We still don't understand how it happened.An anonymous driver sweeps the pedestrian zone of the Westminster Bridge, in the heart of London.His dark gray Hyundai begins to run over pedestrians: four people die-adding to the terrorist-, 29 injured and seven of them serious , according to data from the New Scotland Yard, the London police service.
Now let's go back 24 hours: in the popular 4chan forum a post from appears a user who has never commented before and hangs an old photo with a date drawn with Paint and the following information attached: «-.---....-.-.-···-··-·-··-·.-..-...-.-.....-.·-·-·--.-.---··-·-...-....-..-..-...-»This morse code, translated in binary language, throws this series of numbers: 51.500947,-0.124530.That is, the geographical coordinates that point directly to the bridge that crosses the Tamesis, at the height of Big Ben.
ANONYMOUS ALERTS?
The only record of the user is that it could be found in Denmark at the time I publish the notice.But having used a VPN, a router or simply the TOR browser, that IP would be a simple distraction .
Posts of this type are plentiful.Every day there is speculation of attacks, people talk with extreme fervor, reactionary behaviors or they claim to have read or seen truculent things. How to know which of those messages is real and which an exercise in bragging to become the "interesting"?
Now let's go further back: on November 13, 2015, in the Bataclan Hall, while 1,500 people attended a concert by the Eagles of Death Metal band, four terrorists break into explosives and kalashnikovs, block exits and capture more than 100 hostages.89 die in the ward, out of a total of 129.
A user of Forocoches alerted months before, on similar dates and in the immediate vicinity , a serious attack would happen.In Reddit there was also speculation about the event: cross information from the Dark Web The users of Forocoches begin their conspiracy escalation.
Until the attack arrives, advancing until November 13, and some users get nervous.Then they denounce the police and the user insists that everything was pure chance, a fortuitous accident.Again, how can these messages be filtered , which is a simple game-like this trolling of Hispachan-and what is real?
WHAT THE WEB DARK HIDES
On March 6, around midnight, in the basement of a semi-detached house for workers in Herne, Germany, the body of a child of just nine years appears.The author is unknown although he is quickly associated with the son of the family where the body was found, Marcel H., 19 years old.
Several days later he delivered, giving the information in a fast food place.What the police had not alerted, after analyzing more than 1,500 tracks received, is that the same night of the murder the young Marcel H.I had uploaded to the Dark Web a video of the child I aimed at, selfie included.The photo was spread among some friends.
DIFFERENCES BETWEEN DEEP AND DARK WEB
Before continuing, we will establish the basic differences. The internet we know is grouped into different levels of depth : Clearnet would be the surface layer, which operates publicly with any browser.Web was a term cradled by the company Bright Planet to describe those pages or non-indexable content.And no, let's not think of icebergs or statistics of 90-10%.
Most of the Deep Web includes backups of sites and all those hidden accesses that search engine antennas do not index: databases, payment gateways, the simple login from Facebook or websites where a robot exclusion is requested, either through captchas or password.But are not invisible , you can map a website and remove all its fertile URLs, even hidden ones, it's only Google filters them : it doesn't make sense to index pages of a temporary nature, many of them generated automatically.
The Dark Web , on the other hand, if it encrypts, redesigns and hides its trail , either for reasons of legality, or for privacy reasons.Its name was cradled in the article »The Darknet and the Future of Content Distribution» (2002, Peter Biddle, Paul England, Marcus Peinado and Bryan Willman).
The famous network friend-to-friend Freenet, I2P or ZeroNet, the welcome web of TOR, Hidden Wiki and all those common access points with extension.onion instead of.com or.es: they need to hide the IP and not leave a navigation cache, not because people talk about UFOs, or political conspiracies, but because they are the main communication point for drug traffickers, pedophiles and insane people looking for notoriety and [bad] reputation.in her? Yes .Is it legal to download photos of children? No.
But there are not many: If the Deep Web occupies that quoted 90%, the Dark Web does not exceed 0.2% .If there are 1,167 million operating websites, of something more than 4,500 million of sites in total-adding media with expired domain-, what the Dark Web hides only represents an infinitesimal portion .
WHAT HAPPENS WITHIN THE WEB DARK?
Using a secure network does not have to understand criminal activities.It is a tool, like any other, to protect anonymity, achieve secure communication and avoid indiscriminate espionage to which any user is subjected from that opens Chrome and starts browsing.
Anonymity is a conscious exercise, of course.And police services are aware.Dark Web is used as an accounting service, where to redeem and wash bitcoins, sell Spotify lifetime accounts changing data browser through a VPN or traffic with stolen PayPal accounts to users who lost their credentials.The Dark Web is also an agile market where you can vote with five stars to that user who sells you a stolen iPhone 6 or a PS4 assaulted in a periphery trade And what about firearms, hard drugs, hacking services or exchange of gigs and gigs of pornographic material-and more than that-.
But the Dark Web can also be a social tool to catch or detect certain behaviors.We, as citizens, what responsibility do we have? Not even two days have passed since a terrible rape in Chicago: six young people in their 15s rape a minor and broadcast it on Facebook Live .About 40 people watch the video.Not a single call to the Police.
Perhaps it is a lack of sensitization, or overstimulation, a digital numbness caused by that mixture of shock that grips us and some indifference, as if everything seen through a screen was a fictionalization of any reality.
FIGHTING FROM WITHIN
Paris's famous attacks were carried out through a sleeping cell and planned in Raqqa.Pictures of the clothes and weapons to be used were posted in closed forums of the Dark Web.
The University of Oxford recently published a map of Dark Web use where it showed that in the Middle East and North Africa there is a very high use rate, only exceeded by the United States.Spain would be in fourth place in Europe, with just 100,000 users in activity peaks.
The coordinated suicide attacks of March 22, 2016 in Belgium, which occurred at Brussels Airport (in Zaventem) and at the Maalbeek Metro Station, were alerted, in a cryptic and veiled manner, in a clone of 4chan of the Dark Web .Inside this little libertine paradise there is a lot of noise, a Twitter clone that does not reach the 20,000 users and forums created using SMF, which offers everything but stability.Antediluvian design profiles and portals that never end up loading: VK or Facebook clones appear every once in a while and dozens of drug trafficking websites are lying down.
Let's stop thinking about hooded people unable to spin two sentences in a row.The Dark Web is throwing a powerful message: from there you can get valuable information that saves lives , where you can hunt the junkie on duty and find a thread of messages from a terrorist cell.
The Dark Web is not a landfill where what no one wants to observe is launched, au contraire : There are small, very relevant forums coexisting among the garbage that should be monitored , as Some studies point out, and this time for the safety of all citizens.
Images | Pexels, Forocoches, Reddit, 4chan
Comments
Post a Comment