Dark Web Forensics

$33.00


Get the access to all our courses via Subscription

Subscribe

Editor’s Word

Dear Readers,

Giving you the next editor’s word is a pleasure. Since there is still more to learn about dark web forensics, we have chosen to publish the Dark Web Forensics issue this time. If you are looking for more information about the dark web, this issue is for you. Paulo, in his article on Dark Web File Sharing: Basic Forensics Using CSI Linux presents the dark web investigations. “Investigating the Dark Web poses major challenges for digital forensics because it is a region in which there is, first and foremost, a need to protect people persecuted by governments around the world. However, secondarily, the Dark Web brings together many types of criminal transactions, such as the exploitation of children and the sale of drugs and weapons, among many other activities, including ransomware attacks.”
For more information, read Jeff Minakata's article to learn about "different discovery tools and discuss why we should be using these tools and how to ensure they are working properly in creating a sock puppet (a false identity) to help us keep our real identity "safe" while browsing the Darkweb."
In the article, Dr. Sapna V M "equips the forensics community with a deeper understanding of Tor's inner workings to combat illegal activities shrouded in its anonymity cloak, and explores the Tails Operating System's role in providing safe browsing and web anonymity on both the Clear Web and Dark Web."
If you want to learn more about Generative Pre-trained Transformer (GPT) tools and other AI methodologies for improving dark web forensic practices, read George Antoniou's article. I believe you will find many more inside the magazine. I hope you enjoy reading! Finally, I want to hear your thoughts on the future of digital forensics. There are numerous emerging trends and technologies, including AI, machine learning, blockchain, IoT, cloud computing, and quantum computing. What are your thoughts about them? If you have your own ideas for future trends, please contact me at [email protected].
And I would like to thank everyone on the team and all the contributors who helped me create this issue.
Best Regards,
Ewa

Table of Contents

FORENSIC ANALYSIS OF TOR BROWSER ON WINDOWS 11: UNVEILING THE DARK WEB”S SECRETS

BY DR. SAPNA V M

This work aims to equip the forensics community with a deeper understanding of Tor’s inner workings to combat illegal activities shrouded in its anonymity cloak and explores the Tails Operating System’s role in providing safe browsing and web anonymity on both the Clear Web and Dark Web. The study highlights the importance of live forensics and the need for further investigations into Tor network traffic to improve digital forensic practices in dark web inquiries.

EXPLORING THE SHADOWS: ADVANCES AND CHALLENGES IN DARK WEB DIGITAL FORENSICS

BY GEORGE ANTONIOU

The dark web poses significant challenges to digital forensic investigations due to its anonymous nature and the sophisticated encryption technologies employed by its users. This paper explores the potential of Generative Pre-trained Transformer (GPT) tools and other AI methodologies to enhance forensic practices on the dark web. Employing a mixed-methods approach that includes experimental applications and qualitative analyses, this study investigates the capabilities of AI-driven tools in improving the accuracy and efficiency of digital forensics. Our results demonstrate notable advancements in forensic processes, with AI tools providing deeper insights and faster processing of complex data sets. The paper concludes by discussing the transformative impacts these technologies have on dark web investigations, opening new avenues for both practice and research in cybersecurity forensics.

DARK WEB FILE SHARING: BASIC FORENSICS USING CSI LINUX

BY PAULO PEREIRA

The Dark Web investigation is a war. DFIR investigators and law enforcement professionals are vigilant soldiers working every day to find evidence of illicit activity in this internet zone. Investigating the Dark Web poses major challenges for digital forensics because it is a region in which there is, first and foremost, a need to protect people persecuted by governments around the world. However, secondarily, the Dark Web brings together many types of criminal transactions, such as the exploitation of children and the sale of drugs and weapons, among many other activities, including ransomware attacks. For this reason, an operating system like CSI Linux is necessary in order to properly conduct an investigation.

SEARCHING THE DARK WEB

BY JEFF MINAKATA

In this article, we explore the Darkweb, what it is, precautions we can take to stay safe, how to access it, and how to find URL’s that might be of interest regarding data discovery. We will explore different discovery tools and discuss why we should be using these tools and how to ensure they are working properly in creating a sock puppet (a false identity) to help us keep our real identity “safe” while browsing the Darkweb.

NAVIGATING THE ABYSS: EXPLORING THE FUTURE TRAJECTORY OF DARK WEB FORENSICS

BY RHONDA JOHNSON

The evolution of technology created new frontiers in cyberspace, including the incomprehensible realm of the Dark Web (Dahiya et. al., 2022). Concealed beneath layers of encryption and anonymity, this clandestine network harbors a plethora of illicit activities, from drug trafficking to cybercrime. Dark web forensics, the discipline dedicated to uncovering the secrets of this shadowy domain, stands at the forefront of the ongoing battle between law enforcement and cyber criminals. In this article, we delve into the future trajectory of dark web forensics, examining emerging trends, challenges, and technological advancements that will shape its landscape.

WE ARE DARKNESS

BY WILSON MENDES

In the dark times of totalitarian dictatorships and modern and increasingly common surveillance systems disguised through social networks, applications, and their powerful terms of use, which give full power to big techs to access absolutely everything about the people they use, privacy and individual freedom are increasingly threatened. In this scenario, the use of encryption, which is increasingly popular and embedded in applications, browsers, and emails, for example, emerges as an essential tool for protecting sensitive information and guaranteeing citizens' privacy. 

IOS SYSTEM ARTIFACTS: REVEALING HIDDEN CLUES

BY BELKASOFT

When conducting a digital investigation, application artifacts like chats and browsers are usually the first in line to be explored. However, with iOS devices, system files have great potential, too. Apple devices record and store various user settings and activities, and some of these records may help build a picture of events and reveal crucial evidence. In this article, we will look into a few notable iOS system artifacts

DIGITAL INVESTIGATIONS: HOW TO MAKE BIG DATA SMALL 

BY JUSTIN TOLMAN AND FARAND C. WASIAK

As mobile devices offer more storage and greater computing power—all while taking in more and more data about individual users—this challenge mounts. For instance, walking just a few blocks with a smartphone in your pocket generates huge swaths of data, from your moment-by-moment location and connections to nearby stores to available Wi-Fi networks. You might think artificial intelligence (AI) is here to help parse this sea of data, but AI is a double-edged sword in digital forensics. It has the potential to speed up investigations but can also be used to create illicit content. It’s not trusted as a detection tool in court [1], and the lack of regulation around it complicates its use even further. The good news is that technologies do exist to help digital forensics agents tackle this challenge, and when they’re paired with a few best practices, big data suddenly isn’t so big anymore.

INTERVIEW WITH ALAMEEN KARIM MERALI

BY EWA & EF TEAM

Alameen Karim Merali is a Tanzanian public figure and cybersecurity expert. Alameen holds several cybersecurity certifications, including CompTIA, CHFI, Mobile Security, Corporate Cybersecurity Management, and other certifications from various certification bodies, including Cybrary. He is currently working on obtaining additional certifications and is also a member of ISC2. He plans to complete a B.Sc. degree in information   and a PhD in Malware Analysis in the future. Nonetheless, he has been told that that will not be necessary since all the training he will be doing in all his courses will cover the entire PhD and BSc programs without going for them, so he may decide just to jump the learning and enter directly for PhD and BSc Exams after completing all the courses he’s doing or not do them at all.

“THE TECHIE CIRCUS” UNCOVERING THE RIB-TICKLING, HYSTERICALLY FUNNY, IMPRACTICAL PORTRAYAL OF DIGITAL FORENSICS AND CYBER SECURITY IN INDIAN CINEMA

BY  PIRATHIBBAN. K

Indian cinema, a realm of beyond imagination directly connected to the multiverse of Rangoli like colorful storytelling, larger-than-life characters, laws of physics-defying action sequences, dramatic romantic escapades, and sometimes filled with unexplainable vibe songs in between, never fails to charm us with its special take on various aspects of existence. Although, when it comes to the representation of digital forensics and cyber security, our adored Indian filmmakers have truly taken the phrase “out of this world” to a whole new level. From the blockbusters of Kashmir to the marvels of Kanyakumari, let’s shed some light on a humorous inter-dimensional travel through the absurdly exaggerated and ludicrously illogical portrayal of digital forensics and cyber security in Indian cinema.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023