ILLEGAL ACTIVITIES IN THE INVISIBLE WEB Cover Image

ILEGALNE AKTIVNOSTI U NEVIDLJIVOM WEB-U
ILLEGAL ACTIVITIES IN THE INVISIBLE WEB

Author(s): Marjan Marjanović
Subject(s): Security and defense, Criminology, ICT Information and Communications Technologies
Published by: Fakultet za kriminalistiku, kriminologiju i sigurnosne studije Univerziteta u Sarajevu
Keywords: hacker; hacker’s attack; Internet; terrorism; the Deep Web; the Dark Web;

Summary/Abstract: Reason for writing and research problem (s): The very role of hackers while dealing with illegal activities within surroundings of the invisible part of the World Wide Web motivated the author to analyze relations between this special kind of offenders and hidden areas of modern informatics sphere. Aims of the paper (scientific and/or social): The author focused his attention to establishing of link that, very possible, connects hackers to the potential opportunities of the Deep Web zone. Methodology/Design: Analyze of terms hacker and invisible Web, done through their phenomenological mutuality, prevailed the author’s methodological efforts in this research. Research/Paper limitation: Actual forms of exposing basic terms in the paper are probable limitation to have them presented completely, because of technical lack of the author's capability to make the full-scaled overview of their existing modalities. Results/Findings: According to the author’s opinion, the link between hacker and the Deep Web exists in the various types of criminal activities having hackers’ attacks and terrorism as highlighted in the paper. General Conclusion: Invisible part of Web and its dark zone so-called the Darknet, especially, make specific suitability for hacker’s activity ante delictum, just as post delictum, having at the same time optimal informatics surroundings enabled for the data exchanging as ground of illegal activities preparation and likewise of getting profit out of damage committed by hacker’s attack. Research/Paper Validity: By pointing out on existing of connection between hacker and hidden part of the World Wide Web, the author tends to get caution heightened and to enhance protection considering hackers’ attacks by defining preventive proceedings that can come in handy in exchanging personal data of every user of Internet global communication network.

  • Issue Year: XIX/2019
  • Issue No: 5
  • Page Range: 87-99
  • Page Count: 13
  • Language: Bosnian, Croatian, Serbian