#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
#ABATECHSHOW The Surface Web 2
#ABATECHSHOW Indexed vs. Non-Indexed 3 Crawl Robot.txt Index
#ABATECHSHOW Deep Web Contents 4 Private web Dynamic content Unlinked content Scripted content Limited access content Databases
#ABATECHSHOW Searching the Deep Web
#ABATECHSHOW Finding Information Databases Government sites
#ABATECHSHOW Government Public Records
#ABATECHSHOW Government Public Records
#ABATECHSHOW Actionable Intelligence Define the information that revolves around the individual: Friends Family Neighbors Job Activities Social Platforms
#ABATECHSHOW Social Media Algorithms & software Open Source Intelligence (OSINT)
#ABATECHSHOW Facial Recognition
#ABATECHSHOW Boolean Searches “” quotes around subject matter Run correct search patterns on addresses, phone numbers, addresses and usernames Filetype/site specific searching
#ABATECHSHOW Dark Web Myths 13 X Full of only terrible, terrible things X Automatically on a watch list X Tor will completely protect your online privacy
#ABATECHSHOW Is the Dark Web legal? YES!
#ABATECHSHOW Dark Web Realities Only accessible using special browser software Protects anonymity and privacy
#ABATECHSHOW BitTorrent vs. Dark Web P2P File sharing Searchable Internet data distribution Not anonymous File “chunks”
#ABATECHSHOW Connecting to the Darknet Tor I2P Freenet
#ABATECHSHOW Tor Browser
#ABATECHSHOW Tor T – The O – Onion R – Router Application layer encryption Relays decrypt next hop in circuit Final relay decrypts data
#ABATECHSHOW How Tor Works
#ABATECHSHOW Tor Circuit Randomized
#ABATECHSHOW Tor Metrics Relays and bridges Direct users by country Hidden-service traffic Data flow Unique.onion addresses
#ABATECHSHOW Unique.onion addresses
#ABATECHSHOW Onions & Getting to Sites
#ABATECHSHOW Pros of the Dark Web Anonymity Protection for: –Journalists –Dissidents –Whistleblowers
#ABATECHSHOW Risks of the Dark Web Discovery Malicious code Entrance/exit nodes
#ABATECHSHOW Entrance/Exit Nodes
#ABATECHSHOW Illegal Activity Gun sales Drugs Sex trafficking Hit for hire
#ABATECHSHOW Silk Road
#ABATECHSHOW Darknet
#ABATECHSHOW Hidden Links
#ABATECHSHOW Stolen Credit Cards
#ABATECHSHOW Drugs
#ABATECHSHOW FBI & Carnegie Mellon
#ABATECHSHOW Best Practices Cookies JavaScript Privacy settings
#ABATECHSHOW Best Practices Filesharing/downloading Printing
#ABATECHSHOW Extra Layers of Protection Virtual Private Networks Spoofing MAC address Proxy Encryption
#ABATECHSHOW Bitcoin and the Dark Web
#ABATECHSHOW How It Works Blockchain Mining
#ABATECHSHOW Digital Wallets Desktop Mobile Online Hardware Paper Multi-sig
#ABATECHSHOW Bitcoin Currency conversion Buy/sell Volatility Legality
#ABATECHSHOW Bitcoin Tumbling
#ABATECHSHOW SAVE THE DATE! March 17-19, 2016