SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Demystifying Cyber
Security: The Darknet
(Deep Web)
1 PD Unit
BRADLEY W
DEACON
Session Speaker
Bradley W Deacon
Bradley is a former Federal Agent and was one of the first members of the
Australian Federal Police Computer Crime Unit Sydney where in 1995 his
team was successful in having the first jail sentence imposed on a computer
hacker.
Bradley is a qualified non practising lawyer focussing on the law around
Cyber Space & Social Media with degrees in criminal justice, law, and
postgraduate studies in Criminology and Law. Additionally Bradley has a
Postgraduate Certificate in Distance Ed specialising in Digital Delivery from
Penn State University. Bradley also has a Masters in National Security with
his thesis centred around digital technology: “Evolving Digital Technology
Terrorist Financing & The Threat To U.S National Security”
As a cyber bullying and stalking advocate, Bradley was approached by
VCAT in 2014 to design and facilitate delivery of a social media awareness
package in 2015 for Victorian Court Staff and the Judiciary and was recently
a keynote speaker at the Say No 2 Bullying Conference on the Gold Coast.
Bradley lectures at several Australian Universities and colleges in a variety
of Cyber Law related units and justice units and is about to undertake a PhD
in Social Media by ‘publication’.
On-Demand Professional Development Academy
Session Outline
Learning Outcomes
• Background of Darknet (DeepWeb)
• Ramifications of staff accessing Darknet
• Cyber security education development
• White Hat, Black Hat & Grey Hat hackers
On-Demand Professional Development Academy
Background of the Darknet
The Darknet aka Deep Web
• Hidden websites started appearing in 2004
• The TOR network original intention was for
anonymous communication within Military to keep
messages encrypted and secret
On-Demand Professional Development Academy
Background of the Darknet
The Darknet aka Deep Web
On-Demand Professional Development Academy
• TOR stands for the ‘Onion Router’ and will
generally have an extension .onion
• TOR is slow as it bounces around several
‘volunteer’ computers around the world to keep
original location it was sent from and the place it
is going ‘anonymous’
Background of the Darknet
Released As Open Source
• In 2004 TOR was as freeware ‘open source’ to the
public
• The .onion extension represents the multiple layers
similar to an onion in that when you cook an onion
you peel off layers
On-Demand Professional Development Academy
Background of the Darknet
Released As Open Source
• .Onion is used because the websites you are
visiting are deeper and harder to find
• .Onion websites are deeper and harder to find as
they are behind layers of anonymity
On-Demand Professional Development Academy
Background of the Darknet
Deep Web
• The Deep Web includes many web pages that are
encrypted with passwords or documents in formats
that cannot be indexed
• Therefore, the Darknet is part of the Deep Web, but
the Deep Web is a much broader term than the
Darknet.
On-Demand Professional Development Academy
Background of the Darknet
Deep Web
• The Darknet has an estimated 200,000 to 400,000
sites, with the exact number impossible to
determine.
• Websites are hosted on servers with hidden
locations through the veil of encryption and virtual
private networks (VPNs).
• As a result, Darknet sites are extremely difficult to
shut down as the location of the administrators is
virtually untraceable.
On-Demand Professional Development Academy
Background of the Darknet
Released As Open Source
• .Onion is used because the websites you are
visiting are deeper and harder to find
• .Onion websites are deeper and harder to find as
they are behind layers of anonymity
On-Demand Professional Development Academy
Background of the Darknet
How Safe Is TOR?
● Like any part of the Internet TOR has its security
threats
● YouTube, Facebook, Google, Email all pose a
threat if you do not have good Anti-Virus
● TOR is no different and can be a threat especially if
you click a site/link that is unknown
On-Demand Professional Development Academy
Background of the Darknet
How Safe Is TOR?
● TOR relies on Peer to Peer reviews and some use
this as an indication to how safe a link is or a
download may be
● EXTREME CAUTION MUST BE USED WHEN
USING TOR
On-Demand Professional Development Academy
RAMIFICATIONS STAFF ACCESSING
TOR & YOUR STAFF
• TOR is attractive to staff to use
• TOR is well known amongst ‘Digital Natives’ as the
site to download games, movies and TV shows
• Staff need to be educated about TOR
• Your Internet use policy should include a ban on
using TOR or any Virtual Private Network (VPN) in
the workplace
On-Demand Professional Development Academy
RAMIFICATIONS STAFF ACCESSING
TOR & YOUR STAFF
• Your IT Security Advisor/Provider Should Block
access to TOR and VPN’s
• Ensure you have systems in place to log all
attempts to access TOR and VPN’s
• Ensure Firewalls are installed
• Advise staff of accessing TOR and VPN’s is against
the Firms Internet Use Policy & access attempts are
logged
On-Demand Professional Development Academy
Education Development
Education Is The Key
• Digital Natives are constantly pushing the Internet
boundary
• Digital Natives want everything yesterday
• Digital Natives generally do not see any issue with
copyright infringement for movies, music and the
like
• Porn is available all over the Internet from desktop
to smartphones with one click
On-Demand Professional Development Academy
Education Development
Education Is The Key
• The Darknet provides a marketplace for a wide
variety of illegal substances, services, and
communications.
• It is more than just a black market-the Darknet also
houses the most controversial political debates and
sharing of information between dissidents,
journalists, whistleblowers, extremists and trolls.
On-Demand Professional Development Academy
Education Development
Education Is The Key
• The Darknet via peer group pressure tempts and
lures staff to sites
• Education is paramount and annual reinforcement
is critical
• Case studies need to be provided of where the use
of TOR in the workplace can lead to dismissal
On-Demand Professional Development Academy
Cyber security education development
On-Demand Professional Development Academy
The Darket Brings Out The Scammers
On-Demand Professional Development Academy
The Darket Brings Out The Scammers
On-Demand Professional Development Academy
The bravado I have witnessed as one of the
founding Federal Agents in the Computer Crime
Section in the mid 1990's, where we obtained
Australia's first Jail sentence for a computer
'hacker' and now as a Cyber Law educator and
consultant never ceases to amaze me.
Most seem to have this 'untouchable' attitude
where they believe that they have outsmarted law
enforcement and intelligence agencies and large
private sector IT security companies, only to
eventually face the harsh reality that justice almost
always prevails.
White, Black & Grey Hat Hackers
Hacker Groups and Sub-Groups
From experience and over the years, I have observed
that hackers fall into three categories or sub-groups:
• White Hats - generally work for security
organisations and are assigned the task of
improving and securing computer services by
identifying and securing security flaws. .
On-Demand Professional Development Academy
White, Black & Grey Hat Hackers
On-Demand Professional Development Academy
Black Hats - are a varied group who use their skills to cause
problems for others and can be motivated by a range of
motivations and skill sets:
Some direct their destructive actions at a targeted company or
group and are often referred to as 'angry hackers'
A less skilled group with lower 'hacking' skills who use hacking
tools to cause mischief for fun aka known as 'script kiddies'
and;
Those that are interested in political and economic upheaval
and view technology as the means to accomplishing a goal
aka 'agenda hackers'
White, Black & Grey Hat Hackers
On-Demand Professional Development Academy
Grey Hats - are independent security experts and
consultants who are quite often reformed Black Hats.
● Hacking is quite simply 'unauthorised access and
subsequent use of other people's computer systems'
and can be correlated with everyday burglars who
break into a house where in the world of computers it
is a 'computer break in.’
● One must look at how the hacker came about to
committing the hack that defines what type of hacker
they are.
Hactivisim
On-Demand Professional Development Academy
Over time we have seen another hacking term emerge and
this is 'hacktivism' a term that denotes hacking for a political
or activist purpose where at its worst can even be a 'terrorist
attack'.
It is believed that hacktivism emerged by joining hacking with
activism where the hacking techniques are against a targets
Internet site with the intent of disrupting regular operations
such as web sit-ins, virtual blockades, automated email
bombs, web hacks, computer break ins, computer viruses
and worms.
All of which in legal international and domestic legal
instruments are referred to as 'illegal' or 'unauthorised' access
and interception.
Peace of Mind
Have you got the following covered?
A. Workplace Internet Use Policy?
B. Social Media Policy For The Workplace?
C. Social Media Staff/Firm Reputation
Management Training In Place?
D. IT Security Reviews?
E. Have a ‘White Hat’ Hacker test your staff with
‘Phishing’ attempts to see if they open links?
On-Demand Professional Development Academy
Demystifying Cyber
Security: The Darknet
(Deep Web)
1 PD Unit

Weitere ähnliche Inhalte

Was ist angesagt?

The Darknet and the Future of Everything*
The Darknet and the Future of Everything*The Darknet and the Future of Everything*
The Darknet and the Future of Everything*PeterNBiddle
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep webKhaled Sany
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknetMichelle Devanny
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine ImpasClaudine Impas
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth YuKenny Yu
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the WebPaula Ripoll Cacho
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Deep Web
Deep WebDeep Web
Deep WebAbishaiDas
 

Was ist angesagt? (20)

Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Darknet
DarknetDarknet
Darknet
 
The Darknet and the Future of Everything*
The Darknet and the Future of Everything*The Darknet and the Future of Everything*
The Darknet and the Future of Everything*
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The dark web
The dark webThe dark web
The dark web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Dark web
Dark webDark web
Dark web
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Deep Web
Deep WebDeep Web
Deep Web
 

Andere mochten auch

Online pornography
Online pornographyOnline pornography
Online pornographyMorgane Mahler
 
Deep Web
Deep WebDeep Web
Deep WebSt John
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
The darknet
The darknet The darknet
The darknet Shelly1509
 
Darknet: The Other Side
Darknet: The Other SideDarknet: The Other Side
Darknet: The Other Sidejbraindc
 
Drugs & tthe Dark Net
Drugs & tthe Dark NetDrugs & tthe Dark Net
Drugs & tthe Dark NetTim Bingham
 
Daknet by moinuddin
Daknet by moinuddinDaknet by moinuddin
Daknet by moinuddinSyed Moinuddin
 
Searching the Deep Web
Searching the Deep WebSearching the Deep Web
Searching the Deep WebValerie Forrestal
 
Social Media overview for Positively Cleveland
Social Media overview for Positively ClevelandSocial Media overview for Positively Cleveland
Social Media overview for Positively ClevelandFahlgren Mortine
 
Full ss s-roryt
Full ss s-rorytFull ss s-roryt
Full ss s-rorytbriandigital
 
Tor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden SitesTor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden Sitesagora_url
 
Tim Thorpe
Tim ThorpeTim Thorpe
Tim Thorpesmsherman
 
Darknet
DarknetDarknet
Darknetinnabiii
 
Web development – affecting the society positively
Web development – affecting the society positivelyWeb development – affecting the society positively
Web development – affecting the society positivelystankemp10
 
Deep Web Presentation April 25
Deep Web Presentation April 25Deep Web Presentation April 25
Deep Web Presentation April 25nagold
 
WWII global history
WWII global historyWWII global history
WWII global historyeben_cooke
 

Andere mochten auch (18)

Darknet
DarknetDarknet
Darknet
 
Online pornography
Online pornographyOnline pornography
Online pornography
 
Deep Web
Deep WebDeep Web
Deep Web
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
The darknet
The darknet The darknet
The darknet
 
Darknet: The Other Side
Darknet: The Other SideDarknet: The Other Side
Darknet: The Other Side
 
Drugs & tthe Dark Net
Drugs & tthe Dark NetDrugs & tthe Dark Net
Drugs & tthe Dark Net
 
Daknet by moinuddin
Daknet by moinuddinDaknet by moinuddin
Daknet by moinuddin
 
Searching the Deep Web
Searching the Deep WebSearching the Deep Web
Searching the Deep Web
 
Social Media overview for Positively Cleveland
Social Media overview for Positively ClevelandSocial Media overview for Positively Cleveland
Social Media overview for Positively Cleveland
 
Full ss s-roryt
Full ss s-rorytFull ss s-roryt
Full ss s-roryt
 
Tor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden SitesTor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden Sites
 
Tim Thorpe
Tim ThorpeTim Thorpe
Tim Thorpe
 
THE POWER OF A NARRATIVE
THE POWER OF A NARRATIVETHE POWER OF A NARRATIVE
THE POWER OF A NARRATIVE
 
Darknet
DarknetDarknet
Darknet
 
Web development – affecting the society positively
Web development – affecting the society positivelyWeb development – affecting the society positively
Web development – affecting the society positively
 
Deep Web Presentation April 25
Deep Web Presentation April 25Deep Web Presentation April 25
Deep Web Presentation April 25
 
WWII global history
WWII global historyWWII global history
WWII global history
 

Ähnlich wie Darknet (ec)

Dw communication
Dw communicationDw communication
Dw communicationArjun Chetry
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat IntelligenceMarlabs
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxIbrahimSami14
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security Mehedi Hasan
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark webVeriato
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfAuto Parts Wholesale Online
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023KharimMchatta
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiShah Sheikh
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 

Ähnlich wie Darknet (ec) (20)

Dw communication
Dw communicationDw communication
Dw communication
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Darknet
DarknetDarknet
Darknet
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark web
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Hacking
HackingHacking
Hacking
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 

Mehr von Bradley W. Deacon

Social media and defamation law (watermarked)
Social media and defamation law (watermarked) Social media and defamation law (watermarked)
Social media and defamation law (watermarked) Bradley W. Deacon
 
Pinterest for everyone
Pinterest for everyonePinterest for everyone
Pinterest for everyoneBradley W. Deacon
 
Instagram For Everyone
Instagram For EveryoneInstagram For Everyone
Instagram For EveryoneBradley W. Deacon
 
Grow Your Business With Pinterest
Grow Your Business With PinterestGrow Your Business With Pinterest
Grow Your Business With PinterestBradley W. Deacon
 
Social Media Training Pinterest (7/2014)
Social Media Training Pinterest (7/2014)Social Media Training Pinterest (7/2014)
Social Media Training Pinterest (7/2014)Bradley W. Deacon
 
Communication Skills Learning Styles In A Justice Environment
Communication Skills Learning Styles In A Justice Environment Communication Skills Learning Styles In A Justice Environment
Communication Skills Learning Styles In A Justice Environment Bradley W. Deacon
 
Grow Your Business With A Hash #
Grow Your Business  With A Hash #Grow Your Business  With A Hash #
Grow Your Business With A Hash #Bradley W. Deacon
 
A Parents Guide To Instant Messaging and Chat Options 2014
A Parents Guide To Instant Messaging and Chat Options 2014A Parents Guide To Instant Messaging and Chat Options 2014
A Parents Guide To Instant Messaging and Chat Options 2014Bradley W. Deacon
 
One Bad Tweet & Or Post & %$#@
One Bad Tweet & Or Post & %$#@One Bad Tweet & Or Post & %$#@
One Bad Tweet & Or Post & %$#@Bradley W. Deacon
 
Bitcoin A General Overview
Bitcoin A General Overview Bitcoin A General Overview
Bitcoin A General Overview Bradley W. Deacon
 
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults InteractParents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults InteractBradley W. Deacon
 

Mehr von Bradley W. Deacon (15)

Social media and defamation law (watermarked)
Social media and defamation law (watermarked) Social media and defamation law (watermarked)
Social media and defamation law (watermarked)
 
Online Contracting
Online ContractingOnline Contracting
Online Contracting
 
Twitter For Everyone
Twitter For EveryoneTwitter For Everyone
Twitter For Everyone
 
Pinterest for everyone
Pinterest for everyonePinterest for everyone
Pinterest for everyone
 
#SeizeTheDay
#SeizeTheDay #SeizeTheDay
#SeizeTheDay
 
Instagram For Everyone
Instagram For EveryoneInstagram For Everyone
Instagram For Everyone
 
Tweet Beam Explained
Tweet Beam Explained Tweet Beam Explained
Tweet Beam Explained
 
Grow Your Business With Pinterest
Grow Your Business With PinterestGrow Your Business With Pinterest
Grow Your Business With Pinterest
 
Social Media Training Pinterest (7/2014)
Social Media Training Pinterest (7/2014)Social Media Training Pinterest (7/2014)
Social Media Training Pinterest (7/2014)
 
Communication Skills Learning Styles In A Justice Environment
Communication Skills Learning Styles In A Justice Environment Communication Skills Learning Styles In A Justice Environment
Communication Skills Learning Styles In A Justice Environment
 
Grow Your Business With A Hash #
Grow Your Business  With A Hash #Grow Your Business  With A Hash #
Grow Your Business With A Hash #
 
A Parents Guide To Instant Messaging and Chat Options 2014
A Parents Guide To Instant Messaging and Chat Options 2014A Parents Guide To Instant Messaging and Chat Options 2014
A Parents Guide To Instant Messaging and Chat Options 2014
 
One Bad Tweet & Or Post & %$#@
One Bad Tweet & Or Post & %$#@One Bad Tweet & Or Post & %$#@
One Bad Tweet & Or Post & %$#@
 
Bitcoin A General Overview
Bitcoin A General Overview Bitcoin A General Overview
Bitcoin A General Overview
 
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults InteractParents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
 

KĂźrzlich hochgeladen

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

KĂźrzlich hochgeladen (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
 

Darknet (ec)

  • 1. Demystifying Cyber Security: The Darknet (Deep Web) 1 PD Unit
  • 2. BRADLEY W DEACON Session Speaker Bradley W Deacon Bradley is a former Federal Agent and was one of the first members of the Australian Federal Police Computer Crime Unit Sydney where in 1995 his team was successful in having the first jail sentence imposed on a computer hacker. Bradley is a qualified non practising lawyer focussing on the law around Cyber Space & Social Media with degrees in criminal justice, law, and postgraduate studies in Criminology and Law. Additionally Bradley has a Postgraduate Certificate in Distance Ed specialising in Digital Delivery from Penn State University. Bradley also has a Masters in National Security with his thesis centred around digital technology: “Evolving Digital Technology Terrorist Financing & The Threat To U.S National Security” As a cyber bullying and stalking advocate, Bradley was approached by VCAT in 2014 to design and facilitate delivery of a social media awareness package in 2015 for Victorian Court Staff and the Judiciary and was recently a keynote speaker at the Say No 2 Bullying Conference on the Gold Coast. Bradley lectures at several Australian Universities and colleges in a variety of Cyber Law related units and justice units and is about to undertake a PhD in Social Media by ‘publication’. On-Demand Professional Development Academy
  • 3. Session Outline Learning Outcomes • Background of Darknet (DeepWeb) • Ramifications of staff accessing Darknet • Cyber security education development • White Hat, Black Hat & Grey Hat hackers On-Demand Professional Development Academy
  • 4. Background of the Darknet The Darknet aka Deep Web • Hidden websites started appearing in 2004 • The TOR network original intention was for anonymous communication within Military to keep messages encrypted and secret On-Demand Professional Development Academy
  • 5. Background of the Darknet The Darknet aka Deep Web On-Demand Professional Development Academy • TOR stands for the ‘Onion Router’ and will generally have an extension .onion • TOR is slow as it bounces around several ‘volunteer’ computers around the world to keep original location it was sent from and the place it is going ‘anonymous’
  • 6. Background of the Darknet Released As Open Source • In 2004 TOR was as freeware ‘open source’ to the public • The .onion extension represents the multiple layers similar to an onion in that when you cook an onion you peel off layers On-Demand Professional Development Academy
  • 7. Background of the Darknet Released As Open Source • .Onion is used because the websites you are visiting are deeper and harder to find • .Onion websites are deeper and harder to find as they are behind layers of anonymity On-Demand Professional Development Academy
  • 8. Background of the Darknet Deep Web • The Deep Web includes many web pages that are encrypted with passwords or documents in formats that cannot be indexed • Therefore, the Darknet is part of the Deep Web, but the Deep Web is a much broader term than the Darknet. On-Demand Professional Development Academy
  • 9. Background of the Darknet Deep Web • The Darknet has an estimated 200,000 to 400,000 sites, with the exact number impossible to determine. • Websites are hosted on servers with hidden locations through the veil of encryption and virtual private networks (VPNs). • As a result, Darknet sites are extremely difficult to shut down as the location of the administrators is virtually untraceable. On-Demand Professional Development Academy
  • 10. Background of the Darknet Released As Open Source • .Onion is used because the websites you are visiting are deeper and harder to find • .Onion websites are deeper and harder to find as they are behind layers of anonymity On-Demand Professional Development Academy
  • 11. Background of the Darknet How Safe Is TOR? ● Like any part of the Internet TOR has its security threats ● YouTube, Facebook, Google, Email all pose a threat if you do not have good Anti-Virus ● TOR is no different and can be a threat especially if you click a site/link that is unknown On-Demand Professional Development Academy
  • 12. Background of the Darknet How Safe Is TOR? ● TOR relies on Peer to Peer reviews and some use this as an indication to how safe a link is or a download may be ● EXTREME CAUTION MUST BE USED WHEN USING TOR On-Demand Professional Development Academy
  • 13. RAMIFICATIONS STAFF ACCESSING TOR & YOUR STAFF • TOR is attractive to staff to use • TOR is well known amongst ‘Digital Natives’ as the site to download games, movies and TV shows • Staff need to be educated about TOR • Your Internet use policy should include a ban on using TOR or any Virtual Private Network (VPN) in the workplace On-Demand Professional Development Academy
  • 14. RAMIFICATIONS STAFF ACCESSING TOR & YOUR STAFF • Your IT Security Advisor/Provider Should Block access to TOR and VPN’s • Ensure you have systems in place to log all attempts to access TOR and VPN’s • Ensure Firewalls are installed • Advise staff of accessing TOR and VPN’s is against the Firms Internet Use Policy & access attempts are logged On-Demand Professional Development Academy
  • 15. Education Development Education Is The Key • Digital Natives are constantly pushing the Internet boundary • Digital Natives want everything yesterday • Digital Natives generally do not see any issue with copyright infringement for movies, music and the like • Porn is available all over the Internet from desktop to smartphones with one click On-Demand Professional Development Academy
  • 16. Education Development Education Is The Key • The Darknet provides a marketplace for a wide variety of illegal substances, services, and communications. • It is more than just a black market-the Darknet also houses the most controversial political debates and sharing of information between dissidents, journalists, whistleblowers, extremists and trolls. On-Demand Professional Development Academy
  • 17. Education Development Education Is The Key • The Darknet via peer group pressure tempts and lures staff to sites • Education is paramount and annual reinforcement is critical • Case studies need to be provided of where the use of TOR in the workplace can lead to dismissal On-Demand Professional Development Academy
  • 18. Cyber security education development On-Demand Professional Development Academy
  • 19. The Darket Brings Out The Scammers On-Demand Professional Development Academy
  • 20. The Darket Brings Out The Scammers On-Demand Professional Development Academy The bravado I have witnessed as one of the founding Federal Agents in the Computer Crime Section in the mid 1990's, where we obtained Australia's first Jail sentence for a computer 'hacker' and now as a Cyber Law educator and consultant never ceases to amaze me. Most seem to have this 'untouchable' attitude where they believe that they have outsmarted law enforcement and intelligence agencies and large private sector IT security companies, only to eventually face the harsh reality that justice almost always prevails.
  • 21. White, Black & Grey Hat Hackers Hacker Groups and Sub-Groups From experience and over the years, I have observed that hackers fall into three categories or sub-groups: • White Hats - generally work for security organisations and are assigned the task of improving and securing computer services by identifying and securing security flaws. . On-Demand Professional Development Academy
  • 22. White, Black & Grey Hat Hackers On-Demand Professional Development Academy Black Hats - are a varied group who use their skills to cause problems for others and can be motivated by a range of motivations and skill sets: Some direct their destructive actions at a targeted company or group and are often referred to as 'angry hackers' A less skilled group with lower 'hacking' skills who use hacking tools to cause mischief for fun aka known as 'script kiddies' and; Those that are interested in political and economic upheaval and view technology as the means to accomplishing a goal aka 'agenda hackers'
  • 23. White, Black & Grey Hat Hackers On-Demand Professional Development Academy Grey Hats - are independent security experts and consultants who are quite often reformed Black Hats. ● Hacking is quite simply 'unauthorised access and subsequent use of other people's computer systems' and can be correlated with everyday burglars who break into a house where in the world of computers it is a 'computer break in.’ ● One must look at how the hacker came about to committing the hack that defines what type of hacker they are.
  • 24. Hactivisim On-Demand Professional Development Academy Over time we have seen another hacking term emerge and this is 'hacktivism' a term that denotes hacking for a political or activist purpose where at its worst can even be a 'terrorist attack'. It is believed that hacktivism emerged by joining hacking with activism where the hacking techniques are against a targets Internet site with the intent of disrupting regular operations such as web sit-ins, virtual blockades, automated email bombs, web hacks, computer break ins, computer viruses and worms. All of which in legal international and domestic legal instruments are referred to as 'illegal' or 'unauthorised' access and interception.
  • 25. Peace of Mind Have you got the following covered? A. Workplace Internet Use Policy? B. Social Media Policy For The Workplace? C. Social Media Staff/Firm Reputation Management Training In Place? D. IT Security Reviews? E. Have a ‘White Hat’ Hacker test your staff with ‘Phishing’ attempts to see if they open links? On-Demand Professional Development Academy
  • 26. Demystifying Cyber Security: The Darknet (Deep Web) 1 PD Unit