Hacked reported last week that Tor director Roger Dingledine made the bold claim that the FBI had directly paid Carnegie Mellon University researchers at their Software Engineering Institute to help uncloak Tor nodes and aid law enforcement in prosecuting Dark Web criminals. Carnegie Mellon was not consulted in most of the media coverage, but had declined comment to those who inquired. The story was more to do with Dingledine’s allegations and their potential validity than anything.
Now Carnegie Mellon has come out to take issue with a particular part of the narrative, the part that says the government compensated the university for its efforts. In a very short [...]
The digital propaganda machine of ISIS has run into trouble staying afloat on the clear net, and so like most other banned information, they’re heading to the deep web. While this may severely limit the ability of the group to dutifully indoctrinate new members who aren’t skilled in the arts of Tor, the group hopes the sites will at least stay online.
Researcher Scot Terban discovered the latest effort via a post on the popular Jihadi forum, Shamikh. The translated message (by Google) reads:
The name of Allah the Merciful given the very narrow on the site # Asaddarat_klavh so that it is deleting any new domain after its publication announce the launch of the [...]
Reports have come out recently that paint an interesting picture of the Federal Bureau of Investigation and Carnegie Mellon University. For starters, a court document acquired by Vice showed that the FBI was crediting an unnamed academic institution with helping it in locating a child pornography suspect as well as the people behind Silk Road 2.
Researchers from the school canceled a talk they were scheduled to give at July’s Black Hat conference on exactly the subject of unmasking a Tor IP address. The talk promised to show the conference of hackers how this could be done with a mere $3,000 equipment investment cost. The attack that was successful last year cost around [...]
The 2015 Internet Organized Crime Threat Assessment (IOCTA) has revealed that the number of “publically disclosed” data breaches this year has increased significantly, leading to secondary crimes wherein the breached data is used for extortion, identity theft, fraud and other similar offences.
The 2015 law enforcement-centric IOCTA report, put together from views and experiences of EU law enforcement agencies shows a trend that’s common among cybercrime all over the world.
The annual report is a presentation by Europol’s European Cybercrime Centre (EC3), focusing on the cybercrime threat landscape in EU member states.
The complete IOCTA report is available for [...]