MORE and more people worldwide are going online. A standard browser connected to the Internet gives us access to a wealth of information. Search engines make it easy to find what we seek.
But, do you know there are web pages that are not accessible via normal Internet browsing?
According to British newspaper The Guardian, only 0.03 per cent of Internet content is indexed and, as such, can be accessed via search engines like Google.
The rest is hidden in the Deep Web. A subset of the World Wide Web, its content is not indexed by standard search engines. Hence, it is invisible to most Internet users.
However, this is not to say the Deep Web is necessarily malicious. What is disconcerting about the Deep Web is a section called the Dark Web, which is dangerous because it comprises both legal and illegal content. It is used to control access and ensure privacy.
People involved in illegal activities, such as hitmen, web-based gangs and terrorists, use it as a marketplace to trade illegal goods, such as drugs, human organs, child pornography, counterfeit money, fake passports, firearms, ammunition and explosives. It is also where money-laundering, human-trafficking, prostitution and child-grooming “businesses” are carried out.
The National Drug and Alcohol Research Centre at the University of New South Wales said Australian drug dealers used the Dark Web more than those elsewhere.
In a report titled “The Anatomy of Cyber-Jihad: Cyberspace is the New Great Equaliser”, James Scott revealed that there were forums and communication channels used by the Islamic State and other extremist groups in the Dark Web.
Cybercriminals, who build software to attack or hack businesses or government departments, thrive in the Dark Web.
Political activists are also known to take advantage of the network, as it makes them virtually untraceable. This allows them to operate beyond the supervision of law enforcement agencies.
The Dark Web is accessible only with a specialised software known as TOR (The Onion Router). It is a heavily encrypted web browser designed for anonymous web surfing and protection against traffic analysis.
TOR was developed by the United States Naval Research Laboratory to protect US intelligence communications online. However, it is now a non-profit server that anyone can use.
Even though TOR is associated with criminal and illegal activities, it is also used for legitimate purposes by governments, law enforcement agencies, politicians, activists, whistle-blowers, organisations, journalists and reporters, who want a more accessible and secure Internet experience, and to protect themselves.
Cybersecurity experts, technical resources and innovative approaches are needed to combat criminal activities in the Dark Web.
The government must introduce a dedicated cybercrime unit to tackle the problem. In the short term, law enforcement agencies and regulators should form a task force with CyberSecurity Malaysia and acquire capabilities pertaining to Deep Web analysis.
This is to enable the task force to effectively conduct investigations into serious criminal activities in the Dark Web.
For long-term planning, the government may consider forming a federal crime agency with a range of specialist capabilities to fight organised crime.
The agency must have the capacity to respond to a wide range of threats, including cybercrime, economic crime, and drug, human and weapons trafficking.
In 2013, the United Kingdom formed the National Crime Agency. This intelligence-led law enforcement agency fights serious and organised crime very effectively. It has launched a dedicated cybercrime unit to tackle issues relating to the Dark Web.
Malaysia should introduce a national plan to fight cybercrime. According to the 2014 Global Economic Crime Survey by PricewaterhouseCoopers, cybercrime will likely emerge as the most common type of economic crime in Malaysia, as more IT-related transactions are made in the future. The plan represents a national commitment to ensure greater protection from cyberattacks.
Prevention and mitigation are vital in battling cybercriminals and terrorists, especially those operating in the Dark Web.
DATUK AKHBAR SATAR, Institute of Crime and Criminology, Help University