Top Banner
The DarkNet, Investigations & Criminality Professor John Walker HEXFORENSICS Ltd Shelton Street, Covent Garden, London, WC2H 9JQ
12
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Forensics Expo, London  2015

The DarkNet, Investigations & CriminalityProfessor John Walker

HEXFORENSICS LtdShelton Street, Covent Garden, London, WC2H 9JQ

Page 2: Forensics Expo, London  2015

The Technology Explosion – the Opportunity

The race to evolve technology has in itself enabled the world to be a smarter place, and manifested in opportunitiesfor the global community.

It has also enabled the Criminal Community to create a business model that nets billions in illicit revenue.

Add to this the fact that many businesses do not understand the Cyber Threat and you have the Perfect Storm in whichCriminality, Paedophiles, Abusers and their DarkNets may thrive.

Page 3: Forensics Expo, London  2015

Research

According to research &Europol the principal search engines index only a small portion of the overall web content, the remaining part is unknown to the majority of web users.

I concur..

Page 4: Forensics Expo, London  2015

Why DarkNet?

The DarkNet may actually represent anything its creator withies, for whatever purpose:

• Fun• International Terrorism• Criminal Community Support• Copyright Theft• Paedophilia and Distribution of Images• On Line Live Abuse• Hacking•• Anything

Page 5: Forensics Expo, London  2015

What is the DarkNet Made of?

The Construction is down to imagination, ingenuity, and creativity.•

Dynamic URL’s

Page 6: Forensics Expo, London  2015

The Challenge – The Truth

Proxy Server are on offer in Russia [and other places] as an intermediate system to acts as a mediator between a computer and the Internet. These Proxy Servers are used for various purposes, but their main purpose is to support anonymity. Anonymity, in this case, comes from the fact that the destination server sees the IP address of the proxy server and not that of the miscreants system.

The good news is – such services store logs, and do not always provide complete anonymity.

Dynamic Content

Unlinked Content

Private Web

Contextual Web

Scripted Content

Non-HTML/Text Content

Page 7: Forensics Expo, London  2015

The Reality of the Global Threat Landscape

http://hackmageddon.com/2015/04/20/1-15-april-2015-cyber-attacks-timeline/

Here is a list of 49 attacks which took placeUp to and including 14/04/2015!

Page 8: Forensics Expo, London  2015

Evolution - CaaS

TheRealDeal," has opened up for hackers, which focuses on selling Zero-Day exploits — infiltration codes that took advantage of software vulnerabilities for which the manufacturers have released no official software patch.

Consider MS15-034 flaw which has left over 70 million sites vulnerable to Cyber Attack.

Page 9: Forensics Expo, London  2015

The Value of HUMINT

No matter the type of event or security incident, HUMINT [Human Intelligence] can be a double edge sword – • On one hand it can bring high value to the investigation

• On the other – it can represents OoII to Cyber Adversaries

Page 10: Forensics Expo, London  2015

Minority Reporting – The value of TIA

The Cyber Threats-of-the-Age dictate a new way of looking at the unconventional through a new window of defence.

Page 11: Forensics Expo, London  2015

“Digital Forensics has been used in investigations for more than 30 years, however it is nowfacing one of its biggest challenges.”

Professor Andy Jones – De Montfort University

This presentation only considered the environmental facets of a DarNet – it did not consider:

• Acquisition of Artifacts• Reliability of Evidence• Distance Forensic Protocols• The Chain-of-Evidence• Multi Cloud Environment• Locally Stored Keys• Admissibility

This is a new age and thus dictates new protocols of engagement .

Page 12: Forensics Expo, London  2015

Thank You for Listening