Did you know?
Internet surfers use just three hundredths of one per cent of the internet, so
where’s the rest? The answer lies in the ‘dark web’ or the ‘dark internet’, an
unmonitored area in cyberspace that has become increasingly more sinister and
accessible.
Waseem Saddique comments: “It may surprise the ‘average’
internet user to know that when using the Google search engine to find
information the pages listed do not make up the entire internet. Think of the
internet like an iceberg, the tip sits above the surface, but the bulk of the
iceberg stretches miles below the surface.”
Waseem continues: “The iceberg analogy represents a perfect
model of the internet; Google is simply the tip of the iceberg, whilst the rest
of the internet holds deeper and darker secrets.”
The ‘dark web’ originates from software pioneered by the US
Navy in 2002, designed to safeguard government communications.
However, the Tor
software system was soon adopted by savvy techies all over the world. It’s the
Tor software system that has developed a reputation as the ‘dark web’, allowing
internet users to surf the web completely unmonitored and anonymously.
Now, as the Government pushes for companies like Google,
Facebook, Twitter and other major online companies to censor ‘harmful’ content,
concerns have surfaced that such pressure to implement censorship will drive
web users towards the ‘dark web’ proxy, obscuring the identity of users and the
sites hosted.
The pioneers of the Tor project, a non-profit organisation
whose inception took place in Walpole, Massachusetts in 2002, say that the
project was establish with the intention of making anonymous web-surfing
mainstream.
In an article published by the Independent, Tor project
pioneers claim that ‘the numbers of users of its free software doubled between
2011 and 2012, reaching around 600,000 people each year – and, though the
numbers are hard to trust, its data suggests there are 15,715 unique daily
users in Britain. But as whole companies could be operating from one address,
calculating the true usage is impossible.’
How does Tor work?
Tor, short for ‘The Onion Router’ because of its layer like
complexities, functions by directing web traffic across a series of nodes – aka
onion routes – adding layers of encrypted code at various intervals. The result
is that browsers and online users, as well as the individuals hosting the
websites it features, remain untraceable by authorities.
It is Tor software that kept the identity of ‘Prism’
whistle-blower, Edward Snowden, anonymous before he publically revealed details
of the USA’s ‘secret’ surveillance system.
How does it damage
business?
Waseem Saddique comments: “Reputation management becomes
increasingly difficult as a result of the ‘dark web’, a proportion of companies
in particular industry sectors have been subjected to a barrage of negative
publicity as a result of dark web activity.”
As the ‘dark web’ is made up of non-indexable content and is
500 times larger than the ‘web surface’, the content stored is so much more
difficult to trace and access. Businesses under attack from negative publicity
posted through the ‘dark web’ will find it virtually impossible to trace the
perpetrator and even if they do locate them the damage may already be
irreparable.
The other sinister aspect of the ‘dark web’ is that it
allows for complete anonymity, which provides people with the opportunity to
post slanderous and defamatory comments about particular businesses all over
the web, whether via blog, social media or an online forum. The ramifications
of such activity could easily damage a business brand, without any means of
preventing it.
The warning issued to online business owners by computer security
consultants is beware and get educated about the ‘dark web’.