Dark web markets: from the silk road to alphabay, trends and developments

Andres Baravalle
Andres BaravalleWeb, Security, Data Science em University of East London
Dr Andres Baravalle, CISA
Senior Lecturer, University of East London
Dark web markets: from the Silk
Road to Alphabay, trends and
developments
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• Synopsis and introduction
• Surface web, deep web and dark web
• Dark markets
• Going underground in Agora
• What now?
Outline
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• Within the last years, governmental bodies have been futilely
trying to fight against dark web hosted marketplaces. Shortly
after the closing of “The Silk Road” by the FBI and Europol in
2013, new successors have been established. Through the
combination of cryptocurrencies and nonstandard
communication protocols and tools, agents can anonymously
trade in a marketplace for illegal items without leaving any
record.
• This talk will presents a research carried out to gain insights on
the products and services sold within one of the larger
marketplaces for drugs, fake ids and weapons on the Internet,
Agora, and on new developments after the demise of Agora.
Synopsis
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
Timeline
• April 2015: Inception & funding request
• June 2015 – September 2015: Data collection
• September 2015 – April 2016: Data analysis
• July – August 2016: Writing up
• September 2016: Press release, and front page on
the Time!
The team:
• Dr Andres Baravalle, lead researcher
• Dr Sin Wee Lee, researcher
• Germans Zaharovs, research intern (data
collection)
• Mauro Lopez Sanchez, final year project (data
analysis)
Timeline and the team
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• Research on the “size” of the Internet shows that its size (in term of
hosts) has reached 1.05 billion hosts in early 2016
(http://ftp.isc.org/www/survey/reports/current/); about 3.5 billion users
have now access to the Internet.
• The surface web includes resources indexed by search engines and
made publicly available.
• Regardless of the effort done by these search engines in order to index
more content, some of the contents available on the internet are yet
not indexed. That’s what we call the deep web.
– Bergman (2001) estimated the deep web to be 400 to 550 times larger than
the content on the surface.
• Under the deep web, we can find the dark web, the back alley of the
Internet.
Surface web, deep web and dark web
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• We can define the Dark Web as "a collection of websites that
are publicly visible, but hide the IP addresses of the
servers that run them" (Egan, 2016).
• These web sites can be visited by users, but it is hard to
identify where they are hosted and who hosts them,
– Hidden behind encryption protocols – typically either Tor (The
Onion Routing) or I2P (Invisible Internet Project).
• While the expression "dark web" as we intend it today is
relatively recent, the concepts around dark web have been
under investigation since the early 2000s.
– The concept for example comes up in several works by Chen, H. et
el. around a "Terrorist Knowledge Portal" (cited in Oman, 2004).
The dark web - a definition
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• The Dark Web usually relies on the combination of crypto
currencies such as bitcoins and anonymized access as the
foundations in creating a market place for dealing illegal drugs,
weapons and other illegal contrabands.
• In recent years, the Dark Web has been in extreme scrutiny
and investigations from legal authorities around the globe.
• 2015 estimates put the size of the dark web to 7,000-30,000
sites
Dark web – crypto currencies and anonymized
access
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• February 2011 – February 2013: The Silk Road. Considered
the first Dark Web hosted black market e-commerce platform.
Any user could register anonymously to buy or sell goods with
Bitcoins as currency driver. February 2013: FBI and Interpol
operation against The Silk Road.
• February 2013 – November 2014: Post Silk road era. Several
market places, amongst which were Evolution, Hydra and The
Silk Road 2.0. November 2014: Europol and FBI seize the vast
majority of them during “operation Onymous”.
• The Silk Road and Post Silk Road eras are characterised by
the fact that the police managed to shut down the markets.
Dark web markets timeline: Silk Road and Post
Silk Road eras
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
Frosty’s got a problem with his PHP code
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• February 2014 – September 2015: The rise of Agora. Yet one
platform remained after operation Onymous: “Agora”. With no
competition ahead, “Agora” became “king of the Dark Net”.
Agora closed – possibly because of vulnerabilities in Tor (or
not)
• September 2015 - now: The customer is always right. 50+
markets. Alphabay supports reputation, multisig transactions,
coin tumbling and Monero – and it’s nearly 20 times the size of
Agora at its best.
The rise of Agora and the customer is always
right
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• Agora was a portal selling both products and services, with a
minimal set of rules.
– At the time of our research the only items that couldn’t be sold
were body parts, and the only service that was forbidden to
sell was assassination.
– In the final weeks (and before we completed our spidering),
weapons were also forbidden
• Agora changed host and domain name several times in an
attempt to avoid cyber-crime law enforcers over its almost two
years of existence.
– One of the instances of this marketplace is the subject of our work
(agorahooawayyfoe.onion).
What was Agora?
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• As for all black market operations, operations on Agora were
not taxed, neither directly nor indirectly.
• Agora offered sellers the possibility for sellers to place
products that could not be typically sold legally.
• The key aspects of Agora are largely similar to the ones of
other illegal operations: privacy protection, exchange of
money, illicit profits.
Privacy and money
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• Agora was invite-only - so access to the market place required
first of all digging for an invite.
– The we had to have several sessions on the web site, to be able to
inspect the interaction with the web site.
– Finally, we were able to create human-like sessions with our
software to proceed with the data collection.
• The application used for collection has been built on a classic
LAMP (Linux, Apache, MySQL, PHP) stack for data collection –
and a variety of languages for data analysis.
– TOR proxy running; thanks to Frosty (Silk Road) for some hints!
– The miner was developed using command line PHP (and the cURL
library) and an object oriented approach, using MySQL as a
backend
Mining data from Agora
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• The analysis of the data has been carried with several tools -
including Weka and ad-hoc Java and Python scripts
• Libraries such as Pandas, Numpy, NLTK and MatPlotLib have
been used for the analysis, integrated within a Jupyter
notebook
Analysing the data
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• Protection of their business model in general, and specifically assets is
something that Agora's team very much considered, but the techniques
used by the team were neither advanced nor seemed to show
awareness of the developments of the last few years.
• There is extensive research on techniques to discourage web scraping;
the most common ones include:
– Turing tests
– User-agent identification
– Throttling of HTTPD requests
– Obfuscation
– Data tainting
– Injecting markers
– Network traffic analysis
Security protections – what Agora could have
done
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• Turing tests (CAPTCHA) and user-agent identification were
implemented at the time we started our work
• Network traffic analysis was most likely introduced later
• In time, the web site administrators might have realized that
data mining was in progress as extra layers of protection were
added: geolocation, session expiration and session
management were added after we started the monitoring and
before the closure.
And what Agora did
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• Much more…
What could they have done?
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• I
Dilbert vs Agora
Around 2000 I developed a software to spider Dilbert’s web site (and then a few
hundred others), to automatically download the daily comic strip. To some extent,
the anti-spidering protection on Dilbert’s web site was more advanced.
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• Over 30,000 products on sale, mostly drugs and IDs, worth at
least 170691.12 BitCoins (£26 million).
• A staggering 1,233 sellers spread across 20 countries, with the
largest number located in the USA and UK.
• 90% of the market was dominated by the largest 10% of
sellers, with 80% of the market share going to the selling and
purchase of drugs.
• The highest number of drug sellers were from the USA (388),
Australia (138) and the UK (137), while top countries by market
size were Germany (£7.8 million), USA (£6.06 million) and
Netherlands (£2.9 million).
What did we find?
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• 80% of the market was drugs
• One seller, RADICALRX, was offering a cache of £10 million
pounds worth of drugs, including Hydromorphone, Oxycodone,
Fentanyl and Meth.
• A US-based seller, HonestCocaine, boasted £1.24 million worth
of cocaine for sale.
80% of Agora was drugs
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• The drugs market is dominated by suppliers from US and
UK, while sellers from China lives up to the stereotype and
focus on watches and clothing (most likely counterfeit
products).
Geographical distribution
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• The total size of the market was ~ 3,700 bitcoins – about
£650,000 at the time of our research (~ 2.6% of the market)
• During our research, 84 scans and photos of passports were on
sale, with 12 physical passports also being offered
• A physical UK passport can be bought as cheaply as £752,
while scanned passports can be purchased for as little as £7,
and can be bought in bulk
• Counterfeit identity cards can be bought for as cheap as £142
for an European id card and even cheaper for US state id
cards, with prices ranging between £25 and £92
Counterfeit documents
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• US driving licenses ranged between £51-300; prices for
European driving license were slightly more expensive, up to
£419 but more impressively, in one of the listings, the vendor
claimed that the license sold would be registered officially
• Prices for European driving license were slightly more
expensive, up to £419 but more impressively, in one of the
listings, the vendor claimed that the license sold would be
registered officially
Counterfeit documents – driving licenses
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• We wanted to try to understand first of all how concentrated was the
supply within the different vendors, and then if there were any existing
patterns that would manifest that the supply was operated by well-
coordinated organizations instead of individuals.
• Over 90% of the market is dominated by the largest 10% vendors.
• When looking at the hashish category, the mean amount on sale is 47g,
with a median of 10g, but with some sellers selling up to 1 kg at the
time. This is a reasonable indicator that organized crime is involved.
• Finally, our research indicates that there was some use of sockpuppets
– and we want to look at this more in depth
– How do we know? Image analysis, for starters – but also NLP analysis (to
complete)
Organised crime
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• Entities as RADICALRX have over
10 million dollars of product on sale
on Agora over the time of our
study.
• This is hardly teenagers in
basements – the scale is the one of
organized crime.
Organised crime – not teenagers in basements
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• About 18 months ago I went to a data science workshop organised
by Outreach Digital, 3 Steps To Growth Hacking with Data (using
import.io)
• Amongst the stuff she presented, was some research by her
colleagues at import.io, relating to the contribution of prostitution to
UK’s economy. Andrew Fogg presented this work at Data Summit in
San Francisco.
• According to Andrew Fogg, the Office of National Statistics in UK
estimates (£5.314bn, 0,4% of the GDP), are completely off the mark.
His estimate is that contribution it is really closer to 0.6% of the GDP –
the difference due to methodological errors in the government analysis
and due to the fact that they didn’t count male prostitution.
• That’s when I decided that I was going to look at drugs!
How did it start?
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• Over 170691.12 BitCoins (about £26 million) of merchandise where on sale on
the period under examination. Over 30,000 products were on sale; 1233 sellers
participated in the market, spread across 20 countries, with the largest number
located in the US and UK.
• Drugs, ids and also weapons were readily available in a trans-national
marketplace, just one click away and anonymously.
• When it comes to counterfeit documents, any EU ID card would allow the potential
buyer to travel through any country in the EU, open bank accounts and in general
create a new identity for himself/herself.
• While we didn’t manage to collect any data on weapons as they were removed
from the market early on
• Black market services are working very cautiously, implementing security
measures and hacker avoidance updates regularly. They are largely dominated by
organized crime, and they keep resurfacing regardless of the efforts made to shut
them down.
Conclusions
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
• A more generalised architecture
• The other 20%
• Sharing the data
• Legal highs: surface web and dark web
• The role of organised crime
• What’s new in the dark web?
• Looking at other datasets
What’s next?
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
Dr Andres Baravalle
a.baravalle@uel.ac.u
k
Dr Sin Wee Lee
s.w.lee@uel.ac.uk
Any questions?
Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
M. Splitters, F. Klaver, G. Koot and M. Van Staalduinen, "Authorship Analysis on Dark Marketplace Forums," in roceeding of Intelligence and Security Informatics Conference (EISIC),
Manchester, 2015.
K. Bharat and A. Broder , "A technique for measuring the relative size and overlap of public Web search engines," Computer Networks and ISDN Systems, vol. 30, no. 1-7, pp. 379-388, 1998.
M. Bergman, "White Paper: The Deep Web: Surfacing Hidden Value," The Journal of Electronic, vol. 7, no. 1, 2001.
M. Eddy, "Inside the Dark Web," 04 02 2015. [Online]. Available: http://uk.pcmag.com/security/39461/guide/inside-the-dark-web. [Accessed 17 06 2016].
M. Egan, "What is the Dark Web? How to access the Dark Web. What's the difference between the Dark Web and the Deep Web?," 2016 06 28. [Online]. Available:
http://www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-beautfiulpeople-3593569/. [Accessed 17 06 2016].
H. Oman, "Security Technology Progress: The 37th IEEE-AESS Carnahan Conference, Taiwan," IEEE Aerospace and Electronic Systems Magazine, vol. 19, no. 2, pp. 35-40, 2004.
H. Chen, "The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources," 08 2003. [Online].
Available: http://www.slideshare.net/suyu22/the-terrorism-knowledge-portal-advanced-methodologies-for-collecting-and-analyzing-information-from-the-dark-web-and-terrorism-research-
resources. [Accessed 17 06 2016].
A. Greenberg , "End Of The Silk Road: FBI Says It's Busted The Web's Biggest Anonymous Drug Black Market," 2 10 2013. [Online]. Available:
http://www.forbes.com/sites/andygreenberg/2013/10/02/end-of-the-silk-road-fbi-busts-the-webs-biggest-anonymous-drug-black-market. [Accessed 16 6 2016].
A. Greenberg, "Global Web Crackdown Arrests 17, Seizes Hundreds Of Dark Net Domains," 11 07 2014. [Online]. Available: https://www.wired.com/2014/11/operation-onymous-dark-web-
arrests/. [Accessed 16 6 2016].
A. Greenberg, "Drug Market ‘Agora’ Replaces the Silk Road as King of the Dark Net," 18 11 2015. [Online]. Available: http://www.wired.com/2014/09/agora-bigger-than-silk-road. [Accessed 17 06
2016].
E. L. Feige , "Reflections on the Meaning and Measurement of Unobserved Economies: What Do We Really Know About the 'Shadow Economy'," Journal of Tax Administration , vol. 2, no. 6,
2016.
R. S. Sandhu and P. Samarati, "Access control: principle and practice," IEEE Communications Magazine, vol. 32, no. 9, 1994.
A. Kolupaev and J. Ogijenko, "CAPTCHAs: Humans vs. Bots," IEEE Security & Privacy, vol. 6, no. 1, pp. 68-70, 2008.
V. Bhagwan and T. Grandison, "Deactivation of Unwelcomed Deep Web Extraction Services through Random," in Web Services, 2009. ICWS 2009. IEEE International Conference on, Los
Angeles, CA, 2009.
C. Efroymson, "The Kinked Oligopoly Curve Reconsidered," The Quarterly Journal of Economics, vol. 69, no. 1, p. 119, 1995.
Bibliography
1 de 31

Recomendados

Cybercrime In The Deep Web por
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
4.4K visualizações67 slides
Investigating Using the Dark Web por
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
8K visualizações27 slides
My darkweb-presentation por
My darkweb-presentationMy darkweb-presentation
My darkweb-presentationPaul Wilson
5.1K visualizações45 slides
The dark web por
The dark webThe dark web
The dark webBella M
8.6K visualizações6 slides
Deep Web - what to do and what not to do por
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do Cysinfo Cyber Security Community
4K visualizações35 slides
Journey To The Dark Web por
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
1.8K visualizações20 slides

Mais conteúdo relacionado

Mais procurados

The Deep Web, TOR Network and Internet Anonymity por
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
3.3K visualizações38 slides
Cybersecurity and the DarkNet por
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
427 visualizações11 slides
Malware & Anti-Malware por
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
2.7K visualizações41 slides
Ch 5: Port Scanning por
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port ScanningSam Bowne
4K visualizações50 slides
Getting started with using the Dark Web for OSINT investigations por
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
304 visualizações19 slides
Dark web por
Dark webDark web
Dark webSafwan Hashmi
2.2K visualizações19 slides

Mais procurados(20)

The Deep Web, TOR Network and Internet Anonymity por Abhimanyu Singh
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh3.3K visualizações
Cybersecurity and the DarkNet por James Bollen
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
James Bollen427 visualizações
Malware & Anti-Malware por Arpit Mittal
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
Arpit Mittal2.7K visualizações
Ch 5: Port Scanning por Sam Bowne
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
Sam Bowne4K visualizações
Getting started with using the Dark Web for OSINT investigations por Olakanmi Oluwole
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
Olakanmi Oluwole304 visualizações
Dark web por Safwan Hashmi
Dark webDark web
Dark web
Safwan Hashmi2.2K visualizações
Threat Intelligence por Deepak Kumar (D3)
Threat IntelligenceThreat Intelligence
Threat Intelligence
Deepak Kumar (D3) 3.3K visualizações
Ali shahbazi khojasteh - deep web por Ali Shahbazi Khojasteh
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
Ali Shahbazi Khojasteh383 visualizações
Open source intelligence por balakumaran779
Open source intelligenceOpen source intelligence
Open source intelligence
balakumaran7795.9K visualizações
Introduction To Dark Web por Adityakumar Yadav
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
Adityakumar Yadav1.4K visualizações
Ip spoofing ppt por Anushakp9
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
Anushakp95.8K visualizações
The Dark Web por Suraj Jaundoo
The Dark WebThe Dark Web
The Dark Web
Suraj Jaundoo3.8K visualizações
Introduction to Malware por amiable_indian
Introduction to MalwareIntroduction to Malware
Introduction to Malware
amiable_indian7.7K visualizações
Denial of service por garishma bhatia
Denial of serviceDenial of service
Denial of service
garishma bhatia1.8K visualizações
Illuminating the dark web por Jisc
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
Jisc23.4K visualizações
Dark Web and Privacy por Brian Pichman
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
Brian Pichman4.1K visualizações
Pen Testing Explained por Rand W. Hirt
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
Rand W. Hirt5.6K visualizações
The dark web por hellboytonmoy
The dark webThe dark web
The dark web
hellboytonmoy2.7K visualizações

Similar a Dark web markets: from the silk road to alphabay, trends and developments

Deep web (amatuer level) por
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)Ali Saif Mirza
2.1K visualizações12 slides
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... por
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...i_scienceEU
1.6K visualizações25 slides
Deeplight Intelliagg por
Deeplight IntelliaggDeeplight Intelliagg
Deeplight IntelliaggGavin O'Toole
526 visualizações12 slides
Dark Side of the Net Lecture 4 TOR por
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
220 visualizações29 slides
Research in the deep web por
Research in the deep webResearch in the deep web
Research in the deep webSeth Porter, MA, MLIS
515 visualizações26 slides
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen por
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van AmerongenDeep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van AmerongenGetting value from IoT, Integration and Data Analytics
2.8K visualizações33 slides

Similar a Dark web markets: from the silk road to alphabay, trends and developments(20)

Deep web (amatuer level) por Ali Saif Mirza
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
Ali Saif Mirza2.1K visualizações
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... por i_scienceEU
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
i_scienceEU1.6K visualizações
Deeplight Intelliagg por Gavin O'Toole
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
Gavin O'Toole526 visualizações
Dark Side of the Net Lecture 4 TOR por Marcus Leaning
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
Marcus Leaning220 visualizações
Anonymous internet por Vong Borey
Anonymous internetAnonymous internet
Anonymous internet
Vong Borey215 visualizações
Anonymous internet por Vong Borey
Anonymous internetAnonymous internet
Anonymous internet
Vong Borey538 visualizações
Demystifying the Dark Web por Tom Kranz
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
Tom Kranz138 visualizações
The Dark web - Why the hidden part of the web is even more dangerous? por Pierluigi Paganini
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
Pierluigi Paganini22.1K visualizações
Dark net por Mudasser Afzal
Dark netDark net
Dark net
Mudasser Afzal1.4K visualizações
6 internet and web por MrQaz996
6 internet and web6 internet and web
6 internet and web
MrQaz996344 visualizações
DEEP WEB PRESENTATION.pptx por ismailwinofo
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptx
ismailwinofo10 visualizações
Dark Web.pptx por eliofatjon
Dark Web.pptxDark Web.pptx
Dark Web.pptx
eliofatjon3 visualizações
Dark Web.pptx por Soumen Debgupta
Dark Web.pptxDark Web.pptx
Dark Web.pptx
Soumen Debgupta4 visualizações
Deep web por GauravPandey319
Deep webDeep web
Deep web
GauravPandey319104 visualizações
Acpe 2014 Internet Anonymity Using Tor por Jack Maynard
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
Jack Maynard2.2K visualizações
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia por OWASP Delhi
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
OWASP Delhi850 visualizações

Mais de Andres Baravalle

Introduction to jQuery por
Introduction to jQueryIntroduction to jQuery
Introduction to jQueryAndres Baravalle
1.4K visualizações49 slides
Introduction to JavaScript por
Introduction to JavaScriptIntroduction to JavaScript
Introduction to JavaScriptAndres Baravalle
25.2K visualizações77 slides
Don't make me think por
Don't make me thinkDon't make me think
Don't make me thinkAndres Baravalle
1.6K visualizações23 slides
Social, professional, ethical and legal issues por
Social, professional, ethical and legal issuesSocial, professional, ethical and legal issues
Social, professional, ethical and legal issuesAndres Baravalle
3.5K visualizações35 slides
Accessibility introduction por
Accessibility introductionAccessibility introduction
Accessibility introductionAndres Baravalle
1.4K visualizações47 slides
Designing and prototyping por
Designing and prototypingDesigning and prototyping
Designing and prototypingAndres Baravalle
2.4K visualizações40 slides

Mais de Andres Baravalle(20)

Introduction to jQuery por Andres Baravalle
Introduction to jQueryIntroduction to jQuery
Introduction to jQuery
Andres Baravalle1.4K visualizações
Introduction to JavaScript por Andres Baravalle
Introduction to JavaScriptIntroduction to JavaScript
Introduction to JavaScript
Andres Baravalle25.2K visualizações
Don't make me think por Andres Baravalle
Don't make me thinkDon't make me think
Don't make me think
Andres Baravalle1.6K visualizações
Social, professional, ethical and legal issues por Andres Baravalle
Social, professional, ethical and legal issuesSocial, professional, ethical and legal issues
Social, professional, ethical and legal issues
Andres Baravalle3.5K visualizações
Accessibility introduction por Andres Baravalle
Accessibility introductionAccessibility introduction
Accessibility introduction
Andres Baravalle1.4K visualizações
Designing and prototyping por Andres Baravalle
Designing and prototypingDesigning and prototyping
Designing and prototyping
Andres Baravalle2.4K visualizações
Design rules and usability requirements por Andres Baravalle
Design rules and usability requirementsDesign rules and usability requirements
Design rules and usability requirements
Andres Baravalle5K visualizações
Other metrics por Andres Baravalle
Other metricsOther metrics
Other metrics
Andres Baravalle1.4K visualizações
Issue-based metrics por Andres Baravalle
Issue-based metricsIssue-based metrics
Issue-based metrics
Andres Baravalle2.8K visualizações
Usability evaluation methods (part 2) and performance metrics por Andres Baravalle
Usability evaluation methods (part 2) and performance metricsUsability evaluation methods (part 2) and performance metrics
Usability evaluation methods (part 2) and performance metrics
Andres Baravalle1.9K visualizações
Planning and usability evaluation methods por Andres Baravalle
Planning and usability evaluation methodsPlanning and usability evaluation methods
Planning and usability evaluation methods
Andres Baravalle3.6K visualizações
Background on Usability Engineering por Andres Baravalle
Background on Usability EngineeringBackground on Usability Engineering
Background on Usability Engineering
Andres Baravalle1.3K visualizações
Measuring the user experience por Andres Baravalle
Measuring the user experienceMeasuring the user experience
Measuring the user experience
Andres Baravalle1.6K visualizações
Don’t make me think por Andres Baravalle
Don’t make me thinkDon’t make me think
Don’t make me think
Andres Baravalle692 visualizações
SPEL (Social, professional, ethical and legal) issues in Usability por Andres Baravalle
SPEL (Social, professional, ethical and legal) issues in UsabilitySPEL (Social, professional, ethical and legal) issues in Usability
SPEL (Social, professional, ethical and legal) issues in Usability
Andres Baravalle8.2K visualizações
Accessibility: introduction por Andres Baravalle
Accessibility: introduction  Accessibility: introduction
Accessibility: introduction
Andres Baravalle701 visualizações
Usability evaluations (part 3) por Andres Baravalle
Usability evaluations (part 3) Usability evaluations (part 3)
Usability evaluations (part 3)
Andres Baravalle973 visualizações
Usability evaluations (part 2) por Andres Baravalle
Usability evaluations (part 2) Usability evaluations (part 2)
Usability evaluations (part 2)
Andres Baravalle717 visualizações
Interfaces por Andres Baravalle
InterfacesInterfaces
Interfaces
Andres Baravalle1.4K visualizações
Data collection and analysis por Andres Baravalle
Data collection and analysisData collection and analysis
Data collection and analysis
Andres Baravalle14.9K visualizações

Último

RIO GRANDE SUPPLY COMPANY INC, JAYSON.docx por
RIO GRANDE SUPPLY COMPANY INC, JAYSON.docxRIO GRANDE SUPPLY COMPANY INC, JAYSON.docx
RIO GRANDE SUPPLY COMPANY INC, JAYSON.docxJaysonGarabilesEspej
6 visualizações3 slides
Chapter 3b- Process Communication (1) (1)(1) (1).pptx por
Chapter 3b- Process Communication (1) (1)(1) (1).pptxChapter 3b- Process Communication (1) (1)(1) (1).pptx
Chapter 3b- Process Communication (1) (1)(1) (1).pptxayeshabaig2004
5 visualizações30 slides
Short Story Assignment by Kelly Nguyen por
Short Story Assignment by Kelly NguyenShort Story Assignment by Kelly Nguyen
Short Story Assignment by Kelly Nguyenkellynguyen01
18 visualizações17 slides
Understanding Hallucinations in LLMs - 2023 09 29.pptx por
Understanding Hallucinations in LLMs - 2023 09 29.pptxUnderstanding Hallucinations in LLMs - 2023 09 29.pptx
Understanding Hallucinations in LLMs - 2023 09 29.pptxGreg Makowski
13 visualizações18 slides
Data structure and algorithm. por
Data structure and algorithm. Data structure and algorithm.
Data structure and algorithm. Abdul salam
18 visualizações24 slides
Survey on Factuality in LLM's.pptx por
Survey on Factuality in LLM's.pptxSurvey on Factuality in LLM's.pptx
Survey on Factuality in LLM's.pptxNeethaSherra1
5 visualizações9 slides

Último(20)

RIO GRANDE SUPPLY COMPANY INC, JAYSON.docx por JaysonGarabilesEspej
RIO GRANDE SUPPLY COMPANY INC, JAYSON.docxRIO GRANDE SUPPLY COMPANY INC, JAYSON.docx
RIO GRANDE SUPPLY COMPANY INC, JAYSON.docx
JaysonGarabilesEspej6 visualizações
Chapter 3b- Process Communication (1) (1)(1) (1).pptx por ayeshabaig2004
Chapter 3b- Process Communication (1) (1)(1) (1).pptxChapter 3b- Process Communication (1) (1)(1) (1).pptx
Chapter 3b- Process Communication (1) (1)(1) (1).pptx
ayeshabaig20045 visualizações
Short Story Assignment by Kelly Nguyen por kellynguyen01
Short Story Assignment by Kelly NguyenShort Story Assignment by Kelly Nguyen
Short Story Assignment by Kelly Nguyen
kellynguyen0118 visualizações
Understanding Hallucinations in LLMs - 2023 09 29.pptx por Greg Makowski
Understanding Hallucinations in LLMs - 2023 09 29.pptxUnderstanding Hallucinations in LLMs - 2023 09 29.pptx
Understanding Hallucinations in LLMs - 2023 09 29.pptx
Greg Makowski13 visualizações
Data structure and algorithm. por Abdul salam
Data structure and algorithm. Data structure and algorithm.
Data structure and algorithm.
Abdul salam 18 visualizações
Survey on Factuality in LLM's.pptx por NeethaSherra1
Survey on Factuality in LLM's.pptxSurvey on Factuality in LLM's.pptx
Survey on Factuality in LLM's.pptx
NeethaSherra15 visualizações
RuleBookForTheFairDataEconomy.pptx por noraelstela1
RuleBookForTheFairDataEconomy.pptxRuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptx
noraelstela167 visualizações
3196 The Case of The East River por ErickANDRADE90
3196 The Case of The East River3196 The Case of The East River
3196 The Case of The East River
ErickANDRADE9011 visualizações
Supercharging your Data with Azure AI Search and Azure OpenAI por Peter Gallagher
Supercharging your Data with Azure AI Search and Azure OpenAISupercharging your Data with Azure AI Search and Azure OpenAI
Supercharging your Data with Azure AI Search and Azure OpenAI
Peter Gallagher37 visualizações
JConWorld_ Continuous SQL with Kafka and Flink por Timothy Spann
JConWorld_ Continuous SQL with Kafka and FlinkJConWorld_ Continuous SQL with Kafka and Flink
JConWorld_ Continuous SQL with Kafka and Flink
Timothy Spann100 visualizações
How Leaders See Data? (Level 1) por Narendra Narendra
How Leaders See Data? (Level 1)How Leaders See Data? (Level 1)
How Leaders See Data? (Level 1)
Narendra Narendra13 visualizações
PROGRAMME.pdf por HiNedHaJar
PROGRAMME.pdfPROGRAMME.pdf
PROGRAMME.pdf
HiNedHaJar17 visualizações
Introduction to Microsoft Fabric.pdf por ishaniuudeshika
Introduction to Microsoft Fabric.pdfIntroduction to Microsoft Fabric.pdf
Introduction to Microsoft Fabric.pdf
ishaniuudeshika24 visualizações
Vikas 500 BIG DATA TECHNOLOGIES LAB.pdf por vikas12611618
Vikas 500 BIG DATA TECHNOLOGIES LAB.pdfVikas 500 BIG DATA TECHNOLOGIES LAB.pdf
Vikas 500 BIG DATA TECHNOLOGIES LAB.pdf
vikas126116188 visualizações
UNEP FI CRS Climate Risk Results.pptx por pekka28
UNEP FI CRS Climate Risk Results.pptxUNEP FI CRS Climate Risk Results.pptx
UNEP FI CRS Climate Risk Results.pptx
pekka2811 visualizações
Cross-network in Google Analytics 4.pdf por GA4 Tutorials
Cross-network in Google Analytics 4.pdfCross-network in Google Analytics 4.pdf
Cross-network in Google Analytics 4.pdf
GA4 Tutorials6 visualizações
Advanced_Recommendation_Systems_Presentation.pptx por neeharikasingh29
Advanced_Recommendation_Systems_Presentation.pptxAdvanced_Recommendation_Systems_Presentation.pptx
Advanced_Recommendation_Systems_Presentation.pptx
neeharikasingh295 visualizações

Dark web markets: from the silk road to alphabay, trends and developments

  • 1. Dr Andres Baravalle, CISA Senior Lecturer, University of East London Dark web markets: from the Silk Road to Alphabay, trends and developments
  • 2. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • Synopsis and introduction • Surface web, deep web and dark web • Dark markets • Going underground in Agora • What now? Outline
  • 3. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved.
  • 4. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • Within the last years, governmental bodies have been futilely trying to fight against dark web hosted marketplaces. Shortly after the closing of “The Silk Road” by the FBI and Europol in 2013, new successors have been established. Through the combination of cryptocurrencies and nonstandard communication protocols and tools, agents can anonymously trade in a marketplace for illegal items without leaving any record. • This talk will presents a research carried out to gain insights on the products and services sold within one of the larger marketplaces for drugs, fake ids and weapons on the Internet, Agora, and on new developments after the demise of Agora. Synopsis
  • 5. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. Timeline • April 2015: Inception & funding request • June 2015 – September 2015: Data collection • September 2015 – April 2016: Data analysis • July – August 2016: Writing up • September 2016: Press release, and front page on the Time! The team: • Dr Andres Baravalle, lead researcher • Dr Sin Wee Lee, researcher • Germans Zaharovs, research intern (data collection) • Mauro Lopez Sanchez, final year project (data analysis) Timeline and the team
  • 6. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • Research on the “size” of the Internet shows that its size (in term of hosts) has reached 1.05 billion hosts in early 2016 (http://ftp.isc.org/www/survey/reports/current/); about 3.5 billion users have now access to the Internet. • The surface web includes resources indexed by search engines and made publicly available. • Regardless of the effort done by these search engines in order to index more content, some of the contents available on the internet are yet not indexed. That’s what we call the deep web. – Bergman (2001) estimated the deep web to be 400 to 550 times larger than the content on the surface. • Under the deep web, we can find the dark web, the back alley of the Internet. Surface web, deep web and dark web
  • 7. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • We can define the Dark Web as "a collection of websites that are publicly visible, but hide the IP addresses of the servers that run them" (Egan, 2016). • These web sites can be visited by users, but it is hard to identify where they are hosted and who hosts them, – Hidden behind encryption protocols – typically either Tor (The Onion Routing) or I2P (Invisible Internet Project). • While the expression "dark web" as we intend it today is relatively recent, the concepts around dark web have been under investigation since the early 2000s. – The concept for example comes up in several works by Chen, H. et el. around a "Terrorist Knowledge Portal" (cited in Oman, 2004). The dark web - a definition
  • 8. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • The Dark Web usually relies on the combination of crypto currencies such as bitcoins and anonymized access as the foundations in creating a market place for dealing illegal drugs, weapons and other illegal contrabands. • In recent years, the Dark Web has been in extreme scrutiny and investigations from legal authorities around the globe. • 2015 estimates put the size of the dark web to 7,000-30,000 sites Dark web – crypto currencies and anonymized access
  • 9. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • February 2011 – February 2013: The Silk Road. Considered the first Dark Web hosted black market e-commerce platform. Any user could register anonymously to buy or sell goods with Bitcoins as currency driver. February 2013: FBI and Interpol operation against The Silk Road. • February 2013 – November 2014: Post Silk road era. Several market places, amongst which were Evolution, Hydra and The Silk Road 2.0. November 2014: Europol and FBI seize the vast majority of them during “operation Onymous”. • The Silk Road and Post Silk Road eras are characterised by the fact that the police managed to shut down the markets. Dark web markets timeline: Silk Road and Post Silk Road eras
  • 10. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. Frosty’s got a problem with his PHP code
  • 11. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • February 2014 – September 2015: The rise of Agora. Yet one platform remained after operation Onymous: “Agora”. With no competition ahead, “Agora” became “king of the Dark Net”. Agora closed – possibly because of vulnerabilities in Tor (or not) • September 2015 - now: The customer is always right. 50+ markets. Alphabay supports reputation, multisig transactions, coin tumbling and Monero – and it’s nearly 20 times the size of Agora at its best. The rise of Agora and the customer is always right
  • 12. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • Agora was a portal selling both products and services, with a minimal set of rules. – At the time of our research the only items that couldn’t be sold were body parts, and the only service that was forbidden to sell was assassination. – In the final weeks (and before we completed our spidering), weapons were also forbidden • Agora changed host and domain name several times in an attempt to avoid cyber-crime law enforcers over its almost two years of existence. – One of the instances of this marketplace is the subject of our work (agorahooawayyfoe.onion). What was Agora?
  • 13. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • As for all black market operations, operations on Agora were not taxed, neither directly nor indirectly. • Agora offered sellers the possibility for sellers to place products that could not be typically sold legally. • The key aspects of Agora are largely similar to the ones of other illegal operations: privacy protection, exchange of money, illicit profits. Privacy and money
  • 14. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • Agora was invite-only - so access to the market place required first of all digging for an invite. – The we had to have several sessions on the web site, to be able to inspect the interaction with the web site. – Finally, we were able to create human-like sessions with our software to proceed with the data collection. • The application used for collection has been built on a classic LAMP (Linux, Apache, MySQL, PHP) stack for data collection – and a variety of languages for data analysis. – TOR proxy running; thanks to Frosty (Silk Road) for some hints! – The miner was developed using command line PHP (and the cURL library) and an object oriented approach, using MySQL as a backend Mining data from Agora
  • 15. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • The analysis of the data has been carried with several tools - including Weka and ad-hoc Java and Python scripts • Libraries such as Pandas, Numpy, NLTK and MatPlotLib have been used for the analysis, integrated within a Jupyter notebook Analysing the data
  • 16. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • Protection of their business model in general, and specifically assets is something that Agora's team very much considered, but the techniques used by the team were neither advanced nor seemed to show awareness of the developments of the last few years. • There is extensive research on techniques to discourage web scraping; the most common ones include: – Turing tests – User-agent identification – Throttling of HTTPD requests – Obfuscation – Data tainting – Injecting markers – Network traffic analysis Security protections – what Agora could have done
  • 17. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • Turing tests (CAPTCHA) and user-agent identification were implemented at the time we started our work • Network traffic analysis was most likely introduced later • In time, the web site administrators might have realized that data mining was in progress as extra layers of protection were added: geolocation, session expiration and session management were added after we started the monitoring and before the closure. And what Agora did
  • 18. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • Much more… What could they have done?
  • 19. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • I Dilbert vs Agora Around 2000 I developed a software to spider Dilbert’s web site (and then a few hundred others), to automatically download the daily comic strip. To some extent, the anti-spidering protection on Dilbert’s web site was more advanced.
  • 20. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • Over 30,000 products on sale, mostly drugs and IDs, worth at least 170691.12 BitCoins (£26 million). • A staggering 1,233 sellers spread across 20 countries, with the largest number located in the USA and UK. • 90% of the market was dominated by the largest 10% of sellers, with 80% of the market share going to the selling and purchase of drugs. • The highest number of drug sellers were from the USA (388), Australia (138) and the UK (137), while top countries by market size were Germany (£7.8 million), USA (£6.06 million) and Netherlands (£2.9 million). What did we find?
  • 21. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • 80% of the market was drugs • One seller, RADICALRX, was offering a cache of £10 million pounds worth of drugs, including Hydromorphone, Oxycodone, Fentanyl and Meth. • A US-based seller, HonestCocaine, boasted £1.24 million worth of cocaine for sale. 80% of Agora was drugs
  • 22. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • The drugs market is dominated by suppliers from US and UK, while sellers from China lives up to the stereotype and focus on watches and clothing (most likely counterfeit products). Geographical distribution
  • 23. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • The total size of the market was ~ 3,700 bitcoins – about £650,000 at the time of our research (~ 2.6% of the market) • During our research, 84 scans and photos of passports were on sale, with 12 physical passports also being offered • A physical UK passport can be bought as cheaply as £752, while scanned passports can be purchased for as little as £7, and can be bought in bulk • Counterfeit identity cards can be bought for as cheap as £142 for an European id card and even cheaper for US state id cards, with prices ranging between £25 and £92 Counterfeit documents
  • 24. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • US driving licenses ranged between £51-300; prices for European driving license were slightly more expensive, up to £419 but more impressively, in one of the listings, the vendor claimed that the license sold would be registered officially • Prices for European driving license were slightly more expensive, up to £419 but more impressively, in one of the listings, the vendor claimed that the license sold would be registered officially Counterfeit documents – driving licenses
  • 25. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • We wanted to try to understand first of all how concentrated was the supply within the different vendors, and then if there were any existing patterns that would manifest that the supply was operated by well- coordinated organizations instead of individuals. • Over 90% of the market is dominated by the largest 10% vendors. • When looking at the hashish category, the mean amount on sale is 47g, with a median of 10g, but with some sellers selling up to 1 kg at the time. This is a reasonable indicator that organized crime is involved. • Finally, our research indicates that there was some use of sockpuppets – and we want to look at this more in depth – How do we know? Image analysis, for starters – but also NLP analysis (to complete) Organised crime
  • 26. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • Entities as RADICALRX have over 10 million dollars of product on sale on Agora over the time of our study. • This is hardly teenagers in basements – the scale is the one of organized crime. Organised crime – not teenagers in basements
  • 27. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • About 18 months ago I went to a data science workshop organised by Outreach Digital, 3 Steps To Growth Hacking with Data (using import.io) • Amongst the stuff she presented, was some research by her colleagues at import.io, relating to the contribution of prostitution to UK’s economy. Andrew Fogg presented this work at Data Summit in San Francisco. • According to Andrew Fogg, the Office of National Statistics in UK estimates (£5.314bn, 0,4% of the GDP), are completely off the mark. His estimate is that contribution it is really closer to 0.6% of the GDP – the difference due to methodological errors in the government analysis and due to the fact that they didn’t count male prostitution. • That’s when I decided that I was going to look at drugs! How did it start?
  • 28. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • Over 170691.12 BitCoins (about £26 million) of merchandise where on sale on the period under examination. Over 30,000 products were on sale; 1233 sellers participated in the market, spread across 20 countries, with the largest number located in the US and UK. • Drugs, ids and also weapons were readily available in a trans-national marketplace, just one click away and anonymously. • When it comes to counterfeit documents, any EU ID card would allow the potential buyer to travel through any country in the EU, open bank accounts and in general create a new identity for himself/herself. • While we didn’t manage to collect any data on weapons as they were removed from the market early on • Black market services are working very cautiously, implementing security measures and hacker avoidance updates regularly. They are largely dominated by organized crime, and they keep resurfacing regardless of the efforts made to shut them down. Conclusions
  • 29. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. • A more generalised architecture • The other 20% • Sharing the data • Legal highs: surface web and dark web • The role of organised crime • What’s new in the dark web? • Looking at other datasets What’s next?
  • 30. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. Dr Andres Baravalle a.baravalle@uel.ac.u k Dr Sin Wee Lee s.w.lee@uel.ac.uk Any questions?
  • 31. Copyright © 2016 Information Systems Audit and Control Association, Inc. All rights reserved. M. Splitters, F. Klaver, G. Koot and M. Van Staalduinen, "Authorship Analysis on Dark Marketplace Forums," in roceeding of Intelligence and Security Informatics Conference (EISIC), Manchester, 2015. K. Bharat and A. Broder , "A technique for measuring the relative size and overlap of public Web search engines," Computer Networks and ISDN Systems, vol. 30, no. 1-7, pp. 379-388, 1998. M. Bergman, "White Paper: The Deep Web: Surfacing Hidden Value," The Journal of Electronic, vol. 7, no. 1, 2001. M. Eddy, "Inside the Dark Web," 04 02 2015. [Online]. Available: http://uk.pcmag.com/security/39461/guide/inside-the-dark-web. [Accessed 17 06 2016]. M. Egan, "What is the Dark Web? How to access the Dark Web. What's the difference between the Dark Web and the Deep Web?," 2016 06 28. [Online]. Available: http://www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-beautfiulpeople-3593569/. [Accessed 17 06 2016]. H. Oman, "Security Technology Progress: The 37th IEEE-AESS Carnahan Conference, Taiwan," IEEE Aerospace and Electronic Systems Magazine, vol. 19, no. 2, pp. 35-40, 2004. H. Chen, "The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources," 08 2003. [Online]. Available: http://www.slideshare.net/suyu22/the-terrorism-knowledge-portal-advanced-methodologies-for-collecting-and-analyzing-information-from-the-dark-web-and-terrorism-research- resources. [Accessed 17 06 2016]. A. Greenberg , "End Of The Silk Road: FBI Says It's Busted The Web's Biggest Anonymous Drug Black Market," 2 10 2013. [Online]. Available: http://www.forbes.com/sites/andygreenberg/2013/10/02/end-of-the-silk-road-fbi-busts-the-webs-biggest-anonymous-drug-black-market. [Accessed 16 6 2016]. A. Greenberg, "Global Web Crackdown Arrests 17, Seizes Hundreds Of Dark Net Domains," 11 07 2014. [Online]. Available: https://www.wired.com/2014/11/operation-onymous-dark-web- arrests/. [Accessed 16 6 2016]. A. Greenberg, "Drug Market ‘Agora’ Replaces the Silk Road as King of the Dark Net," 18 11 2015. [Online]. Available: http://www.wired.com/2014/09/agora-bigger-than-silk-road. [Accessed 17 06 2016]. E. L. Feige , "Reflections on the Meaning and Measurement of Unobserved Economies: What Do We Really Know About the 'Shadow Economy'," Journal of Tax Administration , vol. 2, no. 6, 2016. R. S. Sandhu and P. Samarati, "Access control: principle and practice," IEEE Communications Magazine, vol. 32, no. 9, 1994. A. Kolupaev and J. Ogijenko, "CAPTCHAs: Humans vs. Bots," IEEE Security & Privacy, vol. 6, no. 1, pp. 68-70, 2008. V. Bhagwan and T. Grandison, "Deactivation of Unwelcomed Deep Web Extraction Services through Random," in Web Services, 2009. ICWS 2009. IEEE International Conference on, Los Angeles, CA, 2009. C. Efroymson, "The Kinked Oligopoly Curve Reconsidered," The Quarterly Journal of Economics, vol. 69, no. 1, p. 119, 1995. Bibliography