New threats in the cyberspace based on the analysis of The Onion Router

Abstract

New technologies change the society and generate new threats with respect to hiding human identity on the Internet. The aim of the paper is to present the origins, functioning and actual application of the TOR (The Onion Router) network. The author discusses the issue of anonymity as a driving force behind the TOR network which was ignited by social and political problems on the international arena. Also the relevance of TOR for the free flow of information and freedom of social communication on the Internet as well as thematic cross-section of its resources are presented. Further on in the paper the author shows a payment system in the TOR network which is based on cryptocurrencies, mainly on Bitcoin, and proves to be an ideal means of payment for illegal transactions. The paper also lists the most frequently committed crimes now and warns that the newly emerging forms of crimes which rely on anonymizing technologies, will pose a real challenge for law enforcement agencies and the system of justice. The TOR network by providing criminals with anonymity speeds up the development of cyber crime on an unprecedented scale and transfers traditional crime into a completely new dimension. The TOR network may have been well-meaning originally but has become a global threat.<br/><br/>

Authors and Affiliations

Anna Nastuła

Keywords

Related Articles

THE ROLE OF MILITARY POLICE IN THE SLOVAK SYSTEM OF INTERNAL SECURITY. RESEARCH REPORT

The aim of the paper is to present results of research on social and expert perception of Military Police in the Slovak Republic. In addition to the research results the paper also features detailed description of the Sl...

Financing of Cultural Institutions by Local Government Units on The Example of Bielsko-Biała Theatres

Culture is one of the most essential development factors influencing the quality of life and social advancement. Financing of cultural institutions from public funds aims at propagation of culture, supporting artists and...

TEORIE PRAW PODSTAWOWYCH I ICH ROLA W WYKŁADNI KONSTYTUCJI

Postanowienia konstytucji regulujące prawa podstawowe charakteryzują się znacznym stopniem nieokreśloności. Z tego względu wymagają wykładni konkretyzującej, polegającej w dużej mierze na wypełnianiu ich ram normatywną z...

REVIEW ADOPTED BY ADMINISTRATIVE COURTS TO EXAMINE DISCRETIONARY DECISIONS

The article concerns the criteria of review adopted by administrative courts to examine decisions issued by public authorities at their administrative discretion. The author presents views of legal commentators and judic...

COMPARISON OF FINANCING OF LOCAL GOVERNMENT SECURITY

At present great emphasis is continually being placed on security in local government units. One of possibilities for providing security for local communities is municipality police. Municipality police fulfils tasks whi...

Download PDF file
  • EP ID EP516967
  • DOI 10.5604/01.3001.0012.9839
  • Views 78
  • Downloads 0

How To Cite

Anna Nastuła (2018). New threats in the cyberspace based on the analysis of The Onion Router. Zeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 22(4), 26-31. https://europub.co.uk/articles/-A-516967