{"id":1684,"date":"2019-02-05T12:00:02","date_gmt":"2019-02-05T17:00:02","guid":{"rendered":"https:\/\/carleton.ca\/align\/?p=1684"},"modified":"2025-07-25T11:44:15","modified_gmt":"2025-07-25T15:44:15","slug":"illuminate-exploring-the-dark-web-tor-for-activism","status":"publish","type":"post","link":"https:\/\/carleton.ca\/align\/2019\/illuminate-exploring-the-dark-web-tor-for-activism\/","title":{"rendered":"[I-lluminate] Exploring the Dark Web: TOR for Activism"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        [I-lluminate] Exploring the Dark Web: TOR for Activism\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n\n\n<p>By <a href=\"https:\/\/carleton.ca\/align\/people\/nasreen-rajani\/\">Nasreen Rajani&nbsp;<\/a><\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p>The&nbsp;Tor&nbsp;browser \u2013 often mistaken as being the \u201cdark&nbsp;net\u201d itself and seen as being synonymous with illegal or nefarious activities \u2013 has become a useful platform for activists who require privacy and anonymity, and one has been attracting increasing attention from activists and citizens alike in recent years.&nbsp;Tor&nbsp;is being seen as a potential tool for ensuring privacy in a world where the online activity of both activists and even everyday citizens are being closely monitored by corporate and state interests.&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/fedotov.co\/wp-content\/uploads\/2015\/12\/Dark-web.jpg\" alt=\"5 levels of web Surface web, bergie web, deep web, charter web, marianas web.\"\/><\/figure>\n\n\n\n<p><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <\/span><\/p>\n\n\n\n<p class=\"has-text-align-center\">&nbsp;Credit: Fedotov.co<\/p>\n\n\n\n<p><b>SURVEILLANCE TECHNOLOGIES AGAINST ACTIVISTS&nbsp;<\/b><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Many activists now rely on social media platforms, such as Facebook, Twitter, Instagram, YouTube, to organize and mobilize for their cause. These platforms are widely relied upon by activists because of the low barrier to access, the potential to reach the millions of users locally and globally, and because they can be used to document protests and initiatives. As it turns out, these platforms are also heavily used by governments to monitor activists.&nbsp;&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p><a href=\"https:\/\/www.theatlantic.com\/photo\/2011\/09\/911-the-day-of-the-attacks\/100143\/\">The use of surveillance tactics and technologies by police and governments to monitor everyday citizens has become increasingly commonplace<span data-fontsize=\"11\">1<\/span>&nbsp;since&nbsp;the attacks of September&nbsp;11, 2001&nbsp;(Taylor, 2011)<\/a>. This phenomenon of increasing state surveillance coincides with a period of significant political and civic mobilization and action \u2013 including the&nbsp;Idle No More,&nbsp;Occupy Wall Street, and&nbsp;Black Lives Matter&nbsp;movements \u2013 and with the development and widespread global adoption of digital technologies, including personal computers, smart phones and social media platforms.<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Journalists have reported that the Department of Homeland Security consistently collected information of those attending protests from their social media platforms<span data-fontsize=\"11\">2<\/span>, such as Facebook events set up to promote the protests, Twitter hashtags, Instagram and Vine feeds. Furthermore, journalists or everyday citizens taking photos of protests who post them on social media are providing further data for police to identify and surveil activists. The goal for these surveillance tactics over social media platforms were reportedly to <a href=\"https:\/\/www.motherjones.com\/crime-justice\/2017\/10\/police-spied-on-new-york-black-lives-matter-group-internal-police-documents-show\/\">\u201cdisrupt potential violence\u201d (Patterson, 2017)<\/a>. However, as VICE points out, even without tagging an individual, <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/kb78de\/that-time-the-super-bowl-secretly-used-facial-recognition-software-on-fans\">Facebook uses&nbsp;a facial recognition algorithm&nbsp;that can identify people from facial images, putting everyone\u2019s privacy at risk (Rogers, 2016)<\/a>.<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Social media platforms are not neutral, open spaces and it\u2019s clear that corporate interests do not align with activists needs. Social media design and policies are also often in tension with activist social media goals and needs (<a href=\"https:\/\/www.rowmaninternational.com\/book\/critical_perspectives_on_social_media_and_protest\/3-156-3a5cf693-85a6-4840-9563-310348d31b89\">Dencik&nbsp;&amp;&nbsp;Leistert, 2015<\/a>; <a href=\"https:\/\/books.google.ca\/books?id=A6BqrWGIaFIC&amp;printsec=frontcover&amp;source=gbs_ge_summary_r&amp;cad=0#v=onepage&amp;q&amp;f=false\">Van&nbsp;Dijck, 2013<\/a>; <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/91171\/j.1460-2466.2012.01636.x.pdf?sequence=1&amp;isAllowed=y\">Youmans &amp; Work, 2012<\/a>). While social media technologies <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/91171\/j.1460-2466.2012.01636.x.pdf?sequence=1&amp;isAllowed=y\">\u201cserve as venues for the shared expression of dissent, dissemination of information, and collective action\u201d (Youmans &amp; York, 2012, p. 315)<\/a>, the primary objective of social media companies, many of which are publicly traded companies and have fiduciary obligations to shareholders, is generating profit through advertising. Business models&nbsp;of these companies are built upon the mining of personal data about users, and keeping those users online as long as possible (<a href=\"https:\/\/www.rowmaninternational.com\/book\/critical_perspectives_on_social_media_and_protest\/3-156-3a5cf693-85a6-4840-9563-310348d31b89\">Leistert, 2015<\/a>).&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p><b>TOR AS AN ALTERNATIVE AND SECURE BROWSER<\/b><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>The Tor browser provides an online alternative, allowing activists who have some technological know-how to use the browser as a means of organizing and mobilizing while remaining anonymous. Tor addresses concerns about privacy by letting activists encrypt their messages to one another, thereby making it difficult to find out who is sending messages to whom. Tor masks your IP address (which identifies your location and then your potential identity) to prevent it from be used by governments to censor parts of the web. In this case Tor acts similar to a VPN but is volunteer-run, not subject to subpoenas, and does not keep logs of user traffic. For a VICE special on how to not get hacked,&nbsp;J<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/a37m4g\/the-motherboard-guide-to-avoiding-state-surveillance-privacy-guide\">eong&nbsp;(2017)&nbsp;identifies major reasons why people would want to use the Tor browser<\/a>. These are: <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/a37m4g\/the-motherboard-guide-to-avoiding-state-surveillance-privacy-guide\">trying to hide your identity, using public Wi-Fi, avoiding government censorship, and\/or protecting other users of Tor as Tor becomes stronger the more people use it<\/a>.&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Although the Tor platform is often associated with the \u201cdark web\u201d based on the \u201cdarker\u201d acts that occur using such encrypted communication technologies, as discussed in other parts of this issue, the anonymity of Tor has human rights and social justice implications. The \u201cdark web\u201d is often associated with the dangers that stem from its applicability for \u201cdark\u201d purposes such as criminal activity, buying and selling deadly weapons, illegal drugs, child pornography, ISIS communication, and White Supremacist communication. But the privacy and encryption offered by Tor are not just useful for criminal masterminds. These darker aspects are just a small percentage of what takes place on Tor. <a href=\"https:\/\/www.theguardian.com\/technology\/2017\/aug\/23\/dark-web-neo-nazis-tor-dissidents-white-supremacists-criminals-paedophile-rings\">In&nbsp;response to&nbsp;Neo-Nazis turning to Tor for their continued mobilization (Hern 2017), leaders&nbsp;from the Tor Project explained<\/a>:&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n<div class=\"not-prose cu-quote cu-component-spacing\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><a href=\"https:\/\/www.theguardian.com\/technology\/2017\/aug\/23\/dark-web-neo-nazis-tor-dissidents-white-supremacists-criminals-paedophile-rings\"><i>We can\u2019t build free and open source tools that protect journalists, human rights activists, and ordinary people around the world if we also control who uses those tools \u2026.&nbsp;<\/i><i>Tor<\/i><i>&nbsp;is designed to defend human rights and privacy by preventing anyone from censoring things, even us.<\/i><\/a><\/p>\n<\/blockquote>\n<\/div>\n\n\n<p>Tor is neither \u201cgood\u201d or \u201cbad\u201d just like the rest of the internet, however, what\u2019s important here is in how it is being used, who has access to this knowledge and who is often left out of the positive potentials of being anonymous online. As Jardine (2015) shows, the technology of the Tor platform can be used for both \u201cdarker\u201d activities but also for democratic purposes. Data collected from <a href=\"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816639976\">Tor\u2019s network from 2011 and 2013 from over 157 countries demonstrate that although political repression drives most of Tor\u2019s usage (Jardine, 2018<\/a>), in 2015, for instance, with over 2.5 millions users on Tor, only 40% of Tor\u2019s browser was used for nefarious purposes while 60% wasn\u2019t.<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>The anonymity of Tor provides users the benefits of organizing and communicating online with some safety from surveillance. <a href=\"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816639976\">The benefits of TOR are especially useful for those in countries with repressive governments that limit secure and private Internet access, and for those for journalists and activists to blow the whistle on corruption (Jardine, 2015)<\/a>. Examples of groups using these won\u2019t be that many because the whole point is for them to remain to be private. However, <a href=\"http:\/\/time.com\/time-person-of-the-year-2015-runner-up-black-lives-matter\/\">reporters have identified that Black Lives Matter activists&nbsp;moved over to using Signal and Tor&nbsp;to maintain privacy amongst the activists (Altman, 2015)<\/a>.&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Tor, is, of course, not completely free from the risk of data and privacy breaches. There have been reports of security hacks and infiltration from the state and police that are concerning. Tor is left vulnerable through \u201cweak links\u201d in the computer network that is potentially logging more traffic that the node should be (Tor is hosted by volunteer computer nodes). This was how&nbsp;investigators were able to infiltrate&nbsp;ISIS communications (Roe, 2014). Police have also&nbsp;reportedly entered&nbsp;known child pornography forums, gathering information as a pretend pedophile. The FBI has also reportedly developed and used an application called&nbsp;<a href=\"https:\/\/www.wired.com\/2014\/12\/fbi-metasploit-tor\/\">Metasploit&nbsp;to identify users hiding behind Tor\u2019s browser (Poulsen, 2014)<\/a>.&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>But for now,&nbsp;<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/a37m4g\/the-motherboard-guide-to-avoiding-state-surveillance-privacy-guide\">Tor is still the better option&nbsp;than relying on&nbsp;VPNs, using&nbsp;WhatsApp Messenger&nbsp;for end-to-end encryption of messages, or even&nbsp;Signal, another popular application used for encryption and privacy while accessing and sharing online content (Jeong, 2017)<\/a>. The issues with many of these aforementioned applications in comparison to Tor is that they retain some metadata and, just like Facebook and Twitter, comply with data requests and court orders from government and local police authorities.&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p><b>THE TOR PROJECT<\/b><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Because the Tor browser is funded through the US government and military but run completely by volunteers, it\u2019s hard to say how long the browser will survive given the trend of increasing state surveillance. And as more activists turn to Tor, technical limitations could pose challenges, including the need to handle the uptake of users while ensuring enough volunteer computers are in place to keep traffic secure.&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/www.torproject.org\">TOR Project<\/a>, a non-profit organization that maintains the Tor software, is one example of a current initiative to expand Tor to everyone, beyond the criminal masterminds and spies that we often think of lurking in the dark depths of the Internet. The <a href=\"https:\/\/www.torproject.org\">Tor Project<\/a> wants everyone to be using it, so this shows us its capabilities as more than just a space where evil lurks. Using Tor effectively still requires technical know-how and access to the Internet, and in countries with repressive governments, such access to Tor may be hard to penetrate.&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Donating to the Tor project, which <a href=\"https:\/\/techcrunch.com\/2015\/11\/24\/tor-turns-to-crowdfunding-to-lessen-its-dependence-on-government-money\/\">began&nbsp;soliciting crowdfunding in&nbsp;2015&nbsp;(Russell, 2016)<\/a>,&nbsp;or becoming an active relay for computer nodes, are just a few ways to help ensure that the present and future of internet privacy is maintained for some of us until more of us demand action from our current browser and social media owners and more transparency from our governments in their interactions with them.<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p><b>LESSONS FOR EVERYONE ELSE<\/b><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Corporate online surveillance is not just an issue that active protestors now need to worry about, but something that so many more of us are affected by in various ways. Recently, <a href=\"https:\/\/www.vox.com\/policy-and-politics\/2018\/3\/23\/17151916\/facebook-cambridge-analytica-trump-diagram\">the report of Facebook\u2019s secret&nbsp;Cambridge Analytica scandal&nbsp;has fuelled the fire that non-consensual surveillance of users is common place (Chang, 2018)<\/a>. While the outing of such research studies has been a catalyst for improvement, with social media companies taking a more meaningful approach to educating users about privacy (Facebook and recent privacy notifications and suggestions to improve your privacy settings), users\u2019 data is still at risk given the legal authority of government authorities to access data through court order or through surveillance of digital technologies by agencies responsible for protecting national security.&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559731&quot;:720,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Privacy is important for everyone who engages with online and networked forms of communication. Platforms like Tor help us to maintain our privacy to some extents. For activists engaged in social justice, this could provide a more secure way to organize and mobilize.&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Works Cited:<\/strong><\/p>\n\n\n\n<p>Altman, A. (2015). \u201cPerson of the year, the short list: Black Lives Matter.\u201d In&nbsp;Time Magazine. Retrieved from&nbsp;<a href=\"http:\/\/time.com\/time-person-of-the-year-2015-runner-up-black-lives-matter\/\">http:\/\/time.com\/time-person-of-the-year-2015-runner-up-black-lives-matter\/<\/a>&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Chang, A. (May 2, 2018). \u201cThe Facebook and Cambridge Analytica scandal, explained with a simple diagram.\u201d In Vox. Retrieved from&nbsp;<a href=\"https:\/\/www.vox.com\/policy-and-politics\/2018\/3\/23\/17151916\/facebook-cambridge-analytica-trump-diagram\">https:\/\/www.vox.com\/policy-and-politics\/2018\/3\/23\/17151916\/facebook-cambridge-analytica-trump-diagram<\/a>&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Dencik, L.&nbsp;&amp;&nbsp;Leistert, O.&nbsp;(2015).&nbsp;<i><a href=\"https:\/\/www.rowmaninternational.com\/book\/critical_perspectives_on_social_media_and_protest\/3-156-3a5cf693-85a6-4840-9563-310348d31b89\">Critical perspectives on Social Media and Protest: Between Control and Emancipation<\/a>.<\/i>&nbsp;Maryland:&nbsp;Rowman &amp; Littlefield International.<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Hern. A. (Aug 23, 2017). \u201cThe dilemma of the dark web: Protecting neo-Nazis and dissidents alike.\u201d In&nbsp;<i>The Guardian<\/i>. Retrieved from&nbsp;<a href=\"https:\/\/www.theguardian.com\/technology\/2017\/aug\/23\/dark-web-neo-nazis-tor-dissidents-white-supremacists-criminals-paedophile-rings\">https:\/\/www.theguardian.com\/technology\/2017\/aug\/23\/dark-web-neo-nazis-tor-dissidents-white-supremacists-criminals-paedophile-rings<\/a>&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Igo, S. (Apr 10, 2018). \u201cHow you helped create the crisis in private data.\u201d In&nbsp;<i>The&nbsp;Conversation<\/i>. Retrieved from&nbsp;<a href=\"https:\/\/theconversation.com\/how-you-helped-create-the-crisis-in-private-data-94633\">https:\/\/theconversation.com\/how-you-helped-create-the-crisis-in-private-data-94633<\/a>&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Jardine, E. (2015). \u201cThe Dark Web dilemma: Tor, anonymity and online policing.\u201d&nbsp;<i>Global Commission on Internet Governance Paper Series<\/i>, No. 21.&nbsp;Retrieved from&nbsp;SSRN:\u202f<a href=\"https:\/\/ssrn.com\/abstract=2667711\">https:\/\/ssrn.com\/abstract=2667711<\/a>\u202for\u202f<a href=\"https:\/\/dx.doi.org\/10.2139\/ssrn.2667711\">http:\/\/dx.doi.org\/10.2139\/ssrn.2667711<\/a><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Jardine, E. (2018).&nbsp;\u201cTor, what is it good for? Political repression and the use of online anonymity-granting technologies.\u201d\u202f<i>New Media &amp; Society<\/i>,\u202f<i>20<\/i>(2), 435-452.<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;Retrieved from&nbsp;<a href=\"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816639976\">https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816639976<\/a><\/span><\/p>\n\n\n\n<p>Jeong, S. (Nov 27, 2017). \u201cThe Motherboard guide to avoiding state surveillance.\u201d In&nbsp;<i>Motherboard by VICE<\/i>. Retrieved from&nbsp;<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/a37m4g\/the-motherboard-guide-to-avoiding-state-surveillance-privacy-guide\">https:\/\/motherboard.vice.com\/en_us\/article\/a37m4g\/the-motherboard-guide-to-avoiding-state-surveillance-privacy-guide<\/a>&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Leistert, O. (2015).&nbsp;\u201cThe revolution will not be liked: On the systemic constraints of corporate social media platforms for protests.\u201d&nbsp;In L.&nbsp;Dencik&nbsp;and O.&nbsp;Leistert&nbsp;(Eds.)&nbsp;<a href=\"https:\/\/www.rowmaninternational.com\/book\/critical_perspectives_on_social_media_and_protest\/3-156-3a5cf693-85a6-4840-9563-310348d31b89\"><i>Critical&nbsp;<\/i><\/a><i>perspectives on social media and protest: Between control and emancipation.&nbsp;<\/i>Maryland: Rowman and Littlefield.<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Patterson, B. E. (Oct 19, 2017). \u201cPolice spied on New York Black Lives Matter group, internal police documents show\u201d. In&nbsp;<i>Mother Jones<\/i>. Retrieved from&nbsp;<a href=\"https:\/\/www.motherjones.com\/crime-justice\/2017\/10\/police-spied-on-new-york-black-lives-matter-group-internal-police-documents-show\/\">https:\/\/www.motherjones.com\/crime-justice\/2017\/10\/police-spied-on-new-york-black-lives-matter-group-internal-police-documents-show\/<\/a>&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Poulsen, K. (Dec 16, 2014). \u201cThe FBI used the web\u2019s favorite hacking tool to unmask TOR users.\u201d In Wired. Retrieved from&nbsp;<a href=\"https:\/\/www.wired.com\/2014\/12\/fbi-metasploit-tor\/\">https:\/\/www.wired.com\/2014\/12\/fbi-metasploit-tor\/<\/a>&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Roe, K. (Nov 5, 2014). \u201cMeet TOR: The misunderstood gateway into the Dark Web.\u201d In The Bottom Line. Retrieved from&nbsp;<a href=\"https:\/\/thebottomline.as.ucsb.edu\/2014\/11\/meet-tor-the-misunderstood-gateway-into-the-dark-web\">https:\/\/thebottomline.as.ucsb.edu\/2014\/11\/meet-tor-the-misunderstood-gateway-into-the-dark-web<\/a>&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Rogers, K. (Feb 7, 2016). \u201cThat time the Super Bowl secretly used facial recognition software on fans\u201d. In&nbsp;<i>Motherboard by VICE<\/i>. Retrieved from&nbsp;<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/kb78de\/that-time-the-super-bowl-secretly-used-facial-recognition-software-on-fans\">https:\/\/motherboard.vice.com\/en_us\/article\/kb78de\/that-time-the-super-bowl-secretly-used-facial-recognition-software-on-fans<\/a>&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Russell, J. (2016). \u201cTOR turns to crowdfunding to lessen its dependence on government money.\u201d In&nbsp;Techcrunch. Retrieved from&nbsp;<a href=\"https:\/\/techcrunch.com\/2015\/11\/24\/tor-turns-to-crowdfunding-to-lessen-its-dependence-on-government-money\/\">https:\/\/techcrunch.com\/2015\/11\/24\/tor-turns-to-crowdfunding-to-lessen-its-dependence-on-government-money\/<\/a>&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Taylor, A. (Sept 8, 2011). \u201c9\/11 The day of the attacks\u201d. In&nbsp;<i>The Atlantic<\/i>. Retrieved from&nbsp;<a href=\"https:\/\/www.theatlantic.com\/photo\/2011\/09\/911-the-day-of-the-attacks\/100143\/\">https:\/\/www.theatlantic.com\/photo\/2011\/09\/911-the-day-of-the-attacks\/100143\/<\/a>&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Tor Project. (n.d.). \u201cTor project.\u201d Retrieved from&nbsp;<a href=\"https:\/\/www.torproject.org\/\">https:\/\/www.torproject.org\/<\/a>&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>van&nbsp;Dijck, J.&nbsp;(2013).&nbsp;<a href=\"https:\/\/books.google.ca\/books?id=A6BqrWGIaFIC&amp;printsec=frontcover&amp;source=gbs_ge_summary_r&amp;cad=0#v=onepage&amp;q&amp;f=false\"><i>The c<\/i><i>ulture o<\/i><i>f connectivity: A critical history of social m<\/i><i>edia<\/i>.<\/a> Oxford: Oxford University Press.<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Youmans, W. L., &amp; York, J. C. (2012).&nbsp;\u201cSocial media and the activist toolkit: User agreements, corporate interests, and the information infrastructure of modern social movements.\u201d&nbsp;<i>Journal of Communication, 62<\/i>, 315\u2013329.&nbsp;<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:720}\">&nbsp;Retrieved from&nbsp;<a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/91171\/j.1460-2466.2012.01636.x.pdf?sequence=1&amp;isAllowed=y\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/91171\/j.1460-2466.2012.01636.x.pdf?sequence=1&amp;isAllowed=y<\/a><\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/carleton.ca\/align\/wp-content\/uploads\/sites\/121\/ALiGN_Illuminate_Rajani.pdf\"><img loading=\"lazy\" decoding=\"async\" width=\"266\" height=\"290\" src=\"https:\/\/carleton.ca\/align\/wp-content\/uploads\/sites\/121\/Screenshot-2019-09-20-03.57.48.png\" alt=\"\" class=\"wp-image-2147\" srcset=\"https:\/\/carleton.ca\/align\/wp-content\/uploads\/sites\/121\/Screenshot-2019-09-20-03.57.48.png 266w, https:\/\/carleton.ca\/align\/wp-content\/uploads\/sites\/121\/Screenshot-2019-09-20-03.57.48-160x174.png 160w, https:\/\/carleton.ca\/align\/wp-content\/uploads\/sites\/121\/Screenshot-2019-09-20-03.57.48-240x262.png 240w, https:\/\/carleton.ca\/align\/wp-content\/uploads\/sites\/121\/Screenshot-2019-09-20-03.57.48-200x218.png 200w\" sizes=\"auto, (max-width: 266px) 100vw, 266px\" \/><\/a><\/figure>\n\n\n\n<p><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/p>\n\n\n\n<p><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Nasreen Rajani&nbsp; &nbsp; The&nbsp;Tor&nbsp;browser \u2013 often mistaken as being the \u201cdark&nbsp;net\u201d itself and seen as being synonymous with illegal or nefarious activities \u2013 has become a useful platform for activists who require privacy and anonymity, and one has been attracting increasing attention from activists and citizens alike in recent years.&nbsp;Tor&nbsp;is being seen as a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[275,277],"tags":[26,285,284,115,116,106,288],"class_list":["post-1684","post","type-post","status-publish","format-standard","hentry","category-illuminate","category-issue-i-exploring-the-dark-web","tag-activism","tag-dark-web","tag-darknet","tag-digital-technologies","tag-privacy","tag-surveillance","tag-tor"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/posts\/1684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/comments?post=1684"}],"version-history":[{"count":4,"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/posts\/1684\/revisions"}],"predecessor-version":[{"id":3369,"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/posts\/1684\/revisions\/3369"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/media?parent=1684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/categories?post=1684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/tags?post=1684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}