2014/02/09 Memex Aims to Create a New Paradigm for Domain-Specific Search February 09, 2014 New program seeks user-defined, domain-specific search of public information, and plans to use its groundbreaking research to fight human trafficking Today's web searches use a centralized, one-size-fits-all approach that searches the Internet with the same set of tools for all queries. To help overcome these challenges, DARPA has launched the Memex program. “We’re envisioning a new paradigm for search that would tailor indexed content, search results and interface tools to individual users and specific subject areas, and not the other way around,” said Chris White, DARPA program manager. Memex would ultimately apply to any public domain content; initially, DARPA intends to develop Memex to address a key Defense Department mission: fighting human trafficking. Memex plans to explore three technical areas of interest: domain-specific indexing, domain-specific search, and DoD-specified applications. Tweet @darpa
100 Search Engines For Academic Research Back in 2010, we shared with you 100 awesome search engines and research resources in our post: 100 Time-Saving Search Engines for Serious Scholars. It’s been an incredible resource, but now, it’s time for an update. Some services have moved on, others have been created, and we’ve found some new discoveries, too. General Need to get started with a more broad search? iSEEK Education:iSeek is an excellent targeted search engine, designed especially for students, teachers, administrators, and caregivers. Meta Search Want the best of everything? Dogpile:Find the best of all the major search engines with Dogpile, an engine that returns results from Google, Yahoo! Databases and Archives Resources like the Library of Congress have considerable archives and documents available, and many of them have taken their collections online. Books & Journals WorldCat:Find items from 10,000 libraries worldwide, with books, DVDs, CDs, and articles up for grabs. Science Math & Technology Social Science History
Nik Cubrilovic - Analyzing the FBI’s Explanation of How They Located Silk Road. The marketplace was hosted as a hidden service on Tor, a distributed network that provides a layer of anonymity for web and other traffic on the internet. Edward Snowden’s leaks revealed that the NSA target Tor users and that the agency has struggled to deanonymize users on the network. One of the big outstanding issues was how the FBI managed to uncover the real IP address of the server hosting the Silk Road. The indictment is intentionally vague on the details of how the server was discovered, and the issue is important since a large number of users (numbering in the millions) rely on the Tor software network to protect their identity. Last month Ulbricht’s lawyers filed a motion seeking to uncover details on how the FBI located the server. On Friday Wired reported that the FBI had responded with their own filing detailing how they uncovered the server: The government response consists of first the DOJ filing, and then the affidavit from the FBI tech team (PDF). 6. Addendum 1. 2.
100 Useful Tips and Tools to Research the Deep Web By Alisa Miller Experts say that typical search engines like Yahoo! and Google only pick up about 1% of the information available on the Internet. The rest of that information is considered to be hidden in the deep web, also referred to as the invisible web. So how can you find all the rest of this information? Meta-Search Engines Meta-search engines use the resources of many different search engines to gather the most results possible. SurfWax. Semantic Search Tools and Databases Semantic search tools depend on replicating the way the human brain thinks and categorizes information to ensure more relevant searches. Hakia. General Search Engines and Databases These databases and search engines for databases will provide information from places on the Internet most typical search engines cannot. DeepDyve. Academic Search Engines and Databases The world of academia has many databases not accessible by Google and Yahoo! Google Scholar. Scientific Search Engines and Databases Science.gov.
Law Enforcement Agencies in Tor: Impact Over the Dark Web. The recent shutdown of SilkRoad 2.0 was just a small part of the events affecting the Tor network that unfolded last week. Tor-related communities, such as privacy enthusiasts, but also cybercriminals (of course!), expressed worry after a global law enforcement operation targeted a number of illegal services based on Tor. Operation Onymous, coordinated by Europol's European Cybercrime Centre (EC3), the FBI, the U.S. Immigration and Customs Enforcement's (ICE), Homeland Security Investigations (HSI) and Eurojust, resulted in 17 arrests of vendors and administrators running these online marketplaces and more than 410 hidden services being taken down. The official announcement about Operation Onymous is available on the Europol website. Here's an incomplete list of .onion services that were taken down during this operation: Alpaca, Black Market, Blue Sky, Bungee 54, CannabisUK, Cloud Nine, Dedope, Fake Real Plastic, FakeID, Farmer1, Fast Cash! Examples of seized .onion sites
Top 20 Free Digital Forensic Investigation Tools for SysAdmins. Digital forensics tools come in many categories, so the exact choice of tool depends on where and how you want to use it. Here are some broad categories to give you an idea of the variety that comes under the umbrella of digital forensics tools: Database forensicsEmail analysisAudio/video forensicsInternet browsing analysisNetwork forensicsMemory forensicsFile analysisDisk and data captureComputer forensicsDigital image forensics While this is not an exhaustive list, it gives you a picture of what constitutes digital forensics tools and what you can do with them. Also, it is important to note that these categories can get blurred at times depending on the skill set of the staff, the lab conditions, availability of equipment, existing laws, and contractual obligations. But regardless of these variations, what is important is that digital forensics tools offer a vast amount of possibilities to gain information during an investigation. Choosing the right tool Skill level Output Cost Focus 17 HxD
Cybercrime in the DeepWeb Earlier, we published a blog post talking about the recent shut down of the Silk Road marketplace. There, we promised to release a new white paper looking at cybercrime activity on the Deep Web in more detail. This paper can now be found on our site here. While the Deep Web has often been uniquely associated with The Onion Router (TOR), in this paper we introduce several other networks that guarantee anonymous and untraceable access — the most renowned darknets (i.e., TOR, I2P, and Freenet) and alternative top-level domains (TLDs), also called “rogue TLDs.” Due to the large variety of goods available in these marketplaces, we focused on those that sparked the most interest from cybercriminals and compared their prices with the same kinds of merchandise found in traditional Internet underground forums, mostly Russian. Here are some highlights from the paper in terms of underground pricing: Credit cards can be purchased from US$10 to US$150 in various Deep Web marketplaces.
21 Popular Computer Forensics Tools Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to all devices related to digital data. The goal of Computer forensics is to perform crime investigations by using evidence from digital data to find who was the responsible for that particular crime. For better research and investigation, developers have created many computer forensics tools. These computer forensics tools can also be classified into various categories: Disk and data capture toolsFile viewersFile analysis toolsRegistry analysis toolsInternet analysis toolsEmail analysis toolsMobile devices analysis toolsMac OS analysis toolsNetwork forensics toolsDatabase forensics tools In this post, we are listing a few important and popular data forensics tools. 1. Digital Forensics Framework is another popular platform dedicated to digital forensics. Download:
Deep Web Search Engines Where to start a deep web search is easy. You hit Google.com and when you brick wall it, you go to scholar.google.com which is the academic database of Google. After you brick wall there, your true deep web search begins. You need to know something about your topic in order to choose the next tool. To be fair, some of these sites have improved their index-ability with Google and are now technically no longer Deep Web, rather kind-of-deep-web. However, there are only a few that have done so. To all the 35F and 35G’s out there at Fort Huachuca and elsewhere, you will find some useful links here to hone in on your AO. If you find a bad link, Comment the link below. Last updated July 12, 2016 – updated reverse image lookup. Multi Search engines Deeperweb.com – (broken as of Sept 2016, hopefully not dead) This is my favorite search engine. Surfwax – They have a 2011 interface for rss and a 2009 interface I think is better. Cluster Analysis Engine Speciality Deep Web Engines General Books Online
SIFT Kit/Workstation: Investigative Forensic Toolkit Download SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3.0 Download SIFT Workstation VMware Appliance Now - 1.5 GB Having trouble downloading? If you are having trouble downloading the SIFT Kit please contact firstname.lastname@example.org and include the URL you were given, your IP address, browser type, and if you are using a proxy of any kind. Having trouble with SIFT 3? How To: Download Ubuntu 14.04 ISO file and install Ubuntu 14.04 on any system. -> Once installed, open a terminal and run "wget --quiet -O - | sudo bash -s -- -i -s -y" Congrats -- you now have a SIFT workstation!! SIFT Workstation 3.0 Overview An international team of forensics experts, led by SANS Faculty Fellow Rob Lee, created the SANS Investigative Forensic Toolkit (SIFT) Workstation and made it available to the whole community as a public service. Key new features of SIFT 3.0 include: Manual SIFT 3.0 Installation