While digital investigations can benefit from info on the dark web, venturing into this hidden web has unique challenges and hazards. To safely navigate this complex landscape, here’s a list of what to avoid when researching dark websites.
When discussing what not to do on the dark web, intentionally malicious or criminal activity goes without saying. For the purposes of this post, we are going to address some gray areas of using the dark web in the context of threat intelligence gathering, security research or other online investigations. Often, these activities may necessitate access to online forums where criminal activity is discussed or carried out.
Like the other blogs in our dark web series, our primary reference is the Department of Justice’s Cyber Security Unit guidance to the private sector on gathering cyberthreat intelligence in dark marketplaces.
(The memo and following discussion do not constitute legal advice. Authentic8 is prohibited from offering you legal advice. Please consult your attorney or your organization’s attorney for legal advice before undertaking the activities considered here.)
What is the dark web?
First, if you’re not familiar, let’s start with the basics of the three layers of the internet: the surface web, the deep web, and the dark web:
- Surface web: Also known as the open web or clear web, this is the most accessible layer of the internet, available via standard web browsers (e.g., Chrome and Safari). Webpages are indexed by popular search engines (e.g., Google and Bing) to easily explore a vast array of content.
- Deep web: A hidden web, this layer is still accessible via standard browsers, but webpages are not indexed. The difference between surface web and deep web is that deep web sites require login or subscription to access (e.g., academic journals, court record databases or services like Netflix) and content is often hidden behind a security wall.
- Dark web: The dark web requires a specialized dark web browser like Tor to access a specific darknet. (Tor or “The Onion Router” isn’t the only darknet—there’s also ZeroNet, Freenet and I2P, for example.) Dark web sites are not indexed by standard search engines.
The very nature of the dark web network infrastructure varies greatly from the surface web. The dark web network infrastructure enables multi-layer encryption to prevent location tracking and preserves confidentiality among dark web users and hosts.
While this has perfectly legitimate uses (e.g., dissidents avoiding repressive regimes), it has made the dark web a hub for criminals to sell illicit goods and services. A notorious example is the Silk Road, which was shuttered in 2013, but many more have risen (and fallen, and risen again) to take its place.
The dark web’s popularity among criminals is why it’s so often useful to open-source intelligence (OSINT) investigations concerning cyberthreats, financial crime, fraud, human trafficking, child abuse, terrorism and narcotics.
But it’s important for OSINT analysts, threat intel analysts and law enforcement agents to know that the dark web is not totally anonymous, and there are several considerations to take in terms of when and how you access it and what you do while searching there.
Don’t access the dark web without the right tools and capabilities
You’ll need a dark web browser like Tor to access the dark web. However, using Tor without additional protections could leave your device and network vulnerable to a cyberattack—and could attribute your activity back to you or your organization.
- Managed attribution platform: This is the foolproof way to safely access and gather OSINT on the dark web. It includes a fully isolated, cloud-based browsing interface, so no malware you would encounter can pass to your device or network.
- VPN: If you don’t have access to a managed attribution platform, a VPN can give you an added layer of protection. But it needs to be configured correctly and connections can drop, potentially putting you at risk.
- Proxy services: Again, this is just one layer of protection and should be used in combination with a VPN and the Tor browser. It also needs to be properly configured.
Looking for a managed attribution platform to safely access the dark web? Check out Silo: our scaled, secure, cloud-based web isolation platform. Start a 30-day free trial or book a demo.
Don’t access forums in an unauthorized manner
If you come across a forum on the dark web that requires credentials to access, do not attempt to evade the authorization requirements, as the Department of Justice notes:
“Access Forums Lawfully: Accessing a forum in an unauthorized manner, such as by exploiting a vulnerability or by using stolen credentials, can implicate the CFAA and statutes like the Access Device Fraud statute (18 U.S.C. § 1029).”
—DOJ Cybersecurity Unit
Don’t assume someone else’s identity
If you need a persona to access or interact on the dark web, don’t use someone else’s identity (name, photo, phone number, email, etc.) to do so without their consent. Posing as someone else can not only create legal trouble for you, but it also puts the other person at risk of receiving targeted malicious and illegal activity from criminal actors whom you’ve interacted with.
The best approach for accessing the dark web is to create an entirely fake persona of anonymous nature that cannot be connected to you or your organization. The Department of Justice echoes this advice:
“Do Not Assume Someone Else’s Identity without Consent: Using a fake online identity to gain access to or participate in a forum where criminal conduct is occurring, standing alone, is typically not a violation of federal criminal law. However, assuming the identity of an actual person without his or her permission rather than manufacturing a false persona can cause legal problems.”
—DOJ Cybersecurity Unit
Learn how to control your digital fingerprint to match browser and device details to your online identity and avoid tipping off investigative targets.
Don’t do research without a plan
This is important for two reasons. First, having a set of written guidelines in a dark web access policy will help keep your research efforts focused and within the bounds of your organization’s risk appetite. Second, documented plans, policies and procedures are helpful in the event you or your organization comes under investigation from law enforcement.
The Department of Justice refers to this as creating “Rules of Engagement”:
“Create ‘Rules of Engagement’: If your organization conducts activities described in this document, or is planning to do so, it should prepare “rules of engagement” or a “compliance program” with protocols that outline acceptable conduct for its personnel and contractors who interact with criminals and criminal organizations. Following deliberately crafted protocols that weigh legal, security, and operational considerations beforehand will discourage rash decisions that could put an organization, its employees, and its data in jeopardy. Having documented rules may also prove useful if the organization ever faces criminal, civil, or regulatory action.”
—DOJ Cybersecurity Unit
Don’t put your corporate network at risk
This one is up there with the “goes without saying” category of what not to do on the dark web. But you can never be too careful, especially when it comes to activities that pose both technical and operational risks, like dark web investigations.
The takeaway from the Department of Justice is to practice good cyber hygiene:
“Practice Good Cybersecurity: In the situations discussed in this document, information is exchanged with cyber criminals. There is no such thing as being ‘too suspicious’ in those circumstances. Practice good cybersecurity at all times and use systems that are not connected to your company network and are properly secured when communicating with cyber criminals.”
—DOJ Cybersecurity Unit
Learn more about isolated, cloud-based browsing that provides 100-percent separation between the web and your device.
Do play it smart
When conducting a dark web investigation where criminal activity occurs, there are several risks to consider. Make sure legal challenges for your team aren’t among them by creating a best practices protocol. These simple pieces of advice can go a long way toward avoiding legal pushback, but as always, consult your legal and security departments to create an official policy.
To protect yourself, use a program to document your activity on the dark web, such as Silo for Research. In addition to managed attribution for safe browsing, Silo for Research can help protect investigators and their employers in an audit.
More from our dark web blog series:
- Understanding the dark web and how it can aid your investigation: What is it and how it varies from the internet most of us use everyday.
- How to leverage the dark web in online investigations: Why you should use the dark web in your investigation, where to begin and how to protect yourself (and your company) along the way.
- 3 things to consider before you start your dark web investigation: When determining if you should begin a dark web investigation, ask yourself these three questions concerning dark web content, risk and precautions.
- Essential tools for improving surface and dark web research: Leveraging these easy-to-use dark web tools for investigations can help improve the quality and speed of your research.
- Best practices for creating a dark web access policy: Protect your company and employees by creating a dark web access policy to set protocol for investigations to mitigate security and legal challenges.
What not to do on the dark web FAQs
What are some best practices on what not to do on the dark web?
When accessing the dark web for research or threat intelligence, follow these guidelines at a minimum:
- Don’t engage in illegal or unauthorized activities
- Don’t access password-protected forums without credentials
- Don’t assume someone else’s identity
- Don’t use your organization’s network to connect
These actions can violate federal law and put your organization at risk.
Is it illegal to browse the dark web for investigations?
No, simply browsing the dark web is not illegal. However, how you access and what you do while there matters. Unauthorized entry into restricted forums, using stolen credentials, or interacting with criminal marketplaces can violate the Computer Fraud and Abuse Act (CFAA) and other federal statutes.
What are the biggest compliance risks for dark web investigators?
The top compliance risks include unauthorized access, data handling violations, and failure to document research activity. Analysts should follow DOJ guidance, maintain a dark web access policy, and ensure they use tools like managed attribution platforms that isolate activity from organizational networks.
Why shouldn’t I use my corporate network to access the dark web?
Accessing the dark web from a corporate or government network exposes systems to malware, data exfiltration, and attribution risk. The Department of Justice recommends using isolated, cloud-based environments that prevent crossover between investigative browsing and internal infrastructure.
Why is it important to have a dark web investigation plan?
A structured plan ensures all research aligns with organizational policy and legal guidelines. Written rules of engagement and documented compliance protocols help teams stay within legal boundaries and demonstrate due diligence if their activity is ever reviewed or audited.
How can I safely and legally conduct dark web research?
Use a managed attribution platform or isolated browsing environment like Silo to access dark web content securely. Always document your actions, operate under an approved policy, and consult your legal counsel before engaging in activities that may involve criminal forums or marketplaces.
Tags Anonymous research Dark web basics Dark web research OSINT research VPN