Abstract

The dark web and the proliferation of criminals who have exploited its cryptographic protocols to commit crimes anonymously has created major challenges for law enforcement around the world. Traditional policing techniques have required amendment and new techniques have been developed to break the dark web’s use of encryption. As with all new technology, the law has been slow to catch up and police have historically needed to use legislation which was not designed with the available technology in mind. This paper discusses the tools and techniques police use to investigate and prosecute criminals operating on the dark web in the UK and the legal framework in which they are deployed. There are two specific areas which are examined in depth: the use of covert policing and hacking tools, known in the UK as equipment interference. The operation of these investigatory methods within the context of dark web investigations has not previously been considered in UK literature, although this has received greater analysis in the United States and Australia. The effectiveness of UK investigatory powers in the investigation of crimes committed on the dark web are analysed and recommendations are made in relation to both the law and the relevant Codes of Practice. The article concludes that while the UK has recently introduced legislation which adequately sets out the powers police can use during online covert operations and when hacking, the Codes of Practice need to specifically address the role these investigative tools play in dark web investigations. Highlighted as areas of particular concern are the risks of jurisdiction forum shopping and hacking overseas. Recommendations are made for reform of the Investigatory Powers Act 2016 to ensure clarity as to when equipment interference can be used to search equipment when the location of that equipment is unknown.

Highlights

  • Created by the U.S Naval Research Laboratory to provide a means for military units and field agents to communicate online without being identified and tracked, the dark web[1] is a global network of computers that use a cryptographic protocol to communicate, enabling users to conduct transactions anonymously without revealing their location

  • While it is difficult to ascertain the extent of offending on the dark web, a 2014 study found the most common type of content requested by those using hidden services via Tor was child pornography followed by black marketplaces.[3]

  • This article has highlighted that undercover online policing and equipment interference are essential, intrusive, police tactics in the fight against offending on the dark web

Read more

Summary

Introduction

Created by the U.S Naval Research Laboratory to provide a means for military units and field agents to communicate online without being identified and tracked, the dark web[1] is a global network of computers that use a cryptographic protocol to communicate, enabling users to conduct transactions anonymously without revealing their location. When dealing with offending occurring through the dark web this would in no way impact on the originating state’s ability to prosecute as it is likely that harm will () have occurred in that state and that concurrent jurisdiction is held by multiple countries This is a phenomenon which has received very little critical analysis either by academics or LEAs.[35] Such operations have been described as falling into a ‘gray area’ which could be ‘considered a collaborative partnership or a case of jurisdictional forum shopping by international law enforcement agencies’. ‘The Forum Bar in UK Extradition Law: An Unnecessary Failure’ (2020) 84(2) J Crim L 142–62

35. There is a brief discussion of this concept in
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call