Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Hidden in the Shadow: The Dark Web - A Growing Risk for Military Operations?

: Koch, R.


Minárik, T. ; Institute of Electrical and Electronics Engineers -IEEE-; NATO, Cooperative Cyber Defence Centre of Excellence, Tallinn:
11th International Conference on Cyber Conflict: silent battle, CyCon 2019. Proceedings : 28 - 31 May 2019, Tallinn, Estonia
Piscataway, NJ: IEEE, 2019
ISBN: 978-9949-9904-5-0
ISBN: 978-9949-9904-4-3
ISBN: 978-1-72811-724-9
International Conference on Cyber Conflict (CyCon) <11, 2019, Tallinn>
Conference Paper
Fraunhofer FKIE ()

A multitude of leaked data can be purchased through the Dark Web nowadays. Recent reports highlight that the largest footprints of leaked data, which range from employee passwords to intellectual property, are linked to governmental institutions. According to OWL Cybersecurity, the US Navy is most affected. Thinking of leaked data like personal files, this can have a severe impact. For example, it can be the cornerstone for the start of sophisticated social engineering attacks, for getting credentials for illegal system access or installing malicious code in the target network. If personally identifiable information or sensitive data, access plans, strategies or intellectual property are traded on the Dark Web, this could pose a threat to the armed forces. The actual impact, role, and dimension of information treated in the Dark Web are rarely analysed. Is the available data authentic and useful? Can it endanger the capabilities of armed forces? These questions are even more challenging, as several well-known cases of deanonymization have been published over recent years, raising the question whether somebody really would use the Dark Web to sell highly sensitive information. In contrast, fake offers from scammers can be found regularly, only set up to cheat possible buyers. A victim of illegal offers on the Dark Web will typically not go to the police. The paper analyses the technical base of the Dark Web and examines possibilities of deanonymization. After an analysis of Dark Web marketplaces and the articles traded there, a discussion of the potential risks to military operations will be used to identify recommendations on how to minimize the risk. The analysis concludes that surveillance of the Dark Web is necessary to increase the chance of identifying sensitive information early; but actually the `open' internet, the surface web and the Deep Web, poses the more important risk factor, as it is - in practice - more difficult to surveil than the Dark Web, and only a small share of breached information is traded on the latter.