Dark Web. Ronald Bishof, MS Cybersecurity. This Photo by Unknown Author is licensed under CC BY-SA

Similar documents
A to Z of the Darknet

The Deep Web Nicholas A. Davis, CISA, CISSP November 30, 2018

The Battle Against Anonymous Browsing: The Security Challenges Presented by Tor

IP address. When you connect to another computer you send it your IP address.

Circumvention technology and its applications


Search engines darknet

CS Paul Krzyzanowski

Darknet an where it is taking the law

UNDERNEATH THE TIP OF THE ICEBERG: THE DEEP WEB

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

Tor. Tor Anonymity Network. Tor Basics. Tor Basics. Free software that helps people surf on the Web anonymously and dodge censorship.

Dark Web and Silk Road

Queen s Global Markets A PREMIER UNDERGRADUATE THINK-TANK. Economics of the Dark Web The Lesser of Two Evils?

The Activist Guide to Secure Communication on the Internet. Introduction

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party

Carding Forum Carding Credit Cards Cardmafia

Networks and the Internet A Primer for Prosecutors and Investigators

Content Analysis of Dark Net Academic Journals from Using KH Coder

Internet Crimes Against Children:

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

Anonymity vs. Privacy

Cybercrime what is the hidden nature of digital criminal activities nowadays?

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

Tor And The Dark Art Of Anonymity Deep Web Kali Linux Hacking Bitcoins Defeat Nsa Spying

Networks and the Internet A Primer for Prosecutors and Investigators

The Center for Affiliated Learning ( the CAL ) Privacy Policy

Online Brand Enforcement Protecting Your Trademarks in the Electronic Environment. The Deep Web, darknets, Bitcoin and brand protection

I. INFORMATION WE COLLECT

FBI Tor Overview. Andrew Lewman January 17, 2012

Online Anonymity & Privacy. Andrew Lewman The Tor Project

Anonymous Communications

On page 4, we highlight the features and fixes to be released in this month s patch Tuesday for Network Box 5.

EnviroIssues Privacy Policy Effective Date:

Anonymity. Assumption: If we know IP address, we know identity

You are the internet

Chapter 6 Network and Internet Security and Privacy

INTO THE WEB OF PROFIT: TRACKING THE PROCEEDS OF CYBERCRIME

Outside the Box: Networks and The Internet

Website Privacy Policy

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

DROPBOX.COM - PRIVACY POLICY

PROTECTING YOUR BUSINESS ASSETS

Tor Networking Vulnerabilities and Breaches. Niketan Patel

Anonymity With Tor. The Onion Router. July 21, Technische Universität München

DARKNET MODULE SUMMARY

We offer background check and identity verification services to employers, businesses, and individuals. For example, we provide:

We collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V.

Committee: Security Council Topic: The question of targeting cybercrime and the dark web.

Privacy defense on the Internet. Csaba Kiraly

NYSVMS WEBSITE PRIVACY POLICY

NAVY Research Group Department of Computer Science Faculty of Electrical Engineering and Computer Science VŠB-TUO

Cryptocurrencies for Investigators

Tor, a quick overview

UNIQUE IAS ACADEMY-COMPUTER QUIZ-15

WEBSITES PUBLISHING. Website is published by uploading files on the remote server which is provided by the hosting company.

Dark Web Investigation Setup Guide.

The Dark Web. Steven M. Bellovin February 27,

CNT Computer and Network Security: Privacy/Anonymity

Steven D Alfonso Financial Crimes Intelligence Specialist IBM RedCell

Gathering Open Source Intelligence Anonymously Ntrepid Corporation. All rights reserved. PROPRIETARY

Understanding the Topological Structure and Semantic Content of Darknet Communities

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

Introduction to Tor. January 20, Secure Web Browsing and Anonymity. Tor Mumbai Meetup, Sukhbir Singh

THE DARK WEB AND HOW IT AFFECTS YOUR INDUSTRY

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science

Kaspersky For Business. The Dark Web: Myths, Mysteries and Misconceptions

Chapter 002 The Internet, the Web, and Electronic Commerce

Case 1:14-cr KBF Document 57 Filed 09/05/14 Page 1 of 10 : : : : : : : : : DECLARATION OF CHRISTOPHER TARBELL

Web Services Privacy Policy. What the Privacy Policy does. What the Privacy Policy does not do

What is MyPalomarHealth and how will it benefit my health care? How do I access my health information on MyPalomarHealth?

Protocols for Anonymous Communication

FAQ: Crawling, indexing & ranking(google Webmaster Help)

Anonymity Tor Overview

Types of information we collect and how we collect it

Chapter 10: Security and Ethical Challenges of E-Business

T o r o n i b o a r d s c

Spree Privacy Policy

BBC Tor Overview. Andrew Lewman March 7, Andrew Lewman () BBC Tor Overview March 7, / 1

A SIMPLE INTRODUCTION TO TOR

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

DFRI, Swedish Internet Forum 2012

FACTFILE: GCE DIGITAL TECHNOLOGY

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer

Anonymous communications: Crowds and Tor

Contents. Management. Client. Choosing One 1/20/17

Privacy Policy. Optimizely, Inc. 1. Information We Collect

WYNN SOCIAL CASINO PRIVACY POLICY

USE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY

ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES

Websites like pinkmeth

Tor: Online anonymity, privacy, and security.

Deanonymizing Tor. Colorado Research Institute for Security and Privacy. University of Denver

PRIVACY POLICY CHILDREN S PRIVACY

PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement

CHANGES TO THIS POLICY

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

WHAT IS MALICIOUS AUTOMATION? Definition and detection of a new pervasive online attack

Transcription:

Dark Web Ronald Bishof, MS Cybersecurity This Photo by Unknown Author is licensed under CC BY-SA

Surface, Deep Web and Dark Web Differences of the Surface Web, Deep Web and Dark Web Surface Web - Web crawler Deep Web Dark Web - TOR

Surface, Deep Web and Dark Web How the Dark Web was established Who uses the Dark Web What the Dark Web is used for

Three Primary Levels of the Internet Surface Web Deep Web Dark Web

Surface Web A simple definition of the surface web is information which is found on a popular web browser is considered to be surface internet. Google Bing Firefox etc.

Modern Internet Most effective source of information. Most popular search engine: Google In 2008, Google added a trillion web links to their index database. Today, more than 130 trillion new pages!

Google Web crawlers used to organize information from webpages and other publicly available content in the Search index. Google's index represents only an estimated 4 percent of the information that exists on the Internet.

Web Crawler Web crawler (spider) crawls the web to find new documents (web pages, documents). This typically done by following hyperlinks from websites.

Blocking Web Crawlers Include a noindex meta tag in the page's HTML code. In the <head> tag: <meta name="robots" content="noindex"> To prevent only Google web crawlers from indexing a page: <meta name="googlebot" content="noindex">

Only 4 Percent? Where is the rest of the information? Deep Web Part of the World Wide Web whose contents are not indexed by standard web search engines for any reason. Also called invisible or hidden web

Measuring the Deep Web

DEEP WEB Most of the Web's information is buried far down on dynamically generated sites. Traditional web crawler cannot reach. Large portion of data literally un-explored Need for more specific information stored in databases Can only be obtained if we have access to the database containing the information.

Deep Web Most of the deep web contains nothing sinister whatsoever. Large databases, libraries, and members-only websites that are not available to the general public. Academic resources maintained by universities. Banking Information Medical Records When one uses a User Name and Password to view information not

What Deep Web is made up of: Dynamic Web Pages returned in response to a submitted query or accessed only through a form Unlinked Contents Private Web sites requiring registration and login (password-protected resources) Sites with no noindex directives or cache control http headers (<meta name="robots" content="noindex">) Non HTML contents Multimedia Files Database Records

DARK WEB One way to access the dark web is using TOR The Onion Router (TOR) Onion Network TOR keeps all users anonymous it is also believed that the NSA cannot break the TOR encryption

Who established the TOR browser The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval Research Laboratory. The purpose of TOR is to give the U.S. Intelligence a different way to communications online.

Who is allowed to use TOR Anyone it is a browser that can be download by anyone on the internet. Cost Free free to download the browser and use the Onion Network Anyone in the world is allowed to use the Browser

Good Side of TOR Dark Web Government Agencies Law Enforcement FBI and CIA undercover agents State Department SD encourages individuals in foreign and third world countries to use TOR so individuals can freely use the internet in countries where the government heavily monitors the networks. Anyone who wants to stay anonymous

Dark Side of TOR Dark Web Terrorists communicate to each other recruit prospects plan terrorist operations Criminals buying and selling drugs human trafficking prostitution buying and selling of weapons Pedophile material If you can think of it it is being sold on the TOR

HOW A NORMAL MESSAGE IS SENT WHEN AN EMAIL IS SENT IT HAS ONE LAYER OF INSTRUCTION. THE MESSAGE WILL CONTAIN A SENDER IP ADDRESS AND RECEIVERS IP ADDRESS. IN A NORMAL EMAIL MESSAGE BEING SENT, IT IS EASY TO IDENTIFY THE SENDER AND RECEIVER OF ANY MESSAGE.

How a normal message is sent This Photo by Unknown Author is licensed under CC BY-SA

TOR How it works 0 TOR (The Onion Router) is a net browser with built in encryption. The browser has a built in proxy server which hides the senders IP address and the receivers IP address 0 How TOR works - When a message is sent the TOR browser decides a random message path with nodes (or other computers) logged into the network will be involved in delivering the message. TOR puts a layer of encryption providing an email information about the sender and the receiver. When the email is sent from the original sender it may have 20 to 30 layers of encryption instruction. Once the message is sent

TOR How it works 0 and reaches the first destination of the message. The TOR browser peels off the first layer of encryption (which has the sender and receiving computers information) and then the second layer is examined and sent accordingly. 0 The layers of the encryption is the reason for the name The Onion Router has layers similar to an Onion. 0 The very last node to the receiving computer the message is in clear text. 0 It is difficult to track the email message from the original sender to the true recipient of the message.

This Photo by Unknown Author is licensed under CC BY-SA

This Photo by Unknown Author is licensed under CC BY-SA-NC

TOR Characteristics Great Encryption Great Privacy Great Latency It takes a long time for a message to be sent from the sender to the receiving host.

TOR

Orbot

Orbot Encrypts your Internet traffic Bounces it through a series of computers around the world Private web surfing with Orfox Private chat

NSA whistleblower Edward Snowden used Tor to leak information the media.

Dark Net Dark Web

Dark Net Like the Regular Deep Web, but harder to get into and more illegal content. Advanced covert government research. Most of the Internet black market (runs on bitcoins) Human/Arms/Drug/Rare Animal Trafficking. Assassination networks, bounty hunters, illegal game hunting, kidnapping More banned obscene content like CP, Gore, etc.

Crime and the Dark Net Human Trafficking Drugs Fire Arms Hitmen Hackers Terrorists Child Pornography Money Laundering Fake Passports, ID s and Stolen Credit Cards

Dark Net The Human Experiment Summoning Demons Cannibal Forums SALT (Hacking) Last Words (Last words of inmates before execution) Aeroplane Crashes (Last words of pilots before crash) Human Leather Guns and Ammo Unfriendlysolution (Hitman service) Stolen Mac Store

This Photo by Unknown Author is licensed under CC BY-ND This Photo by Unknown Author is licensed under CC BY-SA-NC

This Photo by Unknown Author is licensed under CC BY-SA-NC

Blue Sky Online marketplace to buy illicit goods (guns, drugs counterfeits)

Ronald Bishof, MS bishof.r@gmercyu.edu