The Deep Dark
Total Page:16
File Type:pdf, Size:1020Kb
THE DEEP DARK WEB Pierluigi Paganini—Richard Amores Published by Paganini Amores at Smashwords Copyright 2012 Paganini–Amores The Deep Dark Web - paganini/amores publishing 212 providence St, West Warwick, RI 02893 - 401-400-2932 ALL RIGHTS RESERVED. This book contains material protected under International and Federal Copyright Laws and Treaties. Any unauthorized reprint or use of this material is prohibited. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system without express written permission from the author / publisher. The information in this book is distributed on an “As Is and for educational only” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor Paganini-Amores publishing. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this book. ISBN: 9781301147106 Publisher – Paganini – Amores For information on book distributors or translations, please contact Publisher Paganini –Amores 212 Providence St Rhode Island 02893 Or Via Dell'Epomeo 180 Parco del Pino Fab.C Sc. A 80126 - Napoli (ITALY) Phone 401-400-2932 – [email protected] deepdarkweb.com – uscyberlabs.com – securityaffairs.co Graphics Designer – Gianni Motta was born in Naples in 1977. He is a creative with over ten years in the field of communication, graphic and web designer. Currently he is in charge for Communication Manager in a cyber security firm. Acknowledgement: Richard Amores gAtO’s list :– Gianni Motta –who has done our artwork, Jason Jacobs & Jennifer Gold-Orlando and C3nTuri0n for gelping gAtO hunt in the dark for Tor answers, and of course the loves of my life Nancy, Alexandra, Talon, Grayson and Maggy – just one victory and were on our way Pierluigi Paganini list:- Gianni Motta who has done an outstanding artwork, Luca Scotto D'Antuono, Mohit Kumar , Anthony M.Freed and Colonel Bill Hagestad II who helped me and encouraged my passion for cyber security, and of course the reason of my life, my treasures Rosanna, Alessandro and Alessia. A special thanks to my Hero and friend, the incredible Richard gATo ... “Only those who dare may fly” ... Sepulveda Top of the Document About the Author’s Pierluigi Paganini I’m Master of Engineering and Chief Information Security Officer for Bit4ID, a company leader in solutions for Identity management, but I'm mainly a fan of the security with a great passion for writing. I consider myself a security evangelist, I strong believe that security is a shared responsibility and I profess every day awareness on cyber threats. It all started with the first game consoles, the Commodore and the ZX Spectrum were systems on which I learned as a child to develop and that I disassembled and mounted at will. I’m security expert with over 20 years of experience in the field and the passion for hacking and a previous engage led me to be a Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led me to found the security blog "Security Affairs". I started writing in sleepless nights due to my second child that kept me awake, I started for a joke from scratch and in 11 months has exceeded one million contacts with a growing trend. One day I ran into a strange guy, Richard Amores, a man with a great skill in cyber security and we decide to approach together the Deep Web topic. We worked some moths making researches and trying to explore the abyss of the parallel networks. We have decided to write a book to share with the readers our incredible experience ... this is just our first trip, more adventures are coming. Today I continue to write for some major publications in the security field such as Cyber War Zone, Infosec Island, Infocec Institute, The Hacker News and for many other Security magazines and journals. Richard (gAtOmAlO) Amores gATO is a modern high tech security lowlife -Richard Amores was born amidst the 1950's Cuban Revolution in the small town of Santiago de las Vegas. Fleeing Castro’s reign, his family relocated to NYC where he was subsequently raised until his enlistment into the U.S Navy to serve on the USS Saratoga CVA 60. After discharge, Richard secured a job repairing punch card readers, learning about the before little-known object known as the computer. His interests led him to discovering things from Ethernet and arch net, to token rings, spark stations and s100. Deciding to niche his interests into software development, Richard began writing code for Lotus Notes. With Richard’s help, Lotus Notes developed “email with a database that you could write software that moved about on the network and then into the web.” His talent took him to far and distant lands around the world, working with fortune 100 companies such as IBM, American Express, and Bank of America to name a few. After dedicating much of his life to software and security, Richard, newly retired, became the owner of usCyberlabs.com, a security blog that catalyzed the idea of his new book co-written with Peirluigi. His passion for public security education is readily apparent as readers delve into the likes of “The Deep Dark Web”. Table of Contents Introduction What is the Deep Dark Web? So what are .onion web-sties? Who and Why has promoted the Deep Web? Who uses this hidden network today? Why we need Anonymity & Privacy Online Deep Web and censorship Obfsproxy tool The Iranian censorship and opportunity to test the obfsproxy tool The Chinese Tor Censorship What is the ToR Project Overview Inception Overview Why we need Tor The solution: a distributed, anonymous network Deep Web Timeline And History ClearWeb Services – Dark-Hidden Services The Government will tell you - only criminals use the Dark Tor network--// NO. Difference between Tor network, .onion network, deepWeb, darkWeb and invisibleWeb Hidden Services What Are Tor Hidden Service? What is a hidden service in ToR-.onion network? How can these hidden services be attacked? How to Use ToR-.onion Network How To The Deep Web First step Tools: Tor Products Software & Services Tor Browser Bundle Vidalia Arm Orbot Tails Onionoo Metrics Portal Tor Cloud Obfsproxy Shadow Tor2web Who Uses the Deep Dark Web Why People Use Tor-.onion network We Live In A Cyber Surveillance Planet How the State Department could of uses the ToR network Why Normal people use Tor Why Militaries use Tor Why Journalists and their audience use Tor Why Activists & Whistleblowers use Tor Why High & low profile people use Tor Why Business executives use Tor Why IT Professionals use Tor A Recon into the Abyss What is the Deep Web? A first trip into the abyss What is a Tor? How to preserve the anonymity? Connecting to the Tor network Hacktivist and Dissidents Online The hacktivism phenomenon Who really takes advantage of the operations of Anonymous? The social dissent in the Deep Web Footsteps of the Hacktivist Sample of Communication Channels Among social dissent and complaint Deep Web as inspiration source Not only Anonymous How to mitigate the risks of exposure to hacktivism attacks? Is hacktivism only a threat or also a voice to listen? What to expect from the future? Anonymous, Wikileaks and evolution of hacktivism On the collaboration with WikiLeaks An ambitious objective is the involvement of the masses in the analysis of leaked data and not only in attacks Legality of Anonymity The right to anonymity on Internet and legal implications Is a Tor Relay LEGAL in the U.S. Limitations on liability relating to material online Governments Use of the Deep Dark Web Government Use CIA, FBI, NSA, different agencies for an unique intent…global monitoring Government & Tor Network Monitoring – Control – Document sharing – Example of attack to Tor network Compromise the TOR Anonymity Dear Tor Mail User –government intervention The Business Side of the Deep Dark Web - The Black Market Tor Black Market Cybercrime Ecosystem What is the Cyber Black Market? Blue Collar -Cyber Crime Let’s look at the black market in the surface web.: WHITE COLLAR CYBER CRIMES – cybercrime ecosystem Risk-forwarding cybercrime ecosystem Let’s look at the black market in the dark web.: The Digital Economy - Cyber Black Market-Underground Economy Digital Currency -basics These are some other ecurrencies— Reference: Lab Notes How Does Bitcoin Work? Underground Economy – basics Reloadable Debit Cards Security Conclusion Tips Western Union /Money Grams -Basics Security Tips Ecurrency - Basics Security Tips Trust Networks - Basics Borrowed Bank Accounts / Underground ATM cards Mule Networks Bitcoin FBI – BitCoin Report -Intelligence Assessment Bitcoin Virtual Currency Report – Unclassified Executive Summary Scope Note Source Summary Statement The Bitcoin Economy (U) Introduction Unique Features Present Distinct Challenges for Detecting and Stopping Illicit Activity How Anonymous is Bitcoin? What Users Can Do To Increase Anonymity Decentralized Authority Vulnerabilities (U) Money Laundering Theft of Bitcoins Third-Party Bitcoin Services Theft of Services for the Purpose of Mining Bitcoins Bitcoins Outlook and Implications Bitcoins Intelligence Gaps Appendix A: FBI report Key Terms Appendix B: Confidence Levels U) Appendix C: How Does Bitcoin Work? Bitcoin Mining Scam How does it work? Well… How Normal Business can use ToR Hide Scada In The Tor Network –