Recently, a British intelligence official indicated that terrorists and criminals are using Internet-based communications media to plan and implement their activities.
The call for greater encryption of data, under privacy concerns, it would appear, might be playing right into the hands of those bent on illegal, anti-social destructive behaviour.
The digital connectivity that blossomed with the coming of age of the Internet comes with a downside; the hosting of sites that engage in the sale of arms, drugs and pornography.
These sites, in order to avoid detection by the law, utilise the darknet, the purpose of which is to not only hide the communications themselves but also the fact that information is being exchanged.
So what is a darknet? It is essentially a computer network, with restricted access that is mainly used for illegal information-sharing.
It can be part of the Internet address space that has been specially configured so that it is very difficult to trace or discover by the usual means and thus users face little risk of being detected.
Popular darknets include Tor (the so-called onion router), Freenet and I2P.
These networks are usually of a decentralised nature. The information (e-mails, texts, videos etc) is routed through a maze of servers which makes it very difficult to trace its source.
Many a time, these servers are provided by volunteers.
Tor is the product of a US intelligence agency developed for the furthering of its goals. It has been used to provide digital connectivity in countries in which the Internet and Facebook have been banned, restricted or monitored. It is part of the Internet and requires a special browser to access it.
To make it secure from prying eyes, many layers of encryption are included in the network and hence its name; the onion router.
It facilitated private communications in Egypt, which allowed for the organising of the protests that eventually overthrew the Mubarak regime.
Military and law enforcement personnel utilise it. So too journalists who need to satisfy the anonymity requirements of whistleblowers.
Recently, Facebook introduced a facility for users to connect directly to the social network via Tor.
Co-operation between law enforcement agencies and new techniques to track down the physical locations of servers have resulted in significant successes in detecting and closing down sites on the darknet. Three years ago, the Tor darknet was penetrated and some 40 child pornography sites were taken down. Europol recently closed down some 400 sites that were believed to be involved in selling illegal drugs and weapons. Some arrests were also made.
These, however significant, do not represent or signify victory in the war against cybercrime, which is set to become a bit more difficult with the concern for individual privacy. This concern has led tech companies to start utilising even more encryption technologies.
The Internet is thus proving to be a double-edged sword. Its value in education and business is unquestionable. In social media, the jury is out.
It is, however, proving to be a boon to the criminal elements.
The darknet may have provided and indeed may provide communication facilities for people in repressed regimes. But judging from the result of the so-called Arab spring, one may have to rethink the value of this facility.
More importantly, the anonymity provided by it can also provide a secure environment for those intent on mayhem and exploitation.
A balance must be struck, for there is the danger that the bad may outweigh the good.
Somewhere in the discussions, the debate as to whether the professed democratisation of some countries is worth more than the sexual exploitation of children from all countries must take place.