Investigation and Surveillance on the Darknet – A Secure Architecture to Reconcile Legal Aspects with Technology

Abstract:

Regarding efficient forensics and police activities, legalities often limit the ability to respond with technical action. Things that are technically feasible may be legally forbidden and must comply with a rigorous legal framework. This paper discusses a project of highly secure architecture that enables anyone to take part in the surveillance of the Darknet while complying with all the known legal constraints. Sensitive data collected cannot be accessed by single inves-tigators but by means of a secret sharing scheme. The tools used also succeed in bypassing most website/hidden services securities, such as banishment by IP address or crawler traps.


AUTHORS

Photo of Maxence Delong

ESIEA (C + V)O Lab Laval,
France

Maxence Delong is a PhD student at ENSAM for (C + V)O Laboratory. His researches are mainly focused on distributed networks, anonymous communications, and blockchain technology. He also works in Open Source INTelligence, design tools for automatic, large-scale data gathering and data analysis. He has already made conferences including ICCWS, ECCWS, FORSE, and C0c0n XII.

 

Photo of Eric Filiol

ENSIBS Vannes,
France

Eric Filiol is an Associate Professor at ENSIBS, Vannes, an Associate Professor at CNAM, Paris, an associate professor at Moscow’s HSE University in the field of information and systems security and a senior consultant in cybersecurity and intelligence. He directed the research of the ESIEA group and its cybersecurity laboratory for 12 years. He spent 22 years in the French Army (Infantry/Marine Groups). He holds an engineering degree in cryptology, a doctorate in applied mathematics and computer science from the École Polytechnique and an authorisation to conduct research (HDR) in information from the University of Rennes. He holds several NATO intelligence certifications. He is the editor-in-chief of the Journal in Computer Virology and Hacking Techniques published by Springer. He regularly presents at international conferences in the field of security (Black Hat, CCC, CanSecWest, PacSec, Hack.lu, Brucon, H2HC...). He enjoys walking and hiking and playing the bass guitar (jazz).

Photo of Baptiste David

ESIEA (C + V)O LabLaval,
France

Baptiste David is a PhD student at ENSAM for (C + V)o Laboratory. His research is mainly focused on malware analysis, security under Windows operating system, networks, kernel development, and vulnerabilities. He also works in data analysis and design of automatic tools to collect and manage big data. He likes to teach and share knowledge with anyone who asks. He has already participated in several conferences including iAWACS, C0c0n, Ground Zero Summit, EICAR, ECCWS, Defcon, ZeroNight.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com