DarkNet Tor [Video]


The threats

The increasing use of technology and the Internet in all aspects of daily life puts everyday citizens at risk of becoming targets of cybercriminals.

As society comes to rely more and more on the Internet, the dangers posed by different types of cybercrime have become very real threats. These threats come in a variety of forms and target different features of the Internet, technological devices and their users.

Cyberthreats are constantly evolving and changing, therefore the types of threats outlined here should not be considered as an exhaustive or absolute list. See our advice on how to stay safe online.

In addition to the threats posed by cybercrime itself, cyber-enabled crimes such as financial crime, crimes against children and fraud also pose distinct threats to the public.

 Malware, bots, botnets

When you look up a word or phrase on an Internet search engine, it scans the Internet to find a match.

But there are large sections of the Internet which search engines cannot detect – this is known as the ‘deep web’. Whilst most of what exists in the deep web is not dangerous information, it can be deliberately misused by those with malicious intent. This hidden part of the Internet where criminals act undetected is called the ‘Darknet’.

By using specialized software to conceal their activities and guarantee anonymity, criminals can conduct illegal enterprises on the Darknet such as selling drugs or weapons, illicit gambling, and trading in counterfeit identity documents or child abuse material.

These underground criminal activities came to the public’s attention in 2013 when the US Federal Bureau of Investigation (FBI) shut down the illicit online black market site Silk Road, which was operating in the Darknet.

The complex encryption and anonymization tools used to access and communicate over the Darknet create many challenges for law enforcement in identifying and locating the criminals who seek to hide in the anonymity it provides


Short for ‘malicious software’, this is a broad term to describe any computer programme designed to harm the legitimate user of a computer. Malware may be created for the purpose of a range of criminal activities, such as:

  • Data theft;
  • Obtaining personal information from a victim;
  • Disruption or monitoring of a system;
  • To take control of a device for a criminal purpose such as ransomware or creating a botnet.

Bots and botnets

A botnet is created when a device has been infected with a piece of malware which allows a cybercriminal to gain complete control over that device, usually without their knowledge. The cybercriminal can then use the victim’s computer to carry out attacks on other computers and networks, knowing the attack may only be traced back to the infected computer.

All the infected computers are controlled remotely by cybercriminals who can use the botnet in many ways:

  • Launching a ‘denial of service’ attack: using the botnet-connected computers to access a server, or a website, all at once, causing it to overload or shut down;
  • Sending massive amounts of spam e-mails;
  • Downloading or distributing other malware, such as programmes which log keystrokes.

…read more

Source: Interpol

Tor – The Onion Router


The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor’s users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they’re in a foreign country, without notifying everybody nearby that they’re working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members’ online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company’s patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

Why we need Tor

…read more

Source:  Tor Project Org

Thanks Interpol, Tor Project Org and for reading Darknet Tor

This Site is Blocked By Some Browsers, WOT And Parental Controls Triggered By TERMS and TOPICS of Internet Crime; Child Porn, Pornography Addiction, Sexting, Sextortion, Sexual Harassment.  Children as young as 9 years old are Watching Porn and Sexting.

Use the POWER of Social Media SHARING  to HELP INCREASE AWARENESS of these important topics for Parents, Friends and our Children

Like and Share on our Facebook page

Here you will find our Archive


Loading ....
Dr Don
Founder/Admin The Internet Crime Fighters Org, Internet Users Handbook, Author The Internet Users Handbook, See more http://about.me/drdony
Dr Don
Dr Don
Dr Don

Latest posts by Dr Don (see all)

Comments 1

Leave a Reply