DeepWeb Ad

Monday, August 31, 2015

Transportation, History and CyberWar Search Engines

Transportation

FAA Flight Delay Information — A map of the United States with flight delay information from the nation’s largest airports.
NTSB Accident Database and Synopses — The National Transportation Safety Board’s database of aviation accidents, ranging from 1962 to present.
NTSB Aviation Accident Database— Aviation accident data from the National Transportation Safety Board
National Highway Traffic Safety Administration — A database of car and car part defects, searchable by item number or car make and model.
SaferCar.gov — Crash test safety ratings for automobiles since 1990.
flightwise.com — Real-time flight tracking, with support for Google Earth.
FlightAware — Fee flight tracking with history, graphs, and maps.

History

Ohio State – Compiles lots of Civil War info on troop movements, camps, battles, etc.

Cyber War / InfoSec

Iron Geek irongeek.com — An excellent library of videos explaining many facets of InfoSec and hacking & security
Security Tube – securitytube.net — A large library of videos covering many topics in InfoSec, cyberwar, and most of the hacking conferences.
DefCon — The main hackers Con, so well known that now the Feds send their folks here and it has become a wild west training ground for coming trends. Archives go back to Defcon 1. They are now on Defcon 20, I think.
semanticommunity.info– General military hardware overview. Some deeper links to deep web
Shodan – The deep web search for what things are connected to the internet.  Controversial, but a good tool.

Hey people. If you know of a useful deep web resource, put a comment below and share the love!

Science and Academic search engines

Science and Academic

(Scholarly Paper search engines now have their own page)
ScienceResearch.com — Searchable access to scientific journals and databases.
Academic Index – Main search is a filtered Google search aimed at high authority rank sites, mainly .edu and .gov which filters a great deal out. Second search ties into deep web academic and non-academic databases skewed to librarians and educators.
Science.gov — Gateway to  science info provided by US government agencies.
VideoLectures.net –  Phenomenal video lecture coverage from high authority rank sources.  A great go-to place to find peer-reviewed, conference presented, in depth coverage of a topic at a conference. A nice bonus, is the presentation slides are shown separately, and you can jump to slides of interest to you. Heavily technology based, and 66% is in English. Most lectures 45 minutes or longer.
WebCASPAR — A horrible interface to an alleged wealth of statistical info on science and engineering. I found the site slow, cludgy and designed around 1965 run off of candle power.  From their website:”The WebCASPAR database provides easy access to a large body of statistical data resources for science and engineering (S&E) at U.S. academic institutions. WebCASPAR emphasizes S&E, but its data resources also provide information on non-S&E fields and higher education in general. ”
The Complete Work of Charles Darwin — Charles Darwin’s published works,  search-able and available online. He’s still old and his works still ramble. Scanning didn’t help him much.
USGS Real-Time Water Data — Real-time map of streamflow and water quality data of the USA’s rivers and reservoirs.
USGS Earthquake Hazards Program — Showing real-time earthquake data. Focus on US but covers world as well.
IEEE Publications (Commercial) — Contains over 1.4 million documents from the Institute of Electronics and Electrical Engineers.
Society of Petroleum Engineers Archive (Commercial) — Petroleum engineers technical papers.
Arxivarxiv.org/ — Cornell University repository. Access to 700,000+  technical papers on everything from quantitative biology to computer science. Appears to offer full text in several formats.
VADLO – www.vadlo.com/ — Life Science Search Engine. Very hit and miss. Don’t have high expectations.
Deep Dyve  (Commercial) www.deepdyve.com   DeepDyve has aggregated millions of articles across thousands of journals from the world’s leading publishers, including Springer, Nature Publishing Group, Wiley-Blackwell and more. Haven’t paid the premium to give it a test ride, if someone has, please write a review below.
Data Mining Data sources – http://www.kdnuggets.com/datasets/index.html  – Links to gobs of free and commercial datasets used for data mining.

Medical and Health search engines

Medical and Health

PubMed  — The U.S. National Library of Medicine contains over 16 million citations from MEDLINE and other life science journals going back to the 1950s. Contains links to full-text articles and external resources. Supposed to be the best damn resource for medical out there.
National Institute for Health Research Archive — http://www.nihr.ac.uk/Pages/NIHRArchive.aspx Database of ongoing or completed projects funded by the British  NHS.
National Institutes of Health — Encyclopedia of health topics. More of a kindof-deep-web resource, as Google has this indexed.
American Hospital Directory — Index of US hospital information.
Globalhealthfacts.org — Searchable world health information, by country, disease, condition, program, or demographic. Quickly lay out the conditions in a country.
Centers for Disease Control and Prevention Data and Statistics — Statistical health information according to the CDC. Not true deep web, but useful.
New England Journal of Medicine  (commercial) — A Leading medical journal with full text past issues available online. Commericial, but you can access most for free.

Law and Politics search engines

Law and Politics

THOMAS (Library of Congress) — Legislative information from the Library of Congress.
Law Library of Congress — Allegedly, the largest collection of legal materials in the world, over 2 million volumes.
Global Legal Information Network — Laws, regulations, judicial decisions, and other legal sources.
FindLaw — Free legal database, with collections of cases and codes, legal news.
Office of Postsecondary Education Security Statistics — Contains college campus crime statistics, sortable.
Bureau of Justice Statistics — http://bjs.ojp.usdoj.gov/ Legal and judicial statistics, everything from crime to law enforcement.
The Avalon Project at Yale Law School — Documents in law, history, and diplomacy.
US Congressional Documents and Debates, 1774–1873 (Library of Congress) — The historical Congressional records, bills, documents, statutes, journals, and debates from LOC.
Lobbying Database — Who spent what on firms who have spent lobbying money from 1998. The US, with the finest Congress money can buy!
Legislative Activities — Synopsis of House of Representatives’ bill summary, status, public laws, and votes.
heinonline.org  – (commercial) – Claims to be the ‘worlds largest image based database of legal documents’ . I was able to find an obtuse document on using Bayes Theorem for fact finding in a criminal case.
Project Vote Smart — Government officials and election candidates database, order by last name or ZIP code.

International Search Engines

International Search Engines

International Data Base (IDB) — Statistical tables and demographic information for countries and areas.
FIRST http://first.sipri.org/ Military aggression database and weapons holdings.
Economics of Tobacco Control — Information regarding tobacco usage and policy for180 countries.
Country Indicators for Foreign Policy —Statistical tables on countries’ foreign policies.
World Bank Data — Key development data and statistics for countries and worldwide groups.
CIA Factbook — Reference materials containing information on every country in the world.
US International Trade Statistics — International trade statistics,by country or type of good.
US Foreign Trade Highlights — Information of US international trade.
Energy Information Administration International Energy Data and Analysis — Energy balances sorted by country. Explains why the US gives huge amounts of cash to oil producing countries.

Finance and Government Search Engines

Bankrate.com — Database of interest rates for different loan types, mortgages, and savings accounts.
InvestIQ — Market data from around the world in regions.
BigCharts — Quotes and performance charts on different stocks and mutual funds.
SmartMoney.com Tools — A portal of for stock analysis tools.
NASDAQ Trader — A database of stock data from the NASDAQ stock exchange.
SEC Info — EDGAR and SEC filings searchable by name, industry, SIC code, etc.
EDGAR Online — SEC filings searchable by ticker or company name.

Government Search Engines

Copyright Records (LOCIS) — Online copyright records, documents, serials, and multimedia.
American FactFinder — Aggregate census bureau data to be searched by city, county, or ZIP code.
FedStats — Gateway for statistics on 100 US federal agencies.
United States Patent and Trademark Office — Database of patents,  full-text and full-page images.
Historical Census Browser — Repository of historical US census data. Going back to 1790 compiled by the University of Virginia.
Geospatial One Stop — Awesome GIS data warehouse of geographic data, shapefiles, imagery, and displayable on maps.
Grants.gov — Grant opportunities, from everything under the sun.
Technology Opportunities Program Grants Database — Listing of technology grants, peruse by keyword, state, and year.
United States Government Printing Office (GPO) — I mentioned this earlier, they seem to have everything. A search engine for mutliple government databases: US budgets, campaign reform hearings, code of federal regulations, congressional bills, etc
CIA Electronic Reading Room — The usual uninteresting declassified CIA documents.
POW/MIA Databases and Documents — Info on POWs and MIAs.
ZIP+4 Lookup — US ZIP codes and ZIP+4 codes

Economic and Job Search Engines

EUROPA Press Release Database — Database of press releases by the European Union.
FreeLunch.com —Directory of free economic data.
Bureau of Labor Statistics — Job-based and consumer economic info from the US Department of Labor.
Salary Wizard Calculator — Tools that shows national average salaries adjusted by location for different jobs.
Economagic — A data directory containing over 200,000 econ files.
Penn World Tables — National income data for all countries for the years 1950-2007.
America’s Job Bank — Database of jobs and resumes.
USAJOBS — Portal of data on federal government jobs.
Regional Economic Conditions (RECON) — Economic data available by state, county, and MSA.

Deep Web Search engines 2015

Books Online

Archive.org – Has books online in epub, txt, and pdf formats. The collection encompasses others such as Gutenberg Press, etc. So this is the best site to start with. Again, this makes my top 10 websites. Share the love.
Hathi Trust – http://www.hathitrust.org/  — a partnership of major research institutions and libraries working to ensure that the cultural record is preserved and accessible long into the future. There are more than sixty partners in HathiTrust, and membership is open to institutions worldwide.
Books.google.com – They are putting the squeeze on all the book scanning businesses. They want to scan the world to add it to the Google Borg. You will be assimilated.
The Online Books Page — A searchable database of more than 28,000 English works with full text available for free online.
Bibliomania — A database of free literature from more than 2,000 classic texts. Archive.org crushes this.
Project Gutenberg — The granddaddy of online books with a catalog of more than 20,000 free books with full text available online. Included in Archive.org.
The National Academies Press — Only about 3,000 free books online and ~900 for-sale PDFs.
ebrary — A database of about 20,000 full-text books. Focusing on academia and business.
UNZ – An odd collection of periodicals and book scanned.
Get Abstracts (commercial) — Large online library of more than 8,000 business book summaries. It is the most efficient way to get the best business titles.
Getty Research Institute – http://www.getty.edu/research/library/ – The Getty Research Institute library collections include over one million books, periodicals, study photographs, and auction catalogs as well as extensive special collections of rare and unique materials. Focusing on art history, architecture, and related fields, they begin with the archaeology of prehistory and extend to the contemporary moment.

Newspaper Archives Online

US newspaper coverage – ResearchGuides lists links to many newspapers
Library of Congress Newspaper Resource List – LOC does a great job getting the list together of wonderful newspaper archives.
NewspaperArchive.com(commercial) – Known for a large collection. I haven’t used it, so I can’t confirm this.
xooxleanswers.com – Great list of newspaper archives from Xooxle. Good list and a funky name. Two thumbs up.
University of Penn Newspaper Archive – List of US newspaper archives and dates. Looked like a deeper list of Texas newspapers, so this effort may be a deep comprehensive list.
Australia Newspaper archives – http://trove.nla.gov.au/ndp/del/about – A phenomenal newspaper archive of most Aussie newspapers from 1820’s going to 1980’s. Including Taz as well.

Audio Books Online

LibreVox.org – Huge selection of audio recordings and AudioBooks read by volunteer voice artists

Videos

www.liveleak.com – A Video news aggregator of citizen supplied videos. Great for OSInt in foreign countries. The site appears to have some good aggregation functions to turn randomly submitted videos into a logical collection around a topic.  Proven useful for aggregating the Feb 15, 2013 meteorite strike in Russia.
VideoLectures.net – High quality videos of science based lectures.

Business Deep Web Engines

AAAAgencySearch.com — Advertising agencies via the American Association of Advertising Agencies.
Agency ComPile — Advertising and marketing agencies.
Alibaba – An international marketplace of businesses looking for businesses.
Kompass — Business to business search engine.
GPO Access Economic Indicators — Gateway for economic indicators from January 1998 to present.
Government Printing Office — Big catalog of stuff published by the Government Printing office. Has business stuff but much much more. Environmental reports, legal docs, nature stuff. Hell, I typed in ‘mushroom’ and pulled up 34 entries.
Hoover’s — The Big Boy of info on businesses.
ThomasNet — Just an industrial product search directory.
SBA Loan Data — Loan program approval activity from the Small Business Administration.
GuideStar.org — A searchable database of non-profit organizations including 501c.
Slideshare.net – A searchable database for slides uploaded by crowdsourcing.

Consumer Engines

US Consumer Products Safety Commission Recalled Products — Listing of products, sortable by company name.
Melissa Data — Comprehensive directory of demographic data, sortable by ZIP code.
Kelley Blue Book — A  guide to pricing new and used vehicles.
Edmunds — A recognized and established guide to pricing new and used vehicles.
Consumer Reports — (commercial)  A trusted guide to product reviews, including autos, appliances, electronics, computers, personal finance, etc. I use it.

Find People & Background Checks

Pipl.com– for finding people
zabasearch.com – finding people
Intellus (commercial) – Finding people plus background checks on people and other features.
US Search (commercial) – Finding people plus background checks on people.
123 People (commercial) – A multi search engine built around finding people.
Integrascan – Finding people plus background checks on people.
State of Texas DOT Criminal Background Check – The central background check for felonies provided by the state. Most misdemeanours don’t show up.
socialcatfish.com – Has background check capability plus a photo reverse lookup. Deeper level of search for subscription.

Speciality Deep Web Engines

Infomine – comprehensive virtual library and reference tool for academics. But I’ve found it not too useful, better engines out there.
Archive.org – Huge behemoth of media now public domain – rare books, sound recordings, video, 20 year archived images of all old websites, and free audio books! Makes my top 10 list. (and my top 3)
WWW virtual library – a listing of indexes to industries. Need to know about Architecture? Biochemical war? Zoology? This may get you there.
FindArticles.com – FindArticles has articles from about 500 periodicals with coverage back to 1998, and is completely free of charge.
Library of Congress – loc.gov  – Phenomenal digitized archives, “American Memory” especially interesting. Includes a good newspaper archive.
National Security Archive – Declassified papers and such. In their words – “National Security Archive Electronic Briefing Books provide online access to critical declassified records on issues including U.S. national security, foreign policy, diplomatic and military history, intelligence policy, and more.  Updated frequently, the Electronic Briefing Books represent just a small sample of the documents in our published and unpublished collections.
www.osti.gov – Government research archives, if your tax dollars paid for it, the results are here. Also a huge collection of science presentation videos.
US Geologic Survey – Imagery and Maps galore. 3 portals to fetch data, EarthExplore, Glovis and Seamless. Extremely complex.  There are tutorials on how to get free aerial photos over at learninggis.com.
US National Map by USGS – The source for current geospatial data from the USGS.
http://adswww.harvard.edu/ – Physics and Astronomy data engine for academic papers
http://databank.worldbank.org/data/home.aspx  – Specialty statistical data on all kinds of subjects, from countries GDP to levels of blindness.
http://www.quandl.com/ – An awesome collection of 9,000,000 of financial, economic, and social datasets.

Cluster Analysis Engine

TouchGraph – A brilliant clustering tool that shows you relationships in your search results using a damn spiffy visualization. The smart way to use it, is to let it help you find new sources to your search topic. I have to add, the wiggly effect on the visualization is damn cool, just grab the center item and move it to understand what I’m talking about. (sometimes it doesn’t wiggle, however. Java issue?)
Yippy.com – A useful, non-graphical clustering of results. Give it 2 minutes of your time to understand how it works and it will give back hours of saved research time.
www.quintura.com – (appears down 12JUN15) An interesting data mining search engine that shows related words to your target. Good if you aren’t sure what the exact name of the subject is you seek
www.navagent.com/ – Not a web based search engine, requires you download software. Highly rated, very interesting especially to the 35F intel types.

Multi Search engines

Deeperweb.com – This is my favorite search engine. It breaks your results down into categories – general web, blogs, news, academic, cloud, metrics, research, etc. This allows you to quickly focus on the type of answer you were looking for.  Makes my top 10 websites!
Zuula.com – nice multi engine aggregator
Surfwax – They have a 2011 interface for rss and a 2009 interface I think is better. Takes 60 seconds to understand how to use it.
Dogpile – another multi engine aggregator
Scout Project- scout.wisc.edu — Since 1994, the Scout Project has focused on developing better tools and services for finding, filtering, and presenting online information and metadata.
www.findsmarter.com – You can filter the search by domain extension, or by topic which is quite neat. Sources Yahoo, Bing, Wiki, Blekko, and Alltheweb

Deep Web Search Engines

Where to start a deep web search is easy. You hit Google.com and when you brick wall it, you go to scholar.google.com which is the academic database of Google.
After you brick wall there, your true deep web search begins. You need to know something about your topic in order to choose the next tool. To be fair, some of these sites have improved their index-ability with Google and are now technically no longer Deep Web, rather kind-of-deep-web. However, there are only a few that have done so.  I recommend you use your browsers ‘search’ option to locate on this page your topic of interest, as the page has gotten long.
To all the 35F and 35G’s out there at Fort Huachuca and elsewhere, you will find some useful links here to hone in on your AO.

If you find a bad link, Comment the link below. I try to keep this up to date, but only with your help!

Last updated August 12, 2015

Deep problems in the deep web

When the Silk Road marketplace was shut down in October 2013, many felt the arrest of its owner Ross Ulbricht signaled the end of the dark market as means to sell illegal and unauthorised goods including counterfeits. The intervening months have shown this to be demonstrably not the case, with many more competing markets being launched, including a new and improved Silk Road 2.0.

Anonymous market place in the deep web
Dark market sites are not part of the regular, common-or garden-internet which most of us inhabit on a day to day basis as they can only be accessed through the Tor network.
The Tor anonymising network is a system of pseudo-anonymous networking, originally sponsored by the U.S. Naval Research Laboratory that allows users to access various internet resources such as web sites and forums with some degree of privacy. Tor also enables access to a number of hidden resources inaccessible to normal internet users. Commonly called “onion sites”1,
these locations feature content often excluded from the ‘clear net’.
Hidden onion sites on Tor are generally only accessible to those who have installed the Tor browser bundle2, a specially designed set of software which allows access to Tor through a modified version of Firefox. However, regular web users can take advantage of services such as tor2web.org and onion.to to access onion sites. These services act as a web-based proxy gateway to Tor and allow access to sites such as The Tor Directory and the Hidden Wiki3 (directories of many of the most popular services hosted via Tor) via a slightly amended URL4
However, it is vital to note that while using such methods provides simple access to onion sites, it does not provide any of the anonymity and protections that the full use of the Tor browser affords users. Using a service such as tor2web also places trust in the operator of the proxy. As such, any visits to the Tor network using a web-based proxy should be employed with caution (and indeed, a recent exploit of the Tor browser itself shows that anonymity cannot be guaranteed when using the network ).5
Browsing these sites can be something of a shock for the average web user, whose idea of living dangerously on the internet probably amounts to checking their Facebook feed while in a meeting with their boss. The world of Tor is a far darker place, with hit men offering to take out your unfaithful spouse, alongside drug dealers and pornographers. Throw in a healthy dash of scammers and hackers and five minutes with the Tor browser will convince you that you are not in Kansas anymore.
The primary means of carrying out transactions in the Tor world is through the transfer of Bitcoin, a decentralised crypto-currency that adds another layer of anonymity to proceedings.
It is perhaps unsurprising that such an environment is also an attractive potential market for counterfeiters. Using dark markets, such as Silk Road 2.0 or Hydra marketplace, sellers are able to advertise and sell a swathe of counterfeit products, with few of the risks associated with operating on the clear net.

Available in the deep web

A quick sweep of a few of these sites, turned up listings for openly counterfeit designer clothes, bags, sunglasses and watches, offered for a fraction of the price of the real item.
Watches and jewellery are readily available

Cigarettes and prescription style medication such as Viagra are also widely available on many dark market sites. These may come from grey market channels, or could be totally counterfeit and harmful to health.
Counterfeit drugs are a big problem

Other products available include counterfeit coupons offering huge discounts at a number of web and bricks and mortar stores, as well as – presumably stolen – memberships to online services such as Netflix, Hulu, or Xfinity Online.

While the quality of these products found was not tested, many users seemed happy with what’s on offer, providing feedback in the same way that a user of Ebay or Amazon might. Sellers are then able to build up trust and reputation on a site, a very important attribute when sellers are effectively untraceable and buying anything involves a significant risk of completely losing every penny spent should the seller disappear.
To manage this risk, many sites have implemented sophisticated systems of escrow, that do not release payments until the buyer is happy with the received product. Such systems have been very popular since they were developed and have significantly reduced the risk of buying materials from dark market sites.
For rights holders, the presence of counterfeit versions of their products pose obvious reputational risks, especially when featured alongside listings of illegal drugs or weapons that make up much of the rest of these dark market sites.
At present, the clear net still offers sufficient avenues for counterfeiters to sell their product on sites such as Aliexpress, DHgate and iOffer. However as enforcement actions against such sites become more common place, the unregulated dark markets will offer a potential refuge to those engaged in the sale of counterfeit goods.
The anonymous nature of the Tor network and Bitcoin transactions makes it far more difficult to shut down sites or investigate vendors than on the wider, public internet.
However, when infringing products are found on Tor, there is scope for a carefully designed system of test purchases to provide additional information and data on those offering  products through these illegitimate channels.

Deep Web Movie

Deep Web is a 2015 documentary film directed by Alex Winter, chronicling events surrounding Silk Road, Bitcoin and politics of the Dark Web.
Covering the trial of Ross Ulbricht, the documentary features interviews with Wired writer Andy Greenberg and developer Amir Taaki. Winter is best known on screen for playing Bill from the Bill & Ted film series; Deep Web features narration from his former co-star and Bitcoin enthusiast Keanu Reeves.  the film premiered at the 2015 South By Southwest film festival,[2] and aired on May 31, 2015, on the Epix network

Dig Into the Deep Web

Mention the “Deep Web” and most people will instantly associate it with the part of the Internet used for nefarious and illegal activities. For others, it is this inaccessible side of the Web, the one that requires a lot of technical skill and know-how to reach. Although these assumptions are somewhat correct, they only cover a small portion of the Deep Web as a whole.

Two sides of the coin
Anonymity is the main feature of the Deep Web, and there are plenty of people who would want to use and abuse that. For example, people who want to shield their communications from government surveillance may want to take refuge in darknets. Whistleblowers, like Edward Snowden, can share vast amounts of insider information to journalists without leaving a paper trail. Dissidents in restrictive regimes may need anonymity in order to safely let the world know what’s happening in their country.
On the flipside, those with malicious intentions can also greatly benefit from this anonymity. For example, drug sellers wouldn’t want to set up shop in an online location where law enforcement can easily determine their IP address. The same could be said for those engaged in other illegal activities like selling contraband and stolen goods.
Digging into the Deep Web
We decided to look further down the rabbit hole to get more information about the illegal activities and services offered in the Deep Web. To get information, we employed our system, called the Deep Web Analyzer (DeWa). DeWa is responsible for collecting URLs linked to the Deep Web, including TOR- and I2P-hidden sites and Freenet resource identifiers, and trying to extract relevant information tied to them like page content, links, email addresses, HTTP headers, and so on.
So far, we’ve collected more than 38 million events that account for 576,000 URLs, 244,000 of which bear actual HTML content.
DeWa also has a feature that alerts us if hidden services get a lot of traffic or if there is a large hike in number of sites. This is especially helpful in finding new malware families of cybercriminals who use TOR-hidden services to hide the more permanent parts of their infrastructures.
Cybercrime in the Deep Web
Among our observations was the fact that light drugs (read: cannabis) were the most-exchanged goods, followed by pharmaceutical products like Ritalin and Xanax, hard drugs, and even pirated games and online accounts.


The Deep Web is also home to Bitcoin and money-laundering services. Bitcoin offers a level of anonymity for users. As long as they don’t link their wallet code to their real identities, they are, to some extent, anonymous. Nonetheless, Bitcoin transactions are public, which means investigators can still examine them. Numerous services have sprouted in the Deep Web, offering to move Bitcoins through a network via micro transactions. Paying a handling fee will result in the customer getting the same amount of money but with the added bonus of having transactions that are harder to track or pin down.

The challenge of the Deep Web
Anonymity in the Deep Web will continue to raise a lot of issues and be a point of interest for both law enforcers and Internet users who want to circumvent government surveillance and intervention. Right now, there seems to be a race between “extreme libertarians” and law enforcement agencies, with the former trying to find new ways to become even more anonymous and untraceable.

Sunday, May 31, 2015

Did The #2 Largest Dark Net Market, BlackBank, Exit Scammed?

So, BlackBank market, one of the 3 current leading markets has been down for the past week or so for “security maintenance” (Does implementing a tumbler ring any sheep bells?)
The most recent news posted on Blackbanks’ sub Reddit by blackbank_team, one of the market support staffer, seems to indicate that the admin, MDparity is no longer communicating, a strong indicator that this might be another exit scam in a long line of markets who decided to vanish with their users funds – with evolution being the biggest so far, this is the Reddit thread posted by the support staffer:
I know, you’re afraid and i’m afraid too that mdparity will never ever come back
But to answer all of your questions
My messages here aren’t usually pgp signed, but there are only 2 persons who have credentials for this profile
I can’t believe mdparity has decided to exit scam now, if he has done it i’m astonished, but i believe he hasn’t done it, some might have happened to him, since he’s not answering my messages
I will give him until the first day of june before declaring BlackBank dead, so let’s wait toghether
MrDoe
Since many markets are currently experiencing Ddos attacks and are currently down, it might be an easy opportunity for market admins to disappear without anyone noticing until its too late.
To be clear – this is not a confirmed exit scammed, but it sure starting to look like one, so we will be following and updating.

Pandora Market: Scam or just Down?

I get the feeling that we are going to have to keep this image around:
We really wanted to report something about this case - but this is the only info
We really wanted to report something about this case – but this is the only info
We had some reports about Pandora market being down, both site and forum – probably again, “take the money and run” type of scam, we will follow and update if needed. it wont be a big surprise if it just stays that way.
We had few people mailing us, one comment left, we there was also a few people reporting about this in Reddit and in SR2 forums. Hopefully this will turn out to be false alarm.

Lets make this clear: Most of the (Tor) Deepweb Marketplaces turn out to be scam sites eventually – Silk Road1  & BMR  – were exceptions, people know that and try to take advantage of that – as it became well known that there is a lot of money to be made with scam markets – so use your common sense!

Silk Road Admin Ross Ulbricht (DPR) Sentenced to Life in Prison

The Silk road saga came to an end when Ross Ulbricht, the convicted founder of Silk Road, has been sentenced to life in prison for running the underground online drug bazaar Silk Road (1), signaling the government’s seriousness in combating Dark net markets.
Before the sentencing the parents of the victims of drug overdoses addressed the court. Ulbricht broke down in tears. “I never wanted that to happen,” he said. “I wish I could go back and convince myself to take a different path.”

New DeepWeb Site Offers Free Ransomware Creation

Not long we reported about a new market selling Zero day exploits, and it seems that exploits are becoming more common than ever on the deepweb. Recently a new site was launched and started offering free creation of ransomware – in exchange for 30% of the BTC profits made from ransoms. According to the site itself (toxicola7qwv37qj.onion):

What is Tox?
We developed a virus which, once opened in a Windows OS, encrypts all the files.
Once this process is completed, it displays a message asking to pay a ransom to a bitcoin address to unlock the files.
How do I make money with Tox?
You can subscribe (no mail or other shit needed) and create your virus. You will have to decide the ransom to unlock the files.
Once you have downloaded your virus, you have to infect people (yes, you can spam the same virus to more people). How? That’s your part. The most common practice to spam it as a mail attachment. If you decide to follow this method be sure to zip the file to prevent antivirus and antispam detection.
The most important part: the bitcoin paid by the victim will be credited to your account. We will just keep a 30% fee of the income, so if you specify a 100$ ransom, you will get 70$ and we’ll get 30$, isn’t this fair?
F.A.Q.
Are you serious?
Yes, why not? This is the best way for us to infect a lot of people and make a lot of money.
Am I safe?
Sure, as long as you use tor and don’t use personally identifiable information: we don’t need to know you, and you don’t need to know us. The only thing we’ll ask you is the bitcoin address to withdraw your part.
Are you going to steal my profit?
Nope, why should we? The best way for us to make money is having you helping us.
Then why aren’t you spreading the virus yourself?
We are! But with you, we’re going to have a bigger income.
Why is the file a .scr?
Because in this way people will not suspect anything (who knows what is a .scr?). If you wish, you can change it to .exe it’ll work the same.
How does the virus look?
Sexy. The virus has a .src extension (same as .exe files) and it has the icon of a word document, so the victim wont be suspecting anything.
Will you actually decrypt the files once the ransom is paid?
Yes, we will. We want people to trust us, so that more people will pay the ransom.
How dow I withdraw the money?
In the virus section you can monitor the status of all your viruses. When you have bitcoins to withdraw, just enter your address and press the Withdraw button
We did not take the ransomware to a test drive, but a blog post from mcafee.com shows exactly how it works. It was reported by other blogs that several anti virus softwares are able to detect the ransomware.


Bitcoin News Roundup - 31 May 2015

Recapping the week’s biggest Bitcoins stories from around the web.
The “Silk Road saga” is over, the founder of illegal online market Silk Road has been sentenced to life in prison without parole. US District Judge Katherine Forrest was not convinced that Silk Road was created “out of youthful naïveté.” On the top of the prison sentence, Ulbricht has to pay a fine of nearly $200 million.
Australia plans on making a criminal offense to informing people about the benefits of cryptography.
As Justin OConnell of CryptoCoins News reports, academics and cryptography researchers in Australia could face up to ten years imprisonment in the event of even lecturing on cryptography. According to Australian Department of Defense, “university researchers would need prior permission from a Minister at the DoD to communicate new research to foreign nationals or to publish in any research journals.”
Switzerland might consider establishing the first bitcoin bank. As Sarah Jenn of NewsBtc writes, according to Handelszeitung, Switzerland’s major newspaper, arrangements are in progress for a bitcoin bank to acquire the licenses to start operations.It is also confirmed by various sources in the financial industry that the Financial Market Supervisory Authority is aware of the project and the license application will be submitted with the forthcoming weeks.
Canadian universities are increasingly acknowledging the bitcoin potential and openly support the cryptocurrency technology. As JP Buntinx of Digital Money Times writes, students at Simon Fraser University are allowed to pay for their textbooks in bitcoin. Additionally, the campus provides three bitcoin ATMs.
Regulation
The American Bar Association (ABA) is hosting “Bitcoin and other Digital Currencies: Emerging Issues in Regulation and Enforcement” event. The event will take place on June 26that the Ritz-Carlton in Washington DC. As John WeruMaina of CryptoCoins News writes, the ABA plans to investigate the latest improvements in bitcoin compliance and regulation issues, including whether the digital currency should be regarded as money or as a commodity.
Taxes
New Jersey favors tax breaks for companies that embrace the bitcoin. As Katherine Fletcher of Coin Report writes, New Jersey Assemblymen Raj Mukherji and Gordon Johnson introduced a bill that would block municipalities from launching their own tax regulations on bitcoin. Registration with the Department of Banking of Insuranceis mandatory for the companies that operate in the cryptocurrency industry. Additionally, the bill includes incentives to attract more businesses to adopt the bitcoin and expand the use of the digital currency in New Jersey.
Payments
The Commonwealth Bank of Australia (CBA) joins forces with Ripple Labs. As Jeffrey Maxim of Bitcoin Magazine reports, CBA will capitalize on Ripple technology to expedite payments between its subsidiaries. The CBA has tested the cryptocurrency technology before taking the decision to explore the benefits of intrabank transfers using the Ripple protocols. According to CBA CIO David Whiteing “Bitcoin is a protocol which is now being replicated by non-asset based vendors like Ripple and others. We are about to launch using Ripple as a means to transfer payments between our subsidiaries.”
Bitstamp launches a new prepaid debit card. As Maria Santos of 99bitcoins writes, the London-based Bitcoin exchange has partnered with the payment processor AstroPay to enable Bitstamp’s clients to acquire debit cards in USD, Euros and/or GBP. The debit cards could loaded in fiat currency or in bitcoin and they will be available within the European Union.
ChainPay, the global bitcoin gateway partners with Payment Goblin to facilitate seamless bitcoin transactions. According to Bitcoinist.net, the partnership will enable the customers of Payment Goblin, the UK-based payment processor, to accept bitcoin by using its API. According to an announcement by Payment Goblin “Through this partnership, we hope to introduce merchants currently using traditional card payments to the benefits of digital currency.”

Saturday, April 25, 2015

New Sites to Explore in Deep Web

New Sites To Explore

Reddit user NekroTor is on a quest to reboot many of the Freedom Hosting sites that were taken down. On February 16th of this year, on his onion-routed blog, Nekrotown, he wrote, "2 days ago the BlackMarket Reloaded forum got seized. On the same day, the long-awaited Utopia Market was seized, which just goes to show that all the markets fucking suck these days except for Agora and TMP, and that you should just wait until BlackMarket Reloaded opens up again... eventually ...5 years later, no BMR."
NekroTor is correct in writing that most of the content right now on the Dark Web is not that great. On top of the fact that there used to be a wealth of sites for illegal black market interactions, there also used to be radio, books, blogs, political conversations, and even an Encyclopedia Dramatica that was a satirical culture-based wiki and is now laden with porn and pop-ups.
NekroTor created a new version of Hidden Wiki that has some functional links to audio and video streaming as well as some up-to-date forums for socializing and buying and selling. There are still a few image boards left, but the popular Onii-chan has the words "Well be back later" typed over spinning dildos.

Redditors Who Are Reaching Out For Deep Web Direction

After watching House of Cards, user TrelianScar turned to Reddit for guidance on how to navigate the Dark Web. TrelianScar is not alone. The Deep Web is making appearances in the media, in dinner conversations, and of course on Internet forums. One user jokingly writes to TrelianScar saying, "Wait till we send you an iPad. Then talk to the Dutch oil painting. Then await instructions," referencing HOC's unrealistic depiction of Deep Web interactions.
On a more serious note though, user Serbia_Strong writes, "What are you looking for first of all? Drugs? Guns? Assassins? Credit cards or counterfeit cash? I'd start your journey at the Hidden Wiki and then narrow in on your interests. I pretty much save every site I come across (you can't exactly just google them). Start at The Hidden Wiki and if you need any links just ask. Enjoy your descent into madness :)"
Another user, Dexter-Del-Rey explained a similar conundrum last week—he too is new to the Deep Web and wants some functional starter links. Redditor Ampernand writes back saying, "On the topic of torchan... here's a good piece on how it fell authored by the previous host. Currently torchan is hosted by someone that allows cp, gore etc, censors critics and doesn't give a flying fuck about the community. Effectively torchan has become exactly what it was trying to not be. Also, nntpchan is better." Ampernand links to NNTP-chan, which is a new forum replacing the image board Onii-chan.
New channels are popping up daily in the Deep Web. Currently, marketplace alternatives to Silk Road, Agora, and Pandora are the most frequented. Nonetheless, both TrelianScar and Dexter-Del-Rey were each respectively warned in their threads that the Dark Web is chock-full of scammers and is quite unlike its Hollywood depiction.
Interestingly, the Deep Web has lost much of its stigma over the past year and mainstream web services are experimenting with the platform even if they're not embracing it. In late October 2014, Facebook enabled Tor browser users to visit them anonymously, saying in a press release that "It’s important to us at Facebook to provide methods for people to use our site securely."

An Up-To-Date Layman's Guide To Accessing The Deep Web

If you binge-watched the second season of House of Cards, along with a reported 15% of Netflix's 44 million subscribers, you may be newly interested in the Deep Web. Slate has done a good job of describing what the Deep Web is and isn't, but they don't tell you how to get there.

How To Access The Deep Web

First: the hot sheets. Subreddit forums for DeepWeb, onions, and Tor are the way to go in terms of gathering a backgrounder for entry points into DarkNet. Unsurprisingly though, much of the information currently on the surface Internet about the actual underbelly of the web is outdated. Ever since Silk Road's takedown last year, the Under-web has been changing.
To get into the Deep Web these days, you first have to download the Tor add-on for Firefox. By downloading the Tor Browser Bundle from the Tor Project you are securing your anonymity to browse, which is the main draw for using Tor. Once you have downloaded the browser bundle, Tor builds a circuit of encrypted connections through a randomized relay. In layman's terms that means that your online activity is covered as Tor randomly pings your IP address from one place to the other, making whatever you do less traceable.
Multiple Redditors urge reading the Tor Project's warning page, where they discourage torrent file sharing and downloading while using Tor. The idea is to follow protocol maintaining your anonymity while browsing, chatting, or navigating. This obviously includes giving away your personal information like email addresses, phone numbers, names, time zones, or home addresses in any context.
The newest iteration of the Tor browser, Tor 4.0, was released in October 2014. It contains a variety of product tweaks designed primarily to enable use behind China's massive Internet firewall.
Other precautions include placing duct tape on your webcam, enabling your computer's firewall, and turning off cookies and JavaScript. Again, here is where you want to be completely free of an identity, so treading cautiously is key. The NSA and other government outlets peruse the Dark Web and onion sites frequently using cross-reference tools, malware, and remote administration tools to de-anonymize users engaging in illegal activity.
While the Deep Web houses the retail of weapons, drugs, and illicit erotica, there are also useful tools for journalists, researchers, or thrill seekers. It's also worth noting that mere access through Tor is not illegal but can arouse suspicion with the law. Illegal transactions usually begin on the Deep Web but those transactions quite often head elsewhere for retail, private dialoguing, or in-person meetups; that's how most people get caught by law enforcement officials.
For mobile users, several browsers exist which purport to—more or less—allow Tor to be used on an Android or iOS device. These browsers include OrWeb, Anonymous Browser Connect Tor, the mobile Firefox add-on, Onion Browser, and Red Onion. However, it is important to note that security concerns have been raised for all of these browsers and that anonymous browsing cannot be 100% guaranteed for any of these.

Where To Go Once You're On The Inside

After reading up on the material, downloading Tor, and logging out of every other application, you can finally open Tor's Browser Bundle to begin secure navigation. Network navigation is slow once you are inside because of the running relay, so expect pages to load at a snail's pace.
The most common suggestion on Reddit is to start at the "Hidden Wiki." The Hidden Wiki has a similar interface as Wikipedia and lists by category different sites to access depending on your interest. Categories include: Introduction Points, News/History, Commercial Services, Forums/Boards/Chans, and H/P/A/W/V/C (Hack, Phreak, Anarchy, Warez, Virus, Crack) just to name a few. Under each of these headings are multiple sites with an onion address and a brief description of what you will find there.
Many of the listed sites on the Hidden Wiki though have been taken down. Deep Web Tor, Tor Jump, Tor Answers, and Tor.info were all busts. When the feds took down Silk Road, many other sites also fell victim and/or are currently down for maintenance. Still, gun, drug, and child porn marketplaces operate even though they are on much smaller scales and with a fraction of the reach than that of Silk Road or Atlantis, another drug-peddling site.
Some pages are less nefarious, but arouse your curiosity nonetheless. StaTors.Net is the Twitter for Tor users and Hell Online is the antisocial network with 369 members and 15 different groups. Torchan resembles Reddit, though you need to enter the username and password torchan2 for access, and is still up and running. But recent activity except in Request and Random rooms has all but stopped.
In the Random room a user asked for a new link to Silk Road and the responses were limited. Another user posting an image of a child fully clothed featuring bare feet pleading for a site featuring underage bare feet. An Anonymous user responded: "Someone please give this guy a link, this poor guy has been looking/asking for over a month now."
One popular chat service is OnionChat, an anonymous Tor-based real-time chat room quasi-affiliated with the Onions subreddit. The project's code is available on GitHub as well.
The DeepWeb Link Directory in the site OnionDir had some promising hyperlinks and some not-so-promising ones like the now defunct Deep Web Radio and a blog claiming to be a Deep Web blog but was actually just stories dedicated to spanking.
The New Yorker Strongbox is a secure transmission for writers and editors where I was given the code name: riddle yeah abreacts murgeoning. Through a given codename you can submit a message and/or file to the New Yorker's editorial staff. Mike Tigas, a news application developer for ProPublica, has a functioning blog in the Deep Web but has not posted anything new for some time, which was true for many other blogs as well

Digging Below the Surface

Fortunately, you can uncover this wealth of information by using specialized tools designed to mine databases. For instance, let's say you want to buy a used copy of "Alice in Wonderland." How would you find it? Searching on eBay or Amazon.com--essentially querying their databases--will be more fruitful than using Yahoo! or Google. The same goes for job hunting. Since job postings are stored in a database, most search engines can't find them; searching sites like Craigslist or Monster is a better way to go.
The secret to successful searching is to understand what you want to know, and then using the right Web resource to find it. Ask yourself these questions:
  • Is the information time-sensitive, such as stock quotes or newspaper articles?
  • Are you looking for a photo or a video clip?
  • Do you want to find an MP3 music file or listen to a podcast?
  • Are you searching for specific types of content, such as blogs?
If the answer is "yes," then try using the tools listed in the chart below. And when you find ones that you like, be sure to bookmark them for future use.
Tools for Mining the Deep Web
To find... Try using...
Audio and Music Files
Blogs
Databases
News
Newsgroup & Groups
Photos and Graphic Images
Podcasts
RSS feeds
Sound Effects
Video

Mining the Deep Web

Although search engines like Yahoo!, Bing and Google index billions of web pages and other electronic documents, this represents only a tiny part of the total information available on the World Wide Web. To unearth the buried treasure, you have to understand how to mine the data.
Two Layers of Data Think of the Web as having two layers: a shallow surface and an almost bottomless, deep level. In the top layer, the Surface Web, you will find all the web pages like the one that you're now reading. This page and others like it have fixed web addresses or URLs (in this case, http://www.learnthenet.com/how-to/search-the-deep-web). Also, the information contained in the page doesn't change very often.
The Deep Web contains pages with dynamic content--data that changes frequently and can't be indexed easily by search engines. Most of this information is stored in databases and is assembled "on the fly" when you query the database. For instance, when you search for an item on eBay, information is pulled from eBay's database and instantly assembled on a web page for you. That page did not exist until you performed your search, which is what makes it dynamic; it was customized in response to your query. Because of this fact, search engines can't readily index this information.
Other types of "deep" information include:
  • Multimedia (audio, music and video)
  • Photos and graphics
  • Job listings
  • Financial data (stock and bond prices, currency rates)
  • News
  • Travel-related data (airline and train schedules)
  • Information on sites that require passwords

Thursday, April 2, 2015

NSF's DarkWeb Life imitates Art

The National Science Foundation (NSF) is funding the University of Arizona in developing a project they call the Dark Web to track down terrorists on the net.
When I read the NSF press release that my friend Randy A. pointed out to me, I could have sworn some of it was describing chapters of The Dark Net.


"They can put booby-traps in their Web forums," Chen explains, "and the spider can bring back viruses to our machines." This online cat-and-mouse game means Dark Web must be constantly vigilant against these and other counter-measures deployed by the terrorists.

Dark Web's capabilities are also being used to study the online presence of extremist groups and other social movement organizations. Chen sees applications for this Web mining approach for other academic fields.

"What we are doing is using this to study societal change," Chen says. "Evidence of this change is appearing online, and computational science can help other disciplines better understand this change."

Cyber Attack blows up a Generator

CNN is reporting that the Department of Homeland Security managed to blow up an electrical generator in a simulated cyber attack. It's a vivid demonstration of how the growing dependence on networked control systems links virtual world actions with real world effects.

This shouldn't really surprise anyone. Power grids are already too complex and interconnected to be controlled in any way other than by remote networked systems. Heck, pilots don't really fly jets much anymore - they just use the stick to tell the computer to take the plane in a particular direction. In fact, I doubt planes will even have pilots in 50 years, they'll be just like the automated trams that already haul people around on the ground at airports.

I can currently monitor my home through a web cam, and it won't be long before I have the ability to turn on the lights remotely and crank the air conditioning or heat from the office so things will be nice an comfy when I get home. Someday, I imagine someone could hack my house and do all sorts of annoying things. And if someone were to hack a plane, train, hydroelectric plant, or a nuclear power plant, things could get bad pretty quick.

The experts in the CNN story say that "a lot of the risk has already been taken off the table, " by finding ways to prevent the transformer hacks, but that it could take months to fix them all. That means our power grids are suffering from a classic zero day vulnerability. That is, the powers-that-be have publicly pointed out the flaw and announced fix, but anyone with the motivation has plenty of time to find unprotected systems to attack.

An expert interviewed on CNN claims that shutting down power to 1/3 of the country would have the economic and social devastation comparable to the nation being simultaneously hit by 40-50 major hurricanes.

Will there be an attack? Probably not. On the other hand, this is just one vulnerability. No doubt every networked machine or system, just like every networked computer, will eventually face similar threats.

Dark Net turns deadly in Japan

The Japanese news site Daily Yomiuri is reporting that a woman was murdered in a robbery concocted with the aid of dark Web sites set up to help criminals find accomplices.

Kenji Kawagishi, and unemployed 40 year-old man in Aichi Prefecture, sent messages from his cell phone to the "Dark Employment Security Web," which hooked him up with two other men who were also hard-up for cash. Tsukasa Kanda, a 36 year-old sales agent for the Japanese newspaper Asahi Shimbun, and Yoshitomo Hori, an unemployed man of 32, joined with Kawagishi in kidnapping Rie Isogai while she was on her way home from work. The men robbed her of 70,000 yen (about $600), murdered her and dumper her in the woods of Mizunami, Gifu Prefecture.

The Dark Employment Security Web has been closed, but the Japanese authorities say there's no way to know how many more are out there. Although the police shut them down as soon as they learn of the criminal equivalents of MySpace, new sites replace the deleted ones almost immediately.

Computing with Heat

 Researchers in Singapore have shown, in principle at least, that it will soon be possible to create thermal logic gates, including AND, OR, and NOT gates. Once you have all those pieces, you've got the basic ingredients of a computer that runs directly on heat, with no need for electricity at all.

Lei Wang and Baowen Li of the National University of Singapore propose that their logic gates could soon be built of recently developed thermal transistors or related designs, which control heat flow in the same way that conventional transistors control electricity.

A thermal transistor turns on or off depending on whether the temperature at its input gate is above or below a critical temperature. Constant temperature heat baths would take the place of power supplies in operating the thermal transistors and logic gates. In theory, any heat source could be used to run a thermal computer - sunlight, the heat from a campfire, etc.

In addition to proving that thermal gates can perform all the basic functions of electronic gates, the authors of the research soon to be published in the journal Physical Review Letters point out that the work may also help us to understand the complex heat flow in biological cells and systems in terms of thermal logic.

To get a look at the research before it's officially published, you can download a preprint of paper from the online science archives.

The World's Most Sophisticated Malware Ever Infects Hard Drive Firmware

High-tech "Equation group" is likely connected to NSA

 

 here's a new malware king on the block. Security researchers at Moscow-based Kaspersky Labs have uncovered a sophisticated suite of software packages that stem from what it calls the "Equation" group, a single cluster of unidentified hackers dating back to 2001.
A few things point to involvement by the U.S. intelligence apparatus: the complexity of the software; the groups and organizations targeted by the code; and similarities with known malware like Regin, Stuxnet, and software mentioned in documents from Edward Snowden. It's most likely the work of the National Security Agency (NSA), but Kaspersky doesn't explicitly draw that connection.

The malware can rewrite the firmware of hard drives--i.e. the very software that controls a device--making it virtually impossible to detect, let alone remove.

What makes Equation's work so impressive is the lengths to which it will go to infect target computers. In a never-before-seen capability, its malware can rewrite the firmware of hard drives--i.e. the software on the devices that controls them--making it virtually impossible to detect, let alone remove. Such an exploit would require access to private source code from hard-drive makers, though several of those companies denied to Reuters any knowledge or involvement.
The Equation group might also use a technique called "interdiction," in which they intercept mailed goods and replace them with infected versions; in one instance, Kaspersky learned CDs mailed to attendees of a scientific conference were replaced with versions containing one of Equation's Trojan horse programs.
The news has the feel of some dark web, Big Brother-esque conspiracy, but does this directly impact you, the average computer user? Probably not. For one thing, the Equation group's software appears to be highly targeted. It uses what's called an "escalation model:" a Trojan horse first determines whether or not the target is of interest before installing more invasive software. Much of the malware is also designed to self-destruct after a period of inactivity--no doubt intended to cover its tracks. But in one particular exploit of an online forum, Equation's exploit went out of its way not to track or infect unregistered users, targeting only those who were logged in.
Even if you are concerned about being infected by the Equation group's malware, there's little to be done about it at present. The software is so sophisticated that techniques to remove it don't yet exist--but we expect Kaspersky and other vendors will work to identify those methods.

Most Of The Web Is Invisible To Google. Here's What It Contains

You thought you knew the Internet. But sites such as Facebook, Amazon, and Instagram are just the surface. There’s a whole other world out there: the Deep Web.
It’s a place where online information is password protected, trapped behind paywalls, or requires special software to access—and it’s massive. By some estimates, it is 500 times larger than the surface Web that most people search every day. Yet it’s almost completely out of sight. According to a study published in Nature, Google indexes no more than 16 percent of the surface Web and misses all of the Deep Web. Any given search turns up just 0.03 percent of the information that exists online (one in 3,000 pages). It’s like fishing in the top two feet of the ocean—you miss the virtual Mariana Trench below.
Much of the Deep Web’s unindexed material lies in mundane data­bases such as LexisNexis or the rolls of the U.S. Patent Office. But like a Russian matryoshka doll, the Deep Web contains a further hidden world, a smaller but significant community where malicious actors unite in common purpose for ill. Welcome to the Dark Web, sometimes called the Darknet, a vast digital underground where hackers, gangsters, terrorists, and pedophiles come to ply their trade. What follows is but a cursory sampling of the goods and services available from within the darkest recesses of the Internet.

Things You Can Buy

1. Drugs
Individual or dealer-level quantities of illicit and prescription drugs of every type are available in the digital underground. The Silk Road, the now-shuttered drug superstore, did $200 million of business in 28 months.
2. Counterfeit Currency
Fake money varies widely in quality and cost, but euros, pounds, and yen are all available. Six hundred dollars gets you $2,500 in counterfeit U.S. notes, promised to pass the typical pen and ultraviolet-light tests.
3. Forged Papers
Passports, driver’s licenses, citizenship papers, fake IDs, college diplomas, immigration documents, and even diplomatic ID cards are available on illicit marketplaces such as Onion Identity Services. A U.S. driver’s license costs approximately $200, while passports from the U.S. or U.K. sell for a few thousand bucks.
4. Firearms, Ammunition, and Explosives
Weapons such as handguns and C4 explosives are procurable on the Dark Web. Vendors ship their products in specially shielded packages to avoid x-rays or send weapons components hidden in toys, musical instruments, or electronics.
5. Hitmen
Service providers—including a firm named for the H.P. Lovecraft monster C’thulhu—advertise “permanent solutions to common problems.” For everything from private grudges to political assassinations, these hired guns accept bitcoin as payment and provide photographic proof of the deed.
6. Human Organs
In the darker corners of the Dark Web, a vibrant and gruesome black market for live organs thrives. Kidneys may fetch $200,000, hearts $120,000, livers $150,000, and a pair of eyeballs $1,500.

Things That Make Internet Crime Work

1. Cryptocurrency
Digital cash, such as bitcoin and darkcoin, and the payment system Liberty Reserve provide a convenient system for users to spend money online while keeping their real-world identities hidden.
2. Bulletproof Web-hosting Services
Some Web hosts in places such as Russia or Ukraine welcome all content, make no attempts to learn their customers’ true identities, accept anonymous payments in bitcoin, and routinely ignore subpoena requests from law enforcement.

Bitcoins
via BitcoinTalk
Cryptocurrencies such as Bitcoin help keep the deep web in business.
3. Cloud Computing
By hosting their criminal malware with reputable firms, hackers are much less likely to see their traffic blocked by security systems. A recent study suggested that 16 percent of the world’s malware and cyberattack distribution channels originated in the Amazon Cloud.
4. Crimeware
Less skilled criminals can buy all the tools they need to identify system vulnerabilities, commit identity theft, compromise servers, and steal data. It was a hacker with just such a tool kit who invaded Target’s point-of-sale system in 2013.
5. Hackers For Hire
Organized cybercrime syndicates outsource hackers-for-hire. China's Hidden Lynx group boasts up to 100 professional cyberthieves, some of whom are known to have penetrated systems at Google, Adobe, and Lockheed Martin.
6. Multilingual Crime Call Centers
Employees will play any duplicitous role you would like, such as providing job and educational references, initiating wire transfers, and unblocking hacked accounts. Calls cost around $10.

How to Access the Dark Web’s Wares

Anonymizing Browser
Tor—short for The Onion Router—is one of several software programs that provide a gateway to the Dark Web. Tor reroutes signals across 6,000 servers to hide a page request’s origin, making clicks on illicit material nearly impossible for law enforcement to trace. It uses secret pages with .onion suffixes—rather than .com—which are only accessible with a Tor browser.
Secret Search Engines
In mid-2014, a hacker created Grams, the Dark Web’s first distributed search engine. Grams allows would-be criminals to search for drugs, guns, and stolen bank accounts across multiple hidden sites. It even includes an "I’m Feeling Lucky" button and targeted ads where drug dealers compete for clicks.

Criminal Wikis
Carefully organized wikis list hidden sites by category, such as Hacks, Markets, Viruses, and Drugs. Descriptions of each link help curious newcomers find their desired illicit items.
Hidden Chatrooms
Just as in the real world, online criminals looking to obtain the most felonious material must be vouched for before they can transact. A network of invitation-only chatrooms and forums, hidden behind unlisted alphanumeric Web addresses, provides access to the most criminal of circles.
This article was adapted from Marc Goodman’s book Future Crimes, which was published in February. It originally appeared in the April 2015 issue of Popular Science, under the title "The Dark Web Revealed.” All text © 2015 Marc Goodman, published by arrangement with Doubleday, an imprint of The Knopf Doubleday Publishing Group, a division of Penguin Random House LLC.

Tuesday, March 24, 2015

PayPal Announces First Partnerships in Bitcoin Space

PayPal has announced partnerships with three major payment processors in the bitcoin space – BitPay, Coinbase and GoCoin.
Though the online e-commerce pioneer stopped short of integrating bitcoin into its digital wallet or payment processing services directly, the move marks PayPal's first formal offering to the bitcoin community.
In a blog post penned by senior director of corporate strategy Scott Ellison, PayPal revealed that online merchants will now be able to accept bitcoin via all three companies through its PayPal Payments Hub, its product that enables customers to accept credit cards, mobile carrier payments and other payment methods through a single integration.
Ellison lauded BitPay, Coinbase and GoCoin for their commitment to ensuring consumer protections on their platforms, while suggesting that the offering will appeal to a number of its key customer groups, writing:
"We believe digital goods merchants will be excited to work with these industry-leading companies to sell ringtones, games and music and get paid with bitcoin."
Notably, the announcement follows the decision of PayPal subsidiary Braintree to partner with Coinbase earlier this month.
PayPal is available in 193 markets and 26 currencies. With 143 million active registered accounts and $6.6bn in revenue at the end of 2013, the e-commerce giant brings the potential for new users and new business to the bitcoin economy.

Embracing innovation

Ellison went on to suggest that PayPal is committed to embracing innovation, and that this has lead to its early support of bitcoin. Further, he suggested the company will be monitoring its first formal bitcoin trial to assess how it moves forward with the payment method, writing:
"We’re proceeding gradually, supporting bitcoin in some ways today and holding off on other ways until we see how things develop."
PayPal cited its commitment to allowing businesses freedom of choice and promoting safer buying experiences as key reasons for its decision.
BitPay, Coinbase and GoCoin will pay a referral fee to PayPal for new business they gain through the platform, meaning their existing pricing structures will be unaffected by the move.

Wednesday, March 18, 2015

How To Buy Bitcoins With Your Credit Card Part Two

CoinMama

CoinMama offers its services worldwide including the US. Instantly buy bitcoin using credit/debit card. Users can also use cash to purchase via Western Union and MoneyGram. With over 2 years of reputation, CoinMama is known for its fast straight forward services.

CoinMX

CoinMX - Accepts worldwide users (mainly from the US). you can use your credit card to fund your CoinMX account and buy BTC or LTC currencies. Requires verification of identity by sending a video holding a government issued ID (e.g. passport) to the site.

Cryptonit

Cryptonit.net allows you to make deposits in USD and EUR using Paypal. After you deposit USD/EUR you can trade it to BTC. In order to deposit via Paypal you must pass verification procedure: you will have to provide a set of documents and pass a video interview. Cryptonit has Paypal deposits enabled since October 2013. Daily deposit limits via paypal are 300 USD/EUR. It is important that you deposit Cryptonit account using your Paypal balance but not a credit card.

Indacoin

Indacoin.com Indacoin is a global platform that lets people from all over the world buy bitcoins with a credit or debit card. We have clients from the US, Canada, UK, Germany, France, Russia, Ukraine, Spain, Italy, Poland, Turkey, Australia, Japan and many others. Live chat is also available for our customers.The verification is extremely simple: you need to enter a code from the bank statement and a code from the sms. It won't take more than 15-20 minutes.

MeetPays

MeetPays is a Spanish Startup that provides secure and comfortable tools to buy bitcoins instantly anywhere, anytime.

Trucoin.com

Trucoin - allows users to buy Bitcoin with credit and debit cards. Trucoin is the first properly licensed money service business to offer this service and serves U.S. customers in Alabama, Arizona, Arkansas, American Samoa, Connecticut, District of Columbia, Florida, Georgia, Idaho, Kansas, Kentucky, Maine, Massachusetts, Michigan, Minnesota, Mississippi, Montana, Nebraska, New Jersey, New Mexico, North Dakota, Oregon, Rhode Island, South Carolina, South Dakota, Texas, Wake Island, West Virginia, and Wyoming, with more states and worldwide locations coming soon.

Virwox

The Virtual World Exchange also known as VirWox allows you to buy SLL (Second life Lindens) with all major credit cards which you can then exchange to Bitcoins on VirWox itself. The process is done through the use of Paypal, so every credit card which Paypal accepts is eligible to be used in this process.

Avoiding Scams

Before using any service it is a good idea to look for reviews and feedback from previous customers. This can be done by simply googling the name of the website or company. The bitcointalk forums are also a good place to find discussions and reviews about services. As far as we know, these are the only two services that can reliably be used to buy bitcoins with your credit card.

How To Buy Bitcoins With Your Credit Card

Intro

While it is risky for sellers to offer this option, some services now will allow you to buy bitcoins with your credit card. However, that does not mean it is entirely risk free, if you are from Asia or Africa your funds may be frozen by credit card payment processors for further inspection due to the large amounts of fraud that come from those continents.
Note: If you only want to take advantage of Bitcoin's price volatility You can trade CFDs on Bitcoin via a credit card on sites like AvaTrade or Plus500. When trading online your capital may be at risk. Trading CFDs is suitable for more experienced traders.


247exchange

247exchange.com allows to buy Bitcoin with credit and debit cards. Visa, MasterCard, Maestro, Visa Electron supported. All kinds of cards, including the prepaid ones, accepted. Different currencies - USD, EUR, GBP - offered. Secure service having a license for financial activity and PCI compliance certification. Requires user verification (to avoid fraudulent transactions). Currently the service doesn't work with users from USA and Canada (it requires to have the additional licenses which the company plans to get in 2015-16).

BitcoinGiftCard.org

"Bitcoin Gift Card" allows customers from around the world to purchase Bitcoin gift cards & pay by credit card through PayPal. Gift cards are shipped to a physical address provided by the customer, so it can take 2 or 3 days to get your Bitcoins in the US & Canada or up to 1 week outside of North America.

Bitcoin Insanity

Bitcoin Insanity offers multiple payment methods, making purchasing bitcoins a breeze. They accept all major credit cards, PayPal, bank wires, and cashiers checks. Payment is done either through Paypal's terminal or Mijireh Checkout.

BitSource.org

BitSource.org - BitSource - BitSource now accepts all major credit cards (Visa, Mastercard, Discover, American Express) and ACH account funding options. Be sure to read the FAQ before depositing.

Bittylicious

Bittylicious allows users in Europe (E.E.A.) to buy bitcoins using a credit or debit card, as long as the card is 3D Secure enabled. Users need to validate ID before purchasing.

Brawker

Brawker is a platform where bitcoin owners can order anything they want on the Internet and have it paid by someone else in fiat money who will then take the bitcoins in exchange. Bitcoin owners can order anything they want on the Internet and get a 6% cash back on their purchase. People interested in buying bitcoins can do so by fulfilling someone else's order with their credit card or Paypal account and obtain the equivalent amount in bitcoins.

CC2BTC

CC2BTC.NET allows users from anywhere in the world to buy Bitcoin vouchers with Credit Card. Voucher issued instantly, but the "unlock" code is mailed by priority mail. Payments will transact over Stripe

CEX.IO

CEX.IO Bitcoin Exchange allows users to buy Bitcoins for USD or EUR with payment card (credit/debit card, prepaid card, etc.) or wire transfer and withdraw earnings at one place. Deposits in USD and EUR available. On October, 2014 CEX.IO enabled EUR deposits via SEPA and claimed to benefit its users with lower fees.

CleverCoin.com

CleverCoin Bitcoin Exchange based in The Netherlands that allows user to buy, sell and store bitcoins for EUR. Payment options are iDEAL, SEPA and credit cards (VISA and MasterCard).