SLIDE 1
Case Examples on Evidence Collection, Retention, and Presentation - - PowerPoint PPT Presentation
Case Examples on Evidence Collection, Retention, and Presentation - - PowerPoint PPT Presentation
Case Examples on Evidence Collection, Retention, and Presentation BOGDAN CIINARU | BANGKOK | DATE 10.09.2019 Software used GPG4Win (Kleopatra) Tor Browser Ricochet (https://ricochet.im) VC ENCRYPTION Converting data in
SLIDE 2
SLIDE 3
- GPG4Win (Kleopatra)
- Tor Browser
- Ricochet (https://ricochet.im)
- VC
Software used
SLIDE 4
ENCRYPTION
- Converting data in ciphertext
- (A)symmetric
- Often used on Dark Web/DNMs
- Encrypted messages
Shipping address, info about orders
- E.g. PGP on DNMs
- Key server!
SLIDE 5
PGP
Ensures encrypted communications:
- Encrypt message with recipient’s public key (e.g. found on DNM)
- Recipient will decrypt message with the use of corresponding private
key
SLIDE 6
OSINT for PGP
Some public key servers where you can search for a name (string), email address or hexadecimal KeyID :
- http://pgp.mit.edu/
- https://sks-keyservers.net/i/
- https://pgp.key-server.io/
SLIDE 7
- Since mid ’90s by United States Naval Research Laboratory
- Anonymization software
- Protecting privacy
- Censorship circumvention tool (bridges)
- Protection against traffic analysis
- Protection against eavesdropping
- 6000+ relays worldwide
- Number of users : +/- 5 000 000
- Safer communication for whistleblowers and dissidents
- Hides footprints of LE, military, gov, etc.
- Used by criminals
SLIDE 8
- Hidden service protocol (complex)
- Websites ending on .onion
- Only accessible with Tor
- Server’s location is hidden
- Server’s IP address not revealed
- E.g. Facebook, Wall Street Market
SLIDE 9
TOR NETWORK
- Visit http://torstatus.blutmagie.de/
SLIDE 10
https://metrics.torproject.org/exonerator.html
SLIDE 11
- OpenBazaar
- Orbot – Orfox
- Ricochet
- Tails
- Freenet
- I2P
Others
SLIDE 12
- DeepDotWeb
- Guides
- DeepWebSitesLinks
- DarkWebNews
- Reddit “The Superlist”
- Google (e.g. SR case)
- Pastebin
- Onion Investigator
SLIDE 13
SLIDE 14
- The Hidden Wiki (http://zqktlwi4fecvo6ri.onion)
- The Uncensored Hidden Wiki
(kpvz7ki2lzvnwve7.onion/wiki/index.php/Main_Page)
- Grams (http://grams7enufi7jmdl.onion)
- Search engines/onion crawlers(users, products, marketsetc.):
- Ahmia (http://msydqstlz2kzerdg.onion/)
- Torch (http://xmh57jrzrnw6insl.onion/)
- Not Evil (http://hss3uro2hsxfogfq.onion/)
- VisiTOR (http://visitorfi5kl7q7i.onion/search/)
- Fresh Onions (http://zlal32teyptf4tvi.onion/)
OSINT
SLIDE 15
- torch :
xmh57jrzrnw6insl.onion
- ahmia :
msydqstlz2kzerdg.onion
- searX :
5plvrsgydwy2sgce.onion
Search Engines on darknet
SLIDE 16
Darknet market = hidden service
- Trade of mostly illegal goods/services
- Vendor – buyer interaction
- Admin(s)/moderator(s)
- Escrow/domestically
- Exit scams e.g. Evolution
- Silk Road, AlphaBay, Hansa Market
- Forums
DARKNET Markets
SLIDE 17
DARKNET MARKETS
SLIDE 18
TorLinks : torlinkbgs6aabns.onion Deep.dot.web : deepdot35wvmeyd5.onion The Hidden Wiki : zqktlwi4fecvo6ri.onion/wiki/Main_Page OnionDir : dirnxxdraygbifgc.onion
SLIDE 19
SLIDE 20
- Generally you need to register to
- btain access
- Username
- Password
- (PIN)
- (PGP public key)
- (invitation)
- Search/filter functionality
- User profile
- Feedback ratings
- Pictures
DARKNET Markets
SLIDE 21
- Feedback ratings
SLIDE 22
.onion Forum Markets
SLIDE 23
VENDORS FOR ILLICIT IP PRODUCTS?
- profit-oriented, aiming to reach out to a large pool of customers and increase the
sales volume;
- vendors tend to advertise their products on different Darknet markets
- ften using the same user name and selling the products for the same price
- specialised in selling one category of illicit goods E.G. (counterfeit) pharmaceutical
products or luxury goods
- usually not selling diffrent types of illicit goods as firearms, narcotics, ….
SLIDE 24
.onion Shops
SLIDE 25
Many migrated from Alphabay and Hansa to the new ones IPR vendors are neglected their anonymity:
- email addresses (e.g. @yahoo.com)
- registered websites from clear net
- uploading pictures on popular platforms (e.g. imageshack.com)
- using for delivery courier companies
- have social media accounts(e.g. twitter)
SLIDE 26
- Undercover + classical LE investigations
- Example
- Test-purchase (undercover)
- Figure out from where the parcel was sent from
- Go to post office and ask CCTV footage
- Buy a second good
- Check again the place it was sent from
- Same place?
- Another purchase and proper surveillance in the office
- Follow the suspect etc.
- Fingerprints or DNA on parcel
SLIDE 27
Objective: Locate DNM (real-world IP address)
- Can be very technical (help from private sector?)
Starting info and/or IP address could be revealed through:
- Tip-off
- Deanonymization techniques
Misconfigurations/vulnerabilities/exploits Unmasking sloppy admin(s) because of catastrophic mistakes Intelligence gathering by scraping/crawling marketplace Convert raw data into useful intelligence
SLIDE 28
Focus on darknet markets (DNMs)/vendor shops
- Real-world IP address (hosting the market?) exposed
- Wiretap analysis
- NetFlow analysis
- Infrastructure mapping
Hosting services (VPS, dedicated server) – subpoena – reliable?
- payments
Used software/versions
- If possible, forensic copy for first analysis
- If needed, another wiretap/NetFlow (affiliated systems)
- Connection with admin rights?
Correlate info
- Takedown (server analysis) or takeover (e.g. Hansa Market)
SLIDE 29
Focus on the money
SLIDE 30
Further steps
- involvement of organised crime in this trade and a potential for poly-criminality of
vendors need to be further explored
- monitor and understand emerging threats presented by the Darknet
- complete approach and strong cooperation together with intermediaries (exchangers
and shipping companies)
- awareness raising and expertise sharing among investigators
SLIDE 31
- use and increase the intelligence in this area
- consider the involvement of our private sector partners that possess operational
intelligence
- improve cooperation between our partners similarly at national level
- potential strengthening the legislation
- create future awareness campaigns for the users
- use IPC3’s internet monitoring team
- awarness campaigns
- Continously monitor the dark internet
SLIDE 32
EUROPOL IN NEWS
SLIDE 33
FUTURE?
SLIDE 34
Cyber-patrolling Week
- Second coordinated action week to counter the evolving criminality on the
Darknet in a multi-disciplinary law enforcement manner by focusing on multiple crime areas.
- More than 40 investigators and experts mapped active targets in their specific
crime areas and developed intelligence packages.
- Crime areas: Cyber-attacks, payment card fraud, illicit online trade including:
drugs (cocaine, heroin, synthetic drugs), illicit trafficking in firearms, trafficking in human beings, virtual currencies, forged documents, money laundering and counterfeiting.
SLIDE 35
- Key operational outcome: 272 targets listed, 73 of whom were prioritised for
further investigation, and 42 cross-matches identified across the different areas.
- Europol's contribution: Operational coordination, operational strategy, secure
information exchange, analytical and forensic expertise.
- Participants: AT, BE, BG, CY, CZ, DE, ES, FI, FR, HR, HU, IE, IT, LV, NL, PL, PT, RO, SI,
SK, SE, UK, CH, US, Eurojust and Europol.
- AP Copy representatives for the first time from customs
Cyber-patrolling Week
SLIDE 36
SLIDE 37