DarkCyber for December 18, 2018 Now Available
December 18, 2018
DarkCyber for December 18, 2018, is now available at www.arnoldit.com/wordpress and on Vimeo at https://www.vimeo.com/306639675 .
The program is a production of Stephen E Arnold. It is the only weekly video news shows focusing on the Dark Web and lesser known Internet services.
This week’s story line up includes… an informal agreement among Dark Web drug dealers to cut off sales of fentanyl… NSO, a provider of intelware to governments, is back in the news… Devicesavers can unlock any phone for $4,000… and a father and son Dark Web scheme leads directly to five years in prison.
First, some Dark Web ecommerce vendors are voluntarily cutting off sales of the synthetic opioid fentanyl. The reason is not going straight. The vendors are wary of stepped up police action in order to take down Dark Web sites selling the potent drug. DarkCyber notes that the actions of Dark Web ecommerce vendors are not likely to curtail the sale of the drug. Vendors move their transactions to encrypted chat sessions or private messaging groups on social media systems. Furthermore China prohibits the manufacture of fentanyl, but not some of its analogs.
Second, DarkCyber reports that the vendor of software for government agencies is back in the news. Reports link NSO with Saudi Arabia and allege that the Kingdom used NSO’s Pegasus tool to monitor Omar Abdulaziz and the slain journalist Jamal Khashoggi. Companies like NSO shun the spotlight. Now NSO finds itself allegedly linked to a high profile news story and the subject of increased attention from the Canadian Lab, an independent research group.
The third story reports that Drivesavers has a proprietary method for unlocking iPhones and Android devices. Apple took steps to eliminate a USB vulnerability which some firms were using to unlock iPhones. Drivesavers technique requires the law enforcement send the iPhone to the Drivesavers’ lab, where the phone is unlocked and its data copied to an external storage device. Drivesavers does not provide details about how its method works, but DarkCyber believes the approach is similar to that used by Cellebrite’s mobile device unlocking service. Drivesavers, DarkCyber reports, is listed on the GSA schedule which means US federal agencies can make use of the service with a minimum of bureaucratic
The final story recounts the fate of a father and son duo. The father hit upon the idea of selling his extra doctor prescribed painkillers on the Internet. When that did not work, he enlisted his son for help in setting up a Dark Web business. Federal agents spotted the ads and made an authorized drug buy. The father and son team were arrested and computing devices, text messages, and narcotics were seized. One of the text messages was from a customer who overdosed on the duo’s product. The message, sent from the hospital where the addict was recovering, wanted to set up another drug buy. The father and son team are now serving five years in prison.
DarkCyber is released each week on Tuesday. The next program will be available on December 25, 2018. In 2019, DarkCyber will introduce a Web log covering the stories in the weekly news program plus additional law enforcement related subjects.
Kenny Toth, December 18, 2018
DarkCyber for December 11, 2018 Now Available
December 11, 2018
DarkCyber for December 11, 2018, is now available at www.arnoldit.com/wordpress and on Vimeo at https://www.vimeo.com. The program is a production of Stephen E Arnold. It is the only weekly video news shows focusing on the Dark Web and lesser known Internet services.
This week’s story line up includes… a detailed report about weapons sales on the Dark Web … ThomsonReuters sells driving and personal data to ICE… and The outlines of Dark Web Version 2 become visible.
First, an information packed study about Dark Web weapons sales reveals that Glocks are the most popular illegal hand gun. How much is an illegal weapon? Prices range from $200 to more than $10,000. But fully automatic weapons are the most expensive. Cyber weapons cost a fraction of the price of a physical weapon. The information has been assembled by the RAND Corporation, and the report makes clear that despite the shut down of many Dark Web eCommerce sites, unregistered weapons are available via Tor and the Dark Web. The video provides the information needed to obtain a copy of this useful collection of hard to find data.
Second, DarkCyber reports that ThomsonReuters along with a handful of less well known companies are selling personal data to the US government. ThomsonReuters, according to a source available to DarkCyber, sells information related to driving; for example, data about license tags and information derived from surveillance cameras. With these types of data, government investigators are able to examine travel routes and may be able to pinpoint the location of vehicles. The value of proprietary data is that the accuracy and timeliness of the information can accelerate certain investigations.
The final story reveals that private group chats and encrypted instant messaging may be the future of the Dark Web. Instead of relying on special software to make online behavior anonymous, message oriented applications allow bad actors to work on the public Internet, safe from the eyes of investigators. Stephen E Arnold, author of CyberOSINT: Next Generation Information Access, said: “Encryption is an issue. DarkCyber anticipates that the US, Canada, the UK, New Zealand, and Australia will aggressively seek back doors. The time and cost of traditional decryption are prohibitive as the volume of encrypted messages goes up.”
DarkCyber is released each week on Tuesday. The next program will be available on December 25, 2018.
Kenny Toth, December 11, 2018
DarkCyber for December 4, 2018, Now Available
December 4, 2018
The December 4, 2018, DarkCyber, a weekly video news program about the Dark Web, is now available. The program can be viewed without advertisements at www.arnoldit.com/wordpress or on Vimeo at https:www.vimeo.com/303990213 .
This week’s program includes four stories. These are:
First, the CIA has made available without charge its training monograph about thinking. The book provides a run down of the habits of mind a CIA analyst or spy needs to cultivate. The book includes basic definitions, general information, and specific examples of common pitfalls. For example, the CIA publication makes clear that a vivid example with colorful details may distort one’s thinking about the event described. The DarkCyber video includes a download link for interested viewers.
The second story provides an update on the country-wide surveillance system Venezuela is deploying. The core system has been developed by ZTE, a Chinese company which enjoys close relationships with the Chinese government. One feature of the system is an identification card which allows data about a citizen’s online and offline behavior to be tracked. The new system also includes social network analysis, facial recognition, and data analytics. The installation of the ZTE system may be a response to sanctions imposed on Venezuela by the US government.
The third story reports that an Italian court has dismissed allegations that employees of the Hacking Team stole the company’s intellectual property. The count found that the crime was the work of a hacker who uses the handle Phineas Fisher. This individual is believed to have hacked the German security vendor FinFisher. The Hacking Team’s source code was posted online and is available for those interested in the Hacking Team’s methods.
The final story reports that about two thirds of the Dark Web went offline in mid November 2018. Unknown cyber criminals penetrated and deleted data from Daniel’s Hosting. After the take down of Freedom Hosting, Daniel’s Hosting became one of the larger ISPs catering to Dark Web site operators. News reports about the event suggest that the owner of Daniel’s Hosting was apprehensive about a cyber attack. However, he failed to implement appropriate security protocols. The site is now offline.
Kenny Toth, December 4, 2018
DarkCyber for October 23, 2018, Now Available
October 23, 2018
DarkCyber, Stephen E Arnold’s video news program about the Dark Web and lesser known Internet services, is now available. You can view the video at www.arnoldit.com/wordpress or on Vimeo at https://vimeo.com/296379232.
This week’s program includes four stories.
Bing and Google allegedly display content not appropriate to some users. Bing suggests links to content related to images not suitable for young people. Google allegedly returns results to YouTube videos which explain how to purchase illegal substances on the Dark Web. DarkCyber’s research team verified that content some individuals may find problematic do appear in search results. YouTube “how to” videos are findable by exploring pages deeper in a Google search result set; for example, pages six and following. The conclusion is that even when “safe search” features are activated links to topics which may be interpreted as offensive are easy to find, even for novice Web searchers.
The second story reveals that old school exploits and hacks have found a new lease on life. Bad actors are using standard office software and widely used utilities to obtain access to confidential information, employee email, and customer data. The method involves luring an employee to click on a link such as a document allegedly containing a list of employees at another company. Once the document is opened, a known vulnerability in Microsoft Office Dynamic Data Exchange is used to take over the target’s computer. DarkCyber reveals the simple fix to use to protect from this old school exploit.
The third story presents information about the system and method used by the now defunct Psy-Group. This firm has been identified as an organization of interest in the Robert Mueller investigation of President Donald Trump’s alleged interactions related to the 2016 election. DarkCyber walks through the principal components of a psychological operation designed to push the hot buttons of individuals associated with certain topics and political ideas. The DarkCyber video includes a link to additional documents related to the Psy-Group’s methods, which appear to be similar to those used by Cambridge Analytica.
The final story provides information about the decrease in Facebook usage in 2017. However, among one group, Facebook has become a must have social network. This user group is law enforcement officers. These professionals adopt false personas and work to obtain access to closed Facebook groups in order to gather information related to an investigation. The use of false personas is becoming a standard practice, and the data gathered are admissible in certain proceedings.
Beginning on October 30, 2018, DarkCyber presents a four part series about Amazon’s policeware initiative. The videos explain the importance of the Department of Defense’s JEDI procurement, the principal components of Amazon’s machine learning system, how Amazon will work to create a new type of vendor lock in, and the use of the Amazon policeware platform as a jumping off point for regulatory services in the US and expansion of its customer base outside the United States.
Kenny Toth, October 23, 2018
Tor: A Reason for Enthusiastic Discussion
October 21, 2018
The Tor Web browser was designed by the Naval Research Institute to protect journalists, human rights activists, and freedom fighters avoid detection in authoritarian governments. However, bad actors also use the browser to power the Dark Web to sell drugs, child pornography, weapons, illegal goods, participate in human trafficking, offer assassination services, and more. Homeland Security investigates in the story, “Is Tor Doing More Harm Than Good? Experts Weigh Costs Of Dark Web.”
In May 2018, Virginia Tech held a Dark Web forum that discussed Tor’s impact and whether it was a force for good or bad. The Tor browser is very much like the Internet. When the Internet was first launched it was lauded as a force for good, increasing access to information, communication between people, and more. With the good came the bad, including a new level of crime soon dubbed cyber crimes ranging from child pornography to selling illegal goods. Sound familiar? The Tor Project is supposed to be a force for good and the US State Depart, National Science Foundation, and individuals fund it. Is it worth continuing
“ ‘It’s becoming a place where certain classes of criminals can act with impunity,’ said Gareth Owenson, a senior lecturer in the School of Computing at the University of Portsmouth. ‘At the moment, the U.S. government funds Tor because it believes it is a force for good, that it is promoting human rights in other countries. My view, having studied it for almost five years now, is that overwhelmingly the harm outweighs the good.’”
Eighty percent of the Dark Web sites are dedicated to child pornography in 2014, but it has been reduced to forty percent as of 2018. Bitcoin and other crypto currencies also power the Dark Web. Anonymity is the big draw to the Tor browser and crypto currencies.
Is Tor able to deliver anonymous Web browsing? Sure it is.
Whitney Grace, October 21, 2018
DarkCyber for October 16, 2018 Is Now Available
October 16, 2018
DarkCyber for October 16, 2018, is now available at www.arnoldit.com/wordpress and on Vimeo at https://vimeo.com/295026034
Stephen E Arnold’s DarkCyber is a weekly video news and analysis program about the Dark Web and lesser known Internet services. This week’s program covers three stories related to the Dark Web and specialized Internet services.
The first story explores what appears to be a public relations spat between two Dark Web indexing vendors. Terbium Labs offers it Matchlight service to government and commercial companies. Digital Shadows sells its SearchLight service to the same markets. Terbium Labs issued a new report. The document asserts that data collection about the Dark Web and related services has to be more stringent and consistent. Digital Shadows response was a report that for $150 Dark Web bad actors would hack the email account of any employee. The data used to back the claim were general, and they lacked the specificity that Terbium Labs desires. DarkCyber’s view is that Terbium Lab is advocating a “high road”; that is, more diligent data collection and more comprehensive indexing. Digital Shadows, on the other hand, seems to be embrace the IBM approach to marketing by emphasizing uncertainty and doubt.
The second story reports that PureTech Systems has announced it fully autonomous drone platform. When a sensor is activate, the PureTech drone can launch itself, navigate to the specific location identified by the sensor, and began collecting information in real time. The data are then fed in real time into the PureTech analytics subsystem. Tasks which once required specialists and intelligence analysts can now be shifted to the PureTech platform.
The final story for the October 16, 2018, is the failure of a California film professional to arrange for a Dark Web murder. After police received a tip, the person of interest was arrested. His missteps included using his California driver’s license to purchase Bitcoin to pay the Dark Web hit man. The interest in murder for hire seems to be high; however, most of those visiting these sites do not realize that they are scams. The California man paid $5 down on the hit, but his payoff was a stay in jail, not the termination of his step mother.
DarkCyber appears each Tuesday on the blog Beyond Search and on Vimeo. A four part series about Amazon’s policeware capabilities begins on October 30, 2018. Watch for these programs at www.arnoldit.com/wordpress.
Kenny Toth, October 16, 2018
DarkCyber for October 9, 2018, Now Available
October 9, 2018
DarkCyber for October 9, 2018, is now available at www.arnoldit.com/wordpress and on Vimeo at https://vimeo.com/293949062
Stephen E Arnold’s DarkCyber is a weekly video news and analysis program about the Dark Web and lesser known Internet services. This week’s program covers two stories related to Israel’s thriving intelligence technology capabilities.
The first story discusses the allegation that NSO, based in Israel, has licensed its Pegasus system to the United Arab Emirates. A number of news services have suggested that NSO has the capability to turn a mobile phone into a remote surveillance device. Another allegation explored in this week’s DarkCyber is that NSO can access an Apple iPhone when only the mobile telephone number is provided to the company. If these assertions are accurate, NSO has leapfrogged other forensic and intelligence related firms’ capabilities.
The second story explores the startup Cobwebs Technologies. The company, founded in 2015, has implemented a wide range of capabilities into one easy to use system. Unlike IBM i2 Analyst Notebook and Palantir Technologies Gotham, Cobwebs Technologies’ approach reduces user training to a few days. Most advanced functions such as generating a relationship map or analyzing a stream of social media content require no programming. Stephen E Arnold, producer of Dark Cyber and author of CyberOSINT: Next Generation Information Access, said: “Cobwebs Technologies simplification of the content acquisition and analytics process makes advanced technology within the reach of most law enforcement and intelligence personnel. Until now, most users of advanced intelligence systems needed some programming knowledge and specialized training in the software system. Cobwebs changes the game in a significant way.”
DarkCyber appears each Tuesday. A special four part series about Amazon’s policeware capabilities begins on October 30, 2018. The program will be available on the Beyond Search blog, YouTube, and Vimeo.
Remember our special four part series about Amazon policeware begins on October 30, 2018.
Kenny Toth, October 9, 2018
DarkCyber for October 2, 2018, Now Available
October 2, 2018
Stephen E Arnold’s DarkCyber is a weekly video news and analysis program about the Dark Web and lesser known Internet services. This week’s program covers four Dark Web and security related stories.
The first story reports some of the findings from Carbon Black’s study of cryptojacking. The exploit uses an unsuspecting organization’s computers to mine cryptocurrency without the knowledge of the unwitting host. Organizations in the US, according to the study, are the number one target in the world. DarkCyber reveals how to get a free copy of this report.
The second story explores a new Dark Web crowd funding site called SadaqaCoins. The purpose of the site is to make it easy for terrorist – activists to support specific projects; for example, funding ransom, purchasing weapons, or contributing money so that sacrificial animals can be purchased by the devout. Contributions are accepted in Bitcoin, Monero, and Ethereum. The SadaqaCoins’ site then provides the funds to the person or organization requesting the funds. SadaqaCoins is not a replacement for hawala method of fund transfer.
The third story provides a snapshot of a hacking tool called theHarvester. Included with Kali Linux, theHarvester acquires information about a domain, including subdomains and other information. The system uses publicly available sources of information, including Web searches, PGP registries, Shodan, and similar content resources. The software can display names, email addresses, and related information. The software tool can be used for forensic and more aggressive information gathering tasks. DarkCyber provides information so that a viewer can download the software without charge.
The final story reports that the Drug Llama has been identified and captured. A 31 year old female allegedly sold controlled substances, including fentanyl and engaged in money laundering. The investigation included state and federal law enforcement units. For now, the Drug Llama is no longer roaming the highs and lows of the Dark Web.
Watch for our Amazon Policeware series beginning on Tuesday, October 30, 2018.
Stephen E Arnold, October 2, 2018
DarkCyber for September 25, 2018, Now Available
September 25, 2018
DarkCyber for September 25, 2018, is now available at www.arnoldit.com/wordpress and on Vimeo at https://vimeo.com/291347184
Stephen E Arnold’s DarkCyber is a weekly video news and analysis program about the Dark Web and lesser known Internet services.
This week’s program covers four Dark Web and security related stories.
The first story answers the question, “What are some essential programs for my hacking toolkit. DarkCyber identifies eight tools used by an ethical hacker and provides links to these programs. Each program performs a specific function and delivers information about passwords, system configuration, and other items of information associated with a target.
The second story explores a money laundering method implemented via online games. By exploiting the allegedly lax credit card verification methods used by Apple and other online game sellers, bad actors can use a stolen card to purchase digital assets sold within an online game. The assets can enhance the game play of the purchaser by activating special powers and other features. These digital assets can then be resold with the payments directed to an encrypted and allegedly anonymous digital currency wallet. DarkCyber notes that few parents and some game players are unaware of this scam.
The third story takes a look at Verizon’s detailed analysis of cyber crime exploits. The free report provides “how to” instructions for undertaking social engineering, hardware attacks, and malware attacks. The report includes detailed tables and appendices with additional cyber crime information. Stephen E Arnold, author of Dark Web Notebook, said, “The Verizon report contains information of value for security and law enforcement personnel. Unfortunately, this type of explanatory information provides bad actors with important insights into specific methods are effective when attacking an organization or an individual.”
The final story explains how to create a custom Tor Onion URL. Instead of a string of incomprehensible letters and numbers, DarkCyber reviews a method for generating a more easily recognized URL like “bobsbankxxxxxxxx. The procedure taps an open source software program and specific operational types created by a security expert. The video includes the site locations for the software and the instructional article.
Beginning with the program for October 30, 2018, and then for programs released on November 6, November 13, and November 20, Stephen will issue a series of four DarkCyber programs about Amazon’s policeware initiative. Each video will be about three minutes. The standard news format will resume on November 27.
The DarkCyber team has developed a for fee one hour briefing about the little known facet of Amazon’s product and services initiative. To set up a video conference, email benkent2020 at yahoo dot com. Please, put “Amazon policeware” in the subject line.
Kenny Toth, September 25, 2018
Kenny Toth
DarkCyber for September 18, 2018 Now Available
September 18, 2018
DarkCyber for September 18, 2018, is now available at www.arnoldit.com/wordpress and on Vimeo at https://vimeo.com/290147202 .
This week’s DarkCyber video news program covers … Bitfury’s deanonymization service and its unusual sales approach… the loss of UK law enforcement laptops… facial recognition for law enforcement challenged by tech company employees… and X1 and its eDiscovery system with Dark Web content support.
The first story explains that Bitfury, a UK company with an interesting staff line up, offers digital currency deanonymization services. The company’s approach to sales, however, is unusual. Specifically, the company refused to explain its services at a recent law enforcement conference. DarkCyber continues to recommend that agencies interested in digital currency deanonymization look at services available from Chainalysis and Elliptic, two companies which do explain their services to security and enforcement officials.
The second story reports that UK media pointed out that in one year, UK law enforcement lost 60 laptops. With tens of thousands of officers and operators, DarkCyber states that the alleged problem is blown out of proportion. Bad actors attempt to obtain laptops, mobiles, and other computing devices in order to compromise investigations. DarkCyber asserts that the loss of 60 laptops illustrates the good job UK authorities do with regard to preventing loss of laptops.
The third story describes the Amazon DeepLens system. In addition to explaining how this Amazon camera integrates with Amazon’s machine learning and analytics subsystems, DarkCyber reports that neither Amazon, IBM, or any other US company was able to sell their technology to Ecuador. That country purchased a state-of-the-art Chinese developed system. With employee pushback against their employers’ work for the US government, US facial recognition technology may find itself at a disadvantage with regard to technical development and system innovation.
The final story covers the X1 eDiscovery system for social content. The X1 technology can now acquire and process social media information as well as some Dark Web content. Instead of directly scraping Dark Web sites, the X1 method relies on the Tor2Web.org service. The new product costs about $2,000 per year. DarkCyber explains where to download a 14-day free trial.
Kenny Toth, September 18, 2018