This presentation was made by collecting all publicly available materials and it is purely for educational purpose. Author wants to thank each and every contributor of pictures, video, text in this presentation.
2. Arjun Chetry
Assistant Director (IT)
North Eastern Police Academy
MHA, Govt. of India.
International Certification
Cellebrite certified Operator & Cellebrite Certified Physical Analyser
Computer Hacking Forensics Investigator from EC-Council, US
Red Hat Certified System Administrator from Red Hat Linux
Red Hat Certified Engineer from Red Hat Linux
Cisco Certified Network Associate from Cisco Academy
Certified Information Security Expert from Innobuzz
Main Courses/Training Attended:
Digital Evidence & Digital forensics Training under FBI during ATA Course
Cyber crime Training under Computer Emergency Response Team of India
Memory forensics training from Data Security Council of India
Resource Person
Delivered lecture at Universities, Judiciary Academy, Indian Air force, etc.
Research Publication
Published national & international research papers
B.Sc, M.C.A, Research Scholar in Digital Forensics
3. Tor network for privacy protection
Secret Communication facilities
Challenges to law enforcement agencies
Importance of digital forensics
Agenda for this session
4. Internet(specific in surface web) used for entertainment,
education, travelling or tourism, medical advise, Health report,
etc.: - almost everything are now available on internet or
shared over internet
With so much activities, the internet may seem like a cyber
heaven for the common people but reality is entirely different.
Internet – Platform for livelihood
5. Say it a Google, Tik Tok, Facebook,
WhatsApp, imo, etc. which are top in the list
at present, almost all apps, are reading or
using our online activity for data analytics or
for developer’s help
Keeping yourself anonymous with everything
you do online is not only smart but becoming
more and more fundamentally necessary as
your freedom is restricted and your privacy is
continuously monitored
Internet – Platform for livelihood
7. Encrypt Your Local Files, Folders, and Drives
•Online privacy is only keeping online
safe but also ensuring that your
locally stored files cannot be accessed by
unwanted parties
Technology for better privacy as a users
9. Dark Web:- Users attracted for better privacy
Dark web attracting more users everyday due to anonymity
Such anonymity can be noble, for journalists seeking to interview citizens of
repressive countries where communications are monitored or to circumvent
government restrictions of the internet in places such as China, Iran, for enabling
them to communicate with restricted website/apps.
Understanding the importance of anonymity and the business requirements,
Facebook announced In October 2014 that users could connect to the website,
https://facebookcorewwwi.onion/ through a TOR onion service.
10. What exactly is Dark Web ?
How big is Dark Web ?
Who developed Dark Web ?
23. Dark Web: A cyber heaven of criminal activity
Anonymity of the dark web attracts not only Defense or journalist or generals users
for online privacy, but also criminal actors like drug-dealers, hackers, and child
pornography peddlers
Major activities but not limited to:
Hacked data or Information Leaks business
Frauds Communication platforms
Drug Traffickers, Arms Traffickers, Organ Traffickers communication
Child Pornography Business
Malware distribution or Malware business
Cryptocurrency Mixer or making untraceable business
38. Briar is a messaging app designed for activists, journalists, and anyone
who needs a safe, easy and robust way to communicate.
Unlike traditional messaging apps, Briar doesn’t rely on a central server -
messages are synchronized directly between the users’ devices.
If the internet’s down, Briar can sync via Bluetooth or Wi-Fi, keeping the
information flowing in a crisis.
If the internet’s up, Briar can sync via the Tor network, protecting users
and their relationships from surveillance.
Technology on Tor for better anonymity on Dark Web
47. Block Chain
Bitcoin makes sure
there is only one
block chain by
making blocks.
miners have to
compute
a cryptographic hash
of the block that
meets certain criteria
Successful miners
are rewarded some
bitcoins
51. Dark Web : New battleground, new challenges
LE’s have to go through the same process of collecting evidence and
building cases against criminals.
However, even closer coordination between agencies does not solve
all the challenges that come with fighting crime on the Dark Web.
In many cases, the companies don’t cooperate stating user privacy
law.
But in dark web most of the time, even those companies are
anonymous.
52. Major Challenges for investigator – in brief
Investigation
start from the
receiving end
and they need to
reach the source
of crime.
•IP Address - TOR
•Registration details -
Anonymous
•Payment mode - Crypto
•Delivery Address
55. My research on retrieval of artefacts related to Dark web
56.
57.
58.
59. Summary of the session
Understanding
of dark web and
few onion sites
Multiple
applications for
providing
anonymity
Challenges to
investigation
Dark web related
artefacts from
Storage Device
or from RAM.