Deep Web
Secrecy and Security
By Conrad Jaeger
*
Published byDeep Web Guides at Smashwords
Copyright DeepWeb Guides 2012
ISBN:9781476251172
v 3:0
Deep WebGuides 2013
UpdatedNovember 2015
www.deepwebguides.com
Disclaimer
This book is for educational purposes only. In no wayis it the intention of the author, publishers or distributors toencourage anyone to do anything illegal. The author, publishers anddistributors accept no liability for anything that happens in anyway connected with the reading, possession or use of this book.
Dont even think about it.
Table of Contents
TakingControl
Entering Pioneer Territory
Going Down
A technical aside
TheFamily
Browser
Search Engines
Email
Virus
System Security
Software
Shred
Keep it simple
Smartphone
Downloading
Photos
TheBlogger
TheWhistle Blower
The Campaigner
Using Hidden Networks
First Steps
Using Tor
Entry Points
DeepSearch Engines
Hidden Service lists
Marketplace Drugs
Hosting
Blogs
Forums and Chans
Political
Hacking
Warez
Non-English
TheToolkit
Portable Access
Free Portable Apps
Setting up Secure Comms
Email
Bitmessage
Secret Messaging
EvenDeeper
Encryption and Cryptography
PGPPublic Key Cryptography
DiscEncryption/Erasure
Free EncryptionSoftware
Free Data Shredding Software
Steganography hiding things insidethings
Transferring Secret Data
Downloading
Uploading
Hosting, Storing &Sharing
12. Smartphones
13. UsenetNewsgroups
Producing videos and stills
BasicComputer Security
Avoiding Viruses, Trojans and Spyware
Recommended Free Programs
Whats Running Now?
Zero Emission Pads
Windows OS
Windows SecurityCenter
Pagefile/Swapfile
Hibernation
Alternative Software
Cleaning Up
Erasing History
DeepCurrency
Part 2 Deep Search
FreeUpdates
Other Books by DeepWeb Guides
Why We Need Worry
Major threats come not from the NationalSecurity Agency or Britains spy agency GCHQ but fromcyber-criminals, business competitors, law firms, debt collectors,private investigators, stalkers and malicious trolls.
From the word go, we should all be alert tothe dangers of the digital world. In the same way that children aremade fearful of strangers and taught how to cross the road, weshould all have cyber-safety drilled into us. The risks areeverywhere and everybody is at risk.
Everybody under the age of 20 has grown upwith the Internet but many fail to comprehend the dangers ofopening their lives to all and sundry. Adults who give it anythought tend at best to install some anti-spyware and leave it atthat. Few understand the depth of the risks or appreciate just howmany people out there are out to get them.
Cyber-Criminals
These days the streets are safer because somany criminals are migrating to digital and launching attacks fromthe comfort of their own homes.
If they havent got the necessary skills,they can easily hire someone that has. There are hackers offeringthe complete service from gaining access to a Google account, tostuffing a targets computer with images of child sexual abuse andthen anonymously tipping off the police.
Increasingly, as better counter-spy toolscome on the market, the bad guys are targeting the weakest link inthe chain: the Human. They do this by so-called SocialEngineering, the art of making people do what they want them todo, from opening an infected attachment, to following a link onTwitter to a malicious website.
There are no limits to the forms this cantake. Most professional con-artists now work online full time. Theytug at the heart strings on dating sites, they offer amazingbargains, and they can pretend to be you in a crisis; imploring thefriends in your contact book to send money urgently.
You might follow a link and take onboard aDrive-By Download, a malicious program delivered in the same wayas a regular cookie. The more sophisticated Watering Hole Attacksplant the malicious download in an advertising banner on alegitimate site. As soon as the page loads, the visiting device isinfected.
The fastest growth-area for cyber-criminalsis mobile. The smartphone is the finest tracking device everdevised. It can show where you are now and where you have been. Itcontains all your appointments, past and present, all your friendsand private conversations. They can see what interests you, whatyou watch, buy and download, and they can turn on the camera andwatch you.
Malicious programs enter the device viaattachments, downloads, phony updates and even by simply viewing animage that automatically launches malware. Additionally, someonewith access to the device can download and install a spy programthat runs secretly in the background.
Even at the lowest level, the apps wedownload can be downright dangerous. Apps are dirt cheap or freebecause the developers make their money by letting in theadvertising networks and criminals. It is true when they say Ifyoure not paying, youre the product.
Malicious apps have been found on iTunes andthe Google App Store, and spyware has been found hidden withinanti-spyware apps. There are apps that seek out financialtransactions, others that suck up all the photos and look forpoints of blackmail.
A criminal may take possession of yourdevices and plant a Botnet which then runs unobtrusively to minedigital currencies like the BitCoin for somebody elses benefit. Others simply makecalls to premium rate numbers and rack up your bill.
Business Competitors
All large corporations employ their ownIntelligence agents. They want to know what their competitors areup to, they want to know what is being said about them, and theywant to know if anyone is selling secrets.
But its not just the big boys; today anysize business can employ the tools and techniques of a master-spyagency. Mobile communications can be intercepted. Key-strokeslogged. Confidential reports copied. Staff monitored. Customerspoached.
The business may employ a hot IT guy, butthe criminal will always find a backdoor. A hacker employing socialengineering skills may surreptitiously drop a USB thumb drivemarked Private in the hope that an inquisitive employee will slotit into an office machine to take a look. Result: instantinfection. A CEO may be targeted via his outside interests and away found into his phone or laptop.
Conversely, many companies inadvertentlypost confidential information online that can easily be retrievedby those that know how (see Deep Search ).
Stalkers
Its no longer necessary to hide in thebushes when todays stalker can sip a latte at Caf Nero and followmultiple victims in real time via the free Wi-Fi.
Download for free the suitably-named Creepy surveillancetool and you can keep close tabs on any active Twitter or Instagramuser, following them on a map, seeing who they meet and much else.Conversely, acquire the victims Google log-in and see theirlocation history on Google Maps to follow their every move.
Or borrow someones phone for a few minutesand secretly install a subscription-based surveillance packageallowing the stalker to follow the GPS signal, listen in onconversations, read text and emails, examine images, videos andSkype calls, check Web habits, log passwords, block callers oroutgoing numbers, and activate the microphone and camera. Packagesstart at just US$49 a month.