Skip Navigation

Darknets

In modern usage, a darknet is a networks built on top of the Internet, which typically requires special software to access. Historically, the term “darknet” originated in the 1970s to describe secure defense networks and devices attached to ARPANET, which could receive data from ARPANET but would not reply or otherwise acknowledge their existence.1

Page Contents

Video Lecture


Watch at Internet Archive

Uses of Darknets

Darknets, which collectively are sometimes grouped together as the so-called Dark Web, have a number of legitimate uses. Security, intelligence, and counterintelligence operations still take place in these hidden online systems, echoing the original meaning of the term darknet. Reporters and journalists can make use of darknets to receive whistleblower complaints, information leaks, and other types of news securely, with minimal risk to the source. These overlay networks can improve the security, privacy, and anonymity of their users, making them beneficial to victims of cyberstalking, online harassment, and human rights violations. Security researchers are able to use darknets for a variety of purposes, including gathering information on exploits, hacker groups, and other potential threats.

As is the case with any technology, darknets also have a dark side. Illegal activities do take place inside these systems. Hidden markets exist for all types of illicit goods, including drugs, weapons, and stolen financial information. Criminals may offer services such as identity theft, regular theft, hacking, kidnapping, and murder. Internationally, criminals may use darknet sites to organize, sharing extremist propaganda, child abuse material, or animal abuse material. Jilted lovers might use a darknet to share revenge porn.

The illegal activities that take place on darknets yield far more sensationalist news stories than do the legal activities, so news reports about darknets tend to look unfavorably upon these systems, carrying headlines such as: “Study Claims Dark Web Sites Are Most Commonly Used for Crime.”2 Based on an academic study of Tor hidden sites (a type of darknet), illegal content was found on approximately 20% of the sites surveyed (see Figure 1). This percentage, while high, falls short of “most commonly.”

Graph showing distribution of Tor hidden sites

Figure 1: Graph showing the distribution of content on Tor hidden sites. Note that the largest single share consists of legal content.3

Included within the definition of “illegal” content on the darknet are sites that simply link to other sites, where the other sites actually contain illegal material. Such sites serve as a “nexus” to illegal content, making such content easier to find.4

Law Enforcement in Darknets

One difficulty in addressing illegal content in darknets is that law enforcement must first identify the location of the server hosting the content before it can be removed. Utilizing various techniques, including infiltrating criminal organizations and hacking into servers, law enforcement organizations occasionally do manage to take down illegal hidden sites. However, new sites appear as quickly as old ones are removed.

Some of the techniques used to take down an illegal website are otherwise illegal themselves. For example, an FBI Network Investigative Technique (NIT) might require infecting a hidden site with malware or otherwise compromising the site. Such actions, if undertaken by private individuals outside the protections of government, would be crimes themselves. A particularly egregious example of a questionable FBI action against a hidden site occurred between February 20, 2015, and March 4, 2015, during which time the FBI knowingly distributed child sexual abuse material in a somewhat dubious attempt to try to catch users of the hidden site.5

Accessing Darknet Sites

In order to access darknet sites, special software is required. The exact software needed depends upon the system to be accessed. Tor hidden services, which constitute the largest and most widely used darknet, require the investigator to use the Tor client.6 Smaller darknets include “Eepsites” reachable only via the Invisible Internet Project (I2P)7 and Freenet8, which has its own client.

Various directories of hidden sites exist, some of which are available on the “clearnet,” or regular Internet, such as Hidden Wiki9 (not to be confused with the darknet site of the same name) and OnionLink10. Extreme caution must be used in accessing darknet sites, as the content on a site may not match its description. Illegal, offensive, and malicious content may be encountered in darknet systems. The use of a high security environment such as Tails11 may mitigate some of the risk, but conducting any investigation or research using a darknet system may expose the investigator to unwanted content.

Notes and References


  1. Darknet History August 21, 2017. 

  2. Joseph Cox. “Study Claims Dark Web Sites Are Most Commonly Used for Crime.” Vice. February 1, 2016. Article 

  3. Data Source: Daniel Moore and Thomas Rid. “Cryptopolitik and the Darknet.” Survival 58(1): 7-38, 2016. 

  4. Daniel Moore and Thomas Rid. “Cryptopolitik and the Darknet.” Survival 58(1): 7-38, 2016. Publisher Site 

  5. Mary-Ann Russon. “FBI crack Tor and catch 1,500 visitors to biggest child pornography website on the dark web.” International Business Times. January 7, 2016. Article Note: Despite the headline, the FBI did not actually “crack Tor.” 

  6. Tor Project 

  7. The Invisible Internet Project 

  8. Freenet 

  9. Hidden Wiki 

  10. Tails 

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.