Criminal Communication in Dark web
Arjun Chetry
Arjun Chetry
Assistant Director (IT)
North Eastern Police Academy
MHA, Govt. of India.
International Certification
Cellebrite certified Operator & Cellebrite Certified Physical Analyser
Computer Hacking Forensics Investigator from EC-Council, US
Red Hat Certified System Administrator from Red Hat Linux
Red Hat Certified Engineer from Red Hat Linux
Cisco Certified Network Associate from Cisco Academy
Certified Information Security Expert from Innobuzz
Main Courses/Training Attended:
Digital Evidence & Digital forensics Training under FBI during ATA Course
Cyber crime Training under Computer Emergency Response Team of India
Memory forensics training from Data Security Council of India
Resource Person
Delivered lecture at Universities, Judiciary Academy, Indian Air force, etc.
Research Publication
Published national & international research papers
B.Sc, M.C.A, Research Scholar in Digital Forensics
Tor network for privacy protection
Secret Communication facilities
Challenges to law enforcement agencies
Importance of digital forensics
Agenda for this session
 Internet(specific in surface web) used for entertainment,
education, travelling or tourism, medical advise, Health report,
etc.: - almost everything are now available on internet or
shared over internet
 With so much activities, the internet may seem like a cyber
heaven for the common people but reality is entirely different.
Internet – Platform for livelihood
Say it a Google, Tik Tok, Facebook,
WhatsApp, imo, etc. which are top in the list
at present, almost all apps, are reading or
using our online activity for data analytics or
for developer’s help
Keeping yourself anonymous with everything
you do online is not only smart but becoming
more and more fundamentally necessary as
your freedom is restricted and your privacy is
continuously monitored
Internet – Platform for livelihood
Incognito or
private
browsing
Proxy
server or
VPN
TOR (The
Onion
Router)
Technology for better privacy online as a users
Encrypt Your Local Files, Folders, and Drives
•Online privacy is only keeping online
safe but also ensuring that your
locally stored files cannot be accessed by
unwanted parties
Technology for better privacy as a users
Tor : Attraction and Motivating Messages on Sites
Dark Web:- Users attracted for better privacy
 Dark web attracting more users everyday due to anonymity
 Such anonymity can be noble, for journalists seeking to interview citizens of
repressive countries where communications are monitored or to circumvent
government restrictions of the internet in places such as China, Iran, for enabling
them to communicate with restricted website/apps.
 Understanding the importance of anonymity and the business requirements,
Facebook announced In October 2014 that users could connect to the website,
https://facebookcorewwwi.onion/ through a TOR onion service.
What exactly is Dark Web ?
How big is Dark Web ?
Who developed Dark Web ?
Dark Web ?
11
Dark Web ?
12
How anonymity achieved for Dark web ?
Dark web and Tor Network
NO Personal information
DARK WEB SIZE
metrics.torproject.org
CRIMINAL ACTIVITIES OR
COMMUNICATION
Dark Web: A cyber heaven of criminal activity
 Anonymity of the dark web attracts not only Defense or journalist or generals users
for online privacy, but also criminal actors like drug-dealers, hackers, and child
pornography peddlers
 Major activities but not limited to:
 Hacked data or Information Leaks business
 Frauds Communication platforms
 Drug Traffickers, Arms Traffickers, Organ Traffickers communication
 Child Pornography Business
 Malware distribution or Malware business
 Cryptocurrency Mixer or making untraceable business
Facilities
Facilities
Business with Dark Web Anonymity
Business with Dark Web Anonymity
Business with Dark Web Anonymity
Tor – onion site list or records
TOR Proxies
Tor : Email options for criminal instant communication
Technology on Tor for better anonymity on Dark Web
Technology on Tor for better anonymity on Dark Web
 Briar is a messaging app designed for activists, journalists, and anyone
who needs a safe, easy and robust way to communicate.
 Unlike traditional messaging apps, Briar doesn’t rely on a central server -
messages are synchronized directly between the users’ devices.
 If the internet’s down, Briar can sync via Bluetooth or Wi-Fi, keeping the
information flowing in a crisis.
 If the internet’s up, Briar can sync via the Tor network, protecting users
and their relationships from surveillance.
Technology on Tor for better anonymity on Dark Web
Technology on Tor for better anonymity on Dark Web
Technology on Tor for better anonymity on Dark Web
Technology on Tor for better anonymity on Dark Web
PAYMENT MODE
Block Chain
Bitcoin makes sure
there is only one
block chain by
making blocks.
miners have to
compute
a cryptographic hash
of the block that
meets certain criteria
Successful miners
are rewarded some
bitcoins
Investigation and Dark Web Forensics
Dark Web : New battleground, new challenges
LE’s have to go through the same process of collecting evidence and
building cases against criminals.
However, even closer coordination between agencies does not solve
all the challenges that come with fighting crime on the Dark Web.
In many cases, the companies don’t cooperate stating user privacy
law.
But in dark web most of the time, even those companies are
anonymous.
Major Challenges for investigator – in brief
Investigation
start from the
receiving end
and they need to
reach the source
of crime.
•IP Address - TOR
•Registration details -
Anonymous
•Payment mode - Crypto
•Delivery Address
Research on retrieval of artefacts related to Dark web
My research on retrieval of artefacts related to Dark web
Summary of the session
Understanding
of dark web and
few onion sites
Multiple
applications for
providing
anonymity
Challenges to
investigation
Dark web related
artefacts from
Storage Device
or from RAM.
WhatsApp: +91-9485028139
YouTube channel
https://www.youtube.com/c/cybersafetyawareness
Arjun Chetry
chetry.arjun@gmail.com
meghtechno@gmail.com for YouTube Channel
Reference: Entire Materials was collected from Surface web and no content is copyright to speaker.
It is compiled for educational purpose only
Any Questions Please

Dw communication

  • 1.
    Criminal Communication inDark web Arjun Chetry
  • 2.
    Arjun Chetry Assistant Director(IT) North Eastern Police Academy MHA, Govt. of India. International Certification Cellebrite certified Operator & Cellebrite Certified Physical Analyser Computer Hacking Forensics Investigator from EC-Council, US Red Hat Certified System Administrator from Red Hat Linux Red Hat Certified Engineer from Red Hat Linux Cisco Certified Network Associate from Cisco Academy Certified Information Security Expert from Innobuzz Main Courses/Training Attended: Digital Evidence & Digital forensics Training under FBI during ATA Course Cyber crime Training under Computer Emergency Response Team of India Memory forensics training from Data Security Council of India Resource Person Delivered lecture at Universities, Judiciary Academy, Indian Air force, etc. Research Publication Published national & international research papers B.Sc, M.C.A, Research Scholar in Digital Forensics
  • 3.
    Tor network forprivacy protection Secret Communication facilities Challenges to law enforcement agencies Importance of digital forensics Agenda for this session
  • 4.
     Internet(specific insurface web) used for entertainment, education, travelling or tourism, medical advise, Health report, etc.: - almost everything are now available on internet or shared over internet  With so much activities, the internet may seem like a cyber heaven for the common people but reality is entirely different. Internet – Platform for livelihood
  • 5.
    Say it aGoogle, Tik Tok, Facebook, WhatsApp, imo, etc. which are top in the list at present, almost all apps, are reading or using our online activity for data analytics or for developer’s help Keeping yourself anonymous with everything you do online is not only smart but becoming more and more fundamentally necessary as your freedom is restricted and your privacy is continuously monitored Internet – Platform for livelihood
  • 6.
    Incognito or private browsing Proxy server or VPN TOR(The Onion Router) Technology for better privacy online as a users
  • 7.
    Encrypt Your LocalFiles, Folders, and Drives •Online privacy is only keeping online safe but also ensuring that your locally stored files cannot be accessed by unwanted parties Technology for better privacy as a users
  • 8.
    Tor : Attractionand Motivating Messages on Sites
  • 9.
    Dark Web:- Usersattracted for better privacy  Dark web attracting more users everyday due to anonymity  Such anonymity can be noble, for journalists seeking to interview citizens of repressive countries where communications are monitored or to circumvent government restrictions of the internet in places such as China, Iran, for enabling them to communicate with restricted website/apps.  Understanding the importance of anonymity and the business requirements, Facebook announced In October 2014 that users could connect to the website, https://facebookcorewwwi.onion/ through a TOR onion service.
  • 10.
    What exactly isDark Web ? How big is Dark Web ? Who developed Dark Web ?
  • 11.
  • 12.
  • 13.
    How anonymity achievedfor Dark web ?
  • 14.
    Dark web andTor Network
  • 16.
  • 18.
  • 20.
  • 22.
  • 23.
    Dark Web: Acyber heaven of criminal activity  Anonymity of the dark web attracts not only Defense or journalist or generals users for online privacy, but also criminal actors like drug-dealers, hackers, and child pornography peddlers  Major activities but not limited to:  Hacked data or Information Leaks business  Frauds Communication platforms  Drug Traffickers, Arms Traffickers, Organ Traffickers communication  Child Pornography Business  Malware distribution or Malware business  Cryptocurrency Mixer or making untraceable business
  • 24.
  • 25.
  • 26.
    Business with DarkWeb Anonymity
  • 27.
    Business with DarkWeb Anonymity
  • 28.
    Business with DarkWeb Anonymity
  • 29.
    Tor – onionsite list or records
  • 31.
  • 32.
    Tor : Emailoptions for criminal instant communication
  • 36.
    Technology on Torfor better anonymity on Dark Web
  • 37.
    Technology on Torfor better anonymity on Dark Web
  • 38.
     Briar isa messaging app designed for activists, journalists, and anyone who needs a safe, easy and robust way to communicate.  Unlike traditional messaging apps, Briar doesn’t rely on a central server - messages are synchronized directly between the users’ devices.  If the internet’s down, Briar can sync via Bluetooth or Wi-Fi, keeping the information flowing in a crisis.  If the internet’s up, Briar can sync via the Tor network, protecting users and their relationships from surveillance. Technology on Tor for better anonymity on Dark Web
  • 39.
    Technology on Torfor better anonymity on Dark Web
  • 43.
    Technology on Torfor better anonymity on Dark Web
  • 44.
    Technology on Torfor better anonymity on Dark Web
  • 45.
  • 47.
    Block Chain Bitcoin makessure there is only one block chain by making blocks. miners have to compute a cryptographic hash of the block that meets certain criteria Successful miners are rewarded some bitcoins
  • 50.
  • 51.
    Dark Web :New battleground, new challenges LE’s have to go through the same process of collecting evidence and building cases against criminals. However, even closer coordination between agencies does not solve all the challenges that come with fighting crime on the Dark Web. In many cases, the companies don’t cooperate stating user privacy law. But in dark web most of the time, even those companies are anonymous.
  • 52.
    Major Challenges forinvestigator – in brief Investigation start from the receiving end and they need to reach the source of crime. •IP Address - TOR •Registration details - Anonymous •Payment mode - Crypto •Delivery Address
  • 54.
    Research on retrievalof artefacts related to Dark web
  • 55.
    My research onretrieval of artefacts related to Dark web
  • 59.
    Summary of thesession Understanding of dark web and few onion sites Multiple applications for providing anonymity Challenges to investigation Dark web related artefacts from Storage Device or from RAM.
  • 60.
    WhatsApp: +91-9485028139 YouTube channel https://www.youtube.com/c/cybersafetyawareness ArjunChetry chetry.arjun@gmail.com meghtechno@gmail.com for YouTube Channel Reference: Entire Materials was collected from Surface web and no content is copyright to speaker. It is compiled for educational purpose only Any Questions Please