Darknet - Laurent Gayard - E-Book

Darknet E-Book

Laurent Gayard

0,0
139,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers. This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 271

Veröffentlichungsjahr: 2018

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Preface

Introduction

PART 1: New Frontiers and Governance of Digital Space

1 Fragmentation and Compartmentalization of Virtual Space

1.1. The nymph Carna and Internet census

1.2. Dimensions of cyberspace

1.3.

Deep web, darknet

and

dark web

2 A Society of Control and Panopticism

2.1. Horizontal panopticism and cyber-narcissism

2.2. The neutrality of the network in question

2.3. Going toward an Internet 3.0 and a new form of digital civility?

3 The Internet, a Governance Subject to Controversy

3.1. ICANN, an influenced institution

3.2. Cybersecurity, domains and electronic addressing

3.3. Who regulates those who are in control?

PART 2: Crypto-Anarchism, Cryptography and Hidden Networks

4 From the ARPANET to the Darknet: When States Lose Cryptographic Warfare

4.1. From Minitel to ARPANET

4.2. The rise of asymmetric cryptography

4.3. “The Crypto Wars are over!”

5 From Sneaker Nets to Darknets

5.1. Peer to peer: the first darknets

5.2. “Netopias” and darknets: the appearance of parallel networks

5.3. The Tor network

6 Geopolitics and Cybersecurity

6.1. From “hacktivism” to “cyberwarfare”

6.2. Cybercrime, politics and subversion in the “half-world”

Conclusion

APPENDICES

Appendix 1: Declaration of Independence of Cyberspace (John P. Barlow, February 1996)

Appendix 2: Digital Gangster Manifesto

Glossary

Bibliography

Index

End User License Agreement

List of Tables

1 Fragmentation and Compartmentalization of Virtual Space

Table 1.1. Different types of content

4 From the ARPANET to the Darknet: When States Lose Cryptographic Warfare

Table 4.1. The different types of information and data collection [OMA 12]

6 Geopolitics and Cybersecurity

Table 6.1. Typology of the 5,205 sites identified by the study

List of Illustrations

1 Fragmentation and Compartmentalization of Virtual Space

Figure 1.1. The Internet in the form of an iceberg: a fantasy representation

Figure 1.2. The Grams search engine

Figure 1.3. www.4chan.org homepage

2 A Society of Control and Panopticism

Figure 2.1. Zygmunt Bauman’s “liquid society”

Figure 2.2. Worldwide geography of the Tor network (source: Stefano Desabbata, Wikimedia Commons, August 23, 2014). For a color version of this figure, see www.iste.co.uk/gayard/darknet.zip

Figure 2.3. Chronology of the first three decades that saw the emergence and development of ARPANET, which became the Internet

Figure 2.4. Explanatory diagram of network neutrality

Figure 2.5. The Internet Society

Figure 2.6. The Internet Engineering Task Force

3 The Internet, a Governance Subject to Controversy

Figure 3.1. Example of a DNS hierarchy (Creative Commons/Wikipedia). For a color version of this figure, see http://www.iste.co.uk/gayard/darknet.zip

Figure 3.2. The different types of domain name registration. For a color version of this figure, see http://www.iste.co.uk/gayard/darknet.zip

Figure 3.3. April Fools from http://com.google on April 1, 2015

Figure 3.4. The “inverted Google” of April 1, 2015

4 From the ARPANET to the Darknet: When States Lose Cryptographic Warfare

Figure 4.1. The development of ARPANET from 1969 to 1977

Figure 4.2. An example of a stenographic message [LED 96]. Drawing with a hidden message. The message is coded in Morse code in the long and short grasses on the river bank. A long grass is a line, a short grass is a point. The message reads: Compliments of CPSA MA to out Col Harold R. Shaw on visit to San Antonio May 11, 1945.

Figure 4.3. The adventures of Alice and Bob. For a color version of this figure, see www.iste.co.uk/gayard/darknet.zip

Figure 4.4. The operating principle of Pretty Good Privacy

Figure 4.5. Growth in the number of Tor users between April 2017 and June 2017

5 From Sneaker Nets

1

to Darknets

Figure 5.1. Napster software in 1999

Figure 5.2. Shawn Fanning (left) and Sean Parker (right), co-founders of Napster (Photo Wikipedia)

Figure 5.3. In order, the logos of eDonkey, eMule, Gnutella and Soulseek. For a color version of this figure, see www.iste.co.uk/gayard/darknet.zip

Figure 5.4. Kazaa customer exchange window

Figure 5.5. The principle of hash function in pictures (source: Wikipedia). For a color version of this figure, see www.iste.co.uk/gayard/darknet.zip

Figure 5.6. The working principle of the BitTorrent protocol (BitTorrent.org). For a color version of this figure, see www.iste.co.uk/gayard/darknet.zip

Figure 5.7. The Pirate Bay homepage

Figure 5.8. Cover of the May/June 1993 edition of Wired. The three masked figures are Eric Hughes, John Gilmore and Tim May

Figure 5.9. Cult of the Dead Cow homepage

Figure 5.10. The Peekabooty Beta version interface shows a user (center) connected to a normal user, a second one behind a Firewall (with tape on its mouth) and a third one using NAT (Network Address Translation) protocol that allows it to bypass blocking attempts

Figure 5.11. Freenet’s interface

Figure 5.12. Retroshare download interface (01. net)

Figure 5.13. Twitter account of the Retroshare team

Figure 5.14. Zeronet homepage

Figure 5.15. I2P

Figure 5.16. Tunnel principle in I2P. For a color version of this figure, see www.iste.co.uk/gayard/darknet.zip

Figure 5.17. Digital Gangster homepage

Figure 5.18. Hidden Wiki type address directory screenshot

Figure 5.19. Alice, a Tor user, gets a list of hidden services through an address directory. She can connect to a node/relay to contact one of these hidden services (Torproject.org)

Figure 5.20. Alice chooses a random relay to connect to a hidden service. The green indicates encrypted links and the red indicates the clear ones. For a color version of this figure, see www.iste.co.uk/gayard/darknet.zip

Figure 5.21. If Alice visits another site or connects to the same site after 10 minutes, a new circuit with new relays will have been established. For a color version of this figure, see www.iste.co.uk/gayard/darknet.zip

Figure 5.22. There is a Facebook on the Tor network, officially managed by Mark Zuckerberg’s company

Figure 5.23. Facebook address on Tor (facebook.com)

Figure 5.24. The Hidden Wiki via Tor2Web

Figure 5.25. Aaron Swartz and Virgil Griffith (Wikimedia common photos)

Figure 5.26. Using Tor2Web

Figure 5.27. The Onion Cab search engine homepage

Figure 5.28. Onion City, having become Onion Link

Figure 5.29. Attempted access to the WikiLeaks form (Tor service) document deposit using Onion Link

6 Geopolitics and Cybersecurity

Figure 6.1. Examples of services offered on .onion sites

Figure 6.2. Sites selling narcotic products

Figure 6.3. Anti-pedopornographic site on Tor

Figure 6.4. Alpha7 and Democracy now!, two political Websites (that are pro-Trump) on Tor

Figure 6.5. Twitter on Tor

Guide

Cover

Table of Contents

Begin Reading

Pages

C1

iii

iv

v

ix

x

xi

xiii

xiv

xv

xvi

xvii

1

3

4

5

6

7

8

9

10

11

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

45

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

141

142

143

145

147

148

149

150

151

153

154

155

157

158

159

160

161

163

164

165

166

167

168

169

170

G1

G2

G3

G4

G5

G6

G7

G8

e1

Computing and Connected Society Set

coordinated by

Dominique Carré and Geneviève Vidal

Volume 2

Darknet

Geopolitics and Uses

Laurent Gayard

First published 2018 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.

Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:

ISTE Ltd

27-37 St George’s Road

London SW19 4EU

UK

www.iste.co.uk

John Wiley & Sons, Inc.

111 River Street

Hoboken, NJ 07030

USA

www.wiley.com

© ISTE Ltd 2018

The rights of Laurent Gayard to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988.

Library of Congress Control Number: 2018932685

British Library Cataloguing-in-Publication Data

A CIP record for this book is available from the British Library

ISBN 978-1-78630-202-1

Preface

“According to Stanford1, by 2030, we will have 130 billion objects connected to the Internet. Even our hands and our hearts no doubt, everything will be connected. What is the governance framework? What public policy will regulate this?”2 Fadi Chehadé, director of ICANN’s 55th Congress, summed up some of the issues raised in this book, by asking these questions during the “high-level government meeting” of several government officials. The statement from the president of the powerful Internet Corporation for Assigned Names and Numbers recalls the importance of the ongoing global negotiations between governments, intergovernmental organizations and international institutions on the issue of Internet governance. Since its inception in 1998, ICANN has assumed the essential and strategic role of managing domain names and electronic addressing on the Internet and is a private law organization. However, it is subject to the courts and the U. S. Chamber of Commerce and is therefore dependent on the U.S. government. In 2014, the United States agreed to initiate a transition process paving the way for the internationalization of ICANN and thus, in part, Internet governance. Internationalization or privatization? The future of the Internet depends on resolving this issue, which remains a source of conflict in the current state of negotiations. These discussions between States, private stakeholders, user communities and international organizations, about the evolution of international jurisdiction that frames the development of the global network, reveal how Internet governance is a major geopolitical issue. While these negotiations were taking place at the highest level, the scale of cyber-attacks that hit hundreds of countries and institutions around the world in May and June 2017, and an even higher number in private institutions, suddenly brought a new type of conflict and criminal activity to the front lines, using cyberspace as its setting. Parallel to the debate on the future status of ICANN, the Darknet phenomenon, which encompasses all encrypted, private and alternative networks on the Internet, alternatively raises the issue of network governance and control through the prism of cybersecurity and the preservation of anonymity and freedom of Internet users, another debate, no less essential, which has become even more acute since Edward Snowden’s revelations. Because darknets – it is more accurate to speak of “hidden networks” in the plural – participate in an anarchic development of the global network, which is largely beyond the control of states and ICANN, and also because the tools of future wars and computer attacks are exchanged at the heart of these new virtual territories, this book will be devoted to the history and geopolitics of the darknet. Therefore, it will be necessary to start by defining the terms used, starting with darknet and darknets, a plural term to designate various private or encrypted networks, such as Tor (The Onion Router), I2P or Freenet, and a singular term to encompass the whole phenomenon of the “hidden Internet”. The shift from plural to singular in itself sums up some 15 years of evolution and the transition from the first peer-to-peer (P2P) to the genuine nebula of parallel networks, an evolution that will be discussed at length in this book. An attempt will therefore be made here to differentiate the different spaces that constitute the “network of networks” today (“surface web”, “deep web” and “hidden networks”), to explain some essential notions such as network neutrality and to highlight the role of Internet governance operators, such as ICANN. We will then discuss the genealogy of the phenomenon of darknets, which has been placed in the history of the Internet and the transformations of cyberspace. We will try to analyze which cultures are linked to the constitution of the communities and spaces that make up these new virtual territories and lastly, the security, geopolitical and economic implications of this new (r)evolution of the digital universe that we have taken the liberty of calling “Internet 3.0”3. We hope that this book will at least partially enlighten the reader on the essential issues of the transformation of the communication society that could change digital usage, public policy and, of course, our daily life in the near future.

Laurent GAYARD

February 2018

1

Stanford University. Private American University, located in the heart of Silicon Valley, south of San Francisco. In 1968, Stanford University was linked to the University of Los Angeles (UCLA) and the University of Utah through the first offshore computer network that took the name ARPANET and foreshadowed the creation of the Internet.

2

Fadi Chehadé, Director of the

Internet Corporation for Assigned Names and Numbers

(ICANN). 55th ICANN Congress, Marrakech, March 7, 2016.

3

By clearly distinguishing this expression from “Web 3.0” that implies the “Internet of Things”.

Introduction

On October 17, 2011, the Anonymous group launched a “darknet operation”, revealing the existence of some forty pedophile sites hosted on the Tor network1. The accounts of 1,626 users of these sites were put online and the operation led to the closure of the targeted sites, but the authorities were concerned about the ability of groups such as Anonymous to seriously interfere with ongoing police operations in this type of case. The case also helped to accredit and popularize the idea that there would be a “deep Internet”, providing safe haven for activities under the guise of a vast virtual lawless zone. A year and a half later in August 2013, the FBI’s dismantling of a vast network of child pornography on the Tor network, followed by the arrest of Ross Ulbricht in October of the same year, accused of administering Silk Road, an online drug dealing site, helped fuel the dark legend. The darknet has therefore crossed the threshold of confidentiality and moved from a rumor to a social phenomenon, to the point of capturing French Interior Minister Bernard Cazeneuve’s attention, who in March 2016, did not hesitate to assert in a political context, marked by a wave of murderous attacks and a state of emergency: “Those who hit us use the darknet and encrypted messaging”, he said. A phenomenon known very little of until then, the existence of hidden networks such as Tor, the “onion router”2, reached a little media fame at the time.

In 2016, Sir David Omand, former director of GCHQ3, noted in the pages of the World Policy Journal [OMA 16] that: “The so-called darknet is where most of the online criminal activity takes place, largely beyond the reach of law enforcement. On the darknet, anonymity is the rule, and the identity and location of the participants can be concealed from even the most persistent gaze of police and intelligence agencies”. While using the singular term, David Omand nevertheless took care to restore the term darknet to its multiple singularity, which refers to a disparate aggregate of virtual places, since there are actually as many darknets as there are encrypted and private networks. “The darknet is a collection of networks and technologies used to share digital content”, explained Peter Biddle, Paul England, Marcus Peinado and Bryan Willman in 2003, typically considered to be the first individuals to use the term in an article published in 2003. The darknet is not a physically separate network, but applications and a layer of protocols superimposed on existing networks. The four authors included P2P networks, key-protected exchange systems and even electronic messaging, private forums and newsgroups4 in the denomination of darknets, the term already pluralized. As early as 2003, the four researchers predicted the irremediable expansion of this phenomenon [BID 03]: “We expect that the effectiveness of the darknet as a distribution mechanism will run into some obstacles in the short term, but ultimately, the genius of the darknet will be indelible”.

In 2003, Biddle, England, Peinado and Willman combined the idea of the darknet exclusively with illegal distribution networks for licensed content. The problem that arose at that time, synthesized in the study of the four engineers, was still limited to illegal downloading and the threat posed by this growing phenomenon to the cultural industry. But if the origin of the darknet concept can be linked to the development of illegal download networks, the term also refers to a specific culture linked to technological developments marking the turn of the 20th and 21st century. On February 8, 1996, U.S. President Bill Clinton signed the Telecommunications Act, accompanied by the Communications Decency Act. This initiative represented a historic step in the process of liberalizing telecommunications and online services such as the Internet. The Telecommunications Act replaced the old Communications Act of 1934, attempting to take into account the radical changes in American society during the 1960s, 1970s and 1980s. The main idea of the legislation was to foster the development of competition in the telecommunications sector and to facilitate the entry of large private groups into a sector originally dominated by the American Telephone & Telegraph Corporation. Initially intended to promote the opening up of the telecommunications market to multiple groups, the Telecommunications Act actually led to the creation of new telecommunication giants and the disappearance of a large number of minor operators in this sector. Many observers accused the Telecommunications Act of having paved the way for the complete domination of the mass media. In this case, the new legislation allowed a few major operators to take over the market of internet access providers, such as UUNet (now Verizon), Sprint Corporation, Level 3 Communication (acquired on October 31, 2016 by Centurylink), Comcast and AT&T. In the aftermath of Bill Clinton’s announcement that he had signed the Telecommunications Act, John Perry Barlow, co-founder of the Electronic Frontier Foundation5, drafted a “Declaration of Independence of Cyberspace”6, in which he stated that no government, corporation or institution should impose its authority or claim on any property rights over the Internet. In particular, the declaration, which was addressed to governments and leaders of major economic consortia, proclaimed: “You are not welcome here. You have no sovereignty where we meet. We form our own social contract”. The “cyber-revolutionary” rhetoric, such as that of John Perry Barlow, may seem quite fanciful today. However, it still applies today, through multiple small groups, individual operators, sites and discussion forums, fervently defending the idea of a “Freenet” instead of a darknet, in order to reintroduce the name given to the social network created in 2010: an anonymous and free Internet 3.0, on which the user always remains “in control”.

However, 20 years after the publication of the “Declaration of Independence of Cyberspace”, times have changed, as has the Internet. According to figures from the Data Observatory7, the global volume of online databases has reached 4.4 zettabytes8. The International Data Center9 predicts that this global volume will increase 10-fold by 2020 to 44 zettabytes10. The exponential rate of development of the Internet today makes any calculation partially obsolete: some authors state a trillion pages have been created, that is to say a thousand billion, etc. [PIS 08, p. 188]. This exponential growth interests public and private companies, anxious to take advantage of the economic opportunities offered by the “deep web” and “Big Data”. It also opens up new opportunities for all those who intend to benefit from the growth of the global network, which increasingly calls into question the ability of state structures to effectively monitor the multiple networks that make up the Internet today. This desire to escape the control of institutions responds to economic and ideological motivations and is in line with the promises, sometimes illusory, of a globalized system that makes all forms of borders, barriers and regulations obsolete.

The recent development of darknets, which are no longer just networks of exchange, but real layers of alternative networks superimposed on the global network, contains all the questions raised by the exponential growth of intangible flows, the modification of digital usage and the questioning of the regulatory status of States. The latter, as well as the security and intelligence agencies that depend on them, are now becoming aware of the danger attached to the idea of virtual lawless zones that are somewhat or totally beyond their control. All of them are therefore stepping up their efforts to develop credible and effective policies in the field of cybersecurity. The resurgence of terrorism, but also other illegal activities such as trafficking in drugs, weapons and human beings, which are using new technologies in order to develop, is giving rise to policies for the security and surveillance of cyberspace. In turn, they are severely criticized and questioned by some sections of civil society who, on the contrary, highlight the usefulness of these spaces where anonymity is relatively preserved for journalists or dissidents threatened by authoritarian regimes, thus allowing the free flow of information and freedom of expression. However, States are also using the capabilities offered by darknets to create a new form of interstate or asymmetrical conflict for themselves, that is now taking place in virtual space, but has very severe consequences in the form of cyber-attacks, such as the large-scale one that took place in Estonia in 2007, inaugurating the entry into a new dimension of modern warfare. While, according to journalist Duncan Campbell [CAM 07], States have been losing the battle of cryptography to prevent the spread of advanced encryption techniques in civil society since the 1990s, it seems that Tor-like encrypted networks now offer capabilities to resist cyber-attacks and are also of interest to States and companies wishing to better protect their online databases.

The author of this book does not intend to propose a detailed technical approach of the different protocols and applications related to darknet here [REN 16]. It is not a computer manual either. The objective here is to deliver the keys to understanding a rapidly expanding phenomenon by defining the notions of the darknet, dark web and deep web by paying attention to the intellectual and ideological production that has accompanied and still accompanies the rise of alternative networks, in addition to examining the economic, security and geopolitical issues that are linked to the darknet (or deep web). Particularly, we will try to show that the clash between these different issues and between the diverging interests of users, institutions and economic operators always refers to the question of Internet governance modes. The darknets are on the threshold of a much more important era of development and make these questions crucial today because, as Peter Biddle, Paul England, Marcus Peinado and Bryan Willman asserted in 2003, “the genius of the darknet is indelible”.

1

http://www.humanite.fr/medias/un-reseau-de-plus-de-1500-%C2%AB-pedophiles-%C2%BB-demantele-par-anonymous-482267

.

2

Attributing to sites and users connected to the Tor network addresses in “.onion” instead of the classic “.com” or “.fr”.

3

Government Communications Headquarters

(GCHQ).

4

The Network News Transfer Protocol

(NNTP) is a network protocol designated by URLs beginning with news: //. For example, the Usenet network system, invented in 1979, is organized around the principle of newsgroups, which are hierarchical according to different themes, to which a user can subscribe according to their preferences. Newsgroups allow the exchange of articles and even image, audio or video files in some cases.

5

Founded in 1990 in the United States by Mitch Kapor, John Gilmore and John Perry Barlow, the Electronic Frontier Foundation’s main objective is to defend freedom of expression on the Internet.

6

See the text in Appendix 1.

7

Data Observatory, July 2014, IDC study for EMC-Digital Universe.

8

1 zettabyte = 1,000 exabytes, that is to say 1,021 bytes, the basic unit measuring the volumes of digital information. By way of comparison, 1 zettabyte corresponds to 152 million years of viewing standard VHS cassettes.

9

In 1976, a group of scientists founded the GSE (Group of Scientific Experts) in Geneva at the end of the Geneva Conference on Disarmament in order to study technological developments. Between 1984 and 1995, a series of experiments on improving data collection were carried out jointly by American, Russian and Swedish scientists. In 1996, after the creation of the Comprehensive Nuclear-Test-Ban Organization (CBTO), the International Data Center was transferred from Arlington, Virginia, to Vienna, Austria, to officially become the IDC. Since then, this international organization has generated independent studies and data analysis in a wide range of fields.

10

According to linguist Mark Liberman, this is the equivalent of all the words and languages spoken on the planet.

PART 1New Frontiers and Governance of Digital Space

1Fragmentation and Compartmentalization of Virtual Space

1.1. The nymph Carna and Internet census

One day, a computer scientist wondered how many Internet users could navigate this immense digital map, which is today’s global network. Therefore, he created a small and perfectly harmless spy program named Carna Botnet, in honor of the nymph Carna, who became goddess of the cardo, the “hinge” or “axis”, that is to say, the divinity of the gates in Roman rites, a charge that she inherited from the god Janus, who had taken her virginity in exchange.

“The first day [of June] is consecrated to you, Carna, goddess of the hinges. She opens that which is closed, she closes that which is open; these are the attributes of her divinity”1.

While Janus, honored on January 1, opens the first part of the year, Carna is celebrated on June 1, opening the second half of the year. The anonymous creator of Carna Botnet intimately knew her Latin letters. Carna is indeed a multifaceted goddess. If she was to be given tribute and sacrifice in June, the month in which the days were the longest, it was from her reign of the calendar that the period of the year begins, in which days begin to shorten until the end of summer and slowly turn into winter. The goddess of light, Carna is therefore also a goddess of darkness and concealment, or even a goddess of the underworld, with whom she is associated. This second attribute also makes her worth being considered as the goddess of organs and internal functioning of the human body, the “goddess of the human body viscera”, so says the Latin author Macrobe2.

From May to October 2012, the small program named after the goddess of entrails attempted to list all objects connected to the Internet with an IPv43 address. Out of a total of 4.3 billion IPv4 addresses available, Carna Botnet counted 1.3 billion active addresses in October 2012; 729 million occupied domains and 141 million addresses protected behind a firewall. In a previous “large Internet census” in 2006, 187 million visible users were counted. The latest estimates4 put the total number of this era of smartphone users at just under four billion. Nevertheless, from his large “2012 Internet census”, Carna Botnet’s creator drew the conclusion that the development of IPv65 addresses might make any further census attempts in the future impossible. Five years on, in 2017, the growth of the connected objects industry and the ever-increasing number of users proved it right: it is impossible to know exactly how many users, devices, objects or servers are connected to the Internet today. Estimates and statistics continue to be produced, but remain doomed to be approximated.

It is therefore probably impossible to establish a precise geography of the global network today, and this can only be celebrated if we consider that the Internet must remain a virtual space in which privacy, anonymity and user freedom must be preserved. This libertarian concept contrasts with that of states and governments, striving to know and monitor cyberspace zones entrenched behind the barriers of encryption, or even more simply, lost in the ocean of data accumulated since the creation and privatization of the Internet. States are not alone in wanting to know about this new terra incognita of the digital universe, as private and public sector economic operators are also looking for ways to take advantage of them. In the face of various attempts at state regulation and commercial penetration of the “hidden Internet”, communities and individuals are now trying to hide behind the supposed sanctity of encryption keys that allow, as way of an example, two million users to surf the Internet anonymously using the Tor browser (The Onion Router), in the name of protecting privacy and freedoms, and sometimes for less admirable reasons.

The very provocative “Declaration of the Independence of Cyberspace”6, issued in 1996 by John Perry Barlow, particularly resonates today. In Barlow’s days, it was a protest against the Telecommunications Act that, according to the author of the “Declaration of Independence”, supplied this virtual space of freedom (that is the Internet) to commercial appetites and the regulatory fury of companies and governments. But in 1996, the Internet was still in its infancy. Twenty years later, in 2017, we are not far off from considering that Barlow’s wish came true. Cyberspace has somehow found its independence through its own extension and the phenomenon of encrypted networks. According to Campbell [CAM 07], author of a report for the European Parliament in 1997, the battle of cryptography was already lost by governments at the dawn of the 21st Century, which leaves room for the expansion of private networks and thus offers the prospect of a World Wide Web that is very difficult to control, a virtual territory largely beyond the reach of legislation; a gray zone between public and private space. The exponential growth of the global network, a vast web of networks and subnetworks numbering in the tens of thousands, in itself guarantees the relative powerlessness of States – which never had the extensive monitoring capabilities that they do today – from controlling Internet traffic. The mass of data represented by the circulation of these immaterial flows is impossible to process. Today, the Internet is simply too vast to be submitted in its entirety to the authority of regulatory bodies, or even to be comprehensively understood and apprehended.

1.2. Dimensions of cyberspace

There is a need for early comprehension on some definitions. The Internet is a global computer network composed of millions of public and private networks, made up of a set of sites, pages and databases accessible via the World Wide Web, invented in the early 1990s by CERN7 computer scientists Tim Berners-Lee and Robert Cailliau. The World Wide Web is