Dark Web intelligence pro and cons

Dark Web Intelligence could help law enforcement and intelligence agencies to gather information on potential attacks. Which are the risks?

The increased number of cyber attacks against government entities and the hypothesis that the U.S. government should take an offensive strike against hackers who hit the countries raised the discussion on the problem of the attribution.

Prevention, mitigation and response to cyber attacks must rely on a deep knowledge of the potential attackers and their tactics, technique, and procedures (TTPs).

The analyzing of various sources is a critical factor to gather intelligence information on cyber threats and government entities are looking with increasing interest in the Dark Web. Intelligence experts are aware that cyber criminals, terrorists, and lone hackers crowd the dark park on the web to communicate each other, to exchange information and for many other illegal activities.

The US Government analysts are confident that the analysis of the Dark Web data could help to warn industry about planned attacks.

However, this process is not so simple, as highlighted by security experts there are two factors to carefully consider:

  • The inherent difficulty in finding information on the Dark Web.
  • The risk to compromise the sources and the methodologies of information gathering, communicating the findings of the investigation to private companies.
  • The risk of triggering the companies potential victims of unpredictable reactions.

“Tipping your hand could mean compromising your sources close to the adversary and disrupt a valuable information-gathering process” explained Shane Harris, Daily Beast senior intelligence and national security correspondent, speaking at IBM’s i2 Summit for a Safer Planet.

By sharing the information with companies there are enormous benefits in the short terms, but as explained by Matthew Wong, director of intelligence for Flashpoint, there is the risk to lose the long-term gain of intelligence.

The question is “whether the government has a responsibility to help its citizens or its corporations,” said Wong “And sadly, the act of helping sometimes causes undesired effects. If you help a company, you’re risking your sources and methods, so that’s why the government sometimes doesn’t help citizens and companies even though it has the power and ability to do so,”  “You can have a short-term gain now, if you use this intelligence to protect this asset, and then you lose the long-term gain of intelligence and you potentially lose the ability to leverage that information to protect yourself in the long term.”

Part of the security community is convicted that divulging the information collected during the investigation, especially from Dark Web resources, may induce changes in the modus operandi of the attackers that are difficult to predict and would risk undermining the efforts of previous intelligence operations.

Keeping confidential the information collected during the information gathering activities could give the intelligence agencies and law enforcement the opportunity to conduct further researches on the attackers, profile them and uncover completely the infrastructure they plan to use in the attacks.

“Just because we have the intelligence to stop every intrusion doesn’t mean we should,” Wong said.

Pierluigi Paganini

(Security Affairs – Dark Web, intelligence)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…

8 hours ago

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

20 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

23 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

1 day ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

2 days ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

This website uses cookies.