SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
The DarkNet, Investigations & Criminality
Professor John Walker
HEXFORENSICS Ltd
Shelton Street, Covent Garden, London, WC2H 9JQ
The Technology Explosion – the Opportunity
The race to evolve technology has in itself enabled the world to be a smarter place, and manifested in opportunities
for the global community.
It has also enabled the Criminal Community to create a business model that nets billions in illicit revenue.
Add to this the fact that many businesses do not understand the Cyber Threat and you have the Perfect Storm in which
Criminality, Paedophiles, Abusers and their DarkNets may thrive.
Research
According to research &
Europol the principal
search engines index only a
small portion of the
overall web content,
the remaining part is
unknown to the
majority of web users.
I concur..
Why DarkNet?
The DarkNet may actually represent anything its creator withies, for whatever purpose:
• Fun
• International Terrorism
• Criminal Community Support
• Copyright Theft
• Paedophilia and Distribution of Images
• On Line Live Abuse
• Hacking
•
• Anything
What is the DarkNet Made of?
The Construction is down to imagination, ingenuity,
and creativity.
•
Dynamic URL’s
The Challenge – The Truth
Proxy Server are on offer in Russia [and other places] as an intermediate system to acts as a
mediator between a computer and the Internet.
These Proxy Servers are used for various purposes, but their main purpose is to support anonymity.
Anonymity, in this case, comes from the fact that the destination server sees the IP address of the proxy
server and not that of the miscreants system.
The good news is – such services store logs, and do not always provide complete anonymity.
Dynamic Content
Unlinked Content
Private Web
Contextual Web
Scripted Content
Non-HTML/Text Content
The Reality of the Global Threat Landscape
http://hackmageddon.com/2015/04/20/1-15-april-2015-cyber-attacks-timeline/
Here is a list of 49 attacks which took place
Up to and including 14/04/2015!
Evolution - CaaS
TheRealDeal," has opened up for hackers,
which focuses on selling Zero-Day exploits
— infiltration codes that took advantage of
software vulnerabilities for which the
manufacturers have released no official
software patch.
Consider MS15-034 flaw which has left over 70
million sites vulnerable to Cyber Attack.
The Value of HUMINT
No matter the type of event or security incident, HUMINT [Human Intelligence] can be a double edge sword –
• On one hand it can bring high value to the investigation
• On the other – it can represents OoII to Cyber Adversaries
Minority Reporting – The value of TIA
The Cyber Threats-of-the-Age dictate a new way of looking at the unconventional through a new window of defence.
“Digital Forensics has been used in investigations for more than 30 years, however it is now
facing one of its biggest challenges.”
Professor Andy Jones – De Montfort University
This presentation only considered the environmental facets of a DarNet – it did not consider:
• Acquisition of Artifacts
• Reliability of Evidence
• Distance Forensic Protocols
• The Chain-of-Evidence
• Multi Cloud Environment
• Locally Stored Keys
• Admissibility
This is a new age and thus dictates new protocols of engagement .
Thank You for Listening

Mais conteúdo relacionado

Mais procurados

Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Precious ore, precious data
Precious ore, precious dataPrecious ore, precious data
Precious ore, precious dataBrunswick Group
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
ECOWAS Cybersecurity Strategy Workshop
ECOWAS Cybersecurity Strategy WorkshopECOWAS Cybersecurity Strategy Workshop
ECOWAS Cybersecurity Strategy WorkshopAbdul-Hakeem Ajijola
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Chinese social network
Chinese social networkChinese social network
Chinese social networktianc001
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Phil Agcaoili
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 
Potato Pirates: Computer Networking In 2 Hours
Potato Pirates: Computer Networking In 2 HoursPotato Pirates: Computer Networking In 2 Hours
Potato Pirates: Computer Networking In 2 HoursReshveena Kaur
 
CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270Dario
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...PECB
 

Mais procurados (20)

"Hacking"
"Hacking""Hacking"
"Hacking"
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Precious ore, precious data
Precious ore, precious dataPrecious ore, precious data
Precious ore, precious data
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
ECOWAS Cybersecurity Strategy Workshop
ECOWAS Cybersecurity Strategy WorkshopECOWAS Cybersecurity Strategy Workshop
ECOWAS Cybersecurity Strategy Workshop
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Chinese social network
Chinese social networkChinese social network
Chinese social network
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Take Down
Take DownTake Down
Take Down
 
Potato Pirates: Computer Networking In 2 Hours
Potato Pirates: Computer Networking In 2 HoursPotato Pirates: Computer Networking In 2 Hours
Potato Pirates: Computer Networking In 2 Hours
 
CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 

Semelhante a Forensics Expo, London 2015

Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpFabio Ghioni
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
The Importance Of Computer Crimes
The Importance Of Computer CrimesThe Importance Of Computer Crimes
The Importance Of Computer CrimesSandy Simonsen
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling finalMARIUS EUGEN OPRAN
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technologyBinu p jayan
 

Semelhante a Forensics Expo, London 2015 (20)

Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
The Importance Of Computer Crimes
The Importance Of Computer CrimesThe Importance Of Computer Crimes
The Importance Of Computer Crimes
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 

Mais de Prof John Walker FRSA Purveyor Dark Intelligence (12)

Bo e v1.0
Bo e v1.0Bo e v1.0
Bo e v1.0
 
White hat march15 v2.2
White hat march15 v2.2White hat march15 v2.2
White hat march15 v2.2
 
White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2
 
DarkWeb
DarkWebDarkWeb
DarkWeb
 
Wax Switch
Wax SwitchWax Switch
Wax Switch
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
APT Event - New York
APT Event - New YorkAPT Event - New York
APT Event - New York
 
Lipstick on a pig
Lipstick on a pigLipstick on a pig
Lipstick on a pig
 
Info sec 12 v1 2
Info sec 12 v1 2Info sec 12 v1 2
Info sec 12 v1 2
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
Bt tower v1.1
Bt tower v1.1Bt tower v1.1
Bt tower v1.1
 
Ctf110213 public
Ctf110213 publicCtf110213 public
Ctf110213 public
 

Último

Communication Accommodation Theory Kaylyn Benton.pptx
Communication Accommodation Theory Kaylyn Benton.pptxCommunication Accommodation Theory Kaylyn Benton.pptx
Communication Accommodation Theory Kaylyn Benton.pptxkb31670
 
Juan Pablo Sugiura - eCommerce Day Bolivia 2024
Juan Pablo Sugiura - eCommerce Day Bolivia 2024Juan Pablo Sugiura - eCommerce Day Bolivia 2024
Juan Pablo Sugiura - eCommerce Day Bolivia 2024eCommerce Institute
 
The Real Story Of Project Manager/Scrum Master From Where It Came?!
The Real Story Of Project Manager/Scrum Master From Where It Came?!The Real Story Of Project Manager/Scrum Master From Where It Came?!
The Real Story Of Project Manager/Scrum Master From Where It Came?!Loay Mohamed Ibrahim Aly
 
Dynamics of Professional Presentationpdf
Dynamics of Professional PresentationpdfDynamics of Professional Presentationpdf
Dynamics of Professional Presentationpdfravleel42
 
Burning Issue presentation of Zhazgul N. , Cycle 54
Burning Issue presentation of Zhazgul N. , Cycle 54Burning Issue presentation of Zhazgul N. , Cycle 54
Burning Issue presentation of Zhazgul N. , Cycle 54ZhazgulNurdinova
 
Machine learning workshop, CZU Prague 2024
Machine learning workshop, CZU Prague 2024Machine learning workshop, CZU Prague 2024
Machine learning workshop, CZU Prague 2024Gokulks007
 
ISO 25964-1Working Group ISO/TC 46/SC 9/WG 8
ISO 25964-1Working Group ISO/TC 46/SC 9/WG 8ISO 25964-1Working Group ISO/TC 46/SC 9/WG 8
ISO 25964-1Working Group ISO/TC 46/SC 9/WG 8Access Innovations, Inc.
 
Communication Accommodation Theory Kaylyn Benton.pptx
Communication Accommodation Theory Kaylyn Benton.pptxCommunication Accommodation Theory Kaylyn Benton.pptx
Communication Accommodation Theory Kaylyn Benton.pptxkb31670
 

Último (8)

Communication Accommodation Theory Kaylyn Benton.pptx
Communication Accommodation Theory Kaylyn Benton.pptxCommunication Accommodation Theory Kaylyn Benton.pptx
Communication Accommodation Theory Kaylyn Benton.pptx
 
Juan Pablo Sugiura - eCommerce Day Bolivia 2024
Juan Pablo Sugiura - eCommerce Day Bolivia 2024Juan Pablo Sugiura - eCommerce Day Bolivia 2024
Juan Pablo Sugiura - eCommerce Day Bolivia 2024
 
The Real Story Of Project Manager/Scrum Master From Where It Came?!
The Real Story Of Project Manager/Scrum Master From Where It Came?!The Real Story Of Project Manager/Scrum Master From Where It Came?!
The Real Story Of Project Manager/Scrum Master From Where It Came?!
 
Dynamics of Professional Presentationpdf
Dynamics of Professional PresentationpdfDynamics of Professional Presentationpdf
Dynamics of Professional Presentationpdf
 
Burning Issue presentation of Zhazgul N. , Cycle 54
Burning Issue presentation of Zhazgul N. , Cycle 54Burning Issue presentation of Zhazgul N. , Cycle 54
Burning Issue presentation of Zhazgul N. , Cycle 54
 
Machine learning workshop, CZU Prague 2024
Machine learning workshop, CZU Prague 2024Machine learning workshop, CZU Prague 2024
Machine learning workshop, CZU Prague 2024
 
ISO 25964-1Working Group ISO/TC 46/SC 9/WG 8
ISO 25964-1Working Group ISO/TC 46/SC 9/WG 8ISO 25964-1Working Group ISO/TC 46/SC 9/WG 8
ISO 25964-1Working Group ISO/TC 46/SC 9/WG 8
 
Communication Accommodation Theory Kaylyn Benton.pptx
Communication Accommodation Theory Kaylyn Benton.pptxCommunication Accommodation Theory Kaylyn Benton.pptx
Communication Accommodation Theory Kaylyn Benton.pptx
 

Forensics Expo, London 2015

  • 1. The DarkNet, Investigations & Criminality Professor John Walker HEXFORENSICS Ltd Shelton Street, Covent Garden, London, WC2H 9JQ
  • 2. The Technology Explosion – the Opportunity The race to evolve technology has in itself enabled the world to be a smarter place, and manifested in opportunities for the global community. It has also enabled the Criminal Community to create a business model that nets billions in illicit revenue. Add to this the fact that many businesses do not understand the Cyber Threat and you have the Perfect Storm in which Criminality, Paedophiles, Abusers and their DarkNets may thrive.
  • 3. Research According to research & Europol the principal search engines index only a small portion of the overall web content, the remaining part is unknown to the majority of web users. I concur..
  • 4. Why DarkNet? The DarkNet may actually represent anything its creator withies, for whatever purpose: • Fun • International Terrorism • Criminal Community Support • Copyright Theft • Paedophilia and Distribution of Images • On Line Live Abuse • Hacking • • Anything
  • 5. What is the DarkNet Made of? The Construction is down to imagination, ingenuity, and creativity. • Dynamic URL’s
  • 6. The Challenge – The Truth Proxy Server are on offer in Russia [and other places] as an intermediate system to acts as a mediator between a computer and the Internet. These Proxy Servers are used for various purposes, but their main purpose is to support anonymity. Anonymity, in this case, comes from the fact that the destination server sees the IP address of the proxy server and not that of the miscreants system. The good news is – such services store logs, and do not always provide complete anonymity. Dynamic Content Unlinked Content Private Web Contextual Web Scripted Content Non-HTML/Text Content
  • 7. The Reality of the Global Threat Landscape http://hackmageddon.com/2015/04/20/1-15-april-2015-cyber-attacks-timeline/ Here is a list of 49 attacks which took place Up to and including 14/04/2015!
  • 8. Evolution - CaaS TheRealDeal," has opened up for hackers, which focuses on selling Zero-Day exploits — infiltration codes that took advantage of software vulnerabilities for which the manufacturers have released no official software patch. Consider MS15-034 flaw which has left over 70 million sites vulnerable to Cyber Attack.
  • 9. The Value of HUMINT No matter the type of event or security incident, HUMINT [Human Intelligence] can be a double edge sword – • On one hand it can bring high value to the investigation • On the other – it can represents OoII to Cyber Adversaries
  • 10. Minority Reporting – The value of TIA The Cyber Threats-of-the-Age dictate a new way of looking at the unconventional through a new window of defence.
  • 11. “Digital Forensics has been used in investigations for more than 30 years, however it is now facing one of its biggest challenges.” Professor Andy Jones – De Montfort University This presentation only considered the environmental facets of a DarNet – it did not consider: • Acquisition of Artifacts • Reliability of Evidence • Distance Forensic Protocols • The Chain-of-Evidence • Multi Cloud Environment • Locally Stored Keys • Admissibility This is a new age and thus dictates new protocols of engagement .
  • 12. Thank You for Listening