We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Free Chapter of Cybercrime and the Dark Net by Cath Senker

Ditsa Keren Technology Researcher

Cath Senker is a freelance writer and publisher who specializes in history, global and social issues, world religions, human geography and environmental topics. On september 2016 she published her book Cybercrime and the Dark Net, which provides the perfect starting point for anyone interested in learning about the world of cyber-criminals and their opponents, from a social, human perspective. In this article, we bring you the first chapter of the book, and a few remarks from the author.

"When I was commissioned by Arcturus Publishing to write Cybercrime and the Dark Net, I thought it would be a fascinating subject to research. Not a day goes by without a news story about hacking and the rise of cybercrime," she explains, "there is an air of mystery around the Dark Net and I was curious to discover the truth about it."

"As well as investigating cybercrime and the Darknet extensively online, I read every book on the subject that I could lay my hands on. While researching the book, I realized just how important the issue of online privacy has become. Most people do not know to what extent their personal information is easily available to governments, companies and cybercriminals. For people protesting against human rights abuses in undemocratic countries, online privacy can be a matter of life or death; even in democratic nations, we have no idea to what extent our activities are monitored. "

"I also came to understand that these are complex areas. While some cybercriminals carry out their activities purely for their own financial gain, others commit illegal actions to expose loopholes in security systems. The Darknet is used by many for nefarious undertakings, yet it's also an arena for those who wish to express themselves without censorship or expose the abuse of power."

Below is the Introduction Chapter of Cybercrime and the Dark Net by Cath Senker

Click here to purchase the e-book  Cybercrime and the Dark Net.
 A paperback version will be available in May 2017.

Introduction

In 2016, a phenomenal leak of 11.5 million records from Mossack Fonseca, a law company based in Panama, exposed to the world the hidden financial exploits of some of the wealthiest individuals on the planet. The disclosure illustrates how law companies and banks sell financial secrecy indiscriminately to the wealthy, whether they be politicians, billionaires, celebrities, fraudsters or drug traffickers – by setting up tax havens in which they can keep all their transactions hidden. Although already possessing untold riches, clients of such outfits use their services to hide corrupt practices from the prying eyes of the authorities and evade the taxes that the rest of us have to pay.

The release of the Panama Papers was the culmination of an extraordinarily detailed investigation by the International Consortium of Investigative Journalists, the German newspaper Süddeutsche Zeitung and more than 100 other news organizations. In the largest media collaboration ever, more than 370 reporters pored over millions of Mossack Fonseca’s documents disclosed to them by whistleblowers and shared their findings.

Among those exposed were 12 current and former world leaders, including China’s leader Xi Jinping, who in his official capacity had led anti-corruption efforts. The prime minister of Iceland, Sigmundur David Gunnlaugsson, was shown to be a secret multimillionaire, stashing his fortune in a secret offshore company that kept millions of dollars in Icelandic banks. Following the revelations, he was forced to resign. A total of US $2 billion worth of transactions were revealed to be linked to the Russian president Vladimir Putin. In the UK, the prime minister at the time David Cameron admitted that he had benefited from an offshore trust set up in Panama by his late father.

How did Mossack Fonseca do it? The firm worked with more than 14,000 banks and law companies to set up trusts and fake companies for its customers, known as shell structures, where clients could hide their assets. Paper and electronic records of transactions were destroyed so they could not be traced. These activities may be considered unethical but they are not illegal if used by law-abiding citizens.
Ironically, it is the whistleblowers who reveal such confidential documents who are considered cybercriminals. To access and expose those materials, they operate on the Darknet, using illicit hacking techniques and untraceable communications. Are those who carry out such actions lawless hackers, guilty of releasing millions of secret documents that should never see the light of day? Or are they committed but misunderstood activists, devoted to exposing the corruption and abuse of power of powerful people through freedom of information? This is just one of the conundrums of cybercrime and the Darknet.

Defining cybercrime and the Darknet

It’s worth trying to unpick exactly what these terms mean. Cybercrime is any use of a computer for illegal reasons, including fraud, identity theft, stealing intellectual property, violating privacy or sharing child sexual abuse images. Cybercriminals frequently hack into computer systems, although they also use social engineering – persuading people to reveal private information that allows fraudsters to access their data. Many cybercriminals operate for financial gain, but others act to expose corruption or for political motives. The latter use illegal means but claim their reasons are legitimate.

Hackers

Hackers are categorized into different groups based on the varying degrees of legality and legitimacy of their actions, which include white hat, grey hat, and black hat hackers. Among these groups, there are hacktivists who engage in infiltrating websites and disclosing information for political motives. Both white hat and grey hat hackers, along with hacktivists, firmly believe that their actions are carried out within the boundaries of legitimacy.

  • White-hat hackers look for information or simply enjoy the challenge of breaking into systems to expose their vulnerabilities. Security companies, governments and big businesses employ white-hat hackers to protect their sites.
  • Grey-hat hackers are prepared to break the law to find and publicize security vulnerabilities.
  • Black-hat hackers, also known as ‘crackers’, steal data and seize control of websites to commit fraud.

All hackers operate by looking for weaknesses in a computer network security system, using ‘packet sniffers’ – software that searches for information being passed along computer networks, including passwords. Hackers call firewalls ‘cotton walls’ because they tend to have weaknesses that allow intruders to penetrate them easily.
You don’t have to be a hacker to be a cybercriminal. It’s easy to purchase hacking services or stolen data on the Darknet.

The Darknet

The Darknet is part of the Deep Web, the biggest part of the Internet, which is not indexed by regular search engines. It’s where public databases are found, along with subscription-only and password-protected services, and the content of social networks and messaging sites. The Darknet can be accessed via the Tor browser, and Tor Hidden Services allow you to find anonymously run websites. No one uses his or her real name on the Darknet.

Neither cybercrime nor the Darknet are straightforward – they are a morass of contradictions and grey areas. Cybercriminal activity occurs on the surface net: harassment, copyright infringement, fraud, subversion, sabotage and terrorist propaganda. But although these actions are illegal, are some of them legitimate? Those who believe information should be free oppose copyright laws, while cyber subversion and sabotage can help topple authoritarian regimes; they were vital catalysts in the 2010–11 Arab uprisings.

Cybercrime is big on the Darknet, too: witness the vibrant trade in illegal goods and services, proliferation of child sexual abuse and organization of terrorist actions. Cryptocurrencies such as Bitcoin and blockchain technology developed on the Darknet to enable anonymous payments to be made. But is it possible to identify legitimate elements here, too? Cryptocurrencies are used for lawful as well as illicit trade, and some argue that the drugs market is safer on the Darknet than on the streets. And while governments consider whistleblowing that reveals state secrets to be a crime, freedom of information activists consider it a duty. On the Darknet, human-rights and political activists enjoy privacy, a safe haven where they can avoid surveillance. Creativity blossoms in an atmosphere free from censorship and commercial advertising.

Surveillance

Mass surveillance is a major reason that both cybercriminals and privacy activists have shifted to the Darknet. Governments and security companies are monitoring every aspect of our online lives. On both the surface net and Darknet, they adopt similar tools to the cybercriminals to fight them: using Trojans (see Chapter 2) to hack into their systems and posing as fellow-fraudsters to ensnare outlaws and bring them to justice. Governments carry out cyberespionage and sabotage operations, arguing that their actions are justified to protect people from terrorism and child sexual abuse. However, some people believe that governments overstep the mark and abuse their power.

Cybercrime and the Darknet is divided into two sections. Section 1 focuses on cybercrime. Chapter 1 considers serious online harassment that has been defined as illegal, from cyberbullying to trolling, doxing and grooming, and whether the law can tackle such abuse. Chapter 2 looks at the wide variety of online fraud we risk as individuals – from email scams, malware and phishing to identity theft – and big-business heists including cyberattacks on banks and corporations. Chapter 3 examines how copyright laws are pitched against freedom of information activists and asks whether there can be a happy medium that enables the creators of music, books and movies to make a living while allowing free access to their products.

Chapter 4 surveys the range of online subversion, from individual jailbreaking of devices to hacking to expose corruption and abuse, and mass political activism as a prelude to real-world uprisings. It illustrates how governments attempt to clamp down on these activities using entrapment and heavy penalties for offenders. Chapter 5 considers the rising threat of cyberattacks: cyberespionage for information gathering; cybersabotage, from the defacing of a website to damaging infrastructure; and cyberterrorism, focusing on the online coordination of terrorist actions by the so-called Islamic State (ISIS).

Section 2 is about the Darknet. Chapter 6 enters the hidden world of dark markets, where all manner of illicit goods and services are traded. Drugs are the most popular – Ross Ulbricht’s Silk Road (2011–13) set the standard for the trade, adopting Bitcoin for transactions, while there has been an explosion of child sexual abuse sites. The efforts to shut down illegal markets are explored. Chapter 7 investigates the Darknet as a place of privacy and anonymity for human rights, political and freedom of information activists, of cryptocurrencies for the unbanked and creativity for musicians. It raises the question: can governments balance their desire for mass surveillance for national security and law enforcement with privacy and civil liberties for individuals?

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

Ditsa Keren is a cybersecurity expert with a keen interest in technology and digital privacy.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address

Thanks for submitting a comment, %%name%%!

We check all comments within 48 hours to ensure they're real and not offensive. Feel free to share this article in the meantime.