Page 98 - Cyber Defense eMagazine for July 2020
P. 98
dangerous playing those games in the adulthood, so what’s so needed is to understand the motives of
the persons doing so for a reason once the motive is defined the crime would stop.
Why Does Identity Matter?
It’s not only about the terrorist and criminal organizations to hide their identity – so many defense
professionals would choose to carefully manage their identity as the way of security and privacy
measures getting applied on their tasks. In other words, it’s not smart at all going around and sharing all
you know with everyone as that could be the huge threat to someone’s life and business. So, the well-
known Deep Web solutions are designed by the defense communities, but at the moment they are
available to anyone for more or less obvious reasons. The identity matters in any case and once the
people are convinced that some account is trusted they can try to share a lot of findings with such a
profile. The modern history would teach us how life can be hard and why it’s important to take some
measures of protection.
The Deep Web systems could get used by the media staffs in order to bring the story to the audience.
Practically, anyone sitting on the comp and writing to the journalist could get approved as the information
source to some media group for a reason he can offer the content frequently. So, that’s how the public
opinion could get created and managed and in our belief – that’s so dangerous weapon that can
compromise the media professionalism. No ethical media house would trust to anyone and before
anything is published there should be the several levels of the confirmation. In other words, anyone
looking for the exclusives on the Tor should know that he is possibly working for the other side of the law.
The Need to Hide Who You Are
Sometimes the intelligence sources reporting to some defense agency would need to hide their identity
for the security needs. The agent on the other side of the communications would deal with the clear
picture in a term who is talking to him. Also, the security organizations can confirm a lot of that, so it’s
quite clear they would be highly confident about the sources of the information. Being the source of the
findings to anyone creditable is so heavy and time consuming task and it needs the reliability, accuracy
and skill in order to get approved for such a service. Apparently, the defense staff would hide who he is
as well because it’s not necessary to know any sort of the personal details of that guy as the task is to
provide so helpful findings to the agency. How such an effort would get further directed it’s not up to the
informant – it’s only up to that defense team.
The Anonymity Information Exchange Systems
The most known privacy infrastructure worldwide is the Tor anonymity system that would cope with the
millions of users every single day. From time to time that service would get shut down, but it’s more about
such network’s configuration rules. Essentially, the Tor service can offer the good privacy and it’s mainly
reliable to its users. It would cope with the multi-level encryption, so it’s quite trickery to anyone to
challenge its security capacities. Let’s say the Tor is the quite trusted system that would attract so many
professionals from many areas of interest. Apparently, it would cope with its dark side being one of the
biggest Darknet service providers in the world. It would get the real oasis to the criminals, terrorists and
hackers as it would offer a lot of benefits to the users seeking to remain safe.
Cyber Defense eMagazine –July 2020 Edition 98
Copyright © 2020, Cyber Defense Magazine. All rights reserved worldwide.