New technologies transform modern societies and create new threats related to anonymity on the Internet. The aim of the present paper is to outline the history, functioning and current scope of application of The Onion Router. The paper analyses the issue of anonymity on the Internet which triggered a number of international, social and political problems and became the driving force for the development of TOR network. The author discusses the significance of TOR network for free flow of information and freedom of social communication and shows the wide thematic range of its resources. Other issues presented in the paper include: the payment system used in TOR network which is based on Bitcoin, a cryptocurrency which proved to be an ideal form of payment in illegal transactions; the most frequently committed cybercrimes and new, previously unknown forms of illicit cyberbehaviour based on anonymizing technologies which pose a challenge for law enforcement agencies and the judicial systems. TOR network by offering full anonymity to the world of crime, considerably contributes to the development of cybercrime and takes the illegal activity in an entirely new dimension. TOR network although originally created with good intentions, has turned into a global threat.
Celem niniejszego opracowania jest przedstawienie zagrożeń wynikających z fałszowania dokumentów, a szczególnie wykorzystania nowoczesnych technologii do tego niecnego procederu. Zaprezentowane zostały definicje dokumentu i fałszerstwa oraz podjęta została próba przedstawienia aktualnych kierunków rozwoju przestępczości w obszarze IT. Autorka zwróciła uwagę na problem sieci TOR (ang. The Onion Router), która stanowi obecnie największe zagrożenie dla bezpieczeństwa w zakresie autentyczności dokumentów. W artykule zwraca się także uwagę na konieczność przedsięwzięcia przez organy państwowe działań zmierzających do zapobiegania przestępczości związanej z wiarygodnością dokumentów.
EN
The purpose of this paper is to present the threats related to document forging, especially the use of modern technologies for this reprehensible practice. The paper presents the definitions of a document and forgery, and then attempts to present the current trends in IT crime. The author pays special attention to the TOR network (The Onion Router), which is now the greatest threat to security as regards the authenticity of documents. The article also focuses on the need for the public authorities to take steps to prevent crimes compromising the reliability of documents.
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.