Visible to the public Hidden in the Shadow: The Dark Web - A Growing Risk for Military Operations?

TitleHidden in the Shadow: The Dark Web - A Growing Risk for Military Operations?
Publication TypeConference Paper
Year of Publication2019
AuthorsKoch, Robert
Conference Name2019 11th International Conference on Cyber Conflict (CyCon)
Date PublishedMay 2019
PublisherIEEE
ISBN Number978-9949-9904-5-0
Keywordsanonymity, armed forces, breached information, dark web, dark Web marketplaces, data breaches, data leaks, data sale, deanonymization, deep web, Human Behavior, human factors, Internet, leaked data, marketplaces, military computing, military operations, open internet, operational security, OPSEC, OWL Cybersecurity, PII, pubcrawl, security of data, sophisticated social engineering attacks, surface Web, Tor, US Navy
Abstract

A multitude of leaked data can be purchased through the Dark Web nowadays. Recent reports highlight that the largest footprints of leaked data, which range from employee passwords to intellectual property, are linked to governmental institutions. According to OWL Cybersecurity, the US Navy is most affected. Thinking of leaked data like personal files, this can have a severe impact. For example, it can be the cornerstone for the start of sophisticated social engineering attacks, for getting credentials for illegal system access or installing malicious code in the target network. If personally identifiable information or sensitive data, access plans, strategies or intellectual property are traded on the Dark Web, this could pose a threat to the armed forces. The actual impact, role, and dimension of information treated in the Dark Web are rarely analysed. Is the available data authentic and useful? Can it endanger the capabilities of armed forces? These questions are even more challenging, as several well-known cases of deanonymization have been published over recent years, raising the question whether somebody really would use the Dark Web to sell highly sensitive information. In contrast, fake offers from scammers can be found regularly, only set up to cheat possible buyers. A victim of illegal offers on the Dark Web will typically not go to the police. The paper analyses the technical base of the Dark Web and examines possibilities of deanonymization. After an analysis of Dark Web marketplaces and the articles traded there, a discussion of the potential risks to military operations will be used to identify recommendations on how to minimize the risk. The analysis concludes that surveillance of the Dark Web is necessary to increase the chance of identifying sensitive information early; but actually the `open' internet, the surface web and the Deep Web, poses the more important risk factor, as it is - in practice - more difficult to surveil than the Dark Web, and only a small share of breached information is traded on the latter.

URLhttps://ieeexplore.ieee.org/document/8756708
DOI10.23919/CYCON.2019.8756708
Citation Keykoch_hidden_2019