ROBERT STEELE: Because this post will live forever online, and the topics we will discuss are virtually classified, I offer a more revealing snapshot here with additional details below the fold:
Every official web monitoring system — including so-called “white” portals — has been compromised. Governments (and their contractors) simply do not know what they need to know. As the Deep Web concealment capabilities migrate to the Open Web, the ability to do Passive OSINT without being discovered, and the ability to do Active OSINT online without compromising the official investigation, as well as the ability to detect in near-real-time data breaches using digital fingerprints that scour the Deep Web for replicates of the stolen original documents, become central to proper official exploitation of the Internet.
Dark Web and Tor Investigative Tools: Tactics, New Products, and Ongoing Developments
Next offered: ONLINE 18 October 0930-1100 Eastern time.
Intended audience: federal, state, and local law enforcement and intelligence investigators and analysts, and contractors that support them.
This lecture looks at specific vendors and products tailored to cope with Dark Web or hidden online services. The information in this lecture has been assembled as part of Stephen E Arnold's 18 month research project into Dark Web solutions, tactics, and systems. The program is designed to provide an analyst or investigator with specific information about systems and methods useful in exploring and accessing information hidden, obfuscated, and encrypted on Dark Web sites. The lecture extends the research summarized in Arnold's 2015 study CyberOSINT: Next Generation Information Access (Foreword by Robert David Steele). More than a dozen tools and products are illustrated in the lecture. Many are likely to be unfamiliar to professionals working to leverage Dark Web content and services.
The lecture begins with a brief recap of the Dark Web as an opaque resource useful to good and bad actors. Tor (the Onion router bundle) is required for individuals to access Dark Web resources, but industrial strength solutions are now available.
The lecture reviews solutions suitable for law enforcement, security, and intelligence activities. The Dark Web is being illuminated.
The lecture is organized in five sections:
In the first section of the lecture, you will learn about information sources accessible from a standard browser like Google Chrome, Firefox, and Safari. Pastesites (anonymous publishing services), Reddit discussion groups focused on the Dark Web, and lesser known resources like MillionShort are described with sample outputs.
In the second part of the lecture, the focus shifts to Tor-required information services. You will learn about Ahima, Evil, and Gram. These are Dark Web search systems which can provide one click access to Dark Web resources related to narcotics, weapons, and terrorist related content.
In the third part of the lecture, free software tools will be described. Specific examples of open source software available from the US government will be summarized. Attendees will learn about exploitation tools available from open source repositories.
In the fourth part of the lecture, commercial firms providing Dark Web services are explained. Three services will be profiled: Digital Shadows, Recorded Future, and Tiberium Labs. Each of these companies “indexes” Dark Web content and provides services tailored to the needs of law enforcement and intelligence professionals.
The final part of the lecture provides a quick recap of the new developments in Dark Web access likely in 2017.
Webinar attendees will receive a link to the sources described in the webinar as well as a private link to the archived presentation that may be shared with others after the fact.
Presented by Robert Steele and :
Stephen E. Arnold, Managing Partner, ArnoldIT and author of Beyond Search: What To Do When Enterprise Search System Doesn’t Work, Cyber OSINT: Next Generation Information Access and Searching The Dark Web (forthcoming).
4 hour and 1 day versions of this training are available in live form with both Stephen E. Arnold and Robert David Steele as on-site trainers, on a NOCONTRACT basis, to validated government and law enforcement audiences only.
Contacts:
To register for this specific lecture or discuss an onsite presentation: robert.david.steele.vivas@gmail.com.