Print Friendly, PDF & Email

What is Darknet? Discuss the key challenges involved in fighting the Darknet. Also suggest strategy to deal with it.

Are you Ready for Insta 75 Days Revision Plan (UPSC Prelims - 2020)?

Topic:   Challenges to internal security through communication networks, role of media and social networking sites in internal security challenges, basics of cyber security; money-laundering and its prevention.

5. What is Darknet? Discuss the key challenges involved in fighting the Darknet. Also suggest strategy to deal with it. (250 words)

Reference:  The Hindu

Why this question:

The question is straightforward and aims to analyse the key challenges involved in the applications of Darknet and the prevalent misuse of it.

Key demand of the question:

The answer must discuss the challenges involved in fighting the Darknet while suggesting strategy and solutions to deal with it.

Directive:

Discuss – This is an all-encompassing directive – you have to debate on paper by going through the details of the issues concerned by examining each one of them. You have to give reasons for both for and against arguments.

Structure of the answer:

Introduction:

Explain what Darknet is.

Body:

Dark Net is an umbrella term describing the portions of the Internet not open to public view or hidden networks whose architecture is superimposed on that of the Internet. Explain what are the challenges involved with it; Misuse: Computer crime (hacking, file corruption etc.), Sale of restricted goods on Darknet markets, File sharing (personal files, pornography, confidential files, illegal or counterfeit software etc.) The Dark Web is often used by individuals who want to preserve anonymity. That includes criminals, terrorists and state-sponsored spies. The Dark Web does contain websites selling illicit goods, including drugs etc. Discuss why it is difficult to tackle – virtual presence, no restricted geographical boundaries etc. Suggest solutions to address the challenge like – Introduction of technology-savvy youngsters into the cyber department in large numbers, Hiring of experienced foreign law-enforcement professionals, who have experience in similar operational security and applicable law.

Conclusion:

Conclude by reasserting upon the need to address the issue with greater urgency.