Proceedings of the 3rd International Conference on Advanced Information Science and System 2021
DOI: 10.1145/3503047.3503082
|View full text |Cite
|
Sign up to set email alerts
|

A Framework of Darknet Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…This method can assist in determining if the vendor has overtly sold fentanyl in the past and allow investigators to gauge whether it is probable that they have shifted to covert listings using code words. Moreover, the eventual seizure and forensic disk examination of computer equipment from fentanyl vendors are of high value, can confirm Tor browsing [94] and DNM activity [95], and data can be matched to databases compiled from the data scraping. This comparison allows law enforcement to link specific PGP encryption keys to specific dealers, allowing attribution of the dealers' volume and variety of drug listings, via their involvement in a specific DNM.…”
Section: Discussionmentioning
confidence: 99%
“…This method can assist in determining if the vendor has overtly sold fentanyl in the past and allow investigators to gauge whether it is probable that they have shifted to covert listings using code words. Moreover, the eventual seizure and forensic disk examination of computer equipment from fentanyl vendors are of high value, can confirm Tor browsing [94] and DNM activity [95], and data can be matched to databases compiled from the data scraping. This comparison allows law enforcement to link specific PGP encryption keys to specific dealers, allowing attribution of the dealers' volume and variety of drug listings, via their involvement in a specific DNM.…”
Section: Discussionmentioning
confidence: 99%
“…However, some have made an effort to map this out. According to [2,14] research journals, browser forensic examinations focus on performing more conventional operations on the computer, such as database, RAM, network forensics, and registry. In contrast, dark web forensics should consolidate two fundamental areas: forensics connected to TOR activities and forensics linked to Bitcoin transactions [16].…”
Section: The Landscape Of Dark and Deep Web Forensicsmentioning
confidence: 99%
“…In contrast to the previous report, which was not simple, the entire report has numerous figures and tables that demonstrate the tests being conducted. The most helpful report was found as a result of this; it was a doctoral dissertation submitted to Dakota State University which focused on finding any dark web artefacts on a machine and creating a framework around this [14]. The depth of information in the report extends beyond the scope of this one.…”
Section: Browsing Artefactsmentioning
confidence: 99%
See 1 more Smart Citation