SlideShare uma empresa Scribd logo
1 de 60
Baixar para ler offline
Criminal Communication in Dark web
Arjun Chetry
Arjun Chetry
Assistant Director (IT)
North Eastern Police Academy
MHA, Govt. of India.
International Certification
Cellebrite certified Operator & Cellebrite Certified Physical Analyser
Computer Hacking Forensics Investigator from EC-Council, US
Red Hat Certified System Administrator from Red Hat Linux
Red Hat Certified Engineer from Red Hat Linux
Cisco Certified Network Associate from Cisco Academy
Certified Information Security Expert from Innobuzz
Main Courses/Training Attended:
Digital Evidence & Digital forensics Training under FBI during ATA Course
Cyber crime Training under Computer Emergency Response Team of India
Memory forensics training from Data Security Council of India
Resource Person
Delivered lecture at Universities, Judiciary Academy, Indian Air force, etc.
Research Publication
Published national & international research papers
B.Sc, M.C.A, Research Scholar in Digital Forensics
Tor network for privacy protection
Secret Communication facilities
Challenges to law enforcement agencies
Importance of digital forensics
Agenda for this session
 Internet(specific in surface web) used for entertainment,
education, travelling or tourism, medical advise, Health report,
etc.: - almost everything are now available on internet or
shared over internet
 With so much activities, the internet may seem like a cyber
heaven for the common people but reality is entirely different.
Internet – Platform for livelihood
Say it a Google, Tik Tok, Facebook,
WhatsApp, imo, etc. which are top in the list
at present, almost all apps, are reading or
using our online activity for data analytics or
for developer’s help
Keeping yourself anonymous with everything
you do online is not only smart but becoming
more and more fundamentally necessary as
your freedom is restricted and your privacy is
continuously monitored
Internet – Platform for livelihood
Incognito or
private
browsing
Proxy
server or
VPN
TOR (The
Onion
Router)
Technology for better privacy online as a users
Encrypt Your Local Files, Folders, and Drives
•Online privacy is only keeping online
safe but also ensuring that your
locally stored files cannot be accessed by
unwanted parties
Technology for better privacy as a users
Tor : Attraction and Motivating Messages on Sites
Dark Web:- Users attracted for better privacy
 Dark web attracting more users everyday due to anonymity
 Such anonymity can be noble, for journalists seeking to interview citizens of
repressive countries where communications are monitored or to circumvent
government restrictions of the internet in places such as China, Iran, for enabling
them to communicate with restricted website/apps.
 Understanding the importance of anonymity and the business requirements,
Facebook announced In October 2014 that users could connect to the website,
https://facebookcorewwwi.onion/ through a TOR onion service.
What exactly is Dark Web ?
How big is Dark Web ?
Who developed Dark Web ?
Dark Web ?
11
Dark Web ?
12
How anonymity achieved for Dark web ?
Dark web and Tor Network
NO Personal information
DARK WEB SIZE
metrics.torproject.org
CRIMINAL ACTIVITIES OR
COMMUNICATION
Dark Web: A cyber heaven of criminal activity
 Anonymity of the dark web attracts not only Defense or journalist or generals users
for online privacy, but also criminal actors like drug-dealers, hackers, and child
pornography peddlers
 Major activities but not limited to:
 Hacked data or Information Leaks business
 Frauds Communication platforms
 Drug Traffickers, Arms Traffickers, Organ Traffickers communication
 Child Pornography Business
 Malware distribution or Malware business
 Cryptocurrency Mixer or making untraceable business
Facilities
Facilities
Business with Dark Web Anonymity
Business with Dark Web Anonymity
Business with Dark Web Anonymity
Tor – onion site list or records
TOR Proxies
Tor : Email options for criminal instant communication
Technology on Tor for better anonymity on Dark Web
Technology on Tor for better anonymity on Dark Web
 Briar is a messaging app designed for activists, journalists, and anyone
who needs a safe, easy and robust way to communicate.
 Unlike traditional messaging apps, Briar doesn’t rely on a central server -
messages are synchronized directly between the users’ devices.
 If the internet’s down, Briar can sync via Bluetooth or Wi-Fi, keeping the
information flowing in a crisis.
 If the internet’s up, Briar can sync via the Tor network, protecting users
and their relationships from surveillance.
Technology on Tor for better anonymity on Dark Web
Technology on Tor for better anonymity on Dark Web
Technology on Tor for better anonymity on Dark Web
Technology on Tor for better anonymity on Dark Web
PAYMENT MODE
Block Chain
Bitcoin makes sure
there is only one
block chain by
making blocks.
miners have to
compute
a cryptographic hash
of the block that
meets certain criteria
Successful miners
are rewarded some
bitcoins
Investigation and Dark Web Forensics
Dark Web : New battleground, new challenges
LE’s have to go through the same process of collecting evidence and
building cases against criminals.
However, even closer coordination between agencies does not solve
all the challenges that come with fighting crime on the Dark Web.
In many cases, the companies don’t cooperate stating user privacy
law.
But in dark web most of the time, even those companies are
anonymous.
Major Challenges for investigator – in brief
Investigation
start from the
receiving end
and they need to
reach the source
of crime.
•IP Address - TOR
•Registration details -
Anonymous
•Payment mode - Crypto
•Delivery Address
Research on retrieval of artefacts related to Dark web
My research on retrieval of artefacts related to Dark web
Summary of the session
Understanding
of dark web and
few onion sites
Multiple
applications for
providing
anonymity
Challenges to
investigation
Dark web related
artefacts from
Storage Device
or from RAM.
WhatsApp: +91-9485028139
YouTube channel
https://www.youtube.com/c/cybersafetyawareness
Arjun Chetry
chetry.arjun@gmail.com
meghtechno@gmail.com for YouTube Channel
Reference: Entire Materials was collected from Surface web and no content is copyright to speaker.
It is compiled for educational purpose only
Any Questions Please

Mais conteúdo relacionado

Mais procurados

Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
Udieh Moody
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 

Mais procurados (20)

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslec
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 

Semelhante a Dw communication

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Auto Parts Wholesale Online
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Auto Parts Wholesale Online
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
Gavin O'Toole
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Auto Parts Wholesale Online
 

Semelhante a Dw communication (20)

Darknet
DarknetDarknet
Darknet
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Dark Web Site.pdf
Dark Web Site.pdfDark Web Site.pdf
Dark Web Site.pdf
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crime
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
Dark Web
Dark WebDark Web
Dark Web
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Darknet
DarknetDarknet
Darknet
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Último (20)

psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Dw communication

  • 1. Criminal Communication in Dark web Arjun Chetry
  • 2. Arjun Chetry Assistant Director (IT) North Eastern Police Academy MHA, Govt. of India. International Certification Cellebrite certified Operator & Cellebrite Certified Physical Analyser Computer Hacking Forensics Investigator from EC-Council, US Red Hat Certified System Administrator from Red Hat Linux Red Hat Certified Engineer from Red Hat Linux Cisco Certified Network Associate from Cisco Academy Certified Information Security Expert from Innobuzz Main Courses/Training Attended: Digital Evidence & Digital forensics Training under FBI during ATA Course Cyber crime Training under Computer Emergency Response Team of India Memory forensics training from Data Security Council of India Resource Person Delivered lecture at Universities, Judiciary Academy, Indian Air force, etc. Research Publication Published national & international research papers B.Sc, M.C.A, Research Scholar in Digital Forensics
  • 3. Tor network for privacy protection Secret Communication facilities Challenges to law enforcement agencies Importance of digital forensics Agenda for this session
  • 4.  Internet(specific in surface web) used for entertainment, education, travelling or tourism, medical advise, Health report, etc.: - almost everything are now available on internet or shared over internet  With so much activities, the internet may seem like a cyber heaven for the common people but reality is entirely different. Internet – Platform for livelihood
  • 5. Say it a Google, Tik Tok, Facebook, WhatsApp, imo, etc. which are top in the list at present, almost all apps, are reading or using our online activity for data analytics or for developer’s help Keeping yourself anonymous with everything you do online is not only smart but becoming more and more fundamentally necessary as your freedom is restricted and your privacy is continuously monitored Internet – Platform for livelihood
  • 6. Incognito or private browsing Proxy server or VPN TOR (The Onion Router) Technology for better privacy online as a users
  • 7. Encrypt Your Local Files, Folders, and Drives •Online privacy is only keeping online safe but also ensuring that your locally stored files cannot be accessed by unwanted parties Technology for better privacy as a users
  • 8. Tor : Attraction and Motivating Messages on Sites
  • 9. Dark Web:- Users attracted for better privacy  Dark web attracting more users everyday due to anonymity  Such anonymity can be noble, for journalists seeking to interview citizens of repressive countries where communications are monitored or to circumvent government restrictions of the internet in places such as China, Iran, for enabling them to communicate with restricted website/apps.  Understanding the importance of anonymity and the business requirements, Facebook announced In October 2014 that users could connect to the website, https://facebookcorewwwi.onion/ through a TOR onion service.
  • 10. What exactly is Dark Web ? How big is Dark Web ? Who developed Dark Web ?
  • 13. How anonymity achieved for Dark web ?
  • 14. Dark web and Tor Network
  • 15.
  • 17.
  • 19.
  • 21.
  • 23. Dark Web: A cyber heaven of criminal activity  Anonymity of the dark web attracts not only Defense or journalist or generals users for online privacy, but also criminal actors like drug-dealers, hackers, and child pornography peddlers  Major activities but not limited to:  Hacked data or Information Leaks business  Frauds Communication platforms  Drug Traffickers, Arms Traffickers, Organ Traffickers communication  Child Pornography Business  Malware distribution or Malware business  Cryptocurrency Mixer or making untraceable business
  • 26. Business with Dark Web Anonymity
  • 27. Business with Dark Web Anonymity
  • 28. Business with Dark Web Anonymity
  • 29. Tor – onion site list or records
  • 30.
  • 32. Tor : Email options for criminal instant communication
  • 33.
  • 34.
  • 35.
  • 36. Technology on Tor for better anonymity on Dark Web
  • 37. Technology on Tor for better anonymity on Dark Web
  • 38.  Briar is a messaging app designed for activists, journalists, and anyone who needs a safe, easy and robust way to communicate.  Unlike traditional messaging apps, Briar doesn’t rely on a central server - messages are synchronized directly between the users’ devices.  If the internet’s down, Briar can sync via Bluetooth or Wi-Fi, keeping the information flowing in a crisis.  If the internet’s up, Briar can sync via the Tor network, protecting users and their relationships from surveillance. Technology on Tor for better anonymity on Dark Web
  • 39. Technology on Tor for better anonymity on Dark Web
  • 40.
  • 41.
  • 42.
  • 43. Technology on Tor for better anonymity on Dark Web
  • 44. Technology on Tor for better anonymity on Dark Web
  • 46.
  • 47. Block Chain Bitcoin makes sure there is only one block chain by making blocks. miners have to compute a cryptographic hash of the block that meets certain criteria Successful miners are rewarded some bitcoins
  • 48.
  • 49.
  • 50. Investigation and Dark Web Forensics
  • 51. Dark Web : New battleground, new challenges LE’s have to go through the same process of collecting evidence and building cases against criminals. However, even closer coordination between agencies does not solve all the challenges that come with fighting crime on the Dark Web. In many cases, the companies don’t cooperate stating user privacy law. But in dark web most of the time, even those companies are anonymous.
  • 52. Major Challenges for investigator – in brief Investigation start from the receiving end and they need to reach the source of crime. •IP Address - TOR •Registration details - Anonymous •Payment mode - Crypto •Delivery Address
  • 53.
  • 54. Research on retrieval of artefacts related to Dark web
  • 55. My research on retrieval of artefacts related to Dark web
  • 56.
  • 57.
  • 58.
  • 59. Summary of the session Understanding of dark web and few onion sites Multiple applications for providing anonymity Challenges to investigation Dark web related artefacts from Storage Device or from RAM.
  • 60. WhatsApp: +91-9485028139 YouTube channel https://www.youtube.com/c/cybersafetyawareness Arjun Chetry chetry.arjun@gmail.com meghtechno@gmail.com for YouTube Channel Reference: Entire Materials was collected from Surface web and no content is copyright to speaker. It is compiled for educational purpose only Any Questions Please