Skip to main content

What is the Dark Web and why it comes out every time an attack occurs

We still don't understand how it happened.An anonymous driver sweeps the pedestrian zone of the Westminster Bridge, in the heart of London.His dark gray Hyundai begins to run over pedestrians: four people die-adding to the terrorist-, 29 injured and seven of them serious , according to data from the New Scotland Yard, the London police service.


Now let's go back 24 hours: in the popular 4chan forum a post from appears a user who has never commented before and hangs an old photo with a date drawn with Paint and the following information attached: «-.---....-.-.-···-··-·-··-·.-..-...-.-.....-.·-·-·--.-.---··-·-...-....-..-..-...-»This morse code, translated in binary language, throws this series of numbers: 51.500947,-0.124530.That is, the geographical coordinates that point directly to the bridge that crosses the Tamesis, at the height of Big Ben.


ANONYMOUS ALERTS?


What is the Dark Web and why it comes out every time an attack occurs


The only record of the user is that it could be found in Denmark at the time I publish the notice.But having used a VPN, a router or simply the TOR browser, that IP would be a simple distraction .


Posts of this type are plentiful.Every day there is speculation of attacks, people talk with extreme fervor, reactionary behaviors or they claim to have read or seen truculent things. How to know which of those messages is real and which an exercise in bragging to become the "interesting"?


Now let's go further back: on November 13, 2015, in the Bataclan Hall, while 1,500 people attended a concert by the Eagles of Death Metal band, four terrorists break into explosives and kalashnikovs, block exits and capture more than 100 hostages.89 die in the ward, out of a total of 129.


A user of Forocoches alerted months before, on similar dates and in the immediate vicinity , a serious attack would happen.In Reddit there was also speculation about the event: cross information from the Dark Web The users of Forocoches begin their conspiracy escalation.


What is the Dark Web and why it comes out every time an attack occurs


Until the attack arrives, advancing until November 13, and some users get nervous.Then they denounce the police and the user insists that everything was pure chance, a fortuitous accident.Again, how can these messages be filtered , which is a simple game-like this trolling of Hispachan-and what is real?


WHAT THE WEB DARK HIDES


On March 6, around midnight, in the basement of a semi-detached house for workers in Herne, Germany, the body of a child of just nine years appears.The author is unknown although he is quickly associated with the son of the family where the body was found, Marcel H., 19 years old.


Several days later he delivered, giving the information in a fast food place.What the police had not alerted, after analyzing more than 1,500 tracks received, is that the same night of the murder the young Marcel H.I had uploaded to the Dark Web a video of the child I aimed at, selfie included.The photo was spread among some friends.


DIFFERENCES BETWEEN DEEP AND DARK WEB


What is the Dark Web and why it comes out every time an attack occurs


Before continuing, we will establish the basic differences. The internet we know is grouped into different levels of depth : Clearnet would be the surface layer, which operates publicly with any browser.Web was a term cradled by the company Bright Planet to describe those pages or non-indexable content.And no, let's not think of icebergs or statistics of 90-10%.


Most of the Deep Web includes backups of sites and all those hidden accesses that search engine antennas do not index: databases, payment gateways, the simple login from Facebook or websites where a robot exclusion is requested, either through captchas or password.But are not invisible , you can map a website and remove all its fertile URLs, even hidden ones, it's only Google filters them : it doesn't make sense to index pages of a temporary nature, many of them generated automatically.


The Dark Web , on the other hand, if it encrypts, redesigns and hides its trail , either for reasons of legality, or for privacy reasons.Its name was cradled in the article »The Darknet and the Future of Content Distribution» (2002, Peter Biddle, Paul England, Marcus Peinado and Bryan Willman).


The famous network friend-to-friend Freenet, I2P or ZeroNet, the welcome web of TOR, Hidden Wiki and all those common access points with extension.onion instead of.com or.es: they need to hide the IP and not leave a navigation cache, not because people talk about UFOs, or political conspiracies, but because they are the main communication point for drug traffickers, pedophiles and insane people looking for notoriety and [bad] reputation.in her? Yes .Is it legal to download photos of children? No.


But there are not many: If the Deep Web occupies that quoted 90%, the Dark Web does not exceed 0.2% .If there are 1,167 million operating websites, of something more than 4,500 million of sites in total-adding media with expired domain-, what the Dark Web hides only represents an infinitesimal portion .


WHAT HAPPENS WITHIN THE WEB DARK?


What is the Dark Web and why it comes out every time an attack occurs


Using a secure network does not have to understand criminal activities.It is a tool, like any other, to protect anonymity, achieve secure communication and avoid indiscriminate espionage to which any user is subjected from that opens Chrome and starts browsing.


Anonymity is a conscious exercise, of course.And police services are aware.Dark Web is used as an accounting service, where to redeem and wash bitcoins, sell Spotify lifetime accounts changing data browser through a VPN or traffic with stolen PayPal accounts to users who lost their credentials.The Dark Web is also an agile market where you can vote with five stars to that user who sells you a stolen iPhone 6 or a PS4 assaulted in a periphery trade And what about firearms, hard drugs, hacking services or exchange of gigs and gigs of pornographic material-and more than that-.


But the Dark Web can also be a social tool to catch or detect certain behaviors.We, as citizens, what responsibility do we have? Not even two days have passed since a terrible rape in Chicago: six young people in their 15s rape a minor and broadcast it on Facebook Live .About 40 people watch the video.Not a single call to the Police.


Perhaps it is a lack of sensitization, or overstimulation, a digital numbness caused by that mixture of shock that grips us and some indifference, as if everything seen through a screen was a fictionalization of any reality.


FIGHTING FROM WITHIN


What is the Dark Web and why it comes out every time an attack occurs


Paris's famous attacks were carried out through a sleeping cell and planned in Raqqa.Pictures of the clothes and weapons to be used were posted in closed forums of the Dark Web.


The University of Oxford recently published a map of Dark Web use where it showed that in the Middle East and North Africa there is a very high use rate, only exceeded by the United States.Spain would be in fourth place in Europe, with just 100,000 users in activity peaks.


The coordinated suicide attacks of March 22, 2016 in Belgium, which occurred at Brussels Airport (in Zaventem) and at the Maalbeek Metro Station, were alerted, in a cryptic and veiled manner, in a clone of 4chan of the Dark Web .Inside this little libertine paradise there is a lot of noise, a Twitter clone that does not reach the 20,000 users and forums created using SMF, which offers everything but stability.Antediluvian design profiles and portals that never end up loading: VK or Facebook clones appear every once in a while and dozens of drug trafficking websites are lying down.


What is the Dark Web and why it comes out every time an attack occurs


Let's stop thinking about hooded people unable to spin two sentences in a row.The Dark Web is throwing a powerful message: from there you can get valuable information that saves lives , where you can hunt the junkie on duty and find a thread of messages from a terrorist cell.


The Dark Web is not a landfill where what no one wants to observe is launched, au contraire : There are small, very relevant forums coexisting among the garbage that should be monitored , as Some studies point out, and this time for the safety of all citizens.


Images | Pexels, Forocoches, Reddit, 4chan

Comments

Popular posts from this blog

Internet of plants: a tomato knows as much about networks as you

The possibility of plant species communicating through complex networks, what some scientists have called the internet of plants , is an issue that has been discussed for a long time, at least 20 years.It was in 1997 when the scientist Suzanne Simard , from the University of British Columbia in Vancouver (Canada), published a study in the journal Nature on how Forest plants use complex systems where species exchange nutrients, send warning signals and relate to the environment. Although there is no scientific consensus, several investigations seem to support this hypothesis.If confirmed, as we read in a fascinating report by the Sinc Agency, the forests would act as huge structures that are articulated under the soil through a network in which factors invisible to the human eye interact and can determine the future of the climate.Understanding how it works is the challenge that even science faces. internet of plants and the wisdom of forests The premise of Suzanne Simard ...

New setbacks for conspiranoicos: radiofrequencies do not affect health

New evidence published by the Scientific Advisory Committee on Radio Frequency and Health (CCARS) in its 2016 Radio Frequency and Health Report indicates that there are no adverse health effects derived of exposure to radio frequencies emitted by mobile phone antennas or radio and television broadcasting.No evidence has been found on the danger in wireless systems (Wi-Fi) or airport scanners. The new 2016 Radio Frequency and Health Report collects, updates and analyzes the scientific evidence on the subject for the period between January 2013 and June 2016. radio frequencies are not dangerous According to the conclusions of the report " the critical analysis of the evidence supports that there are no technical or sanitary reasons that justify the arbitrary and discretionary imposition of more demanding exposure limits than those recommended by WHO-ICNIRP and the Union European ", while the application of more restrictive limits" would imply increasing the n...

GIF history: where they come from and where they are going

Funny, witty, curious... GIFs have already become a regular resource in social networks and messaging applications and have become part of our daily lives and jokes.It is an image format that has evolved significantly throughout its history and is experiencing a new awakening. In fact, to find its origins, we must go back more than twenty years ago .A moment in which they had little to do with what we know today and an evolution that we could not stop review.So let's find out where they come from and try to catch a glimpse of where they are going. What is a GIF The word GIF responds to the acronym of Graphics Interchange Format , or what is the same, graphic exchange format.A term for the graphic format used in the network for both static images and animations.In more concrete terms, it supports 8 bits per pixel and allows you to display images with up to 256 colors simultaneously-limited by a palette of 16 million-. This particularity makes it a perfect ally of infogr...

Amazon Prime Video arrives in Spain: this is all you need to know

That during the last years there has been a change in the way we enjoy audiovisual content is an obvious reality, as reflected by the huge popularity of streaming services like Netflix and the like.A context in which new competitors are constantly added and that, after the landing of this company in our country just over a year ago, is in full transformation. In fact, today we have learned of the incursion of a new protagonist in this area.Yes, because Amazon Prime Video has just arrived in Spain .A landing that takes place only two weeks away that of HBO, which culminates in a 2016 sown of changes.But, what exactly does it consist of? What advantages and disadvantages does it have compared to the "of its kind"? WHAT AMAZON PRIME VIDEO OFFERS The type, quality and quantity of movies and series offered by the service will be key when determining your success.A catalog a priori smaller than that of HBO and Netflix, but in which we find titles like Seinfield , Into...

What we know and what we suspect in the new Facebook algorithm change

"In my time, we read the newspaper in Facebook ".By 2020, nostalgia has taken over billions of people.In its memory, 2018, when Facebook stopped being Facebook to become Facebook again.Paraiso of engagement for brands and media, land paid for clickbaits and fake news, the social network of Mark Zuckerberg has given a rudder to his algorithm. He wants to return to his origins .And this is what will happen. Related If something goes well, to change it.40.653 million dollars entered in 2017.More than 2.100 million active users per month, a quarter of the world's population.But Zuckerberg is not one of those, of which they are.Want a Facebook with more social connections between people and less presence of brands and media .And what do your users want? Nearly two-thirds of American adults consume news on social networks.More than half do so on their Facebook walls.Pew Research Center data points to a clear trend: Facebook is becoming a media platform.54% of Facebook u...

No kidding: selfitis exists and can be a problem

Sometimes one thinks that social networks were created to share photos of faces putting on little bones and images of dishes overflowing with appetizing foods or, better, of faces putting little bones in front of plates overflowing with appetizing foods in the same shot.is to see faces, faces, faces...all of them smiling, as if looking at the smartphone mirror was the height of happiness.And it does not seem that there are so many beautiful and happy people, or maybe yes, that you go Namely.What envy. Well, what we're going to do: Janarthanan Balakrishnan psychologists from the Thiagarajar School of Management in India; and Mark D.Griffiths, of the Nottingham Trent University, in the United Kingdom, have published an article in the International Journal of Mental Health and Addiction entitled 'A study on' Selfitis', which names this mania of going around the world taking pictures of oneself, as if beyond our curls the world had been destroyed by that meteorite th...

Twitter shows the best of ourselves (it wasn't always going to be the worst)

In the era of social networks, accustomed to interact daily with Facebook, Twitter, Instagram, Google or WhatsApp, we forget that these tools are phenomenal in the History of Humanity capable of mobilize hundreds of thousands of people in very different geographical locations in a matter of hours or even minutes. Already in the past, Twitter has asserted its more social dimension to mobilize people, companies or organizations and also, from a broader perspective, feelings of solidarity and support or also of rejection and repulses towards causes with an important mediatic impact.Recently, Twitter was once again the engine of solidarity after Dortmund's explosions as the Borussia Dortmund team bus passed on its way to the local stadium on the occasion of the Champions League match between the Borussia and the Monaco. These explosions did not have the devastating effect that they could have caused , so that everything remained in a major social commotion at international lev...

Most apps for children violate your privacy

Do you know if apps with which children enjoy their safety? A team of researchers from the International Computer Science Institute (ICSI) of the University of Berkeley has studied compliance with the Online Privacy Protection Act (COPPA) in these mobile applications for the little ones, through a scalable dynamic analysis that allows the automatic evaluation of privacy behaviors of Android apps. After studying 5,855 applications aimed at children, the research concludes that most of these apps, 57%, violate the privacy of their users mainly due to the use of data by third parties. apps for children and privacy Although many apps offer options in their configuration to respect the federal law that protects minors in the United States, by disabling tracking, their results suggest that a majority of applications either do not use these options or propagate them in wrong way. In addition, researchers believe that 19% of apps for children send user IDs to third parties to show ...

Are social networks damaging democracy?

The revelations according to which Russian agents inserted ads on Facebook that tried to influence the 2016 US elections raise a disturbing question: is Facebook bad for democracy? As an expert in the social and political repercussions of technology, I think that the problem is not exclusively from Facebook, but that it is much broader: Social networks are weakening some of the conditions that have historically enabled the existence of national states democratic. I understand that it is a dramatic statement, and I do not expect anyone to believe it immediately, but considering that almost half of all potential voters received false news promoted by the Russians in Facebook is an argument that must be debated. Associate Professor of Philosophy, Director of Center for Professional and Applied Ethics, University of North Carolina-Charlotte How we create a shared reality Let's start with two concepts: the "imagined community" and the "bubble filter". ...

This is how visual challenges star in some of the most viral content

Constantly, we all receive in our mail, our WhatsApp or our Facebook account, games that try to test our ingenuity, imagination or visual skill.There are a thousand types, more fun or darker.But they have one thing in common: we cannot avoid trying them and see if we are able to solve them .This is how the visual challenges star in some of the most viral content of the network. Visual challenges, why are we crazy? The visual challenges are games.So, they attend to this playful and fun part that people have no choice but to feed from time to time.They are pure and hard entertainment, with no more pretensions, and that desire to Having fun represents one of the main features that are sought when surfing the Internet . Another of the qualities for which they succeed is because they challenge the mind directly.Human beings love that feeling of feeling a little troubled, somewhat lost, but convinced that there is a solution to that enigma to which, sooner or later, it will come.Rathe...