New threats in the cyberspace based on the analysis of The Onion Router

Abstract

New technologies change the society and generate new threats with respect to hiding human identity on the Internet. The aim of the paper is to present the origins, functioning and actual application of the TOR (The Onion Router) network. The author discusses the issue of anonymity as a driving force behind the TOR network which was ignited by social and political problems on the international arena. Also the relevance of TOR for the free flow of information and freedom of social communication on the Internet as well as thematic cross-section of its resources are presented. Further on in the paper the author shows a payment system in the TOR network which is based on cryptocurrencies, mainly on Bitcoin, and proves to be an ideal means of payment for illegal transactions. The paper also lists the most frequently committed crimes now and warns that the newly emerging forms of crimes which rely on anonymizing technologies, will pose a real challenge for law enforcement agencies and the system of justice. The TOR network by providing criminals with anonymity speeds up the development of cyber crime on an unprecedented scale and transfers traditional crime into a completely new dimension. The TOR network may have been well-meaning originally but has become a global threat.<br/><br/>

Authors and Affiliations

Anna Nastuła

Keywords

Related Articles

ATTITUDES OF LOAN TAKERS AND CREDIT POLICY OF BANKS IN POST-CRISIS ECONOMY

Last financial crisis caused insolvency of many entities: natural persons, companies, banks and even whole states. The crisis had a serious impact on the real sphere of the economy through channels of financing because t...

ADVANTAGES AND DISADVANTAGES OF FUNCTIONS OF FINANCIAL AND ACCOUNTING SYSTEMS USED IN ACCOUNTANCY

The need of collecting information about business units grows together with economic progress. Accounting is the source of this data without which no company would be able to conduct business activity. The data is consid...

NON-DISCLOSURE AGREEMENT IN THE PROCESS OF PROTECTION OF INTANGIBLE PROPERTY

The paper explains a legal concept of a non-disclosure agreement (NDA)/confidential disclosure agreement (CDA) as an effective tool for the trade secret protection. Ensuring the confidentiality of important information o...

COMMENTS TO THE GOVERNMENT BILL OF 13 JULY 2016 ON AMENDMENTS TO THE ACT ON THE REGIONAL ACCOUNTING CHAMBERS

The paper consists of two parts. The first part is devoted to discussing currently effective provisions of the Act on the Regional Accounting Chambers within organisation and operation rules of the rios (Polish abbreviat...

LEGAL DEREIFICATION OF ANIMALS – THE POLISH EXPERIENCE

The aim of the paper is to present the concept of normative dereification of animals. Since 1997 Poland has been one of the countries which decided to build their animal protection system on the foundation of distinction...

Download PDF file
  • EP ID EP516967
  • DOI 10.5604/01.3001.0012.9839
  • Views 69
  • Downloads 0

How To Cite

Anna Nastuła (2018). New threats in the cyberspace based on the analysis of The Onion Router. Zeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 22(4), 26-31. https://europub.co.uk/articles/-A-516967