Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Combating Crime on the Dark Web

You're reading from   Combating Crime on the Dark Web Learn how to access the dark web safely and not fall victim to cybercrime

Arrow left icon
Product type Paperback
Published in Feb 2023
Publisher Packt
ISBN-13 9781803234984
Length 138 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Nearchos Nearchou Nearchos Nearchou
Author Profile Icon Nearchos Nearchou
Nearchos Nearchou
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Part 1:Introduction to Cybercrime and Dark Web’s History
2. Chapter 1: An Introduction to Cybercrime FREE CHAPTER 3. Chapter 2: An Introduction to the Dark Web 4. Part 2:The Dark Web’s Ecosystem and Major Crimes
5. Chapter 3: Drug Markets on the Dark Web 6. Chapter 4: Child Pornography on the Dark Web 7. Chapter 5: Human Trafficking on the Dark Web 8. Chapter 6: Cyberterrorism on the Dark Web 9. Part 3:Efforts to Combat Crimes on the Dark Web
10. Chapter 7: Efforts for Combating Crime on the Dark Web 11. Chapter 8: System for Combating Crime on the Dark Web 12. Chapter 9: Discussion and Evaluation 13. Index 14. Other Books You May Enjoy

What this book covers

Chapter 1, An Introduction to Cybercrime, covers a wide range of topics related to cybercrime. It starts with the main types of cybercrime and how you can protect yourself from it. Subsequently, it describes the evolution of cybercrime and how it can affect people’s lives. Finally, the chapter concludes with the three main levels of the internet and the tools you can use to access the Dark Web.

Chapter 2, An Introduction to the Dark Web, starts with a history of the Dark Web and how it has evolved through the years. Additionally, this chapter describes in detail the three main tools used to access the Dark Web, which are the Tor Browser, the Invisible Internet Project (I2P), and Freenet software. Finally, the chapter explains the world of cryptocurrencies and how they are used to conduct illegal activities and transactions on the Dark Web.

Chapter 3, Drug Markets on the Dark Web, goes into detail about the world of narcotics on the Dark Web. The chapter covers a wide range of topics, including the drug market’s ecosystem and what enables transactions between buyers and sellers. Additionally, the chapter describes the ways law enforcement, the private sector, and the public use to fight the Dark Web drug markets.

Chapter 4, Child Pornography on the Dark Web, covers in detail the aspects of this heinous crime. The chapter discusses the issues surrounding Dark Web child pornography and explains the difference between child abuse/exploitation terms. Additionally, the chapter describes the behaviors of pedophiles on the Dark Web and what techniques they use to conduct their illegal activities. The chapter concludes with the various ways law enforcement and the private sector use to detect and capture child offenders on the Dark Web.

Chapter 5, Human Trafficking on the Dark Web, goes through the types of human trafficking and how traffickers behave on this hidden part of the Internet. The chapter covers the tactics and methods offenders use when exploiting vulnerable humans on the Dark Web. Subsequently, the chapter covers the impact Dark Web human trafficking has on society and the ways authorities use it to capture offenders.

Chapter 6, Cyberterrorism on the Dark Web, covers the issues surrounding terrorism on the Dark Web. The chapter starts with an explanation of the various types of cyber terrorists. Next, the chapter describes the reasons why terrorists use the Dark Web and how they can benefit from it. Finally, the chapter concludes with the methods law enforcement uses to prosecute terrorists on the Dark Web.

Chapter 7, Efforts for Combating Crime on the Dark Web, describes the various ways and tools law enforcement and the private sector use to mitigate crime on the Dark Web. The chapter goes into detail about honeypot traps and sting operations, two widely used cybersecurity disruption methods. Additionally, it covers the three best tools (traffic confirmation attack, open source intelligence (OSINT), and the MEMEX project) to effectively combat crime on the Dark Web.

Chapter 8, System for Combating Crime on the Dark Web, describes in detail an efficient system for combating crime on the Dark Web. It utilizes the collaborative approach and suggests that all entities must come together to achieve better results.

Chapter 9, Discussion and Evaluation, provides an overview of the overall research done on crimes that happen on the Dark Web.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime