Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2018 | 4 | 26-31

Article title

New threats in the cyberspace based on the analysis of The Onion Router

Authors

Title variants

Languages of publication

EN

Abstracts

EN
New technologies transform modern societies and create new threats related to anonymity on the Internet. The aim of the present paper is to outline the history, functioning and current scope of application of The Onion Router. The paper analyses the issue of anonymity on the Internet which triggered a number of international, social and political problems and became the driving force for the development of TOR network. The author discusses the significance of TOR network for free flow of information and freedom of social communication and shows the wide thematic range of its resources. Other issues presented in the paper include: the payment system used in TOR network which is based on Bitcoin, a cryptocurrency which proved to be an ideal form of payment in illegal transactions; the most frequently committed cybercrimes and new, previously unknown forms of illicit cyberbehaviour based on anonymizing technologies which pose a challenge for law enforcement agencies and the judicial systems. TOR network by offering full anonymity to the world of crime, considerably contributes to the development of cybercrime and takes the illegal activity in an entirely new dimension. TOR network although originally created with good intentions, has turned into a global threat.

Year

Issue

4

Pages

26-31

Physical description

Dates

published
2019-01-07

Contributors

author
  • The Department of Law and Administration, Universitas Opoliensis

References

  • Bergman, M. (2001). The Deep Web: Surfacing Hidden Value. Journal of Electronic Publishing.
  • Golański, A. (2017). Upadek narkotyków bazarów AlpaBay i Hansa: prywatność jest za trudna?. Dobreprogramy.pl.
  • Handlujbezpiecznie.pl. (2014). Polish Black Market.
  • Hołyst, B. (2014). Bezpieczeństwo jednostki. Warszawa: PWN.
  • Howell O’Neill, P. (2014). The darkest net. The Kernel Issues- kernelmag.dailydot.com.
  • Howell O’Neill, P. (2014). The Deep Web’s biggest child porn sites are closing ranks. The Kernel Issues- kernelmag.dailydot.com.
  • Howell O’Neill, P. (2017). Tor’s ex-director: The criminal use of Tor has become overwhelming. Cyberscoop.com.
  • https://Dailymail.co.uk
  • https://metrics.torproject.org/userstats-bridge-table.html
  • https://new.secdev-foundation.org
  • https://oedb.org/ilibrarian/invisible-web/
  • https://web.archive.org/web/20130610072640/http://weirderweb.com/2013/06/06/back-in-booming-lolita-city-the-online-child-pornography-community-is- thriving
  • https://www.torproject.org/about/sponsors.html.en
  • Lake, E. (2013). Hitman network says it accepts Bitcoins to murder for hire. Thedailybeast.com.
  • Majdan, K. (2016). Tu jest wszystko co nielegalne. Odsłaniamy tajemnice ukrytej sieci. Forsal.pl.
  • Mazurczak, K. (2015). Anonimowe płatności internetowe wykorzystywane w cyberprzestępczości. Istota kryptowaluty Bitcoin. De Securitate et Defensione. O Bezpieczeństwie i Obronności.
  • Moore, D. and Rid, T. (2016). Cryptopolitics and the Darknet. Survival.
  • Szydłowski, T. (2018). Wszystko co trzeba wiedzieć o sieci cebulowej. Komputerswiat.pl.
  • Szymankiewicz, M. (2014). Bitcoin. Wirtualna waluta Internetu. Warszawa.
  • Watson, K. (2012). The Tor Network: A Global Inquiry into the Legal Status of Anonymity Networks. Washington University Global Studies Law Review.
  • Weber, R. and Heinrich, U. (2012). Anonymization,. Springer.
  • Wood, J. (2010). The Darknet: A Digital Copyright Revolution. Richmond Journal of Law and Technology.

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-2d4e811c-1aec-4597-9be2-c1eafc7932a3
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.