Cyber Security: Protect yourself from the Dark Web

Sale online: Cheap Guns!

For 19 year old Liam Lyburd buying a Glock semi-automatic pistol on the Dark Web was as easy “as buying chocolate”.
So what exactly is the Dark Web, how is it used and how can you protect yourself from it?


Max Vetter | 18 November 2016

For 19 year old Liam Lyburd buying a Glock semi-automatic pistol on the Dark Web was as easy “as buying chocolate”. He was quoted saying this following his arrest and subsequent conviction after planning a mass shooting at Newcastle College, similar to the Columbine massacre in the US.

Luckily the police were tipped off by someone concerned by his posts on social media. However, if he had kept all his activities on the Dark Web they may not have been so lucky.

Even the words “the Dark Web” conjures up images of criminal underworlds but exactly what is the Dark Web, how is it used, and how could a teenager use it to buy illegal weapons? Given cases like that of Mr Lyburd the interest in the Dark Web for law enforcement is obvious, but should private sector have as much of an interest?

To explore the Dark Web we should first mention Tor; a piece of software that can be used very effectively to keep a user’s activities online anonymous. It is Tor that is used to connect to what is known as Tor Hidden Services, which has become synonymous with the Dark Web. Tor Hidden Services allow a website to obfuscate its IP address, which makes locating and closing it down very difficult. Alternative Dark Webs are available but the most commonly used and publicised one is the one accessed using Tor.

It is not just criminals that use Tor to anonymise their activities; human rights activists, governments and terrorists all have been known to use the software. Hackers in particular use Tor to hide their activities and locations. The FBI recently revealed that during the hack into Hillary Clinton’s email someone had connected to the server using Tor, and IP addresses known linked to what are known as Tor exit nodes. Closer to home, it was reported that hackers had boasted thefts from Tesco Bank of £2.5m recently.  

This is where the relevance comes for any business. Detecting and stopping connections from services such as Tor can and often should be an integral part of any company’s security policies. Often IT professionals and security teams do not even understand the threat the Dark Web may pose to their business and therefore do nothing about it.

QA’s one-day Dark Web course explores anonymising software including Tor in-depth, the threats and opportunities of them and the ways a network or business can be protected against attacks coming from these mediums.

More information

Cyber Security training courses

Related blogs

TalkTalk hit again with cyber attack

Staying safe online

The human element of cyber security

Lessons from the Ashley Madison hack

Open source intelligence techniques and the Dark Web

TalkTalk Hack

 

QA Training | Max Vetter

Max Vetter

Cyber Security Training Consultant

Max holds a BSc in Astrophysics and two MSc’s in Communication Systems and Signal Processing and Countering Organised Crime and Terrorism. Max worked in both the private and public sector for 10 years as an intelligence analyst, Covert Internet Investigator and trainer in Open Source Intelligence. Max is a specialist in Covert Internet Investigations, the Dark Web and Cyber Threats.
Talk to our learning experts

Talk to our team of learning experts

Every business has different learning needs. QA has over 30 years of experience in combining the highest quality training with the most comprehensive range of learning services, ensuring the very best fit for your organisation.

Get in touch with our learning experts to talk about how we can help.