bit more horsepower than average. Microsoft's Surface Book 2 will have you covered, with its speedy processors and graphics and up to 16 GB of RAM. The laptop also features a detachable display, meaning you can switch into tablet mode—or even the turn the display around and use the keyboard as a stand—for maximal flexibility depending on what your home work setup requires. The notebook also has choices between vibrant 13.5-inch and 15-inch displays.  Synology RT2600ac Router  The next thing that might need an upgrade for your work-from-home setup is your Wi-Fi router—the typical home wireless router j...

Best Websites for Engineer

Best Websites for Engineer  Being an Engineer there are lots of components which are standard, so its takes lots of time to find out the standard dimension and competent product. OEM (Original Equipment Manufacturer) try to make it easy by there website. So here is some website that makes easy the engineers life and make design faster and easiest way.   By the way if you go through simple calculation it may cause lots of stress and time. This sites will eliminate you’re your stress just go and wright the number. And you find out solutions.    These website mostly used for R&D, new product development etc. it will increased your focus to another parameter.  You can check this out it will useful in many manner to understand things.  Best Websites for Engineer !   1. Seals   Seals are the most usable component used to make leak free component, it may use in every industries where pressure is containing. One of the most popular com...

Nuclear Submarine Technology

Nuclear Submarine, Extreme Technology & How do they work? Submarine Introduction Hello, friends! Submarine is vehicle works on and under the water. A nuclear missile with the capability to reach a target on the other side of the globe, spanning thousands of kilometers. This isn't a mere imagination; it's a reality today, thanks to submarines. The Trident 2 The Trident 2 falls under the category of submarine-launched ballistic missiles (SLBMs) , representing one of the most formidable weapons globally. These SLBMs boast an estimated yield of 475 kilotons, a stark contrast to the 12-13 kiloton yield of the nuclear bomb dropped on Hiroshima. Presently, these potent weapons are housed within submarines, stealthily traversing the world's oceans in highly classified, undisclosed locations. Technology Submarine The technology that propels them and unravelling their operational mechanisms. Principle of submarine Fundamentally, all submarines operate based on Archimedes' pr...