Dark Web Insight
dark web

History of the Dark Web: From Naval Lab to Now

The dark web's origins trace to a 1990s U.S. Navy research project. This guide covers the full history from onion routing to Silk Road and modern enforcement.

By Dark Web Insight Research Desk6 min readUpdated

The dark web's origins are not criminal — they are military. The anonymity network that powers it was designed by U.S. Navy researchers in the mid-1990s to protect intelligence communications, not to sell drugs or enable fraud. The story of how that infrastructure evolved into what it is today is a useful corrective to most media coverage — and it's more interesting than the headlines suggest.

1990s: Onion Routing and the Naval Research Laboratory

The foundational concept behind the dark web is onion routing — a technique for anonymizing internet traffic by wrapping data in multiple layers of encryption and routing it through a series of relays, each of which peels away one layer before passing the traffic onward.

Three U.S. Naval Research Laboratory researchers developed the technique: Paul Syverson, Michael Reed, and David Goldschlag. Their first public paper on onion routing was published in 1996. The goal was narrow and specific: protect intelligence communications from traffic analysis. DARPA provided funding. The Naval Research Laboratory filed the core patents.

The technique worked by ensuring no single relay knew both the source and the destination of traffic — only its immediate predecessor and successor in the chain. For intelligence purposes, this was useful. It would later become useful for a much wider audience.

For a deeper look at how this works technically, see how onion routing works.

2002: The Tor Project Is Born

The first public alpha of Tor (The Onion Router) was released in 2002. The Tor Project was incorporated as a U.S. nonprofit in 2006, but the software's public development began earlier. The Electronic Frontier Foundation (EFF) began funding Tor in 2004, a decision it documented publicly.

Open-sourcing the network was a deliberate strategic choice. If only government agents used the anonymity network, traffic patterns would quickly reveal them — everyone on the network would be a government actor. Adding civilian and commercial users created the privacy cover that made the network useful in the first place.

That logic is still operative today. The EFF and the Tor Project both maintain that the value of anonymity tools depends on their adoption by a broad, diverse user base, not just high-risk users.

2004–2010: Early Adoption — Dissidents and Researchers

Through the mid-2000s, Tor was primarily used by privacy researchers, security professionals, and political activists in countries with repressive governments. Freenet, an earlier anonymous file-sharing network launched in 2000, and I2P (Invisible Internet Project), launched in 2003, provided parallel infrastructure for similar use cases.

Organizations including Freedom House, the Committee to Protect Journalists (CPJ), and Reporters Without Borders began recommending Tor to journalists and activists operating in Iran, China, and Belarus. The CPJ's digital safety resources still include Tor guidance as of 2024.

What the dark web is today is partly a product of these early adoption patterns — the network grew around legitimate use cases before criminal markets arrived.

2011: Silk Road Changes Everything

In January 2011, Ross Ulbricht — operating under the pseudonym "Dread Pirate Roberts" — launched Silk Road, a Tor-based marketplace for drugs and other contraband transacted with Bitcoin. It was not the first dark web market, but it was the first to reach scale.

By the time the FBI seized Silk Road in October 2013, the platform had processed an estimated $1.2 billion in transactions. Ulbricht was arrested in a San Francisco public library, identified through a combination of forum posts, an IP address leak from an early version of the site, and old email accounts.

Silk Road established the blueprint for darknet markets: pseudonymous vendor accounts, buyer reviews, escrow payments, and Bitcoin. It also demonstrated that these markets could be dismantled — and that mistakes outside Tor itself were usually what exposed operators.

2013–2017: The Takedown Era Begins

The FBI's seizure of Silk Road in October 2013 did not end dark web markets — it multiplied them. Silk Road 2.0 launched weeks after the original's closure and was itself seized in November 2014 as part of Operation Onymous, a joint FBI-Europol operation that took down 17 dark web services simultaneously.

AlphaBay, which had grown into the largest dark web market in existence by 2017, was dismantled in Operation Bayonet in July 2017 — a coordinated takedown involving the FBI, DEA, and Dutch authorities. The site's administrator, Alexandre Cazes, was arrested in Thailand and died in custody shortly after.

These law enforcement takedowns established a pattern: large markets attract attention, administrator mistakes create vulnerabilities, and multinational law-enforcement cooperation has become significantly more coordinated since 2013.

2018–2022: The Ecosystem Matures — and Gets Policed

The period from 2018 to 2022 saw both the maturation of dark web markets and aggressive international enforcement action. Dream Market, once one of the most active markets, closed in April 2019 — citing technical issues, though many observers suspected law enforcement pressure.

Empire Market executed an exit scam in August 2020, disappearing with an estimated $30 million in user escrow funds. Exit scams — in which market administrators abscond with funds — became increasingly common as markets scaled.

The Hydra Market seizure in April 2022 was among the most significant enforcement actions of the period. German federal police (BKA) coordinated with the U.S. Department of Justice to seize Hydra's servers and $25 million in Bitcoin. Hydra had been the dominant Russian-language dark web market, with an estimated $1.3 billion in 2020 revenue.

The pattern that emerges across this history: no large market has proven permanent. The Silk Road model persists, but the specific platforms operating it keep changing.

Frequently Asked Questions

Who invented the dark web?

The underlying infrastructure — onion routing — was invented by Paul Syverson, Michael Reed, and David Goldschlag at the U.S. Naval Research Laboratory in the mid-1990s. The Tor Project, which built the open network most people associate with the dark web, was launched in 2002.

When was the dark web created?

The concept of the dark web as an accessible network dates to the Tor Project's 2002 alpha release. The infrastructure behind it (onion routing) was developed starting in 1995–1996. Silk Road's 2011 launch is often cited as the point at which the dark web became widely known to the public.

What was the first dark web marketplace?

Silk Road, launched in January 2011 by Ross Ulbricht, is generally considered the first large-scale dark web marketplace. Earlier anonymous networks like Freenet hosted file-sharing, but Silk Road introduced the market model that subsequent platforms copied.

How did law enforcement start policing the dark web?

The FBI's October 2013 takedown of Silk Road marked the beginning of organized law enforcement operations against dark web markets. Since then, Europol, the DEA, BKA, and other agencies have developed joint operational frameworks. On-chain cryptocurrency analysis (by firms like Chainalysis) and traditional investigation techniques — following financial flows, monitoring forums — have become the primary tools.