Professional Documents
Culture Documents
(Download PDF) Dark Web Investigation Babak Akhgar Online Ebook All Chapter PDF
(Download PDF) Dark Web Investigation Babak Akhgar Online Ebook All Chapter PDF
https://textbookfull.com/product/social-media-strategy-in-
policing-from-cultural-intelligence-to-community-policing-babak-
akhgar/
https://textbookfull.com/product/serious-games-for-enhancing-law-
enforcement-agencies-from-virtual-reality-to-augmented-reality-
babak-akhgar/
https://textbookfull.com/product/application-of-social-media-in-
crisis-management-advanced-sciences-and-technologies-for-
security-applications-1st-edition-babak-akhgar/
https://textbookfull.com/product/the-dark-web-breakthroughs-in-
research-and-practice-1st-edition-igi-global/
Master Techniques in Facial Rejuvenation 2nd Edition
Babak Azizzadeh
https://textbookfull.com/product/master-techniques-in-facial-
rejuvenation-2nd-edition-babak-azizzadeh/
https://textbookfull.com/product/guidelines-for-failure-
investigation-american-society-of-civil-engineers-committee-on-
forensic-investigation/
https://textbookfull.com/product/criminal-investigation-charles-
r-swanson/
https://textbookfull.com/product/criminal-investigation-steven-g-
brandl/
https://textbookfull.com/product/algorithms-2-a-quickstudy-
laminated-reference-guide-1st-edition-babak-ahmadi/
Security Informatics and Law Enforcement
Series Editor: Babak Akhgar
Dark Web
Investigation
Security Informatics and Law Enforcement
Series Editor
Babak Akhgar, CENTRIC
Sheffield Hallam University, Sheffield, UK
Editor’s Note:
The primary objective of this book series is to explore contemporary issues
related to law enforcement agencies, security services and industries deal-
ing with security related challenges (e.g., government organizations,
financial sector insurance companies and internet service providers) from
an engineering and computer science perspective. Each book in the series
provides a handbook style practical guide to one of the following security
challenges:
Cyber Crime - Focuses on new and evolving forms of crimes. Books
describe the current status of cybercrime and cyber terrorism develop-
ments, security requirements and practices.
Big Data Analytics, Situational Awareness and OSINT- Provides unique
insight for computer scientists as well as practitioners in security and polic-
ing domains on big data possibilities and challenges for the security
domain, current and best practices as well as recommendations.
Serious Games – Provides an introduction into the use of serious games
for training in the security domain, including advise for designers/pro-
grammers, trainers and strategic decision makers.
Social Media in Crisis Management – explores how social media enables
citizens to empower themselves during a crisis, from terrorism, public dis-
order, and natural disasters
Law enforcement, Counterterrorism, and Anti-Trafficking – Presents
tools from those designing the computing and engineering techniques,
architecture or policies related to applications confronting radicalisation,
terrorism, and trafficking.
The books pertain to engineers working in law enforcement and research-
ers who are researching on capabilities of LEAs, though the series is truly
multidisciplinary – each book will have hard core computer science, appli-
cation of ICT in security and security / policing domain chapters. The
books strike a balance between theory and practice.
Dark Web
Investigation
Editors
Babak Akhgar Marco Gercke
CENTRIC Cybercrime Research Institute
Sheffield Hallam University Köln, Nordrhein-Westfalen, Germany
Sheffield, UK
Helen Gibson
Stefanos Vrochidis CENTRIC
Information Technologies Institute Sheffield Hallam University
Centre for Research and Sheffield, UK
Technology Hellas
Thessaloniki, Greece
Criminality on or enabled by the dark web has been a concern for law
enforcement agencies (LEAs) since before the Silk Road dark web market
came to mainstream prominence in 2011. Many years later, the difficulties
faced in policing the dark web remain a key challenge for law enforcement.
The issues encountered by LEAs in conducting investigations on the
dark web are wide and varied including technical and ethical challenges
such as network access and configurations, limited access to tools which
support dark web investigation (e.g. even simple access to the ToR
browser), a mindset that is limited to manual investigatory processes, bud-
getary concerns that prevent the purchase of specialised software to sup-
port investigations, and lack of knowledge of both investigators and senior
investigators in terms of ‘how’ to access and investigate content on the
dark web. Even the name, ‘the dark web’ conjures up a form of fear and
mystique that leads less experienced investigators to believe that accessing
the dark web is somehow illegal or may cause them to be immediately
confronted with overwhelming amounts of terrorist content, child sexual
abuse material or the opportunity to buy copious amounts of drugs and
weapons.
As criminals become more technically savvy and move more of their
operations onto the dark web, LEAs must try to get ahead of them and
develop capabilities to prevent and detect the criminal activities. Even as
investigatory procedures and technological capabilities improve (as we
have seen for open source intelligence (OSINT) in recent years), the chal-
lenge remains to have access to the ‘right’ tools to effectively and lawfully
carry out dark web investigations whilst integrating such tools with already
vii
viii FOREWORD
enhancing their confidence and understanding of the dark web and how it
may provide crucial and underexplored avenues for intelligence gathering
within their investigations.
The editors would like to thank the experts who have contributed to this
book, sharing their knowledge, experience and latest research. In particu-
lar, we would like to thank the following people, projects and
organisations:
xi
Contents
Part I Foundations
xiii
xiv Contents
Index273
Editor Biographies
xv
xvi EDITOR BIOGRAPHIES
xvii
PART I
Foundations
CHAPTER 1
1.1 Introduction
Dimitris Avramopoulos, European Commissioner for Migration, Home
Affairs and Citizenship, said:
D. Kavallieros ()
Center for Security Studies-KEMEA, Athens, Greece
University of Peloponnese-Department of Informatics and Telecommunications,
Tripoli, Greece
e-mail: d.kavallieros@kemea-research.gr
D. Myttas • E. Kermitsis • E. Lissaris • G. Giataganas • E. Darra
Center for Security Studies-KEMEA, Athens, Greece
e-mail: d.myttas@kemea-research.gr; e.kermitsis@kemea-research.gr; e.lissaris@
kemea-research.gr; g.giataganas@kemea-research.gr; e.darra@kemea-research.gr
The I2P client software can act as a router once it is installed in a machine,
providing connectivity to I2P websites (TLD, .i2p) in the darknet, or it
can host a service (e.g. an .i2p website).
The garlic routing technique, which is a variant of onion routing, was
coined back in 2000 and in the framework of I2P provides the following
three attributes (I2P Garlic Routing 2018):
• Tunnel building and routing (in order to transmit data, each router
creates one-way tunnels (inbound and outbound tunnels)).
• Data bundling to be able to evaluate the end-to-end message deliv-
ery status.
• ElGamal/EAS + SessionTags encryption algorithms are used to pro-
vide end-to-end encryption and minimise the possibility of traffic
analysis attacks.
The cutting edge of the hole is at the smaller diameter; place that
side of the plate up. Never use a hammer as it would split the top of
the peg and would ruin the cutting edge of the dowel plate should it
strike it. Use a mallet, and when the peg is nearly thru finish by
striking a second peg placed upon the head of the first.
86. Directions for Doweling.—(1) Place the boards to be
doweled side by side in the vise, the
face sides out, and even the jointed edges. (2) Square lines across
the two edges with knife and trysquare at points where it is desired
to locate dowels. (3) Set the gage for about half the thickness of the
finished board and gage from the face side across the knife lines. (4)
At the resulting crosses bore holes of the same diameter as that of
the dowel.
Fig. 156.
Fig. 158.
91. Directions for Mortise in the Tenon.—(1) Lay out the sides
of the mortise for the key
before the sides and shoulders of the tenons are cut. From the
shoulder line of the tenon, measure toward the end a distance
slightly less—about one thirty-second of an inch—than the thickness
of the member thru which the tenon is to pass. This is to insure the
key’s wedging against the second member. (2) Square this line
across the face edge and on to the side opposite the face side. (3)
On the top surface measure from the line just squared around the
piece a distance equal to the width the key is to have at this point
when in place. Fig. 158, A B. (4) Square a pencil line across the
surface at this point. (5) In a similar manner, measure and locate a
line on the opposite side, C D, Fig. 158. (6) Set the gage and mark
the side of the mortise nearer the face edge on face side and side
opposite. (7) Reset, and from the face edge gage the farther side of
the mortise, marking both sides. (8) This mortise may be bored and
chiseled like the one preceding. As one side of the mortise is to be
cut sloping, a little more care will be needed.
Fig. 162.
Fig. 165.
97. Miter Joint.—The miter joint is subject to various
modifications. In the plain miter, Fig. 166, the ends
or edges abut. They are usually fastened with glue or nails or both.
The most common form of the plain miter is that in which the slope is
at an angle of forty-five degrees to the edge or side.
98. Directions for Miter Joint.—(1) Lay off the slopes (see
Chapter I, Section 4). (2) Cut and
fit the parts. To fit and fasten four miter joints, such as are found in a
picture frame, is no easy task. Special miter boxes are made for this
purpose which make such work comparatively easy. (3) Fig. 167
shows the manner of applying the hand clamps to a simple miter
joint. When a joint is to be nailed, drive the nail thru one piece until
its point projects slightly. Place the second piece in the vise to hold it
firmly. Hold the first piece so that its end projects somewhat over and
beyond that of the second; the nailing will tend to bring it to its proper
position, Fig. 168. If a nail is driven thru from the other direction, care
must be taken to so place it that it will not strike the first, or a split
join will result.
Fig. 168.
Fig. 173.
The corresponding mortises and tails may now be laid out on the
drawer side and worked. (10) By superposition, Fig. 179, mark out
the shape of the mortises to be cut in the sides. (11) Saw and chisel
these mortises. Fig. 172.
105. Directions for Drawer.—(1) Square the different members to
size. (2) Groove the front and sides of
the drawer to receive the drawer bottom. These grooves should be
made somewhat narrower than the bottom is thick to insure a good
fit. The under side of the bottom, later, may be gaged and beveled
on the two ends and the front edge, Fig. 180. (3) Lay out and cut in
the drawer sides the dadoes into which the ends of the back are to
be fitted, Fig. 181. (4) Lay out and cut the joints on the front of the
drawer. (5) Get the bottom ready; that is, plane the bevels on the
under side as suggested in 2, above. (6) Assemble the members dry
to see that all fit properly. (7) Take apart; glue the joints by which the
sides are fastened to the front and the joints by which the back is
fastened to the sides. Glue the bottom to the front of the drawer but
not to the sides or back.
Fig. 182.