Law Enforcement Utilizes New and Traditional Methods for Dark Web Matters

September 15, 2016

While the Dark Web may be thought of as a home to drug dealers, several individuals have been apprehended by law enforcement. Edinburgh News published a report: FBI Helps Catch Edinburgh Man Selling Drugs on ‘Dark Web’. David Trail was convicted for creating a similar website to eBay, but on the Dark Web, called Topix2. Stolen credit card information from his former employer, Scotweb were found in the search of his home. The article states,

Detective Inspector Brian Stuart, of the Cybercrime Unit, said: ‘Following information from colleagues in FBI, Germany’s West Hessen Police and the UK’s National Crime Agency, Police Scotland identified David Trail and his operation and ownership of a hidden website designed to enable its users to buy and sell illegal drugs anonymously and beyond the reach of law enforcement. His targeting of a previous employer, overcoming their security, almost had a devastating effect on the company’s ability to remain in business.

As this piece notes, law enforcement used a combination of new and traditional policing techniques to apprehend Trail. Another common practice we have been seeing is the cooperation of intelligence authorities across borders — and across levels of law enforcement. In the Internet age this is a necessity, and even more so when the nature of the Dark Web is taken into account.

Megan Feil, September 15, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/

Is a New Policing Group Needed to Deal with Online Cyber Terrorism?

September 11, 2016

In June 2015, Yahoo News had reported breach of election systems of Illinois an Arizona for possibly stealing the data. According to the Department of Homeland Security, the perpetrators may have been probably were Russian state-sponsored hackers, an easy scapegoat in the run up to the US elections. The attack method allegedly was a Denial of Service (DoS) strategy. But how do hackers get access to network of computers and servers and still remain anonymous?

A report published by ABC Net “Thousands of Australian Computer Log Ins Up for Sale on Dark Web” states that

Computers from a federal research network, a peak sporting body, a school and a local council are among tens of thousands of machines which have been hacked and had their login details put up for sale in a Dark Web marketplace.

And if you think that it would cost hundreds of thousands of Bitcoins on Dark Web to control these hacked network of systems, you are in for a shock. Kaspersky, the anti virus centric security firm, which detected the hack says that

Computers like these can be rented by cyber criminals and used to launch attacks against others for as little as $6.

No wonder cyber terrorists , – whether state sponsored or rogue – are able to launch large scale attacks on federal agencies and American corporations with minimal risk and cost. It is evident from the fact that data breaches are becoming increasingly common. The latest victim being DropBox wherein access credentials of 68 million users were leaked.

The key question here is, “Is an international coordinated agency needed to police cyber crime?” Existing organizations seem to be less and less able to deal with breaches. The rallying cry may once again be, “Let’s create more bureaucracy.”

Vishal Ingole, September 11, 2016

Dark Web: Was Hillary Clinton a Phishing Target?

September 9, 2016

I am not too sure about the information is some British newspapers. Nevertheless, I find some of the stories amusing. A good example of an online frolic is a write up designed to suck in clicks and output blogger and podcast commentaries. Case in point: Beyond Search just helped out the Daily Mail’s traffic. Wikipedia, another always-spot on source of information points to a statement about the newspaper’s “institutional racism.”

The headline which caught my attention was “Hacking Fears over Clinton server: FBI reveal Hillary Was Sent ‘Phishing’ Email with Porn Links and ‘Dark Web Browser’ Was Used to Access Another Account.” I am frightened I guess.

The write up asserts:

An unknown individual used an anonymous web browsing tool often used to access the dark web to get into an email account on the Clinton family server, the FBI revealed [on September 2, 2016].

The Daily Mail explains the bad stuff about the Dark Web. Then there is a leap:

In another incident that raised hacking fears, Clinton received a phishing email, purportedly sent from the personal email account of a State official. She responded to the email: ‘Is this really from you? I was worried about opening it!’.

And for a third cartwheel, the estimable newspaper stated:

In a separate incident, Abedin sent an email to an unidentified person saying that Clinton was worried ‘someone [was] was hacking into her email’. She had apparently received an email from a known associate ‘containing a link to a website with pornographic material’ at the time, but there is no additional information as to why she would believe she had been hacked.

Fascinating. I did not see anyone in the pictures accompanying the write wearing a baseball cap with the phrase:

Make journalism great again.

Everything I read online is accurate. Plus, I believe absolutely everything I read on my computing device’s screen. We try to remain informed about online here in rural Kentucky.

Stephen E Arnold, September 9, 2016

Revolving Door Hires at Google

September 7, 2016

It looks like Google has determined the best way to address its legal challenges in Europe is to infiltrate and influence its governments. The Guardian reports, “Google: New Concerns Raised About Political Influence by Senior ‘Revolving Door’ Jobs.” The personnel-based tactic has apparently worked so well in the U.S. that Google is applying it to the European arena. Writer Jamie Doward cites research by the the Google Transparency Project, a venture of the Campaign for Accountability (CfA), when she writes:

New concerns have been raised about the political influence of Google after research found at least 80 ‘revolving door’ moves in the past decade – instances where the online giant took on government employees and European governments employed Google staff. … The CfA has suggested that the moves are a result of Google seeking to boost its influence in Europe as the company seeks to head off antitrust action and moves to tighten up on online privacy.

The article gets into specifics on who was hired where and when; navigate to it for those details. In sum, Doward writes:

Overall, the research suggests that Google, now part of parent company Alphabet Inc, has hired at least 65 former government officials from within the European Union since 2005.

During the same period, 15 Google employees were appointed to government positions in Europe, gaining what the CfA claims are ‘valuable contacts at the heart of the decision-making process’.

Anne Weisemann, CfA executive director, points to Google’s success influencing the U.S. government as a driving factor in its EU choices. She notes Google spends more to lobby our federal government than any other company, and that Google execs grace the White House more than once a week, on average. Also, CfA points to more than 250 of these “revolving door” appointments Google has made in the U.S.

For its part, Google claims it is just hiring experts who can answer government officials’ many questions about the Internet, about their own business model, and the “opportunity for European businesses to grow online.” There’s no way that could give Google an unfair advantage, right?

The article concludes with a call to reevaluate how government officials view Google—it is now much more than a search engine, it is a major political actor. Caution is warranted as the company works its way into government-run programs like the UK’s National Health Service and school systems. Such choices, ones that can affect the public on a grand scale, should be fully informed. Listening to Google lobbyists, who excel at playing on politicians’ technical ignorance, does not count.

Cynthia Murrell, September 7, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/

Social Media Snooping Site Emerges for Landlord and Employers

September 2, 2016

The promise of unlocking the insights in big data is one that many search and analytics companies make. CNet shares the scoop on a new company: Disturbing new site scrapes your private Facebook and informs landlords, employers. Their website is Score Assured and it provides a service as an intermediary between your social media accounts and your landlord. Through scanning every word you have typed on Facebook, Twitter, LinkedIn or even Tinder, this service will then filter all the words through a neuro-linguistic programming tool to provide a report on your reputation. We learned,

There’s no reason to believe that Score Assured’s “analysis” will offer in any way an accurate portrayal of who you are or your financial wherewithal. States across the country are already preparing or enacting legislation to ensure that potential employers have no right to ask for your password to Facebook or other social media. In Washington, for example, it’s illegal for an employer to ask for your password. Score Assured offers landlords and employers (the employer service isn’t live yet) the chance to ask for such passwords slightly more indirectly. Psychologically, the company is preying on a weakness humans have been displaying for some time now: the willingness to give up their privacy to get something they think they really want.

Scraping and finding tools are not new, but could this application be any more 2016? The author of this piece is onto the zeitgeist of “I’ve got nothing to hide.” Consequently, data — even social data — becomes a commodity. Users’ willingness to consent is the sociologically interesting piece here. It remains to be seen whether the data mining technology is anything special.

Megan Feil, September 2, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Think of the Children! Kids and Unsupervised iPads

September 1, 2016

I hear this complaint everyday: people, especially children, are spending too much time attached to a screen. The belief is that we, as a society, are not establishing strong connections or relationships with each other. When it comes to children, the common conception is that too much screen time hinders their development growth. The Daily Mail spoke with modern parents to figure out what their concerns are concerning kids and iPad usage in the article, “’He Could Be Talking To A 60 Year Old Man:’ Parents Reveal Their Fears As They Admit Allowing Their Children As Young As Four to Use iPads Unsupervised.”

Parents are allowing their children to use iPads for entertainment, such as watching videos and playing games. Tablet is the dream tool that all parents have wanted for years when they needed to keep children occupied as they did chores or had a busy day running errands. While the iPad is a good tool to keep kids occupied, parents are concerned their offspring could access inappropriate material. One parent is concern that her child could communicate with an adult stranger. Another is worried that her progeny will create social media profiles and be at risk.

The biggest concern is stranger danger, which is a valid argument. However, most of these children using an iPad do not know how to read or write yet, so how could they contact anyone without those abilities? There are also settings on an iPad that limit how apps are touched and instill parental controls. From personal experience, there are always ways around parental controls that kids discover. Kids circumnavigate the parental controls to view taboo contact. Parents view the Internet:

The Internet is seen as a potential minefield by parents and whatever support site owners can give to prevent children seeing or buying what they shouldn’t would be welcomed. The government is currently pushing ahead with age verification protections for pornographic sites, but clearly parents have a much broader set of online content and services that cause them concern.

Also take into account each family raises their kids differently, so what qualifies as inappropriate content is subjective. The best way to raise children with an iPad is to be aware of what they are watching, how they use it, teach them on what they are allowed, and accept that there will be mistakes. All of the hullabaloo is the same as allowing kids to watch too much TV, videogames, comic books, and (way, way back) novels. It is a new medium, but same argument.

Whitney Grace, September 1, 2016

Intuitive Interfaces Matter on Dark Web Sites Too

September 1, 2016

Did you know some sites on the Dark Web have a sleek look and intuitive user experience?  VeriClouds published this information, including screenshots and more in a piece called Dark Web: Sophisticated eCommerce platform trading in your personal information. Channels for cybercriminals allow users to search for Dark Web commodities such as personal or sensitive information by: category, product type, price, sale type, location and shipping options. Mirroring the processes and policies of traditional retail, some sellers also have refund options. The article states:

Platforms like these are so much more than just rudimentary command line setups or chat rooms. They offer many of the same features as online stores like Amazon or Ebay with vendor ratings, buyer feedback, detailed search options and facilitated transaction and delivery services. Collections of data are presented with detailed descriptions (similar to an ecommerce product pages), and some even provide tutorials on how to best utilize that data to scam victims.

On one level, this report shows us how much an intuitive user experience has become the expectation, not an added bonus — anywhere on the web. Related to this heightened expectation for even intangible “things” to have an effective look and feel, we are reminded this is the information age. As information is a commodity, it is no surprise to see the rise in cyber theft of such invisible goods on the Dark Web or otherwise. For example, as the article mentioned, last year’s estimate by the Federal Trade Commission showed 9.9 million victims of identity theft.

Megan Feil, September 1, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Russia Boasts of Encryption Keys for Popular Social Messaging Apps

August 25, 2016

If Russia’s Federal Security Service is to be believed, they have devised a way to break through the encryption on some of the world’s biggest messaging apps. The International Business Times reports, “Russia Now Collecting Encryption Keys to Decode Information from Facebook, WhatsApp, and Telegram.” The initiative appears to be a response to pressure from the top; columnist Mary Ann Russon writes:

“In June, Russia passed a scary new surveillance law that demanded its security agencies find a way to conduct better mass surveillance, requiring all internet firms who provide services to citizens and residents in Russia to provide mandatory backdoor access to encrypted communications so the Russian government can know what people are talking about. If any of these internet companies choose not to comply, the FSB has the power to impose fines of up to 1 million rubles (£11,406)….

The article continued:

“The FSB has now updated its website declaring that it has indeed been able to procure a method to collect these encryption keys, although, cryptically, the agency isn’t saying how exactly it will be doing so. The notice on the FSB website simply declares that in order to ensure public safety and protect against terrorism, the FSB has found a ‘procedure of providing the FSB with a method necessary for decoding all received, sent, delivered, and chat conversations between users on messaging networks’ and that this method had been sent to the Ministry of Justice to approve and make provisions to amend federal law.”

At least the Russians are not coy about their efforts to spy on citizens. But, is this a bluff? Without the details, it is hard to say. We do know the government is holding out a carrot to foreign messaging companies—they can continue to operate within their borders if they have their services “certified” by a government-approved lab. Hmm. How much is the Russian messaging market worth to these companies? I suppose we shall see.

Cynthia Murrell, August 25, 2016

Another Robot Finds a Library Home

August 23, 2016

Job automation has its benefits and downsides.  Some of the benefits are that it frees workers up to take on other tasks, cost-effectiveness, efficiency, and quicker turn around.  The downside is that it could take jobs and could take out the human factor in customer service.   When it comes to libraries, automation and books/research appear to be the antithesis of each other.  Automation, better known as robots, is invading libraries once again and people are up in arms that librarians are going to be replaced.

ArchImag.com shares the story “Robot Librarians Invade Libraries In Singapore” about how the A*Star Research library uses a robot to shelf read.  If you are unfamiliar with library lingo, shelf reading means scanning the shelves to make sure all the books are in their proper order.  The shelf reading robot has been dubbed AuRoSS.  During the night AuRoSS scans books’ RFID tags, then generates a report about misplaced items.  Humans are still needed to put materials back in order.

The fear, however, is that robots can fulfill the same role as a librarian.  Attach a few robotic arms to AuRoSS and it could place the books in the proper places by itself.  There already is a robot named Hugh answering reference questions:

New technologies thus seem to storm the libraries. Recall that one of the first librarian robots, Hugh could officially take his position at the university library in Aberystwyth, Wales, at the beginning of September 2016. Designed to meet the oral requests by students, he can tell them where the desired book is stored or show them on any shelf are the books on the topic that interests them.

It is going to happen.  Robots are going to take over the tasks of some current jobs.  Professional research and public libraries, however, will still need someone to teach people the proper way to use materials and find resources.  It is not as easy as one would think.

Whitney Grace, August 23, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

Read the Latest Release from…Virgil

August 18, 2016

The Vatican Library is one of the world’s greatest treasures, because it archives much of western culture’s history.  It probably is on par with the legendary Library of Alexandria, beloved by Cleopatra and burned to the ground.  How many people would love the opportunity to delve into the Vatican Library for a private tour?  Thankfully the Vatican Library shares its treasures with the world via the Internet and now, according to Archaeology News Network, the “Vatican Library Digitises 1600 Year-Old Manuscript Containing Works Of Virgil.”

The digital version of Virgil’s work is not the only item the library plans to scan online, but it does promise donors who pledge 500 euros or more they will receive a faithful reproduction of a 1600 manuscript by the famous author.  NTT DATA is working with the Vatican Library on Digita Vaticana, the digitization project.  NTT DATA has worked with the library since April 2014 and plans to create digital copies of over 3,000 manuscripts to be made available to the general public.

“ ‘Our library is an important storehouse of the global culture of humankind,’ said Monsignor Cesare Pasini, Prefect of the Vatican Apostolic Library. ‘We are delighted the process of digital archiving will make these wonderful ancient manuscripts more widely available to the world and thereby strengthen the deep spirit of humankind’s shared universal heritage.’”

Projects like these point to the value of preserving the original work as well as making it available for research to people who might otherwise make it to the Vatican.  The Vatican also limits the amount of people who can access the documents.

Whitney Grace, August 18, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

 

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta