Taking on the Dark Web: Law Enforcement Experts ID Investigative Needs (2024)

The “dark web” is an internet shadow world where the good and the bad co-exist. On the good side, the dark web provides anonymous, highly secure communication channels to shield classified government activity and protect reform agents such as human rights activists and journalists opposed by oppressive foreign regimes. On the bad side, the dark web has emerged as an important hub of criminal commerce, a fully functional marketplace where hidden customers can buy from hidden sellers with relative confidence, often with customer ratings available, just as on the public-facing web.

The anonymity of illicit activity on the dark web cloaks an enterprise of mounting concern to authorities. One site alone generated an estimated $219 million in annual revenue as of 2017, according to a new NIJ-supported report by the RAND Corporation (RAND). The report, “Identifying Law Enforcement Needs for Conducting Criminal Investigations Involving Evidence on the Dark Web,” explores better ways to investigate dark web crimes. Although the dark web still accounts for just a fraction of all illicit sales online, it appears poised for rapid growth, according to the report.

The criminal side of the dark web relies on anonymizing technology and cryptocurrency to hide its trade in an assortment of contraband such as opioids and other drugs, bomb parts, weapons large and small, child p*rnography, social security numbers, body parts — even criminal acts for hire.

The dark web’s anonymity not only encourages illegal activities, it keeps many law enforcement agencies largely unaware of its existence, even while their jurisdictions are impacted by online transactional crimes.

To raise the visibility of the dark web among law enforcement agencies and identify tools that can help them police it, an NIJ-supported gathering of experts identified law enforcement’s key dark web challenges and opportunities, as well as high-priority needs for addressing them. The group included experts from federal, state, and local agencies; academic researchers; and civil rights advocates. Organized on behalf of NIJ by RAND and the Police Executive Research Forum, the experts’ workshop yielded high-level recommendations focused on the following:

  • Training — training officers and investigators to spot relevant dark web evidence.
  • Information-Sharing — improving information-sharing among agencies, both domestically and internationally.
  • New Structures for Cooperation — examining the benefits of building cross-organization structures for cooperation.
  • New Forensic Standards — developing new standards for forensic tools to collect dark web evidence on computers.
  • New Laws for Package Inspection — researching ways to modernize laws facilitating inspection of packages shipped by mail or other services.
  • Research on Crime Connections — researching the increasingly connected nature of crime to help law enforcement recognize and address both highly visible traditional crime and the less-visible crime on the dark web.

In all, the experts’ workshop identified 40 problems or opportunities and 46 potential solutions or needs related to dark web investigations. Nineteen needs were deemed high-priority, across four general subject areas: training, organizational cooperation and information-sharing, tool development, and other problems and opportunities. “Taken together,” said the RAND report on the workshop and its results, “the high-priority needs identified during the workshop represent a way to prepare law enforcement at all levels to better address the challenge posed by cybercrime, now and into the future.”

A key problem for law enforcement spotlighted by the workshop experts is a lack of knowledge of how the dark web operates and how criminals have begun to use it, the report said. See “A Snapshot of How the Dark Web Works.”

The Workshop Design and Objectives

The workshop participants prioritized needs using a formula that took into account both the perceived importance of a particular need and the perceived likelihood of meeting that need successfully. Thus, if two needs were rated of highest importance, one would be assigned a higher priority than the other if a law enforcement commitment to fulfilling that need had a perceived higher likelihood of success than committing to the second need.

The workshop covered six overarching topics. Those topics, and key established needs and challenges related to each, follow.

General Needs and Challenges

Rapid Changes in Volume of Use — Law enforcement sees evidence of a steady expansion of dark web activities but largely lacks quantitative data to inform effective responses and solutions to dark web activities.

Globalization — Dark web activity crosses local and state boundaries and national borders. The cross-jurisdictional nature of the dark web makes it essential that investigators collaborate across agencies. If agencies avoid the dark web because of its cross-jurisdictional nature, participants noted, “dark web actors might be emboldened by the lack of enforcement to conduct more illicit business using the dark web.”

The Need to Demystify the Dark Web – Some law enforcement participants expressed concern about exposing themselves and their departments to retaliation by malicious web users, should they act against dark web interests. The report, noting “a need to demystify the dark web” for law enforcement, stated, “Given the lack of definitive quantitative data, law enforcement is expected to act without comprehensive information regarding what works and what is needed to address these dark web challenges. Participants suggested police trainers could emphasize the commonalities of dark web investigations and traditional investigations, or “plain old police work.”

Command Buy-In for Additional Training — Participants noted a need to persuade law enforcement command staff to initiate dark web training and investigations. Command buy-in may be essential to commitments of funding and training time.

Training — Participants identified a need for two distinct categories of training:

  1. For line officers, courses to develop basic familiarity with digital evidence found at the scene.
  2. For specialized units, targeted training on evidence preservation as well as advanced training on methods used by criminals on the dark web.

Participants identified a need for more subject matter experts to conduct training. In all, the workshop participants identified 12 highest priority needs related to training, more than any other area.

Technical Needs and Challenges

Even as the anonymity of the dark web often keeps law enforcement at bay, basic tools can enable anyone to engage dark web services without much difficulty: “Basic internet literacy, a computer, and access to the internet is enough for any sufficiently motivated individual to begin supplying or purchasing illicit goods on the dark web,” the RAND report said. Law enforcement seizures can compromise entire markets, with buyers’ and sellers’ information de-anonymized. But users have found additional tools to protect their information.

A major challenge is interdicting dark web shipments through postal systems. The U.S. Postal Service alone is estimated to move more than 500 million parcels daily. In addition to the quantity of parcels, seizures from the Postal Service often require warrants.

As a high-priority need, the workshop experts called for conducting research into gaps in laws related to searching packages.

Crime Identification

Line officers need to develop awareness of the types and scope of illicit dealings on the dark web. Participants pointed to the potential of new state task forces, which could share data, across organizations and jurisdictions, on the dark web.

Privacy Protection

Workshop participants related a need for guidance from federal partners on how to manage privacy concerns during investigations. Although not identified as a top priority, participants also identified a need for research to understand how much privacy citizens would sacrifice in order to gain security.

Suspect Identifications

Participants noted that officers responding to criminal activity need to develop the ability to recognize items, such as login information, that could help link suspects to dark web sites, the report said.

Evidence Identification, Access, and Preservation

Law enforcement faces a challenge both in acquiring relevant technical data and in turning it into evidence understandable to the public, members of which sit on juries deciding the guilt or innocence of those charged with dark web crimes. The evidence challenge is heightened by the growth of data quantity, indecipherable formats, and the need for cross-jurisdictional coordination. In light of difficulties posed by the encryption and anonymity features of software used on the dark web, the participants urged that law enforcement use best available standards, tools, and processes to capture evidence. To that end, a high-priority need identified during the workshop is encouraging establishment of standards for new processes used to capture dark web evidence.

Resource Allocation — Several participants noted that it could be beneficial to pool resources in new task forces.

Adaptation and Fluctuation — Successful law enforcement operations against dark web interests commonly cause users to adapt quickly, shifting to different markets or creating entirely new markets. Workshop participants noted that dark web users often exchange information on how to evade detection by law enforcement.

Legal Needs and Challenges

The Multijurisdictional Nature of Crime — Authorities are challenged by web-based crime involving different jurisdictions with a multitude of relevant laws. Participants emphasized the importance of multiagency partnerships in that regard.

Entrapment — Concerns were expressed over the possibility of legal actions for entrapment brought by web users conducting business on dark web marketplaces created by law enforcement, the report said. The risk can arise when authorities must impersonate criminals to establish trust with criminals on the dark web.

Conclusion

Law enforcement authorities identified priority needs for investigating criminal activity on the dark web:

  • Raising awareness of the dark web among state and local authorities.
  • Forging cross-jurisdictional partnerships among agencies.
  • Initiating more and better training to equip officers to identify dark web evidence and activity.
  • Equipping special investigation units with advanced knowledge of dark web methods and activities. Because of the clandestine nature of the dark web, many state and local law enforcement agencies are generally unaware of its existence and its capacity for engendering crime in their jurisdictions.

Sidebar: A Snapshot of How the Dark Web Works

The dark web is a portion of the “dark net,” a segment of the internet employing encryption and anonymizing technology designed to prevent tracking.

For purposes of the workshop, the dark web was defined as those hyperlinked services on the dark net accessible only through The Onion Router (or Tor) protocol or similar protocols. Tor is a specially configured browser enabling users to access services on the web in ways that are difficult or impossible to trace. Typical web browsers reveal their unique IP (Internet Protocol) address, making them traceable by law enforcement. But a dark web browser issues a false IP address, using a series of relays, to mask the user’s identity.

A significant portion of dark web activity is lawful. The Tor browser itself was initially developed by the U.S. Naval Research Laboratory in the 1990s and released to the public in 2002. Tor’s original purpose, the RAND report noted, was “to conceal the identities of American operatives or dissidents attempting to communicate within oppressive regimes.” The anonymizing browser is also used by some journalists working internationally, the report said.

The fact that the dark web is highly anonymized and encrypted, however, also attracts illicit conduct. One study[1] estimated that 57 percent of dark websites facilitate illicit activity, according to the RAND report. At various points in 2013 and 2016, large drug sales on the dark net approached a quarter of all cryptomarket drug revenue, the report said. But researchers found most drug sales on the dark web were under $100.

Overall, illicit internet use is on the rise. Workshop participants reported a sharp increase in crime brought to their attention with a dark web element, and according to one reported study[2], total monetary losses from internet-enabled crime was estimated at more than $1.4 billion in 2016. At a Police Executive Research Forum (PERF) conference in 2018, DEA agents noted a significant increase in narcotics cases involving the dark web, and FBI officials reported a surge in use of the dark web to purchase malware and launder money, the dark web workshop report said.

Fentanyl sales on the dark web have been a major focus of U.S. law enforcement. Other potential illegal activities include identity theft, blueprint distribution, human trafficking, and weapon sales. For authorities, the dark web has been elusive but not invulnerable. The FBI’s 2013 crackdown on the Silk Road marketplace, an online narcotics bazaar, was a high-profile response to a large operation, the report noted. More recently, a collaboration of the FBI, DEA, ICE, and Homeland Security Investigations has shut down two major dark web markets, AlphaBay and Hansa, the RAND report noted. In January 2018, the Department of Justice created a joint enforcement team focused on dark web opioid sales. State and local agencies have also engaged in collaborative dark web enforcement initiatives, the report said.

About This Article

The research described in this article was funded by NIJ grant 2013-MU-CX-K003, awarded to the RAND Corporation. This article is based on the grantee final report, “Identifying Law Enforcement Needs for Conducting Criminal Investigations Involving Evidence on the Dark Web” (2019), by Sean E. Goodison, Dulani Woods, Jeremy D. Barnum, Adam R. Kemerer, and Brian A. Jackson. The workshop activities underlying the report were supported by RAND in partnership with PERF, on behalf of NIJ. The program is part of the Priority Criminal Justice Needs Initiative of NIJ in partnership with RAND, PERF, RTI International, and the University of Denver.

Taking on the Dark Web: Law Enforcement Experts ID Investigative Needs (2024)

FAQs

What is the most common crime on the dark web? ›

Recreational and pharmaceutical drugs are the most popular products, followed by stolen and counterfeit documents such as identities, credit cards, and bank credentials. Some sites offer hacking and technological crime services, including malware, distributed denial of service attacks, and hacking for hire.

Is my information on the dark web? ›

Run a free Dark Web scan

This is a good place to start — however, free scanners only check for email addresses (and sometimes phone numbers). To see if your financial data, SSN, or IDs have been leaked, you need to sign up for a Dark Web monitoring service.

What website is used for the dark web? ›

The dark web, also known as darknet websites, are accessible only through networks such as Tor ("The Onion Routing" project) that are created specifically for the dark web.

What can law enforcement agencies do to enhance their investigative capabilities? ›

Training in research-based investigative procedures and access to tools and resources can help law enforcement officers carry out successful investigations.

How to monitor the dark web? ›

Set up your monitoring profile
  1. On your Android phone or tablet, open the Google One app .
  2. Under “Dark web report,” tap Set up. Start monitoring.
  3. To include additional Google Account personal information in your monitoring profile: ...
  4. Confirm your selections and add any additional data you want to monitor.
  5. Tap Done.

Which is the number 1 most common Internet crime? ›

Most reported cyber crime in the U.S. 2023, by number of individuals affected. In 2023, the most common type of cyber crime reported to the United States internet Crime Complaint Center was phishing and spoofing, affecting approximately 298 thousand individuals.

How do you know if your identity is on the dark web? ›

With identity monitoring through McAfee Identity Protection, you'll receive notifications if we find your personal information on the dark web. Our extensive monitoring service keeps tabs on up to 60 unique types of personal data and can notify you up to 10 months sooner than similar services.

Can I remove my information from the dark web? ›

Unfortunately, it's almost impossible to remove your personal information from the internet once it's circulating on the Dark Web. However, you can use a Dark Web monitoring service to check if your data has been exposed.

What happens if your personal information is on dark web? ›

If your personal information is spotted on the dark web, it could mean someone took the information without your permission. Criminals steal personal information in a variety of ways. Some try hacking into accounts or using malware to capture passwords.

What is the onion site? ›

Onion sites (aka Tor sites) are websites only accessible on the dark web; you can't view them using a regular browser. Their URLs have .onion as the domain, instead of the common surface web domains like .com or .net.

Is Tor browser illegal? ›

Tor is not itself illegal, but much of the activity on the dark web is illegal. Activities using Tor Browser are subject to the laws of each respective country. Depending on the country, even just accessing certain dark web sites may be illegal.

Is the hidden wiki illegal? ›

First of all, it's entirely legal to view the Hidden Wiki, but not all websites listed are wholesome. We provide this information for educational purposes and encourage you to use sober judgment in the links you follow. Further, because of the unmoderated nature of the onion network, there are a lot of scams.

What are investigative techniques in law enforcement? ›

Some tools that police use when investigating a crime are interviews and interrogations. Police will also collect any physical evidence left at the scene of the crime and evidence referred to in an interview or interrogation. They then use the information and evidence to piece together a police report of the crime.

What software do police use? ›

Computer-aided dispatch (CAD) is police software that helps first responders receive dispatch calls, direct resources to appropriate areas and record incidents from the initial 911 call to the resolution of the incident.

What do law enforcement investigators do? ›

Criminal investigators, also referred to as detectives or agents, are law enforcement officers who specialize in collecting evidence, interviewing witnesses, and analyzing information related to criminal activity.

What is mostly on the dark web? ›

Given its anonymous nature, the dark web is also used for illicit and even illegal purposes. These include the buying and selling of illegal drugs, weapons, passwords, and stolen identities, as well as the trading of illegal p*rnography and other potentially harmful materials.

What cyber crime is most common? ›

What Is The Most Common Type of Cyber Crime? Phishing remains the most common form of cyber crime. In 2021, 323,972 internet users reported falling victim to phishing attacks.

How many people are active on the dark web? ›

The deep web and dark web comprise 96% of the Internet, although the dark web is believed to be a far smaller share than the deep web. There were more than 2.5 million daily visitors to the dark web on average in 2023.

What is the dark crime rate? ›

In criminology and sociology, the dark figure of crime, hidden figure of crime, or latent criminality is the amount of unreported or undiscovered crime.

Top Articles
Latest Posts
Article information

Author: Allyn Kozey

Last Updated:

Views: 6774

Rating: 4.2 / 5 (43 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Allyn Kozey

Birthday: 1993-12-21

Address: Suite 454 40343 Larson Union, Port Melia, TX 16164

Phone: +2456904400762

Job: Investor Administrator

Hobby: Sketching, Puzzles, Pet, Mountaineering, Skydiving, Dowsing, Sports

Introduction: My name is Allyn Kozey, I am a outstanding, colorful, adventurous, encouraging, zealous, tender, helpful person who loves writing and wants to share my knowledge and understanding with you.