Is the Dark Web Legit? Robert W. Gehl University of Utah

Slides:



Advertisements
Similar presentations
HiveMind Distributed File Storage Using JavaScript Botnets Copyright 2013 Sean T. Malone.
Advertisements

Bridging the Gap between eBook Readers and Browsers eBooks: Great Expectations for Web Standards W3C Workshop on Electronic Books and the Open Web Platform.
Copyrights and Internet Piracy: SOPA and PIPA Essential Questions… What are SOPA and PIPA? Should people make money off of their creativity? How damaging.
Why ha.ckers. org doesn’t get hacked. Who we are. James Flom (id) COO SecTheory Ltd
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Dark net . . Invisible Web . . Hidden Web . .
Barracuda Web Application Firewall
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE.
Presented By Michelle Decker Elements Laws Classroom It’s our responsibility.
4/19/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Company LOGO Internet Safety A Community Approach.
Lesson 1: Understanding Browsers. This unit is a set of investigations into how to protect against digital threats, and how to detect digital crimes.
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Psiphon Program By Amine Moubtasim.
My Story by Herman Mashaba. Birthplace & Upbringing.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
A’Lexus Williams CSC 104 Final Exam Part 1. Societal Topics Weeks 7 & 8 Internet Regulation-is basically restricting or controlling access to certain.
ASIC Australian Securities & Investments Commission Electronic Enforcement Keith Inman October 2000.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
By Edward Frimpong MUSIC PIRACY. WHAT IS MUSIC PIRACY? Music piracy can be defined as the stealing of music. One scenario could be borrowing a friend's.
Microsoft MVP (Enterprise Security) Microsoft Certified Trainer (18 years) Founder: Cybercrime Security Forum! Winner: Microsoft Speaker Idol 2006 Author:
Josh Schmoldt The Data Mining Experts. My project is an investigation of data mining and Google. Hal Niedzviecki’s book “The Peep Diaries: How We’re Learning.
1 Book Cover Here Copyright © 2015, Elsevier Inc. All rights Reserved Chapter #2 Legal Aspects of Security Security Supervision and Management Theory and.
Internet Architecture and Governance
1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008.
Offline Web Apps - an offline web application is a list of URLs for HTML, CSS, JavaScript, images, or any other kind of resource. Most browsers have offline.
TCOM Information Assurance Management Software Hacking.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Family Connection Collaborative Webs A Tool for Creating and Managing Web sites.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
1 Host versus Network Security Steven M. Bellovin
Bell Work  Define Federalism  Give a delegated power found in Article I of the Constitution  Give an example of a reserved power for the states not.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
Hacktivism Social Activism and Electronic Access.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
Fire Your Boss & Join The Marketing Revolution Brought to you by (Join us FREE!)
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Presented By Michelle Decker
Tor Good + Evil.
Computer Literacy – Grade 8
We celebrate 26/11 every year as the CITIZEN ACTION PLEDGE DAY
Dark Web – the modern threat for the Internet Security
Respond to Advanced Threats with Risk Based Policies and Monitoring
LAUSD Responsible Use Policy (RUP)
Drugs & The Dark Net Tim Bingham
What is Web Browsers - What is Blogs-
Is the Dark Web Legit? Robert W. Gehl University of Utah
Computer Literacy – Grade 8
Web Servers / Deployment
How does the deep web work?
6. Application Software Security
Crime Behind The Keyboard(Dark Web)
Presentation transcript:

Is the Dark Web Legit? Robert W. Gehl University of Utah

Plan of the Presentation What is the Dark Web? Three Legitimacies  State violence  Appropriate  Authentic, real, cool Three Legits and the DW Symbolic/Material Economy of Legitimacy

What is the "Dark Web"? Standard Web technologies  HTML, HTTP, CSS, PHP, Javascript Web browser Special routing software  Encryption  Obfuscation of publisher IP address/identity  Obfuscation of browser's IP/identity

What is the "Dark Web"?

Three Legitimacies Legitimate(d) use of violent force Appropriate, proper, law-abiding, respectable Authenticity, realness

Legitimate(d) use of violent force

Object: the citizen-subject Power practices: Deprivation of time (imprisonment) or life (death penalty, military death [ie., drone-killing], police killing) Social groups: Law enforcement, military, security state, politicians

Appropriate, proper, law-abiding

Objects: employees, investors, consumers Power practices: Deprivation of livelihood, money, access (firing, suing), discipline Social groups: Management, moderators, administrators

Authenticity, realness

Objects: artists, intellectuals, hackers, critics Power practices: inclusion and exclusion, distinction and differentiation, criticism Social groups: artists, intellectuals, hackers, critics

Three Legitimacies Why even use the term "legitimacy" in relation to the Dark Web?  Because social groups associated with the Dark Web use the term (i.e., it is emic knowledge)  Dark Web social groups: Law enforcement and governments Network builders (Tor project, i2p, etc) Site administrators DW users

Three Legitimacies Legitimate(d) use of force (1/2) Law enforcement, op-ed writers  Arrest makers of illegitimate sites  Seize servers, monitor users In this sense, legitimacy in the negative: the Dark Web is illegitimate

Three Legitimacies Legitimate(d) use of force (2/2) Free speech activists  Dark Web as free speech-preserving bulwark against state power  A means to contest the legitimation of state force In this sense, Dark Web is legitimate even in the face of illegal activities conducted on it

Three Legitimacies Appropriate, legal sense (1/2) Tor user and site admin:  In the time I've been using the DarkWeb, I've seen a great number of sites come and go. Primarily, it's been the illegal sites that have been the shortest lived, but many legitimate sites have been established out here as well, just to pull up stakes within a year or less due to whatever reason.

Three Legitimacies Appropriate, legal sense (2/2) Another Tor user and site admin:  "Hosting and promoting legit services on Tor that doesn’t deal with all the stuff that makes good press and people think badly about such a system is a win in my book. If people would just realize that Tor is meant for all this great and empowering things, and not be afraid of all the 'darkness' that the 'dark net' is connected to, the entire world society would be better off, both online and offline."

Three Legitimacies Authentic, real (1/2) Many, many DW users:  "Is THIS SITE legit?" Is it a scam? Is it a law enforcement honeypot? Can I get my drugs or guns? Can I get real hacking advice?

Three Legitimacies Authentic, real (2/2) Tor hidden service admin  Challenges of "trying to keep bots out while allowing legitimate users in, meanwhile doing so in a way that doesn't compromise the user's anonymity" Who are "real" users?

Three Legitimacies State Power Authentic Practices Appropriate Orgs, Technologies

Well? Is the Dark Web legit?  Impossible to say just now Could be illegitimate (state power) Could be legitimated (as an accepted technology) Could be legit (drug markets)  Undergoing its legitimacy trial  We see a symbolic/cultural/material economy of legitimacy  I will focus on Dark Web Search, Markets, and Social Networking Sites

Is the Dark Web Legit? Robert W. Gehl University of Utah