Page 98 - Cyber Defense eMagazine for July 2020
P. 98

dangerous playing those games in the adulthood, so what’s so needed is to understand the motives of
            the persons doing so for a reason once the motive is defined the crime would stop.


            Why Does Identity Matter?

            It’s  not  only  about  the  terrorist  and  criminal  organizations  to  hide  their  identity  –  so  many  defense
            professionals  would  choose  to  carefully  manage  their  identity  as  the  way  of  security  and  privacy
            measures getting applied on their tasks. In other words, it’s not smart at all going around and sharing all
            you know with everyone as that could be the huge threat to someone’s life and business. So, the well-
            known  Deep  Web  solutions  are  designed  by  the  defense  communities,  but  at  the  moment  they  are
            available to anyone for more or less obvious reasons. The identity matters in any case and once the
            people are convinced that some account is trusted they can try to share a lot of findings with such a
            profile. The modern history would teach us how life can be hard and why it’s important to take some
            measures of protection.

            The Deep Web systems could get used by the media staffs in order to bring the story to the audience.
            Practically, anyone sitting on the comp and writing to the journalist could get approved as the information
            source to some media group for a reason he can offer the content frequently. So, that’s how the public
            opinion  could  get  created  and  managed  and  in  our  belief  –  that’s  so  dangerous  weapon  that  can
            compromise  the  media  professionalism.  No  ethical  media  house  would  trust  to  anyone  and  before
            anything is published there should be the several levels of the confirmation. In other words, anyone
            looking for the exclusives on the Tor should know that he is possibly working for the other side of the law.



            The Need to Hide Who You Are

            Sometimes the intelligence sources reporting to some defense agency would need to hide their identity
            for the security needs. The agent on the other side of the communications would deal with the clear
            picture in a term who is talking to him. Also, the security organizations can confirm a lot of that, so it’s
            quite clear they would be highly confident about the sources of the information. Being the source of the
            findings to anyone creditable is so heavy and time consuming task and it needs the reliability, accuracy
            and skill in order to get approved for such a service. Apparently, the defense staff would hide who he is
            as well because it’s not necessary to know any sort of the personal details of that guy as the task is to
            provide so helpful findings to the agency. How such an effort would get further directed it’s not up to the
            informant – it’s only up to that defense team.



            The Anonymity Information Exchange Systems

            The most known privacy infrastructure worldwide is the Tor anonymity system that would cope with the
            millions of users every single day. From time to time that service would get shut down, but it’s more about
            such network’s configuration rules. Essentially, the Tor service can offer the good privacy and it’s mainly
            reliable  to  its  users.  It  would  cope  with  the  multi-level  encryption,  so  it’s  quite  trickery  to  anyone  to
            challenge its security capacities. Let’s say the Tor is the quite trusted system that would attract so many
            professionals from many areas of interest. Apparently, it would cope with its dark side being one of the
            biggest Darknet service providers in the world. It would get the real oasis to the criminals, terrorists and
            hackers as it would offer a lot of benefits to the users seeking to remain safe.






            Cyber Defense eMagazine –July 2020 Edition                                                                                                                                                                                                                         98
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   93   94   95   96   97   98   99   100   101   102   103