Says a Friend of Benthall's

Total Page:16

File Type:pdf, Size:1020Kb

Says a Friend of Benthall's 54 I At 3:15 P.M. on October 1, 2013, Ross Ulbricht’s career as a drug kingpin came to an end in the science- fiction section of San Francisco’s Glen Park Library. The 29-year- old had walked up the steps just inside the modern stone building, passed the librarian working at the circula- tion desk and taken a seat at a far corner table near a window. It was a sunny day, but the small community library was filled with people. Ulbricht, with his easy smile and thick mop of brown hair, was dressed in blue jeans web of lies_ AN UNDERGROUND, ANONYMOUS INTERNET— THE DEEP WEB—IS THE LAST LAWLESS FRONTIER ON EARTH. BUT NOTHING COULD SAVE ITS KINGPINS FROM THE PAINFUL CONSEQUENCES OF HUMAN ERROR BY JOSHUA HUNT and a T-shirt. The hand- ful of people reading and wandering among rows of novels nearby weren’t dressed much differently, but beneath their shirts and jackets they wore vests that identified them as FBI agents. Until the moment they rushed Ulbricht, pushing him up against a window to handcuff him as other agents seized his laptop before he could lock it down, nobody suspected anything out of place. The cuffs went on and a small crowd gathered, but Ulbricht just looked out at the afternoon sun. Ulbricht was an educated person, with a master’s degree in 55 materials science and engi- neering from Penn State. He was a good son from a good Texas family, an un- likely addition to the list of men who had changed the shape and scale of drug distribution in Amer- ica. But like Pablo Escobar, who used small planes to 2_ flood the U.S. with Colom- bian cocaine in the 1970s and 1980s, and Joaquín Guzmán Loera, who led Mexico’s Sinaloa cartel to deploy submarines, freight trains and a Boeing 747 to move billions of dollars in 1_ narcotics into major U.S. cities over the past decade, Ulbricht did more than just move drugs: He revolution- ized the drug- trafficking in- dustry altogether, bringing it into the digital age. Authorities allege that Ulbricht, under the handle Dread Pirate Roberts, oper- ated Silk Road, an online 3_ marketplace where mari- juana, heroin, cocaine, LSD and other drugs were freely traded, along with passports, fake IDs, software for hackers and identity thieves, and all man- ner of contraband. Illicit goods were delivered to buyers by neighborhood mail carriers in packaging as inconspicuous as 4_ any book or DVD from Amazon. By the 1_ Portrait of a time agents arrested Ulbricht, authorities modern drug lord: say, he had made a small fortune in com- what it means to be a book seller, Silk Road changed what it Ross Ulbricht takes a selfie.2_ Silk missions on roughly $200 million in drug means to be a drug dealer, small-arms vendor or identity thief Road 2.0 leader sales alone. They called it the world’s by making it possible for users to order illicit goods without Blake Benthall largest and most sophisticated online the inconvenience and danger of face-to-face transactions. It with his girlfriend. marketplace for illegal goods. It had got- was just one of thousands of sites on (continued on page 116) 3_ Ulbricht’s fake IDs, never used. ten there in under three years. 4_ An eBay for Trade on Silk Road flourished in part many illegal items: because of the security and anonymity it “I’D COMPARE TOR TO A HANDGUN,” SAYS A screen shots of Silk provided its customers, who could make Road and its FBI- TExAS ­lawyer. “IT CAN BE USED BY GOOD mocking successor, purchases from sellers rated and re - Silk Road 2.0. viewed much as they are on other online PEOPLE TO DO GOOD, BUT IN THE WRONG marketplaces. Just as Amazon changed HANDS, IT CAN CAUSE TERRIBLE HARM.” PEELING THE ONION_ THE DEEP WEB RELIES ON A network CALLED TOR—THE SELLER_ ONION ROUTER—TO PROvIDE The process ANONYMITY. HERE’S HOW repeats for users on the server’s encrypted server_ supply side. In an instant, one If Tor is set of 6,000 volunteer- up correctly run Tor relays fields and no foolish the page request, mistakes are then encrypts its made, the origins and sends site_ seller’s biggest it to another. Wash, Users range risk lies in rinse and repeat from activists in finally mailing BUYER_ twice more. censor-happy that kilo. The chain begins with nations to those anyone savvy enough looking for a fix. to run the Tor browser By the time a Tor (it doesn’t take much). server is reached, Enter a .onion URL, and tracing its source Tor seeks out a relay to is impossible. 56 conceal your identity. marketplace that utilized anonymity and a had been more than a year since the 26-year- decentralized currency to drive transactions. old had moved to the two-story house, It was, in other words, an experiment in which, despite its odd green and yellow economics and technology whose political color scheme, didn’t warrant a second look underpinnings excited Ulbricht and other in the eccentric city. Even Benthall realized idealists as much as any criminal motive. its charms were hidden; he’d nicknamed it In January 2012 a drug dealer known the Ship House, after an old model ship that on Silk Road as “digitalink” was arrested: hung in a bay window facing the street. “An Jacob Theodore George IV, a 32-year-old hour away from boarding StartUp Bus,” he Maryland man, had been selling heroin wrote on Facebook that morning. “Three and methylone on the site for about three days in a bus with strangers, building a com- m months. Prosecutors didn’t waste the op- pany to pitch to investors waiting in Austin. portunity to gain insight into the deep web’s Second year doing this, crazy excited!” the clandestine constellation most popular drug marketplace. The arrest Those strangers would soon become was kept quiet, and a plea agreement al- friends, teammates and competitors. Some Continued from page 56 lowed authorities to obtain e-mails and fi- were software engineers like Benthall, while nancial records to help them map Silk Road others were designers, businessmen and the “deep web,” an anonymous version of through its second year of business. Six marketers. Once aboard, each would take the internet where pages are not indexed months later, customs officers in Australia in- a microphone at the front of the bus and by Google and can be accessed only with tercepted a package of cocaine and MDMA pitch an idea, the strongest of which would special browsers such as Tor. By allowing addressed to a Silk Road user named Paul be developed in groups over a three-day users to visit hidden URLs anonymously, Leslie Howard. Drugs, as well as scales, cash ­­hackathon—a frenzied but not unheard- leaving no trace of their online activity, and 35 stun guns disguised to look like cell of pace. Some participants had start-ups of the deep web and Tor became popular phones, were found during a subsequent their own, funded by such noted investors as with security- conscious dissidents, whistle- raid of Howard’s home. It became the first Mark Cuban; others worked for companies blowers, journalists—and criminals. Silk Road–related arrest to make interna- like Google and were accustomed to deal- This is a story about two bright, privi- tional headlines. In America, more arrests ing with high-pressure deadlines. When the leged young men—men who went to col- gave the government a network of infor- bus arrived, their reward would be harsh lege, held good jobs and became unlikely mants to help navigate Ulbricht’s world, critiques from celebrity judges and investors criminals for reasons difficult to fathom by spawning a cross-agency law-­­enforcement who would then select a winner and possibly family and friends, many of whom would effort dubbed Operation Marco Polo, after offer funding to the most promising groups. comment only on the condition of ano- the explorer who first wrote about the site’s Benthall had taken his first StartUp Bus nymity. It is a story about how the internet namesake trading route. trip in 2013 with his friend Falon Fatemi, is changing crime and how crime is chang- In the end, it was no high-tech game chief executive of a secretive tech start-up ing the internet. of cat and mouse that landed Ulbricht named Close. Fatemi had been the “conduc- Silk Road first appeared in February in handcuffs. It was a man named Curtis tor,” rallying friends and associates to come 2011, but it was the rising popularity of Clark Green, one of a handful of employ- along. ­­Benthall performed impressively that Bitcoin, by then two years old, that made ees Ulbricht paid thousands of dollars each year, reaching the competition’s finals with a the site possible. A peer-to-peer digital cur- month to help run his site. In January 2013 localized anonymous-messaging app called rency both free from government oversight Green was arrested after taking delivery of GhostPost, which allowed users to chat with and difficult to trace, Bitcoin’s value is de- a kilogram of cocaine in a deal personally one another at parties, sporting events and termined by supply and demand, making it brokered by Ulbricht. Green quickly be- concerts. “People loved the app, and we stole popular among technologists and libertar- trayed his employer by agreeing to cooper- thunder from the group that presented be- ians.
Recommended publications
  • The Internet and Drug Markets
    INSIGHTS EN ISSN THE INTERNET AND DRUG MARKETS 2314-9264 The internet and drug markets 21 The internet and drug markets EMCDDA project group Jane Mounteney, Alessandra Bo and Alberto Oteo 21 Legal notice This publication of the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) is protected by copyright. The EMCDDA accepts no responsibility or liability for any consequences arising from the use of the data contained in this document. The contents of this publication do not necessarily reflect the official opinions of the EMCDDA’s partners, any EU Member State or any agency or institution of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). More information on the European Union is available on the internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2016 ISBN: 978-92-9168-841-8 doi:10.2810/324608 © European Monitoring Centre for Drugs and Drug Addiction, 2016 Reproduction is authorised provided the source is acknowledged. This publication should be referenced as: European Monitoring Centre for Drugs and Drug Addiction (2016), The internet and drug markets, EMCDDA Insights 21, Publications Office of the European Union, Luxembourg. References to chapters in this publication should include, where relevant, references to the authors of each chapter, together with a reference to the wider publication. For example: Mounteney, J., Oteo, A. and Griffiths, P.
    [Show full text]
  • Download (589Kb)
    This is an Open Access document downloaded from ORCA, Cardiff University's institutional repository: http://orca.cf.ac.uk/95227/ This is the author’s version of a work that was submitted to / accepted for publication. Citation for final published version: Décary-Hétu, David and Giommoni, Luca 2017. Do police crackdowns disrupt drug cryptomarkets? a longitudinal analysis of the effects of Operation Onymous. Crime, Law and Social Change 67 (1) , pp. 55-75. 10.1007/s10611-016-9644-4 file Publishers page: http://dx.doi.org/10.1007/s10611-016-9644-4 <http://dx.doi.org/10.1007/s10611- 016-9644-4> Please note: Changes made as a result of publishing processes such as copy-editing, formatting and page numbers may not be reflected in this version. For the definitive version of this publication, please refer to the published source. You are advised to consult the publisher’s version if you wish to cite this paper. This version is being made available in accordance with publisher policies. See http://orca.cf.ac.uk/policies.html for usage policies. Copyright and moral rights for publications made available in ORCA are retained by the copyright holders. 1 Do Police Crackdowns Disrupt Drug Cryptomarkets? A Longitudinal Analysis Of The Effects Of Operation Onymous In recent years, there has been a proliferation of online illicit markets where participants can purchase and sell a wide range of goods and services such as drugs, hacking services, and stolen financial information. Second- generation markets, known as cryptomarkets, provide a pseudo-anonymous platform from which to operate and have attracted the attention of researchers, regulators, and law enforcement.
    [Show full text]
  • Virtual Currencies and Terrorist Financing : Assessing the Risks And
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT FOR CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS COUNTER-TERRORISM Virtual currencies and terrorist financing: assessing the risks and evaluating responses STUDY Abstract This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the TERR Committee, explores the terrorist financing (TF) risks of virtual currencies (VCs), including cryptocurrencies such as Bitcoin. It describes the features of VCs that present TF risks, and reviews the open source literature on terrorist use of virtual currencies to understand the current state and likely future manifestation of the risk. It then reviews the regulatory and law enforcement response in the EU and beyond, assessing the effectiveness of measures taken to date. Finally, it provides recommendations for EU policymakers and other relevant stakeholders for ensuring the TF risks of VCs are adequately mitigated. PE 604.970 EN ABOUT THE PUBLICATION This research paper was requested by the European Parliament's Special Committee on Terrorism and was commissioned, overseen and published by the Policy Department for Citizens’ Rights and Constitutional Affairs. Policy Departments provide independent expertise, both in-house and externally, to support European Parliament committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU external and internal policies. To contact the Policy Department for Citizens’ Rights and Constitutional Affairs or to subscribe to its newsletter please write to: [email protected] RESPONSIBLE RESEARCH ADMINISTRATOR Kristiina MILT Policy Department for Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] AUTHORS Tom KEATINGE, Director of the Centre for Financial Crime and Security Studies, Royal United Services Institute (coordinator) David CARLISLE, Centre for Financial Crime and Security Studies, Royal United Services Institute, etc.
    [Show full text]
  • Cybercrime: Internet Driven Illicit Activities and Behavior
    Land Forces Academy Review Vol. XXV, No. 4(100), 2020 CYBERCRIME: INTERNET DRIVEN ILLICIT ACTIVITIES AND BEHAVIOR Maurice DAWSON Illinois Institute of Technology, Chicago, United States of America [email protected] ABSTRACT Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further. KEYWORDS: cybercrime, human trafficking, dark web, online marketplace, cryptocurrency, disinformation 1. Introduction name a few (Deibert, 2009). Meanwhile, The Internet has allowed for many more countries have been known to use the technological advances that have brought Internet to target political dissidents such as forth positive outcomes. In retrospect, the Cuba, Ethiopia, Eritrea, Gambia, Morocco, Internet has also allowed for criminal North Korea, Russia, and more (Committee activities to flourish. And while both to Protect Journalists, 2020). Even with this positive and negative effects are expected, mentioned censorship and oversight, illicit the use of the Internet by a criminal activities remain on the rise through the organization, nation-states, terrorists, Internet. extremists, and others finds another means In recent years, police and other law to market their illegal activity. As the enforcement organizations have shut down introduction of the technological pages that advocate prostitution.
    [Show full text]
  • An Evolving Threat the Deep Web
    8 An Evolving Threat The Deep Web Learning Objectives distribute 1. Explain the differences between the deep web and darknets.or 2. Understand how the darknets are accessed. 3. Discuss the hidden wiki and how it is useful to criminals. 4. Understand the anonymity offered by the deep web. 5. Discuss the legal issues associated withpost, use of the deep web and the darknets. The action aimed to stop the sale, distribution and promotion of illegal and harmful items, including weapons and drugs, which were being sold on online ‘dark’ marketplaces. Operation Onymous, coordinated by Europol’s Europeancopy, Cybercrime Centre (EC3), the FBI, the U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) and Eurojust, resulted in 17 arrests of vendors andnot administrators running these online marketplaces and more than 410 hidden services being taken down. In addition, bitcoins worth approximately USD 1 million, EUR 180,000 Do in cash, drugs, gold and silver were seized. —Europol, 20141 143 Copyright ©2018 by SAGE Publications, Inc. This work may not be reproduced or distributed in any form or by any means without express written permission of the publisher. 144 Cyberspace, Cybersecurity, and Cybercrime THINK ABOUT IT 8.1 Surface Web and Deep Web Google, Facebook, and any website you can What Would You Do? find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located 1. The deep web offers users an anonym- on the surface web. It is likely that when you ity that the surface web cannot provide. use the Internet for research and/or social What would you do if you knew that purposes you are using the surface web.
    [Show full text]
  • Dark and Deep Webs-Liberty Or Abuse
    International Journal of Cyber Warfare and Terrorism Volume 9 • Issue 2 • April-June 2019 Dark and Deep Webs-Liberty or Abuse Lev Topor, Bar Ilan University, Ramat Gan, Israel https://orcid.org/0000-0002-1836-5150 ABSTRACT While the Dark Web is the safest internet platform, it is also the most dangerous platform at the same time. While users can stay secure and almost totally anonymously, they can also be exploited by other users, hackers, cyber-criminals, and even foreign governments. The purpose of this article is to explore and discuss the tremendous benefits of anonymous networks while comparing them to the hazards and risks that are also found on those platforms. In order to open this dark portal and contribute to the discussion of cyber and politics, a comparative analysis of the dark and deep web to the commonly familiar surface web (World Wide Web) is made, aiming to find and describe both the advantages and disadvantages of the platforms. KeyWoRD Cyber, DarkNet, Information, New Politics, Web, World Wide Web INTRoDUCTIoN In June 2018, the United States Department of Justice uncovered its nationwide undercover operation in which it targeted dark web vendors. This operation resulted in 35 arrests and seizure of weapons, drugs, illegal erotica material and much more. In total, the U.S. Department of Justice seized more than 23.6$ Million.1 In that same year, as in past years, the largest dark web platform, TOR (The Onion Router),2 was sponsored almost exclusively by the U.S. government and other Western allies.3 Thus, an important and even philosophical question is derived from this situation- Who is responsible for the illegal goods and cyber-crimes? Was it the criminal[s] that committed them or was it the facilitator and developer, the U.S.
    [Show full text]
  • USA -V- Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • Repaving the Ancient Silk Routes
    PwC Growth Markets Centre – Realising opportunities along the Belt and Road June 2017 Repaving the ancient Silk Routes In this report 1 Foreword 2 Chapter 1: Belt and Road – A global game changer 8 Chapter 2: China’s goals for the Belt and Road 14 Chapter 3: Key sectors and economic corridors 28 Chapter 4: Opportunities for foreign companies 34 Chapter 5: Unique Belt and Road considerations 44 Chapter 6: Strategies to evaluate and select projects 56 Chapter 7: Positioning for success 66 Chapter 8: Leveraging international platforms 72 Conclusion Foreword Belt and Road – a unique trans-national opportunity Not your typical infrastructure projects Few people could have envisaged what the Belt and Road However, despite the vast range and number of B&R (B&R) entailed when President Xi of China first announced opportunities, many of these are developed in complex the concept back in 2013. However, four years later, the B&R conditions, not least because they are located in growth initiative has amassed a huge amount of economic markets where institutional voids can prove to be hard to momentum.The B&R initiative refers to the Silk Road navigate. Inconsistencies in regulatory regimes and Economic Belt and the 21st Century Maritime Silk Road underdeveloped credit markets, together with weak existing initiatives. The network connects Asia, Europe and Africa, infrastructure and a maturing talent market all combine to and passes through more than 65 countries and regions with add further complexity for companies trying to deliver and a population of about 4.4 billion and a third of the global manage these projects.
    [Show full text]
  • Anonymity Through the Silk Road
    Anonymity Through The Silk Road In the pursuit of gaining anonymity online, there is a continuous ebb and flow that involves one party attempting to gain permanent and lasting anonymity while a second party attempts to compromise that anonymity. In this paper, I will be using The Silk Road as a means to explore this notion and as a real life example of this constant back and forth of maintaining anonymity. 1. Abstract The Silk Road is an online marketplace that allows users to anonymously buy and sell just about any good, whether it be legal or illegal. Because the goal of The Silk Road is to maintain the anonymity of users, the Tor browser is what users use to connect to the website and Bitcoins are used for transactions. Both Tor and Bitcoin, while solid ways to remain anonymous, do have some flaws and vulnerabilities that can potentially remove the necessary anonymity that a user requires in order to safely use the site. 2. Silk Road Overview 2.1 What is the Silk Road? The Silk Road is an anonymous online marketplace that was created in order to allow for the online sales of all items, legal and illegal. The entire concept is fascinating because it allows for people from around the entire world to both buy and sell any and all goods to each other without ever having their identity compromised and without having to worry about any buying or selling restrictions that may be in effect due to geographical location (country, state, province, etc.). There are many factors required for anonymity on The Silk Road that must be maintained in order for anonymity to be fully encompassing and complete.
    [Show full text]
  • JW Apostate Reply Supporting Motion to Quash April 6Th
    Case 7:20-mc-00119-CS Document 13 Filed 04/06/20 Page 1 of 21 1 JANE / JOHN DOE 2 Email: [email protected] 3 4 Pro se 5 IN THE UNITED STATES DISTRICT COURT FOR THE 6 SOUTHERN DISTRICT OF NEW YORK 7 8 IN RE: DMCA SUBPOENA TO GOOGLE, LLC Case No.: 7:20-mc-00119 9 10 JANE / JOHN DOE’S REPLY IN SUPPORT OF THE OBJECTION AND MOTION TO 11 QUASH DMCA SUBPOENA 12 13 A. INTRODUCTION 14 15 While it is true that Jehovah’s Witnesses are well known for their distribution of 16 Bible based books and publications, they are also a notorious group of criminal 17 pedophiles running a scam “religion” who are guilty of abuse of process and emotional 18 19 extortion through sham litigation in their pathetic efforts at discovering leaks and 20 moles and whistleblowers. Unfortunately for them, this is the year 2020 and things 21 22 like VPNs, anonymous proxies, and TOR exit nodes frustrate them at every turn. 23 Whether one is known as Darkspilver or John Redwood or JW Apostate, or any 24 number of other pseudonyms, it does not really matter as we are all Spartacus in this 25 26 fight! Reporting on and exposing to public comment and ridicule the doctrinal 27 inconsistencies and reversals, failed predictions, mistranslation of the Bible, harsh 28 JANE / JOHN DOE’S REPLY IN SUPPORT OF OBJECTION AND MOTION TO QUASH DMCA SUBPOENA- 1 Case 7:20-mc-00119-CS Document 13 Filed 04/06/20 Page 2 of 21 1 treatment of former members and autocratic and coercive leadership (not to mention 2 the child raping!) is a public duty that Jane / John Doe takes extremely seriously at 3 1 great personal risk.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • A Framework for Identifying Host-Based Artifacts in Dark Web Investigations
    Dakota State University Beadle Scholar Masters Theses & Doctoral Dissertations Fall 11-2020 A Framework for Identifying Host-based Artifacts in Dark Web Investigations Arica Kulm Dakota State University Follow this and additional works at: https://scholar.dsu.edu/theses Part of the Databases and Information Systems Commons, Information Security Commons, and the Systems Architecture Commons Recommended Citation Kulm, Arica, "A Framework for Identifying Host-based Artifacts in Dark Web Investigations" (2020). Masters Theses & Doctoral Dissertations. 357. https://scholar.dsu.edu/theses/357 This Dissertation is brought to you for free and open access by Beadle Scholar. It has been accepted for inclusion in Masters Theses & Doctoral Dissertations by an authorized administrator of Beadle Scholar. For more information, please contact [email protected]. A FRAMEWORK FOR IDENTIFYING HOST-BASED ARTIFACTS IN DARK WEB INVESTIGATIONS A dissertation submitted to Dakota State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Cyber Defense November 2020 By Arica Kulm Dissertation Committee: Dr. Ashley Podhradsky Dr. Kevin Streff Dr. Omar El-Gayar Cynthia Hetherington Trevor Jones ii DISSERTATION APPROVAL FORM This dissertation is approved as a credible and independent investigation by a candidate for the Doctor of Philosophy in Cyber Defense degree and is acceptable for meeting the dissertation requirements for this degree. Acceptance of this dissertation does not imply that the conclusions reached by the candidate are necessarily the conclusions of the major department or university. Student Name: Arica Kulm Dissertation Title: A Framework for Identifying Host-based Artifacts in Dark Web Investigations Dissertation Chair: Date: 11/12/20 Committee member: Date: 11/12/2020 Committee member: Date: Committee member: Date: Committee member: Date: iii ACKNOWLEDGMENT First, I would like to thank Dr.
    [Show full text]