What this book covers
Chapter 1, An Introduction to Cybercrime, covers a wide range of topics related to cybercrime. It starts with the main types of cybercrime and how you can protect yourself from it. Subsequently, it describes the evolution of cybercrime and how it can affect people’s lives. Finally, the chapter concludes with the three main levels of the internet and the tools you can use to access the Dark Web.
Chapter 2, An Introduction to the Dark Web, starts with a history of the Dark Web and how it has evolved through the years. Additionally, this chapter describes in detail the three main tools used to access the Dark Web, which are the Tor Browser, the Invisible Internet Project (I2P), and Freenet software. Finally, the chapter explains the world of cryptocurrencies and how they are used to conduct illegal activities and transactions on the Dark Web.
Chapter 3, Drug Markets on the Dark Web, goes into detail about the world of narcotics on the Dark Web. The chapter covers a wide range of topics, including the drug market’s ecosystem and what enables transactions between buyers and sellers. Additionally, the chapter describes the ways law enforcement, the private sector, and the public use to fight the Dark Web drug markets.
Chapter 4, Child Pornography on the Dark Web, covers in detail the aspects of this heinous crime. The chapter discusses the issues surrounding Dark Web child pornography and explains the difference between child abuse/exploitation terms. Additionally, the chapter describes the behaviors of pedophiles on the Dark Web and what techniques they use to conduct their illegal activities. The chapter concludes with the various ways law enforcement and the private sector use to detect and capture child offenders on the Dark Web.
Chapter 5, Human Trafficking on the Dark Web, goes through the types of human trafficking and how traffickers behave on this hidden part of the Internet. The chapter covers the tactics and methods offenders use when exploiting vulnerable humans on the Dark Web. Subsequently, the chapter covers the impact Dark Web human trafficking has on society and the ways authorities use it to capture offenders.
Chapter 6, Cyberterrorism on the Dark Web, covers the issues surrounding terrorism on the Dark Web. The chapter starts with an explanation of the various types of cyber terrorists. Next, the chapter describes the reasons why terrorists use the Dark Web and how they can benefit from it. Finally, the chapter concludes with the methods law enforcement uses to prosecute terrorists on the Dark Web.
Chapter 7, Efforts for Combating Crime on the Dark Web, describes the various ways and tools law enforcement and the private sector use to mitigate crime on the Dark Web. The chapter goes into detail about honeypot traps and sting operations, two widely used cybersecurity disruption methods. Additionally, it covers the three best tools (traffic confirmation attack, open source intelligence (OSINT), and the MEMEX project) to effectively combat crime on the Dark Web.
Chapter 8, System for Combating Crime on the Dark Web, describes in detail an efficient system for combating crime on the Dark Web. It utilizes the collaborative approach and suggests that all entities must come together to achieve better results.
Chapter 9, Discussion and Evaluation, provides an overview of the overall research done on crimes that happen on the Dark Web.