Skip to main content

2016 | OriginalPaper | Buchkapitel

8. OSINT and the Dark Web

verfasst von : George Kalpakis, Theodora Tsikrika, Neil Cunningham, Christos Iliou, Stefanos Vrochidis, Jonathan Middleton, Ioannis Kompatsiaris

Erschienen in: Open Source Intelligence Investigation

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Dark Web, a part of the Deep Web that consists of several darknets (e.g. Tor, I2P, and Freenet), provides users with the opportunity of hiding their identity when surfing or publishing information. This anonymity facilitates the communication of sensitive data for legitimate purposes, but also provides the ideal environment for transferring information, goods, and services with potentially illegal intentions. Therefore, Law Enforcement Agencies (LEAs) are very much interested in gathering OSINT on the Dark Web that would allow them to successfully prosecute individuals involved in criminal and terrorist activities. To this end, LEAs need appropriate technologies that would allow them to discover darknet sites that facilitate such activities and identify the users involved. This chapter presents current efforts in this direction by first providing an overview of the most prevalent darknets, their underlying technologies, their size, and the type of information they contain. This is followed by a discussion of the LEAs’ perspective on OSINT on the Dark Web and the challenges they face towards discovering and de-anonymizing such information and by a review of the currently available techniques to this end. Finally, a case study on discovering terrorist-related information, such as home made explosive recipes, on the Dark Web is presented.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
7
The term Dark Web is often confused with Deep Web, especially in media reporting. However, it should be clear that the two terms are distinguished, and Dark Web constitutes a subset of Deep Web exhibiting specific properties. Moreover, the term Dark Web has also been used to refer to the specific content generated by international terrorist groups and made available either on the Surface Web (including on Web sites, forums, chat rooms, blogs, and social networking sites) or on the Deep Web (Chen 2011); this definition is different to the one employed in this book.
 
13
As estimated by the Tor Project https://​metrics.​torproject.​org/​ on April 27, 2016.
 
14
As estimated by http://​stats.​i2p/​ on April 27, 2016.
 
15
As estimated by http://​asksteved.​com/​stats/​ on April 27, 2016.
 
24
HOMER (Home Made Explosives and Recipes characterization—http://​www.​homer-project.​eu/​) is an EU funded project that aims to expand the knowledge of European bodies about HMEs and to improve the capacity of security and law enforcement agencies to cope with current and anticipated threats so as to reduce the probability that HMEs will be used by terrorists.
 
Literatur
Zurück zum Zitat Bartlett J (2014) The Dark Net. Random House, London Bartlett J (2014) The Dark Net. Random House, London
Zurück zum Zitat Bergman MK (2001) White paper: the deep web: surfacing hidden value. J Electron Pub 7(1) Bergman MK (2001) White paper: the deep web: surfacing hidden value. J Electron Pub 7(1)
Zurück zum Zitat Biryukov A, Pustogarov I, Thill F, Weinmann RP (2014) Content and popularity analysis of Tor hidden services. In: 2014 IEEE 34th International conference on distributed computing systems workshops (ICDCSW). IEEE, pp 188–193 Biryukov A, Pustogarov I, Thill F, Weinmann RP (2014) Content and popularity analysis of Tor hidden services. In: 2014 IEEE 34th International conference on distributed computing systems workshops (ICDCSW). IEEE, pp 188–193
Zurück zum Zitat Chen H (2011) Dark web: exploring and data mining the dark side of the web (vol 30). Springer Science and Business Media, Berlin Chen H (2011) Dark web: exploring and data mining the dark side of the web (vol 30). Springer Science and Business Media, Berlin
Zurück zum Zitat Christin N (2013) Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd international conference on world wide web. ACM, pp 213–224 Christin N (2013) Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd international conference on world wide web. ACM, pp 213–224
Zurück zum Zitat Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Naval Research Lab Washington DC Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Naval Research Lab Washington DC
Zurück zum Zitat Erdin E, Zachor C, Gunes MH (2015) How to find hidden users: a survey of attacks on anonymity networks. IEEE Commun Surv Tutorials 17(4):2296–2316CrossRef Erdin E, Zachor C, Gunes MH (2015) How to find hidden users: a survey of attacks on anonymity networks. IEEE Commun Surv Tutorials 17(4):2296–2316CrossRef
Zurück zum Zitat Huber M, Mulazzani M, Weippl E (2010) Tor HTTP usage and information leakage. In: IFIP international conference on communications and multimedia security. Springer, Berlin, pp 245–255 Huber M, Mulazzani M, Weippl E (2010) Tor HTTP usage and information leakage. In: IFIP international conference on communications and multimedia security. Springer, Berlin, pp 245–255
Zurück zum Zitat Kalpakis G, Tsikrika T, Iliou C, Mironidis T, Vrochidis S, Middleton J, Kompatsiaris I (2016) Interactive discovery and retrieval of web resources containing home made explosive recipes. In: International conference on human aspects of information security, privacy, and trust. Springer International Publishing, Berlin, pp 221–233 Kalpakis G, Tsikrika T, Iliou C, Mironidis T, Vrochidis S, Middleton J, Kompatsiaris I (2016) Interactive discovery and retrieval of web resources containing home made explosive recipes. In: International conference on human aspects of information security, privacy, and trust. Springer International Publishing, Berlin, pp 221–233
Zurück zum Zitat Manikonda L, Hu Y, Kambhampati S (2014) Analyzing user activities, demographics, social network structure and user-generated content on instagram. arXiv preprint arXiv:1410.8099 Manikonda L, Hu Y, Kambhampati S (2014) Analyzing user activities, demographics, social network structure and user-generated content on instagram. arXiv preprint arXiv:​1410.​8099
Zurück zum Zitat Mittal P, Khurshid A, Juen J, Caesar M, Borisov N (2011) Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. In: Proceedings of the 18th ACM conference on computer and communications security. ACM, pp 215–226 Mittal P, Khurshid A, Juen J, Caesar M, Borisov N (2011) Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. In: Proceedings of the 18th ACM conference on computer and communications security. ACM, pp 215–226
Zurück zum Zitat Moore D, Rid T (2016) Cryptopolitik and the darknet. Survival 58(1):7–38 Moore D, Rid T (2016) Cryptopolitik and the darknet. Survival 58(1):7–38
Zurück zum Zitat Murdock V (2011) Your mileage may vary: on the limits of social media. SIGSPATIAL Spec 3(2):62–66CrossRef Murdock V (2011) Your mileage may vary: on the limits of social media. SIGSPATIAL Spec 3(2):62–66CrossRef
Zurück zum Zitat Olston C, Najork M (2010) Web crawling: foundations and trends in information retrieval Olston C, Najork M (2010) Web crawling: foundations and trends in information retrieval
Zurück zum Zitat Owen G, Savage N (2015) The Tor dark net.’ global commission on internet governance (No. 20) Owen G, Savage N (2015) The Tor dark net.’ global commission on internet governance (No. 20)
Zurück zum Zitat Pant G, Srinivasan P (2005) Learning to crawl: comparing classification schemes. ACM Trans Inform Syst (TOIS) 23(4):430–462 Pant G, Srinivasan P (2005) Learning to crawl: comparing classification schemes. ACM Trans Inform Syst (TOIS) 23(4):430–462
Zurück zum Zitat Ricardo BY, Berthier RN (2011) Modern information retrieval: the concepts and technology behind search second edition. Addision Wesley, 84, 2 Ricardo BY, Berthier RN (2011) Modern information retrieval: the concepts and technology behind search second edition. Addision Wesley, 84, 2
Zurück zum Zitat Sherman C, Price G (2003) The invisible web: uncovering sources search engines can’t see. Libr Trends 52(2):282–298 Sherman C, Price G (2003) The invisible web: uncovering sources search engines can’t see. Libr Trends 52(2):282–298
Zurück zum Zitat Thomee B, Shamma DA, Friedland G, Elizalde B, Ni K, Poland D, Li LJ (2016) YFCC100M: the new data in multimedia research. Commun ACM 59(2):64–73 Thomee B, Shamma DA, Friedland G, Elizalde B, Ni K, Poland D, Li LJ (2016) YFCC100M: the new data in multimedia research. Commun ACM 59(2):64–73
Zurück zum Zitat Tian G, Duan Z, Baumeister T, Dong Y (2013) A traceback attack on freenet. In: INFOCOM, 2013 Proceedings IEEE. IEEE, pp 1797–1805 Tian G, Duan Z, Baumeister T, Dong Y (2013) A traceback attack on freenet. In: INFOCOM, 2013 Proceedings IEEE. IEEE, pp 1797–1805
Zurück zum Zitat Tsikrika T, Moumtzidou A, Vrochidis S, Kompatsiaris I (2016) Focussed crawling of environmental web resources based on the combination of multimedia evidence. Multimedia Tools Appl 75(3):1563–1587CrossRef Tsikrika T, Moumtzidou A, Vrochidis S, Kompatsiaris I (2016) Focussed crawling of environmental web resources based on the combination of multimedia evidence. Multimedia Tools Appl 75(3):1563–1587CrossRef
Metadaten
Titel
OSINT and the Dark Web
verfasst von
George Kalpakis
Theodora Tsikrika
Neil Cunningham
Christos Iliou
Stefanos Vrochidis
Jonathan Middleton
Ioannis Kompatsiaris
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-47671-1_8