
The Internet has been shown to be a very powerful communication tool, enabling individuals to connect globally to access and exchange material with very few obstacles, including governmental or jurisdictional interference.

This core serves a critical function and has implications for detecting how users connect on Tor. The analysis shows that these core sites form a significant portion of all connections made on the network with a density of 0.132. Using social network analysis, website hyperlinks are examined and core sites are identified. Automated data collection techniques were used to leverage the interconnected nature of domains on Tor. We explore traditional social disorganization principles as a basis to draw comparisons between these virtual communities and real-life crime-prone neighborhoods. Examining hyperlinks can provide insight into how virtual communities form on a network. This study examines Tor by focusing on the network structures created between websites via hyperlinks. The use of encryption to achieve anonymity poses a significant challenge for law enforcement that wishes to monitor users and content for illicit activity. To visit websites on the network, the user must use a heavily modified Firefox browser. Although multiple dark web technologies exist, with a common trait of using encryption to enforce anonymity, the Tor network remains the most prominent dark web network.

The dark web is a concealed portion of the Internet that can only be accessed through specialized software.
