SlideShare a Scribd company logo
1 of 60
Download to read offline
Criminal Communication in Dark web
Arjun Chetry
Arjun Chetry
Assistant Director (IT)
North Eastern Police Academy
MHA, Govt. of India.
International Certification
Cellebrite certified Operator & Cellebrite Certified Physical Analyser
Computer Hacking Forensics Investigator from EC-Council, US
Red Hat Certified System Administrator from Red Hat Linux
Red Hat Certified Engineer from Red Hat Linux
Cisco Certified Network Associate from Cisco Academy
Certified Information Security Expert from Innobuzz
Main Courses/Training Attended:
Digital Evidence & Digital forensics Training under FBI during ATA Course
Cyber crime Training under Computer Emergency Response Team of India
Memory forensics training from Data Security Council of India
Resource Person
Delivered lecture at Universities, Judiciary Academy, Indian Air force, etc.
Research Publication
Published national & international research papers
B.Sc, M.C.A, Research Scholar in Digital Forensics
Tor network for privacy protection
Secret Communication facilities
Challenges to law enforcement agencies
Importance of digital forensics
Agenda for this session
 Internet(specific in surface web) used for entertainment,
education, travelling or tourism, medical advise, Health report,
etc.: - almost everything are now available on internet or
shared over internet
 With so much activities, the internet may seem like a cyber
heaven for the common people but reality is entirely different.
Internet – Platform for livelihood
Say it a Google, Tik Tok, Facebook,
WhatsApp, imo, etc. which are top in the list
at present, almost all apps, are reading or
using our online activity for data analytics or
for developer’s help
Keeping yourself anonymous with everything
you do online is not only smart but becoming
more and more fundamentally necessary as
your freedom is restricted and your privacy is
continuously monitored
Internet – Platform for livelihood
Incognito or
private
browsing
Proxy
server or
VPN
TOR (The
Onion
Router)
Technology for better privacy online as a users
Encrypt Your Local Files, Folders, and Drives
•Online privacy is only keeping online
safe but also ensuring that your
locally stored files cannot be accessed by
unwanted parties
Technology for better privacy as a users
Tor : Attraction and Motivating Messages on Sites
Dark Web:- Users attracted for better privacy
 Dark web attracting more users everyday due to anonymity
 Such anonymity can be noble, for journalists seeking to interview citizens of
repressive countries where communications are monitored or to circumvent
government restrictions of the internet in places such as China, Iran, for enabling
them to communicate with restricted website/apps.
 Understanding the importance of anonymity and the business requirements,
Facebook announced In October 2014 that users could connect to the website,
https://facebookcorewwwi.onion/ through a TOR onion service.
What exactly is Dark Web ?
How big is Dark Web ?
Who developed Dark Web ?
Dark Web ?
11
Dark Web ?
12
How anonymity achieved for Dark web ?
Dark web and Tor Network
NO Personal information
DARK WEB SIZE
metrics.torproject.org
CRIMINAL ACTIVITIES OR
COMMUNICATION
Dark Web: A cyber heaven of criminal activity
 Anonymity of the dark web attracts not only Defense or journalist or generals users
for online privacy, but also criminal actors like drug-dealers, hackers, and child
pornography peddlers
 Major activities but not limited to:
 Hacked data or Information Leaks business
 Frauds Communication platforms
 Drug Traffickers, Arms Traffickers, Organ Traffickers communication
 Child Pornography Business
 Malware distribution or Malware business
 Cryptocurrency Mixer or making untraceable business
Facilities
Facilities
Business with Dark Web Anonymity
Business with Dark Web Anonymity
Business with Dark Web Anonymity
Tor – onion site list or records
TOR Proxies
Tor : Email options for criminal instant communication
Technology on Tor for better anonymity on Dark Web
Technology on Tor for better anonymity on Dark Web
 Briar is a messaging app designed for activists, journalists, and anyone
who needs a safe, easy and robust way to communicate.
 Unlike traditional messaging apps, Briar doesn’t rely on a central server -
messages are synchronized directly between the users’ devices.
 If the internet’s down, Briar can sync via Bluetooth or Wi-Fi, keeping the
information flowing in a crisis.
 If the internet’s up, Briar can sync via the Tor network, protecting users
and their relationships from surveillance.
Technology on Tor for better anonymity on Dark Web
Technology on Tor for better anonymity on Dark Web
Technology on Tor for better anonymity on Dark Web
Technology on Tor for better anonymity on Dark Web
PAYMENT MODE
Block Chain
Bitcoin makes sure
there is only one
block chain by
making blocks.
miners have to
compute
a cryptographic hash
of the block that
meets certain criteria
Successful miners
are rewarded some
bitcoins
Investigation and Dark Web Forensics
Dark Web : New battleground, new challenges
LE’s have to go through the same process of collecting evidence and
building cases against criminals.
However, even closer coordination between agencies does not solve
all the challenges that come with fighting crime on the Dark Web.
In many cases, the companies don’t cooperate stating user privacy
law.
But in dark web most of the time, even those companies are
anonymous.
Major Challenges for investigator – in brief
Investigation
start from the
receiving end
and they need to
reach the source
of crime.
•IP Address - TOR
•Registration details -
Anonymous
•Payment mode - Crypto
•Delivery Address
Research on retrieval of artefacts related to Dark web
My research on retrieval of artefacts related to Dark web
Summary of the session
Understanding
of dark web and
few onion sites
Multiple
applications for
providing
anonymity
Challenges to
investigation
Dark web related
artefacts from
Storage Device
or from RAM.
WhatsApp: +91-9485028139
YouTube channel
https://www.youtube.com/c/cybersafetyawareness
Arjun Chetry
chetry.arjun@gmail.com
meghtechno@gmail.com for YouTube Channel
Reference: Entire Materials was collected from Surface web and no content is copyright to speaker.
It is compiled for educational purpose only
Any Questions Please

More Related Content

What's hot

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinEslam Hussein
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslecscottdp3
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 

What's hot (20)

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslec
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 

Similar to Dw communication

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat IntelligenceMarlabs
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crimejung921
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfAuto Parts Wholesale Online
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Auto Parts Wholesale Online
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight IntelliaggGavin O'Toole
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfAuto Parts Wholesale Online
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 

Similar to Dw communication (20)

Darknet
DarknetDarknet
Darknet
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Dark Web Site.pdf
Dark Web Site.pdfDark Web Site.pdf
Dark Web Site.pdf
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crime
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
Dark Web
Dark WebDark Web
Dark Web
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Darknet
DarknetDarknet
Darknet
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 

Recently uploaded

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Recently uploaded (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

Dw communication

  • 1. Criminal Communication in Dark web Arjun Chetry
  • 2. Arjun Chetry Assistant Director (IT) North Eastern Police Academy MHA, Govt. of India. International Certification Cellebrite certified Operator & Cellebrite Certified Physical Analyser Computer Hacking Forensics Investigator from EC-Council, US Red Hat Certified System Administrator from Red Hat Linux Red Hat Certified Engineer from Red Hat Linux Cisco Certified Network Associate from Cisco Academy Certified Information Security Expert from Innobuzz Main Courses/Training Attended: Digital Evidence & Digital forensics Training under FBI during ATA Course Cyber crime Training under Computer Emergency Response Team of India Memory forensics training from Data Security Council of India Resource Person Delivered lecture at Universities, Judiciary Academy, Indian Air force, etc. Research Publication Published national & international research papers B.Sc, M.C.A, Research Scholar in Digital Forensics
  • 3. Tor network for privacy protection Secret Communication facilities Challenges to law enforcement agencies Importance of digital forensics Agenda for this session
  • 4.  Internet(specific in surface web) used for entertainment, education, travelling or tourism, medical advise, Health report, etc.: - almost everything are now available on internet or shared over internet  With so much activities, the internet may seem like a cyber heaven for the common people but reality is entirely different. Internet – Platform for livelihood
  • 5. Say it a Google, Tik Tok, Facebook, WhatsApp, imo, etc. which are top in the list at present, almost all apps, are reading or using our online activity for data analytics or for developer’s help Keeping yourself anonymous with everything you do online is not only smart but becoming more and more fundamentally necessary as your freedom is restricted and your privacy is continuously monitored Internet – Platform for livelihood
  • 6. Incognito or private browsing Proxy server or VPN TOR (The Onion Router) Technology for better privacy online as a users
  • 7. Encrypt Your Local Files, Folders, and Drives •Online privacy is only keeping online safe but also ensuring that your locally stored files cannot be accessed by unwanted parties Technology for better privacy as a users
  • 8. Tor : Attraction and Motivating Messages on Sites
  • 9. Dark Web:- Users attracted for better privacy  Dark web attracting more users everyday due to anonymity  Such anonymity can be noble, for journalists seeking to interview citizens of repressive countries where communications are monitored or to circumvent government restrictions of the internet in places such as China, Iran, for enabling them to communicate with restricted website/apps.  Understanding the importance of anonymity and the business requirements, Facebook announced In October 2014 that users could connect to the website, https://facebookcorewwwi.onion/ through a TOR onion service.
  • 10. What exactly is Dark Web ? How big is Dark Web ? Who developed Dark Web ?
  • 13. How anonymity achieved for Dark web ?
  • 14. Dark web and Tor Network
  • 15.
  • 17.
  • 19.
  • 21.
  • 23. Dark Web: A cyber heaven of criminal activity  Anonymity of the dark web attracts not only Defense or journalist or generals users for online privacy, but also criminal actors like drug-dealers, hackers, and child pornography peddlers  Major activities but not limited to:  Hacked data or Information Leaks business  Frauds Communication platforms  Drug Traffickers, Arms Traffickers, Organ Traffickers communication  Child Pornography Business  Malware distribution or Malware business  Cryptocurrency Mixer or making untraceable business
  • 26. Business with Dark Web Anonymity
  • 27. Business with Dark Web Anonymity
  • 28. Business with Dark Web Anonymity
  • 29. Tor – onion site list or records
  • 30.
  • 32. Tor : Email options for criminal instant communication
  • 33.
  • 34.
  • 35.
  • 36. Technology on Tor for better anonymity on Dark Web
  • 37. Technology on Tor for better anonymity on Dark Web
  • 38.  Briar is a messaging app designed for activists, journalists, and anyone who needs a safe, easy and robust way to communicate.  Unlike traditional messaging apps, Briar doesn’t rely on a central server - messages are synchronized directly between the users’ devices.  If the internet’s down, Briar can sync via Bluetooth or Wi-Fi, keeping the information flowing in a crisis.  If the internet’s up, Briar can sync via the Tor network, protecting users and their relationships from surveillance. Technology on Tor for better anonymity on Dark Web
  • 39. Technology on Tor for better anonymity on Dark Web
  • 40.
  • 41.
  • 42.
  • 43. Technology on Tor for better anonymity on Dark Web
  • 44. Technology on Tor for better anonymity on Dark Web
  • 46.
  • 47. Block Chain Bitcoin makes sure there is only one block chain by making blocks. miners have to compute a cryptographic hash of the block that meets certain criteria Successful miners are rewarded some bitcoins
  • 48.
  • 49.
  • 50. Investigation and Dark Web Forensics
  • 51. Dark Web : New battleground, new challenges LE’s have to go through the same process of collecting evidence and building cases against criminals. However, even closer coordination between agencies does not solve all the challenges that come with fighting crime on the Dark Web. In many cases, the companies don’t cooperate stating user privacy law. But in dark web most of the time, even those companies are anonymous.
  • 52. Major Challenges for investigator – in brief Investigation start from the receiving end and they need to reach the source of crime. •IP Address - TOR •Registration details - Anonymous •Payment mode - Crypto •Delivery Address
  • 53.
  • 54. Research on retrieval of artefacts related to Dark web
  • 55. My research on retrieval of artefacts related to Dark web
  • 56.
  • 57.
  • 58.
  • 59. Summary of the session Understanding of dark web and few onion sites Multiple applications for providing anonymity Challenges to investigation Dark web related artefacts from Storage Device or from RAM.
  • 60. WhatsApp: +91-9485028139 YouTube channel https://www.youtube.com/c/cybersafetyawareness Arjun Chetry chetry.arjun@gmail.com meghtechno@gmail.com for YouTube Channel Reference: Entire Materials was collected from Surface web and no content is copyright to speaker. It is compiled for educational purpose only Any Questions Please