The Dark Web: Cyber-Security Intelligence Gathering Opportunities, Risks and Rewards

نویسندگان

  • Gregory Epiphaniou
  • Carsten Maple
چکیده

We offer a partial articulation of the threats and opportunities posed by the so-called Dark Web (DW). We go on to propose a novel DW attack detection and prediction model. Signalling aspects are considered wherein the DW is seen to comprise a low cost signaling environment. This holds inherent dangers as well as rewards for investigators as well as those with criminal intent. Suspected DW perpetrators typically act entirely in their own self-interest (e.g. illicit financial gain, terrorism, propagation of extremist views, extreme forms of racism, pornography, and politics; so-called ‘radicalisation’). DW investigators therefore need to be suitably risk aware such that the construction of a credible legally admissible, robust evidence trail does not expose investigators to undue operational or legal risk.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Web-based Intelligence in Adaptive Security Models and Multidisciplinary Aspects of Activation and Analysis (in Italian)

L’ascesa del cyberspazio come centro delle realtà sociali, politiche, economiche e culturali (SPEC) ha evidenziato una perdita di efficacia nell'approccio tradizionale di Sicurezza a favore di un nuovo modello di Adaptive Cyber Security capace di riconoscere e adattarsi all’evolversi delle minacce del cyberspazio. La Web-based Intelligence rappresenta lo strumento abilitante per l’Adaptive Cybe...

متن کامل

Investigating Cyber Security Threats:

This report focuses on how federal agencies define success in computer crime investigations and how they can facilitate the development and refinement of a comprehensive law enforcement strategy for addressing cyber threats. Through interviews with experienced computer crime investigators from the Federal Bureau of Investigation, the U.S. Secret Service, and the Air Force Office of Special Inve...

متن کامل

The Dark Web

The internet's ability to leap borders, thwart censorship and preserve anonymity is making it a crucial tool in recruiting jihadists. Discontented western Muslim youth, even in Australia, are ripe for the message of hate of the cyber imams. I T'S A FORMIDABLE blockade: 5000 armed police and troops, 5km of security fencing, closed-circuit TV surveillance and backup muscle including army helicopt...

متن کامل

Indian Medical Mission at Hajj-2016: Mass-Gathering Medicine Perspectives, Challenges, and Opportunities in a Mission Posture

Introduction: Hajj is an annual mass gathering of over 3.5 million pilgrims congregating from 200 countries in the desert climate of Saudi Arabia. Mass gathering medicine at Hajj is challenged by issues of healthcare accessibility, infection control, on-site treatment, referral, evacuation, and response to disasters and public health emergencies. The Indian Medical Mission at H...

متن کامل

Role of Intelligence Inputs in Defending against Cyber Warfare and Cyber Terrorism

This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the econo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014