The Dark side of the web.

“Online everything is recorded, and you don’t know by whom. It is cheaper to record and keep everything than figure out what to delete” (Mitew, 2013).

 

This sentence is the basis of all hacking. The idea that all data is preserved creates pools of information, the ultimate target for people seeking to blackmail or otherwise utilise the data. Not all data is indexed or organised, the ocean of uncatalogued random data is labelled as ‘deep web’.  From this ‘deep web’ and it’s pools of data emerges cyber-crime.

Cybercrimes are defined by the Australian Federal Police as “Crimes committed directly against computers and computer systems and or the use of technology to commit or facilitate the commission of traditional crimes.” The technique of cybercrime, directly against computers and computer systems is best exemplified by DDoS (Distributed Denial of Service) and in particular a case study of Lizard Squad.

Lizard Squad, a hacking group who targets mostly gaming websites and organisations have no particular motivations other than for entertainment. Earlier this year, lizard squad executed attacks on Destiny and Call of Duty servers, and although their twitter account has since been suspended, they publicly claimed responsibility.  Lizard Squad’s DDoS of theses servers left them unusable, thus classifying them under the first aspect of cybercrime, a crime committed directly to a network. Hiding behind a veil of anonymity the deep web is accommodates this kind of activity, hacking groups such as Lizard Squad

The second aspect of cybercrime outlined by the AFP is the use of technology to commit traditional crimes. This a best exemplified by the growing rates of cyber blackmailing. Cyber blackmailing entails utilising information in cyberspace to force (or blackmail) a person or party into doing something. In some cases this is a personal attack such as in the case of Amanda Todd where a person directly acquired photographs from Amanda, otehrwise the attacks may be the result of a hacker dipping into the pool of information that is the deep web.  Blackmail is on the rise mostly due to the access of the deep web, the idea that nothing is deleted works in two ways. Firstly it means that anything put on the internet can be dug up later and used as extortion but also anything that is not yet on the internet, once released can not be removed.

Overall this idea of deep web and its utilities is empowering for cybercriminals.

References

Miter, T. (2013), DIGC202 Dark Fiber: hackers, botnets, cyberwar, Lecture slides, < http://prezi.com/iiied2_aa8tc/digc202-dark-fiber-hackers-botnets-cyberwar/ >

Australian Federal Police 2014, High Tech Crime, viewed 21st October <http://www.afp.gov.au/en/policing/cybercrime/hightech-crime.aspx&gt>

Advertisements

5 thoughts on “The Dark side of the web.

  1. A well written post, and though it was quite informative, I struggled to find much of your personal opinion on the matter within it. Not to say that this is a necessity within a blog post, but it would have been interesting to hear your thoughts on the activities of these groups themselves. Sure it’s legally considered cybercrime, but is there ever a justification for it?

  2. Hey Shaun, this was a really descriptive post. I had never heard of the Lizard squad before. It is interesting how often these attacks seem to happen, particularly ones that serve no purpose or meaning. I thought you might like this article (http://www.smh.com.au/technology/technology-news/operation-titstorm-hackers-bring-down-government-websites-20100210-nqku.html). It details Operation Titstorm which was an attack on government servers due to an apparent forthcoming pornography censorship. Also perhaps you could break up the writing with some audio-visual elements? Cheers.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s