The Deep Web, The Darknet, And Bitcoin - MarkMonitor

1y ago
11 Views
2 Downloads
2.20 MB
32 Pages
Last View : 12d ago
Last Download : 3m ago
Upload by : Gia Hauser
Transcription

The Deep Web, the Darknet,and BitcoinElisa Cooper & Akino ChikadaMarkMonitor 2015 MarkMonitor Inc. All rights reserved.

Agenda Deep Web vs DarknetTorUnderground MarketplacesRole of BitcoinStrategies for Mitigating AbuseQ&A Session

Understanding the Internet LandscapeSurface WebSearchable with standardsearch enginesDeep WebUn-indexed websitesDark Web / DarkNetDark Web: web content that exists onthe DarkNetDarkNet: Network that can only beaccessed with specific software,configurations, or authorizationThe Deep Web is hundreds of times larger than the ‘Surface Web'

What's in the Deep Web? 96% of the content exists in the deep web 7500 TB of content Types of content that is in the deep web: Dynamic contentUnlinked contentPrivate WebContextual WebLimited access content]Scripted contentNon-HTML/text contentSoftwareWeb archivesUn-indexed websitesP2P networks

Deep Web ContentNot Everything in the Deep Web is Seedy Forms Login / Paywall Corporate Intranet Social Media Sites No URL

Deep Web Content of Concern Any un-indexed web page Selling counterfeit or grey market goodsCollecting user credentialsDisseminating malwareEngaged in false associationConducting consumer scam P2P sites where piracy taking place Marketplaces where counterfeit, grey market or unauthorizedgoods are sold Social media where impersonation is occurring

How Are Consumers Directed to the ch

So What Is the Darknet? Within the Darknet both web surfers and website publishers areentirely anonymous Anonymity is usually achieved using Tor There are a number of marketplaces (the online black market) AbraxasAgora MarketplaceMiddle Earth MarketplaceNucleusSilk Road 1, 2 and 3

What is Tor? Acronym for The Onion Router Free software for enabling anonymous communication Originally developed on behalf of the U.S. intelligencecommunity Today it is used by criminal enterprises, hacktivists, and lawenforcement agencies Users can remain anonymous Activities can remain untraceable Resources can remain hidden

How is Tor Accessed?

The Tor Browser

How Does Tor Work?torproject.org

How Does Tor Work?torproject.org

How Does Tor Work?torproject.org

Accessing Underground Marketplaces

What’s Sold on a Typical Tor Security0100020003000400050006000Source: Abraxas marketplace7000

Underground Marketplaces on Tor Typically require registration Some require invitation to join Link on another site – not difficult to obtain Some marketplaces are sophisticated Seller ratingsSeller profilesOrder historyOnline discussions groups

Typical Tor Marketplace

Typical Tor Marketplace - Pirated Software

Typical Tor Marketplace - Luxury Goods

Typical Tor Marketplace - Pharmaceuticals

Typical Tor Marketplace - Counterfeits

Typical Tor Marketplace – Account Info

So What Role Does Bitcoin Play? Sites utilize Bitcoin to conduct transactions Other types of cryptocurrency are sometimes accepted Dash (formerly known as Darkcoin)

How Does Bitcoin Work? Anonymous payment system Utilizes peer-to-peer technology to operate with no central authority Relies upon “Miners” rewarded with Bitcoin to conduct networktransactions Transactions are conducted electronically using URIs which can beimbedded in QR codes for use with mobile devices Bitcoin can be bought and sold through online exchanges Currently 13 million Bitcoin in circulation Current value of a Bitcoin is 295 US By 2140, there will be no more than 21 million Bitcoin

Features of Bitcoin Decentralized The Bitcoin network is not controlled by any one central authority every machine that mines Bitcoin and processes transactions makesup a part of the network, and the machines work together Anonymous Bitcoin addresses are not linked to names, addresses, or otherpersonally identifying information Fast Money can be sent anywhere and arrives within minutes, as soon asthe Bitcoin network processes the payment Non-Reversible When Bitcoins are sent, there’s no getting them back, unless therecipient returns them to you – they are gone forever

Identifying Abuse in Deep ANDP2P/FilesharingRISKEmailMarketplacesMobileApps

Mitigating Abuse in Deep Web Enforcement options C&Ds to website operators Take-down requests to ISPs Notices to marketplaces, social media sites, mobile app stores

Identifying Abuse in the Darknet Understand your level of risk FIs must be monitoring for account information Those with counterfeiting issues should determine if thesemarketplaces provide means of mass distribution All others should: Determine whether you need regular monitoring OR Periodic monitoring for changes to the threat landscape Track abuse over time Evolving area of the Internet

Mitigating Abuse in the Darknet Due to anonymity, online enforcement difficult May be information if seller profiles are available E-mail addresses may be used to uncover additional information May consider test-buys to understand what is being sold Truly counterfeit, grey market, stolen For stolen account or credential information Work with internal fraud teams to determine next steps

Questions?

Thank You! For information on MarkMonitor solutions, services andcomplimentary educational events Contact us via email:field.marketing@markmonitor.com Visit our website at:www.markmonitor.com Contact us via phone:US: 1 (800) 745 9229Europe: 44 (0) 203 206 2220

Dark Web / DarkNet The Deep Web is hundreds of times larger than the 'Surface Web' Searchable with standard search engines Un-indexed websites Dark Web: web content that exists on the DarkNet DarkNet: Network that can only be accessed with specific software, configurations, or authorization

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

We divide the darknet into two types: internal and external. From the viewpoint of an organization, the darknet within its own organization is an internal darknet, and the darknets in other organizations are external darknets. 3.1 Internal Darknet Alert (Local Scan) As shown in Figure 2, when a malware infection occurs in .

Darknet Market Analysis Darknet Markets are online markets hosted on the Tor ser-vice and guarantee strong anonymity property to partici-pants. As a result, the darknet markets involve in illegal ac-tivities online. For the sake of public interests, the authorities and researchers have a growing interest to understand the darknet markets.

2.2. Darknet space In a nutshell, darknet traffic is Internet traffic destined to unused Internet addresses (i.e., dark sensors). Since these addresses are unallocated, any traffic targeting such space is suspi-cious. Darknet analysis has shown to be an effective method to generate cyber threat intelligence [8,9]. Darknet traffic is typically

NICTER is building a darknet monitoring system that distributes installation of darknet sensors based on coop-eration with various organizations in Japan and overseas, then collects and manages the darknet traffic observed by these sensors in real time. This darknet monitoring system started from approximately 16,000 addresses in 2005, and

way to communicate anonymously is via darknet existing within deep web. While the terms darknet and deep web seem interchangeable, they refer to different elements of the web. Darknet is a part of the deep web that is approximately 400 to 550 times larger than the commonly defined world wide web (Beckett, 2009).

Broadcasting: Our strategy & targets at a glance By making sustainability all of our business, working to deliver: Efficient, low impact operations and a thriving sustainable workforce. We will: - Cut our carbon emissions by 24% by 2022 in line with a science based reduction target - Buy renewable energy - Operate buildings and technology efficiently - Provide training for staff, creating .