Automating Aspects of Forensic Case Management 1 G Nor, I Sutherland, AJC Blyth

Total Page:16

File Type:pdf, Size:1020Kb

Automating Aspects of Forensic Case Management 1 G Nor, I Sutherland, AJC Blyth Volume 17, Issue 4, Fall 2018 ISSN 1445-3312 (Printed Journal) JOURNAL OF INFORMATION WARFARE ISSN 1445-3347 (Online Journal) Journal of Vo Information lume 17 Issue 4 Warfare Fall 2018 Journal of Information Warfare (JIW) www.jinfowar.com Journal Staff Authors’ Responsibilities & Copyright Chief Editor Authors are to ensure the accuracy of their papers. This Dr. Leigh Armistead journal does not accept any responsibility for statements made by authors in their written papers. Where Assistant Editor relevant, authors are to ensure that the contents Dr. William Hutchinson of their papers are cleared for publication, for example, by their employer, their client, the funding organization, Deputy Editor in Chief and/or copyright owner of any material that is Dr. Diane Silver reproduced. Technical Editor Copyright of the article is retained by the authors who Dr. Marla Weitzman warrant that they are the copyright owner and have in no way infringed any third- party copyright. In submitting Editorial and Technical Advisor the article for publication, the above warrant is implied as Zachary Hubbard is the grant of a non-exclusive copyright license by the author to the Journal of Information Warfare to publish Administrative and Editorial the work as determined by the Editorial Board. Assistant Angel Linzy The views expressed by contributors do not necessarily represent those of the editors, advisory board, or the Editorial Board publishers. S. Furnell J. Lopez J. Slay P. Williams Subscriptions H. Armstrong C. Irvine The Journal of Information Warfare is published four C. Bolan A. Jones times per year and is available both online and in hard G. Duczynski W. Mahoney copy. A. Ahmad C. Valli M. Henson A. Liaropoulos Individual; Individual, Student; and Corporate subscriptions are available. For current pricing, see Advisory Board http://www.jinforwar.com/subscribe/. Dr. Corey Schou Idaho State University, Idaho, United States Individual A one-year subscription to the journal for individual Professor Matthew Warren subscribers. Both online-only and, online and print Deakin University, Melbourne, Australia subscriptions are available. Dr. Brett van Niekerk Individual, Student University of KwaZulu-Natal, Durban, SA A one-year subscription to the journal for students. Evidence of full-time study must be provided. Both Scope online-only and, online and print subscriptions are The journal has been created to provide a forum for available. discussion, information, and interaction between practitioners and academics in the broad discipline of Corporate information warfare/operations. It is of interest to A one-year subscription to the journal for professionals from the military, government, commerce, corporate/library subscribers. Both online-only and, industry, education, and academy. online and print subscriptions are available. A single subscription covers unlimited use for a single A full gambit of topics is covered—from the physical campus/geographic location. destruction of information systems to the psychological aspects of information use. The aim is to provide a Note: Individual print copies of the journal are definitive publication that makes available the latest generally available for purchase only to subscribers thinking and research in the critical area of information and contributors. warfare. All advertisements in this journal are printed free of Submissions charge as a service to readers. The journal welcomes submissions. To learn more about preparing articles for submission, authors should visit the Journal cover design, concept, and layout by Laima Croft. JIW website. Articles may be submitted to Diane Silver at [email protected] or Angel Linzy at [email protected]. Journal of Information Warfare Volume 17, Issue 4 Fall 2018 Contents From the Editor i L. Armistead Authors ii Automating Aspects of Forensic Case Management 1 G Nor, I Sutherland, AJC Blyth Towards a Literature Review on Cyber Counterintelligence 11 PC Duvenage, VJ Jaquire, SH von Solms Conducting Investigations on the Dark Web 26 C Easttom On the Use of Ontology Data for Protecting Critical Infrastructures 38 J Henriques, F Caldeira, T Cruz, P Simões A Cultural Exploration of Social Media Manipulators 56 C Sample, J McAlaney, JZ Bakdash, H Thackray Implications of Privacy & Security Research for the Upcoming Battlefield ofThings 72 L Fritsch, S Fischer-Hübner Behavioral Profiling for Transparent Verification in Cloud Storage Services 88 B Al-Bayati, N Clarke, P Haskell-Dowland, F Li Cyber-Securing Super Bowl 50: What Can a Live-Fire Football Match Teach Students 106 about Becoming Better Cyber Security Professionals? MW Bovee, HOL Read Journal of Information Warfare © Copyright 2019 Published by Peregrine Technical Solutions, LLC Yorktown, Virginia, USA Print Version ISSN 1445-3312 Online Version ISSN 1445-3347 From the Editor Fall 2019 Information has always been regarded as an element of power. Too often, however, it has been seen as an enabling or supporting component rather than as the mission-critical element it frequently is in conducting operations. Indeed, the very nature of modern-day operations, with its persuasive and never-ending 24-7 global media coverage, has time and again demonstrated the need for actors and nation-states to utilise all the tools or elements of power at their disposal. To be sure, information must be considered a vital compo- nent in any sort of influence type of operations. However, the factors that make information useful as an element of power are also adding to the difficul- ties nation-states face in their efforts to conduct information campaigns, or IO, on a successful basis. The shifting of power away from a centralised authority, the loss of control from the federal bureaucracy, and the low cost as well as ease of entry into this domain have combined to create a fundamental change in the ways that information is and can be utilised around the world. The advent of new information-technology capabilities has certainly benefited elements of society: non-gov- ernmental organisations, non-state actors, corporations, individuals, and—unfortunately—terrorists. But it has also radically altered the methods by which the administration and other branches of the federal govern- ment can interact with their counterparts around the world. At the centre of the issue is a lack of control— control of content, flow, and paths of communication. Consequently, despite the heightened expectations understandably fostered by the increased capabilities inherent in IO, governmental entities struggle and often fail to construct successful information campaigns and operations. There is no coherent theoretical construct, definition, or taxonomy—instead, there is a virtual smorgasbord of training classes with varying curricula and content, none of which are integrated or coordinated. In general, too much is expected, and too much has been promised. With no radical changes in funding across these agencies, it is no surprise that progress has overall been disappointing. While the Journal of Information Warfare cannot solve all of these issues, it can and will continue to provide a forum for voices and theories and research and especially conversations that can and will contribute to the real and significant progress we have every reason to expect. Join the conversation with us at one or more of the professional conferences slated for the coming year. The next event is the 18th European Conference on Cyber Warfare & Security, which will be held at the University of Coimbra in Portugal in July 2019. The Australians usually host their Edith Cowan University Security Research Institute in Perth, Australia, in early December of each year, with an event that hosts five different security-based conferences over these three days. In March 2020, the 15th ICCWS will convene at Old Dominion University in Norfolk, VA. Finally, we are always looking for good reviewers for JIW. If you are interested, please contact me (larmi- [email protected]) or email our staff at [email protected]. Members of our review board help us conduct our double-blind, peer- reviewed assessment; appear on the journal’s masthead; and get a free online subscrip- tion during each year of their service. Cheers, Dr Leigh Armistead, CISSP Chief Editor, Journal of Information Warfare [email protected] Journal of Information Warfare i Authors Burhan Al-Bayati is currently a Dr. Matthew Bovee is the As- final-year PhD candidate at the sociate Director of the Comput- Centre for Security, Commu- er Science/Computer Security nications & Network Research & Information Assurance pro- at the University of Plymouth gram at the Norwich Universi- (UK). He holds a BSC in com- ty School of Business & Man- puting from Baghdad Universi- agement. As Lecturer there, he ty (Iraq), 2002, and an MSC in teaches general and specialist computing from Pune University courses in computer science, (India), 2008-2010. Burhan’s re- digital forensics, and comput- search interests include information security, biomet- er security. In addition to cyber security and digital ric authentication, and cloud security. forensics, Dr. Bovee’s background includes research, publications, and degrees in accounting and informa- tion systems and exercise physiology. Jonathan Z. Bakdash received the PhD degree in psychology in Filipe Caldeira is an Adjunct 2010 from the University of Vir- Professor at the Informatics ginia. He is a Research Psychol- Department of the Polytechnic ogist with the Human Research Institute of Viseu, Portugal. He and Engineering Directorate, obtained his PhD degree in In- U.S. Army Research Laborato- formatics Engineering in 2014 ry, South Field Element, at the from the Faculty of Sciences University of Texas, Dallas. His and Technology of the Universi- research interests include human ty of Coimbra. He has acted as decision-making, human-machine interaction, and cy- program director of the Infor- ber security. matics Engineering program since 2014. He is also a researcher at the Centre for Informatics and Systems of the University of Coimbra and at the CI&DETS re- Dr. Andrew Blyth, formally search center of the Polytechnic Institute of Viseu.
Recommended publications
  • Nor'easter News Volume 2 Issue 5
    Established 2007 N ...........R'EASTER NEWS Make a Dif­ Setting the Re­ ference, Be a cord Straight Mentor on Housing BY ANDREW FREDETTE BY MICHAEL CAMPINELL Nor'easter Staff Nor'easter Staff Have you ever wondered Right after the hous­ what it would be like to have a ing selection for the 2009 - 2010 mentor when you where growing school year happened, rumors up? Wonder what the experience starting spreading like wildfire. might do for you and the experi­ This article is to help set those ru­ ence you might gain? Growing mors straight. Information in this up is a part of life that not ev­ article was received from Jennifer eryone wants to do. But there are Deburro-Jones, the Director oJ ways to revert to your child hood Residential Life at UNE. She and and feel like a kid again. UNE is I have spoke on several occasions running a mentor program with about the many different aspects the College Community Men­ of housing at UNE and she has toring Program. also sent me answers to specific The program consists of 55 questions about the housing se­ mentors right now who are all lection process and what is hap­ UNE students, and the group of TY GOWEN, NOR'EASTER NEWS pening next year. BUSH CENTER: George H.W. and Barbara Bush address UNE at the dedication ceremony on October 3, 2008. children they work with are any One of the first rumors is that where from kindergarten all the housing selection numbers are way to 8th grade. The age of the International Center not actually random.
    [Show full text]
  • Introduction Points
    Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database) TORLINKS Directory for .onion sites, moderated. Core.onion - Simple onion bootstrapping Deepsearch - Another search engine. DuckDuckGo - A Hidden Service that searches the clearnet. TORCH - Tor Search Engine. Claims to index around 1.1 Million pages. Welcome, We've been expecting you! - Links to basic encryption guides. Onion Mail - SMTP/IMAP/POP3. ***@onionmail.in address. URSSMail - Anonymous and, most important, SECURE! Located in 3 different servers from across the globe. Hidden Wiki Mirror - Good mirror of the Hidden Wiki, in the case of downtime. Where's pedophilia? I WANT IT! Keep calm and see this. Enter at your own risk. Site with gore content is well below. Discover it! Financial Services Currencies, banks, money markets, clearing houses, exchangers. The Green Machine Forum type marketplace for CCs, Paypals, etc.... Some very good vendors here!!!! Paypal-Coins - Buy a paypal account and receive the balance in your bitcoin wallet. Acrimonious2 - Oldest escrowprovider in onionland. BitBond - 5% return per week on Bitcoin Bonds. OnionBC Anonymous Bitcoin eWallet, mixing service and Escrow system. Nice site with many features. The PaypalDome Live Paypal accounts with good balances - buy some, and fix your financial situation for awhile. EasyCoin - Bitcoin Wallet with free Bitcoin Mixer. WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more. Cheap Euros - 20€ Counterfeit bills. Unbeatable prices!! OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry. BestPal BestPal is your Best Pal, if you need money fast. Sells stolen PP accounts.
    [Show full text]
  • Quase 700 Sites Onion, a MAIORIA ESTÁ ONLINE
    Quase 700 sites onion, A MAIORIA ESTÁ ONLINE (ALGUNS NÃO SÃO 24HRS ONLINE) APROVEITE, TENHA CAUTELA A VISITAR SITES SEM LEGENDA, NÃO SABEMOS O QUE É OU O QUE V AI ENCONTRAR EU NÃO TESTEI TODOS OS SITES, OBVIAMENTE. http://2222243pi3jvhgnt.onion/ The Nowhere Server (restored from FH) http://222224h72gngmbr4.onion/ The Nowhere Server (restored from FH) http://2222266ahj25j5j2.onion/ The Nowhere Server (restored from FH) http://2223t4sermipwasm.onion/ The Nowhere Server (restored from FH) http://23tjl3xpt5btiqms.onion/ W38M411 - Login http://25ffhnaechrbzwf3.onion/ NL Growers - Coffee Shop grade Cannabis from the Netherlands - Weed, Hash, Marijuana, Cannabis for Bitcoins http://2atptz66l5aepcbj.onion/ Hacktivisme libre http://2bicbge75gy5xjso.onion/ Sam's Drug Store http://2cmg43zpfbelgwlw.onion/ http://2fqgjzbb2h7yevom.onion/ http://2gxxzwnj52jutais.onion/ The Nowhere Server (restored from FH) http://2jv5r7k66ralyk3g.onion/ http://2kcreatydoneqybu.onion/ Einloggen http://2kka4f23pcxgqkpv.onion/ Euro Guns - Number one guns dealer in onionland - Buy guns and ammo for Bitcoin. http://2ogmrlfzdthnwkez.onion/ Rent-A-Hacker - Hire a hacker for every job you c an imagine, from DDOS to completely ruining people or destroy reputation of a co mpany or individual http://2oztyiaxrr3vijwe.onion/ Index of / http://2pdkdy3eo552mpiz.onion/ http://2q4ryi45p6har5w2.onion/ I2P Downloads from kytv http://2qhtfzoxe24d5gxe.onion/ System Setup Required http://2qtnwm3zdbn52nxt.onion/ Hidden Service #6 http://2r2tz6wzqh7gaji7.onion/ KAVKAZ CENTER http://2xtsq3ekkxjpfm4l.onion/
    [Show full text]
  • Network Security
    Cristina Nita-Rotaru CS6740: Network security Anonymity. Sources 1. Crowds: http://avirubin.com/crowds.pdf 2. Chaum mix: http://www.ovmj.org/GNUnet/papers/p84-chaum.pdf 3. To r : https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf 4. Predecessors attack: http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf 5. Also based on slides prepared by Chi-Cun Chan. 2 Anonymity systems. 1: Motivation Anonymity Anonymity (``without name’’) means that a person is not identifiable within a set of subjects } Unlinkability of action and identity } For example, sender and his email are no more related after adversary’s observations than they were before } Who talks to whom } Unobservability } Adversary cannot tell whether someone is using a particular system and/or protocol 4 Anonymity systems. There is no anonymity on the Internet } Your IP address can be linked directly to you } ISPs store communications records } Usually for several years (Data Retention Laws) } Law enforcement can subpoena these records } Your browser is being tracked } Cookies, Flash cookies, E-Tags, HTML5 Storage } Browser fingerprinting } Your activities can be used to identify you } Unique websites and apps that you use } Types of links that you click 5 Anonymity systems. Wiretapping is ubiquitous } Wireless traffic can be trivially intercepted } Airsnort, Firesheep, etc. } Wifi and Cellular traffic! } Encryption helps, if it’s strong } WEP and WPA are both vulnerable! } Tier 1 ASs and IXPs are compromised } NSA, GCHQ, “5 Eyes” } ~1% of all Internet traffic } Focus on encrypted traffic 6 Anonymity systems. Who uses anonymity systems? } “If you’re not doing anything wrong, you shouldn’t have anything to hide.” } Implies that anonymous communication is for criminals } The truth: who uses Tor? } Journalists } Law enforcement ¤ Business executives } Human rights activists ¤ Military/intelligence personnel } Normal people ¤ Abuse victims } In fact, the predecesor of Tor was developed by the U.S.
    [Show full text]
  • Responsible Vendors, Intelligent Consumers: Silk Road, the Online
    EXHIBIT 3 G Model DRUPOL-1273; No. of Pages 7 ARTICLE IN PRESS International Journal of Drug Policy xxx (2013) xxx–xxx Contents lists available at ScienceDirect International Journal of Drug Policy jo urnal homepage: www.elsevier.com/locate/drugpo Editors’ choice Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading a,∗ b Marie Claire Van Hout , Tim Bingham a School of Health Sciences, Waterford Institute of Technology, Waterford, Ireland b Irish Needle Exchange Forum, Ireland a r a t i c l e i n f o b s t r a c t Article history: Background: Silk Road is located on the Deep Web and provides an anonymous transacting infrastructure Received 28 August 2013 for the retail of drugs and pharmaceuticals. Members are attracted to the site due to protection of identity Received in revised form 25 October 2013 by screen pseudonyms, variety and quality of product listings, selection of vendors based on reviews, Accepted 27 October 2013 reduced personal risks, stealth of product delivery, development of personal connections with vendors in stealth modes and forum activity. The study aimed to explore vendor accounts of Silk Road as retail Keywords: infrastructure. Silk Road Methods: A single and holistic case study with embedded units approach (Yin, 2003) was chosen to explore Internet Vending the accounts of vendor subunits situated within the Silk Road marketplace. Vendors (n = 10) completed an online interview via the direct message facility and via Tor mail. Drug markets Results: Vendors described themselves as ‘intelligent and responsible’ consumers of drugs. Decisions to commence vending operations on the site centred on simplicity in setting up vendor accounts, and opportunity to operate within a low risk, high traffic, high mark-up, secure and anonymous Deep Web infrastructure.
    [Show full text]
  • Lecture 21: Anonymous Communications
    CS232 Lecture 21: Anonymous Communications November 21, 2018 2 You Are Not Anonymous 3 ¨ Your IP address can be linked directly to you ¤ ISPs store communications records ¤ Usually for several years (Data Retention Laws) ¤ Law enforcement can subpoena these records ¨ Your browser is being tracked ¤ Cookies, Flash cookies, E-Tags, HTML5 Storage ¤ Browser fingerprinting ¨ Your activities can be used to identify you ¤ Unique websites and apps that you use ¤ Types of links that you click Wiretapping is Ubiquitous 4 ¨ Wireless traffic can be trivially intercepted ¤ Airsnort, Firesheep, etc. ¤ Wifi and Cellular traffic! ¤ Encryption helps, if it’s strong n WEP and WPA are both vulnerable! ¨ Tier 1 ASs and IXPs are compromised ¤ NSA, GCHQ, “5 Eyes” ¤ ~1% of all Internet traffic ¤ Focus on encrypted traffic Who Uses Anonymity Systems? 5 ¨ “If you’re not doing anything wrong, you shouldn’t have anything to hide.” ¤ Implies that anonymous communication is for criminals ¨ The truth: who uses Tor? ¤ Journalists ¤ Business executives ¤ Law enforcement ¤ Military/intelligence personnel ¤ Human rights activists ¤ Abuse victims ¤ Normal people ¨ Fact: Tor was/is developed by the Navy Why Do We Want Anonymity? 6 ¨ To protect privacy ¤ Avoid tracking by advertising companies ¤ Viewing sensitive content n Information on medical conditions n Advice on bankruptcy ¨ Protection from prosecution ¤ Not every country guarantees free speech ¤ Downloading copyrighted material ¨ To prevent chilling-effects ¤ It’s easier to voice unpopular or controversial opinions
    [Show full text]
  • The Deep Dark
    THE DEEP DARK WEB Pierluigi Paganini—Richard Amores Published by Paganini Amores at Smashwords Copyright 2012 Paganini–Amores The Deep Dark Web - paganini/amores publishing 212 providence St, West Warwick, RI 02893 - 401-400-2932 ALL RIGHTS RESERVED. This book contains material protected under International and Federal Copyright Laws and Treaties. Any unauthorized reprint or use of this material is prohibited. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system without express written permission from the author / publisher. The information in this book is distributed on an “As Is and for educational only” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor Paganini-Amores publishing. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this book. ISBN: 9781301147106 Publisher – Paganini – Amores For information on book distributors or translations, please contact Publisher Paganini –Amores 212 Providence St Rhode Island 02893 Or Via Dell'Epomeo 180 Parco del Pino Fab.C Sc. A 80126 - Napoli (ITALY) Phone 401-400-2932 – [email protected] deepdarkweb.com – uscyberlabs.com – securityaffairs.co Graphics Designer – Gianni Motta was born in Naples in 1977. He is a creative with over ten years in the field of communication, graphic and web designer. Currently he is in charge for Communication Manager in a cyber security firm.
    [Show full text]
  • Cyberextortion, a Growing Industry 22/02/2016
    CyberThreats_ Telefónica Cyberextortion, a Growing Industry 22/02/2016 Cyberextortion, a Growing Industry. 22/02/2016 Major findings There is an increasing tendency towards aggression in numerous cyber-attacks, notably those using some method of extortion in particular. In this sense, the conclusions on the methods carried out which are having the greatest impact are as follows: . Extortion via DDoS attacks is being firmly established. The modus operandi of the DD4BC group could give rise to more attackers impersonating them without the need for a great infrastructure and extensive technical knowledge. On the other hand, possible money outflows with the aim of laundering returned to the source of the extortion are the online gaming and trading platforms. Security breaches are assuming a way of extortion based on the sensitivity of filtered information. Currently, two ways are being opted to monetise the attacks, either to sell the database or to extort it directly to users. The payment method required is usually Bitcoin. A growing trend is sexual extortion, also known as sextortion. The sharing of files using peer-to-peer networks remains the main platform for access to child abuse material and for its distribution in a non-commercial manner. In the same way, other anonymous networks and platforms such as Tor are considered as a threat in this area. However, what worries Security Authorities and Bodies the most is the live streaming of child abuse due to the difficulty to detect and investigate it since criminals tend not to store a copy of the material. Since 2015, the threat of ransomware has increased by 165%.
    [Show full text]
  • R'easter News
    Established 2007 ..........R'EASTER NEWS Remembering Art Gallery Harold Alfond features BY KELCY CUNNINGHAM Aberlardo Nor'easter Staff Walking into the Harold Al­ Morell fond Center for Health Sciences, most students are thinking of the BY JAMIE THOMPSON test they are about to take or the Nor'easter Staff lab write-up they need to finish. However, they often forget that On November 30, the Art the building affectionately known Gallery at UNE unveiled its simply as Alfond would be non­ retrospective of photographs by existent if it weren't for the gen­ Abelardo Morell. Upon enter­ erosity of one individual, Harold ing the gallery, viewers are con­ Alfond. fronted by the massive "Book Through Alfond's charity, a Damaged by Water."The simple, $2.5 million gift for the fundrais­ straightforward title belies the ing campaign for the building, image itself: twisted, warped thousands of students have had book pages are pressed together the benefit ofusing the Center for in a labyrinthine formation. This Health Sciences and its numerous piece. is indicative of much of laboratories and lecture halls. The NORTH DAM MILL: Located on Main St. in downtown Biddeford, North Dam Mill may offer alternative to traditional on Morell's work in that the stark College of Osteopathic Medicine campus housing for UNE students black and white depictions of could not exist without this build­ everyday objects take on strange, ing, and it has helped UNECOM Mill buildings to offer off campus housing almost abstract qualities that defy to grow into what it is today. expectations. The Center for Health Sci­ MARISSA SIMOES in the market.
    [Show full text]
  • Deep Web Bienvenido - Welcome - Witam
    Deep Web Bienvenido - Welcome - Witam Juan Miguel Taboada Godoy @juanmitaboada https://www.linkedin.com/in/juanmitaboada Deep Web Bio Juan Miguel Taboada Godoy ( 1980 - … ) 1996 – Primer ordenador y primera LAN (cable coaxial) 1999 – Universidad de Málaga y Linux Málaga 2001 – Grupo de investigación GEB.uma.es (4 años) Cluster computación +20 nodos (OpenMosix) 2002 – Presidente de Asociación Málaga Wireless 2003 – Beca en Neurociencia en SUNY Teleruta (Ministerio de Fomento – 2 años) 2005 – Autónomo: - Nace Centrologic - Polonia (2 años) - Likindoy (Axaragua + Junta Andalucía) 2008 – Responsable Sistemas en PontGrup 2011 – Adquisición Datos en Bética Fotovoltáicas 2012 – SAFECLON y SCRUM/KANBAN 2013 – Executive MBA 2014 – Aeronáutica: Django + AngularJS 2015 – Industria: Likindoy + Big Data Deep Web ¿Deep qué? ¿Deep web? He oído algo sobre eso... Sí, el 96% de Internet no es accesible a través de buscadores estándar. Se puede encontrar de todo or ahí: porno infantil blanqueo de bitcoins compra de narcóticos . ¿Y cómo se accede? Es bastante fácil, pero te advierto: ojito con donde haces click Hay cosas de locos que lo flipas Diálogo entre Lucas Goodwin y un personaje Secundario en “House of Cards S02E02” Deep Web ¿Deep qué? Deep Web ¿Quién? Gente normal ● Privacidad ● Búsqueda de temas escabrosos (SIDA, control natalidad, cultura tibetana, religión) ● Evitar vigilancia activa ● Eludir la censura Periodistas y lectores ● Reporteros sin fronteras ● Difundir la información en paises limitados (Radio Free Europe, Voice of America) ● Periodistas
    [Show full text]
  • Önder Gürbüz
    Önder Gürbüz Tadında, bir kılavuz ki rehber olsun sana. Ne uzun uzadıya nede çok kısa, içinde fuhuşta var, silahta. Esrar ve gizli ilimler, gizliden gizliye bilgiler, belgeler. Bilinmeyenler, gizemin en karanlığı. Ruhum dediğimde, dünyanın bir köşesinden diğerine! Saniyeler içeresinde, yeryüzünden, güneş pırıltısına, yedi kat yerin dibine. http://www.gurbuz.net http://wordpress.gurbuz.net 26.07.2016 Daha Facebook’da yazıp çizerken birisi bana sormuştu “bilgileri nasıl elde ediyorsun?” diye… Yasal zemin dururken yasadışı hareket etmenin âlemi yok… Ancak bu yöntemler ile bir sonuca varamazsanız eğer başka yöntemlere başvurulabilir! Birinci ve en önemli kural: Ne aradığınız hakkında bir fikriniz olmalı… Sonra kelime dağarcığınızda belli oranda kelimelerin mevcudiyeti çok önemli. Son olarak Boole Cebir’i denen operatörlerin kullanımını bilmelisiniz. Çok kısa bir hatırlatmada bulundum çünkü bu konu hakkında gerçekten çok yazmıştım. Benim niyetim buradan uzun uzun ahkâm kesmek değil elinize bir nevi kılavuz, rehber vermek. Online Anonymisierungsdienst ∙ Anonymizer ∙ Anonimleştirme (kimliğinizi, IP adresinizi gizleme) https://www.proxymus.de/ http://anonymouse.org/anonwww_de.html https://hide.me/de/proxy Başka bir yöntem ki aslında hem basit hem etkili, yani en azından yasadışı bir niyetiniz yoksa hedef adresinize birkaç arama motoru üzerinden gitmeniz. Örnek vermek gerekirse… Mesela beni arıyorsunuz, Önder Gürbüz. Arama hedefiniz benim, Google üzerinden Bing’i, Bing üzerinden Yahoo ve Yahoo üzerinden beni arıyorsunuz. Ne kadar çok arama motoru
    [Show full text]
  • The Art of Invisibility: the World's Most Famous Hacker Teaches You How
    Copyright Copyright © 2017 by Kevin Mitnick Foreword copyright © 2017 by Mikko Hypponen Cover design by Julianna Lee Author photograph by Tolga Katas Cover copyright © 2017 by Hachette Book Group, Inc. Hachette Book Group supports the right to free expression and the value of copyright. The purpose of copyright is to encourage writers and artists to produce the creative works that enrich our culture. The scanning, uploading, and distribution of this book without permission is a theft of the author’s intellectual property. If you would like permission to use material from the book (other than for review purposes), please contact [email protected]. Thank you for your support of the author’s rights. Little, Brown and Company Hachette Book Group 1290 Avenue of the Americas, New York, NY 10104 littlebrown.com twitter.com/littlebrown facebook.com/littlebrownandcompany First ebook edition: February 2017 Little, Brown and Company is a division of Hachette Book Group, Inc. The Little, Brown name and logo are trademarks of Hachette Book Group, Inc. The publisher is not responsible for websites (or their content) that are not owned by the publisher. The Hachette Speakers Bureau provides a wide range of authors for speaking events. To find out more, go to hachettespeakersbureau.com or call (866) 376-6591. ISBN 978-0-316-38049-2 E3-20161223-JV-PC Contents Cover Title Page Copyright Dedication Foreword by Mikko Hypponen Introduction | Time to Disappear Chapter One | Your Password Can Be Cracked! Chapter Two | Who Else Is Reading Your E-mail? Chapter
    [Show full text]