Hiding in the Dark: The Internet You Cannot See Marc Visnick 503-242-3637.

Slides:



Advertisements
Similar presentations
What is the internet ? How did it originate? Networks / Intranets / Addresses HTML (to make a webpage from source)
Advertisements

Basic Internet Terms Digital Design. Arpanet The first Internet prototype created in 1965 by the Department of Defense.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Dark net . . Invisible Web . . Hidden Web . .
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Network Layer and Transport Layer.
INTERNET A collection of networks. History ARPANet – developed for security of sending in case of a nuclear attack IDEA – the system would not go down.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
The Internet Useful Definitions and Concepts About the Internet.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 The Internet, Intranets, and Extranets Chapter 7.
Introduction 2: Internet, Intranet, and Extranet J394 – Perancangan Situs Web Program Sudi Manajemen Universitas Bina Nusantara.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Internet Basics.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
The internet and the WWW
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Lecturer: Ghadah Aldehim
CS134 Web Design & Development Introduction to the Internet Mehmud Abliz.
Introducing the Internet Source: Learning to Use the Internet.
Web Mastering Module Internet Fundamentals. What is the Internet? –Global network of networks –Communicating using same set of rules (protocols/languages)
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
INTERNET DATA FLOW Created by David Whitchurch for ISDS 4120 Louisiana State University.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
IT Introduction to Information Technology. The Internet & World Wide Web Began in 1969 with the ARPANET (Advanced Research Project Agency Network)
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Networks QUME 185 Introduction to Computer Applications.
Chongseok Park 1.  It is a global system of interconnected computer networks that use the standard Internet protocol suite and it serves billions.
CIS 1310 – HTML & CSS 1 Introduction to the Internet.
Introduction To Internet
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Chapter 7: The Internet, Intranets, and Extranets.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Internet Architecture and Governance
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
The Internet: What is it? How does it work?
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Uniform Resource Locator URL protocol URL host Path to file Every single website on the Internet has its own unique.
Week-6 (Lecture-1) Publishing and Browsing the Web: Publishing: 1. upload the following items on the web Google documents Spreadsheets Presentations drawings.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Information Networks. Internet It is a global system of interconnected computer networks that link several billion devices worldwide. It is an international.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
HOW THE INTERNET WORKS. Introduction : The internet has brought revolutionary changes Has become a medium for interaction and information Can access to.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Basics of Networking & Internet Services Prof. Sadique Khan.
Introduction To Web Design
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Dark Web, I2P, and Deep Web Team 5
ACT102 Introduction to web design
Web Design & Development
CS134 Web Design & Development
ACT102 Introduction to web design
The Internet CSCI 101.
A worldwide system of interconnected computer networks.
Designing IIS Security (IIS – Internet Information Service)
The Internet and Electronic mail
Presentation transcript:

Hiding in the Dark: The Internet You Cannot See Marc Visnick

Goals for Today  What’s the big picture?  Define some terms and concepts  Situate these in the real world

The Internet

 A global network of networks…  Connecting billions of devices...  Using various communications protocols…  To provide a variety of services.

A global network of networks…  Many devices  Servers, clients  Routers  IoT  Many locations  On land  Under the ocean  In orbit

Connected using protocols…  Internet Protocol (IP)  Every device must have a numerical address   Domain Name Service (DNS)  Translates names to numbers  aipla.org =  Transmission Control Protocol (TCP)  Packetizes data, ensures delivery  Routes around blockage

To provide services.  Services run on top of the underlying communications protocols   File sharing (peer-to-peer)  Media streaming  Virtual Private Networking (VPN)  Web browsing

The Internet Visible net Dark net

The World Wide Web  The Mother of all Services  An information space composed of hypertext documents (“resources”), identified by Uniform Resource Locators (URLs).  Resources usually constructed from HTML (Hypertext Markup Language)

How do I find stuff on the Web?  If the Web is the mother of all services, search is the mother of all problems  Search engines attempt to index accessible web content  Searchable content = the surface web

WWWW Surface Web Deep Web

The Deep Web  Not inherently nefarious; simply means:  Non-searchable (by standard search engines)  Most web content, is in fact in the deep  Intranet pages  Paywall-protected services  Dynamically-generated webpages  “Dead” pages which search robots cannot reach  The dark web

The Dark Web (here, there be Dragons…)  Web content found on darknets  Access generally requires specialized software and/or authorization  Characterized by:  Anonymity  Encryption  Decentralization (Peer-to-Peer)  Of Tor and the Silk Road…

Tor  Software to enable anonymous communications  Anonymity, not end-to-end security  Can be used for:  Web browsing (the dark web)  Instant messaging  File transfers  Wide range of users  Not just criminals!

The origins of Tor  Mid-90’s:  United States Naval Research Laboratory and DARPA  Military wanted a way to anonymously use Internet  2004: NRL open-sources Tor, EFF takes over  2006: Tor Project is formed  Tor has been continuously funded by US Government since its inception

Tor… not your ordinary vegetable  “Onion routing”  Communicate data packets by “wrapping” those packets in multiple layers of encryption  Each layer contains address information for a node in a sequence of nodes, ultimately leading from sender to receiver  Main goal is to preserve anonymity  Tor does not provide end-to-end security  It does provide encryption “in the middle”

The “regular” Internet… Alice Bob Router AddressData

Node Exit Node Entry Node Tor: Create the circuit.. Alice Bob Directory Authority

Node Exit Node Entry Node Tor: Build the onion, send the data... Alice Bob Entry node encryption Node encryption Exit node encryption Original data

Rendezvous Point Tor: Hidden services Alice Bob Database of Hidden Services Introduction Point

Of Tor and Dark Markets…  Dark market: A commercial website running on a dark net, such as Tor  Silk Road, one among many dark markets  On Tor, usually as a hidden service  Dark, in the truest sense…  Havens for sale of drugs, stolen credit cards, and a variety of other illicit goods  “Whack-a-mole”  Silk Road  Silk Road 2.0  Silk Road Reloaded

Of rights holders & reality…  Shutting down dark markets is incredibly hard  How do you discover IP address?  What about jurisdiction issues?  Catch transactions once they cross into real world  Mail drops  Crypto currency conversions to fiat currency  Weakness is almost always the user, not the tech  Shut down markets via technical hacks

Marc Visnick