background preloader

Deep Web Research and Discovery Resources 2013

Deep Web Research and Discovery Resources 2013
Related:  Need to Organize

Law Enforcement Agencies in Tor: Impact Over the Dark Web. The recent shutdown of SilkRoad 2.0 was just a small part of the events affecting the Tor network that unfolded last week. Tor-related communities, such as privacy enthusiasts, but also cybercriminals (of course!), expressed worry after a global law enforcement operation targeted a number of illegal services based on Tor. Operation Onymous, coordinated by Europol's European Cybercrime Centre (EC3), the FBI, the U.S. The official announcement about Operation Onymous is available on the Europol website. Here's an incomplete list of .onion services that were taken down during this operation: Alpaca, Black Market, Blue Sky, Bungee 54, CannabisUK, Cloud Nine, Dedope, Fake Real Plastic, FakeID, Farmer1, Fast Cash! Examples of seized .onion sites At the sametime , reports appeared about a number of Tor nodes being seized by authorities: Over the last few days, we received and read reports saying that several Tor relays were seized by government officials. The current state of the Dark Web

Deep Web Search Engines Where to start a deep web search is easy. You hit and when you brick wall it, you go to which is the academic database of Google. After you brick wall there, your true deep web search begins. You need to know something about your topic in order to choose the next tool. To all the 35F and 35G’s out there at Fort Huachuca and elsewhere, you will find some useful links here to hone in on your AO. If you find a bad link, Comment the link below. Last updated July 12, 2016 – updated reverse image lookup. Multi Search engines – (broken as of Sept 2016, hopefully not dead) This is my favorite search engine. Surfwax – They have a 2011 interface for rss and a 2009 interface I think is better. – You can filter the search by domain extension, or by topic which is quite neat. Cluster Analysis Engine TouchGraph – A brilliant clustering tool that shows you relationships in your search results using a damn spiffy visualization. General Videos

Nik Cubrilovic - Analyzing the FBI’s Explanation of How They Located Silk Road. The marketplace was hosted as a hidden service on Tor, a distributed network that provides a layer of anonymity for web and other traffic on the internet. Edward Snowden’s leaks revealed that the NSA target Tor users and that the agency has struggled to deanonymize users on the network. One of the big outstanding issues was how the FBI managed to uncover the real IP address of the server hosting the Silk Road. Last month Ulbricht’s lawyers filed a motion seeking to uncover details on how the FBI located the server. On Friday Wired reported that the FBI had responded with their own filing detailing how they uncovered the server: The FBI claims to have found the server’s location without the NSA’s help, simply by fiddling with the Silk Road’s login page until it leaked its true location.[..]they found a misconfiguration in an element of the Silk Road login page, which revealed its internet protocol (IP) address and thus its physical location. The affidavit goes on to say: 6. Addendum 1. 2.

An Up-To-Date Layman's Guide To Accessing The Deep Web If you binge-watched the second season of House of Cards, along with a reported 15% of Netflix's 44 million subscribers, you may be newly interested in the Deep Web. Slate has done a good job of describing what the Deep Web is and isn't, but they don't tell you how to get there. How To Access The Deep Web First: the hot sheets. To get into the Deep Web these days, you first have to download the Tor add-on for Firefox. You might also like: The Casual Bitcoin Buyer's Guide To Investing In Cryptocurrencies Multiple Redditors urge reading the Tor Project's warning page, where they discourage torrent file sharing and downloading while using Tor. The newest iteration of the Tor browser, Tor 4.0, was released in October 2014. Other precautions include placing duct tape on your webcam, enabling your computer's firewall, and turning off cookies and JavaScript. For mobile users, several browsers exist which purport to—more or less—allow Tor to be used on an Android or iOS device. | your entry to the Deep Web, Darknet, Onionland, Tor, Hidden Wiki, Deepweb How-To Find Files In Unprotected Directories We’ve all got a little voyeurism in us. That’s a big reason why the post, Clearing Google Search History to Maintain Your Privacy sent my visitor counts off the charts :). In this article, I’m going to show you how to create search queries that will list the contents of unprotected directories on the internet. You’ll be able to play the music files, watch the videos, look at photos and more. I have to say, it’s really addicting. First of all, what’s an unprotected web directory? I have to say I have not had this much fun with Google for a while! So let’s get to the nitty gritty details. The words “Index of /” are common to these pages, and they end up in the “title” of the page. So, for starters here is a query that will give you a search results page of unprotected directories: [-inurl(html|htm|php) intitle:”index of” +”last modified” +”parent directory” +description +size] But, this is kind of boring. Let’s say that we wanted to find any movie files in WMV or AVI format:

2014/02/09 Memex Aims to Create a New Paradigm for Domain-Specific Search February 09, 2014 New program seeks user-defined, domain-specific search of public information, and plans to use its groundbreaking research to fight human trafficking Today's web searches use a centralized, one-size-fits-all approach that searches the Internet with the same set of tools for all queries. While that model has been wildly successful commercially, it does not work well for many government use cases. For example, it still remains a largely manual process that does not save sessions, requires nearly exact input with one-at-a-time entry, and doesn't organize or aggregate results beyond a list of links. To help overcome these challenges, DARPA has launched the Memex program. “We’re envisioning a new paradigm for search that would tailor indexed content, search results and interface tools to individual users and specific subject areas, and not the other way around,” said Chris White, DARPA program manager. Tweet @darpa

10 Search Engines to Explore the Invisible Web Not everything on the web will show up in a list of search results on Google or Bing; there are lots of places that their web crawlers cannot access. To explore the invisible web, you need to use specialist search engines. Here are our top 12 services to perform a deep internet search. What Is the Invisible Web? Before we begin, let's establish what does the term "invisible web" refer to? Simply, it's a catch-all term for online content that will not appear in search results or web directories. There are no official data available, but most experts agree that the invisible web is several times larger than the visible web. The content on the invisible web can be roughly divided into the deep web and the dark web. The Deep Web The deep web made up of content that typically needs some form of accreditation to access. If you have the correct details, you can access the content through a regular web browser. The Dark Web The dark web is a sub-section of the deep web. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.

100 Search Engines For Academic Research Back in 2010, we shared with you 100 awesome search engines and research resources in our post: 100 Time-Saving Search Engines for Serious Scholars. It’s been an incredible resource, but now, it’s time for an update. Some services have moved on, others have been created, and we’ve found some new discoveries, too. Many of our original 100 are still going strong, but we’ve updated where necessary and added some of our new favorites, too. Check out our new, up-to-date collection to discover the very best search engine for finding the academic results you’re looking for. General Need to get started with a more broad search? iSEEK Education:iSeek is an excellent targeted search engine, designed especially for students, teachers, administrators, and caregivers. Meta Search Want the best of everything? Dogpile:Find the best of all the major search engines with Dogpile, an engine that returns results from Google, Yahoo! Databases and Archives Books & Journals Science Math & Technology Social Science

The Ultimate Guide to the Invisible Web Search engines are, in a sense, the heartbeat of the internet; “Googling” has become a part of everyday speech and is even recognized by Merriam-Webster as a grammatically correct verb. It’s a common misconception, however, that Googling a search term will reveal every site out there that addresses your search. Typical search engines like Google, Yahoo, or Bing actually access only a tiny fraction — estimated at 0.03% — of the internet. The sites that traditional searches yield are part of what’s known as the Surface Web, which is comprised of indexed pages that a search engine’s web crawlers are programmed to retrieve. "As much as 90 percent of the internet is only accessible through deb web websites." So where’s the rest? So what is the Deep Web, exactly? Search Engines and the Surface Web Understanding how surface pages are indexed by search engines can help you understand what the Deep Web is all about. How is the Deep Web Invisible to Search Engines? Reasons a Page is Invisible Art

100 Useful Tips and Tools to Research the Deep Web By Alisa Miller Experts say that typical search engines like Yahoo! and Google only pick up about 1% of the information available on the Internet. Meta-Search Engines Meta-search engines use the resources of many different search engines to gather the most results possible. SurfWax. Semantic Search Tools and Databases Semantic search tools depend on replicating the way the human brain thinks and categorizes information to ensure more relevant searches. Hakia. General Search Engines and Databases These databases and search engines for databases will provide information from places on the Internet most typical search engines cannot. DeepDyve. Academic Search Engines and Databases The world of academia has many databases not accessible by Google and Yahoo! Google Scholar. Scientific Search Engines and Databases The scientific community keeps many databases that can provide a huge amount of information but may not show up in searches through an ordinary search engine.

Invisible web invisible Des moteurs comme Google, MSN/Live Search, Yahoo! Search ou des répertoires tels que Yahoo! Directory ne vous donnent accès qu'à une petite partie (inférieure à 10%) du web, le Web Visible. La technologie de ces moteurs conventionnels ne permet pas d'accéder à une zone immense du web, le Web Invisible, espace beaucoup plus important que le web visible. Lors d'une navigation en Antarctique pour prélever des échantillons de glace sur des icebergs, si vous vous limitez à leur partie émergée, vous vous privez de la surface immergée, en moyenne 50 fois plus importante. Sur le web, c'est la même chose ! > Une partie du web est non accessible aux moteurs parce que : • Les documents, pages et sites web ou bases de données sont trop volumineux pour être entièrement indexés. • des pages sont protégées par l'auteur (balise meta qui stoppe le robot). • les pages sont protégées avec une authentification par identifiant (login) et mot de passe.

Cybercrime in the DeepWeb Earlier, we published a blog post talking about the recent shut down of the Silk Road marketplace. There, we promised to release a new white paper looking at cybercrime activity on the Deep Web in more detail. This paper can now be found on our site here. While the Deep Web has often been uniquely associated with The Onion Router (TOR), in this paper we introduce several other networks that guarantee anonymous and untraceable access — the most renowned darknets (i.e., TOR, I2P, and Freenet) and alternative top-level domains (TLDs), also called “rogue TLDs.” We analyzed how malicious actors use these networks to exchange goods and examined the marketplaces available in the Deep Web, along with the goods offered. Due to the large variety of goods available in these marketplaces, we focused on those that sparked the most interest from cybercriminals and compared their prices with the same kinds of merchandise found in traditional Internet underground forums, mostly Russian.