Presentation about dark web
the introduction, description, model, graphical
Size: 1.6 MB
Language: en
Added: Sep 03, 2024
Slides: 21 pages
Slide Content
Student Name Student ID Nuruddin Bin Razali 6191000051 Program : Master in Information Technology Course : Research Methodology (IAM 6113) Lecturer Name : Ts. Dr. Saliyah Binti Kahar Research Proposal Title : The Use of Dark Web in Criminal Activities in Malaysia
Introduction Dark web is already known as a nest for the cybercrimes in the world, from identity selling, fake license and ID, drug selling, killing service its extend to some disgusting crimes ever known such like child pornography, beaten alive, child abuse and a lot more which can people never imagine. The growth of the dark web is increasing daily, time by time people with bad intention entering the dark web and use its functions to conducts crime activities. Malaysia is one of the developing countries who did not want to miss in technology usage and update, Malaysian people are one of the highest internet users in the world. However, it is odd when come to the issue of the dark web, most of Malaysian people did not know or just ignore about the dark web and its dangerous to the society. The level of awareness is very low, from my observation, even in the education institutions, most the students and lecturers are not aware about the dark web. Articles, research papers or studies about the dark web by Malaysian students or researchers are very less. It is a shock when knowing that until 2019, there is no conference regarding the dark web that has been organized in Malaysia, not even once! If the awareness is on that level, how about the technology to against the dark web? Are the Malaysian authorities ready to combat the dark web efficiently and effectively? What is the current situation or statistics on the crime activities happens in dark web among the Malaysian internet users? How far the Malaysian dark web users have gone? What criminal activities initiated or organized by the Malaysian dark web users? Are there any activities by Malaysian user related to the terrorism? How serious the evolution and progress of the dark web in Malaysia? All these questions are mystery for Malaysian citizen, nobody knows what the current situation is, nobody knows if their children, friend or relative is an active dark web user. By knowing this situation, it has moved me to do some research about the use of dark web in criminal activities in Malaysia. I would like to know how far the Malaysian dark web users has gone through and what is the Malaysian authorities’ actions to prevent and fight against the dark web. Hopefully, by the result from this research, we can take the necessary actions or at least give a valid information regarding the dark web and its dangerous to the Malaysian people and help the Malaysian authorities by suggesting a framework, software, or guideline to protect our nation from the dark web.
Criminal activities Terrorist movement, child pornography, illegal drugs, fake passports, human organs for sale, prostitution, human trafficking and even contract killers to be hired. These are among the nefarious activities that can be found in the dark web. However, the scope of this research is to identify what is criminal activities happen in Malaysia using the Dark Web and maybe come out with the framework, suggestions or technique to be used against the dark web. Technology and capability to fight the dark web Capability of the Malaysia authorities to fight the dark web is still questionable, what technology they use to against the dark web currently? are they capable enough to prevent it? Our technology is updated or outdated? By identify the current capability of the Malaysian authorities, we can help the authorities to fight against the dark web and study together about the solution technically and tactically. Problem Statements
Dark Web visibility Does Malaysian people aware about the dark web? What are they know about the dark web? Based on my observation most of Malaysian people does not know about the dark web, even though some of IT academician also did not know about the dark web. Some of Malaysian people may heard about dark web, some of them know the existing of dark web but did not know what it is and mostly a lot of them are know nothing about the dark web. Understanding how the dark web works Technology and framework of the TOR browser as a door access to the dark web must be understood to understand how it works. By understanding the process, we will know how its works and why it is dangerous. What can be done from the output? What can this study help to against or prevent the dark web? Is there any current solution or can this study create a new solution to help the authorities and citizen against the dark web? By analyzing the output not only the awareness about the dark web can be improved, we also can study the necessary actions of identify current technology which can be used to fight the dark web. Problem Statements
Objective To identify and analyze types of criminal activities using the Dark Web by Malaysian The main objective of the study is to identify what types of criminal activities that usually done by Malaysian user. From the data, we can analyze to set what is the top and least dark web criminal activities happening in Malaysia. To understand the Malaysia authority’s capability and methods against the dark web In this study we also want to know the current capability of Malaysia authorities to handle the dark web issue. How they prevent the use of dark web and what methods or technology they use to fight the dark web. To propose idea or suggestion to prevent and combat the dark web After study, the data and do the analysis the expected output is to come out with idea or suggestion to the Malaysian people and authorities to prevent and respond from the dark web. Maybe a few frameworks or diagrams can be produced through this study and whatever the output, it is all to benefits the Malaysian to fight against the dark web
Research Questions What is the level of knowledge of Malaysians about the dark web? What types of criminals committed by Malaysian internet users? What technology the Malaysian authorities use to prevent and combat the dark web? What is the difficulty that Malaysia authorities facing about the dark web? Is there any campaign or awareness programs organized by the authorities or any party about the dark web? How crucial the usage of dark web by Malaysian internet users What can this study help to prevent and against the dark web?
Hypothesis There is relationship between dark web and criminal activities in cybercrimes and the hypothesis is accepted that most of the crimes in dark web are dangerous to people. Connection between dark web and terrorism is inevitable, it is worrying that terrorist organizations use the dark web as their communication medium The hypothesis that criminals in the dark web cannot be traced and arrested by the authorities is unaccepted. There is a mechanism used by the US authorities to trace and arrest the culprit who uses the dark web to commit their crimes. And how about Malaysia? It is in belief that vulnerability to the dark web will affect the Malaysia sociology and socioeconomic but how far the effect is still to be studied.
Significance of the research Identify how crucial the dark web usage among Malaysian Awareness to Malaysian people about the dark web Helping the Malaysian authorities to combat the dark web Producing solution to prevent and fight against the dark web Ensuring the Malaysian cybersecurity are always ready and up to date to combat the dark web Protect Malaysian internet users from the danger of dark web.
Scope Malaysia environment and perspective Malaysia internet users Crime activities by Malaysian Malaysia authorities Malaysia law and enforcement Malaysia cybersecurity Malaysia citizen Scope and Limitations Limitations Budget – The budget is self-sponsor Alone project - No co-partner Cooperation by the authorities – The research need permission by the authorities for the interview and data collection Logistic – Different and far location of the Malaysia Royal Police Department (PDRM), Malaysia Communication and Multimedia Commission (MCMC), Malaysian Cyber Consumer Association (MCCA), and Malaysia Cybersecurity Malaysia (CSM). Time – Conducting this research in part time basis
Literature Review Dark Web The Internet is actually made up of three distinct layers: surface web, deep web, and dark web (Hale, 2020). The dark web contains many illegal activities and illegal substances as well as criminal interventions. It is a haven for cyber criminals where it is a place for all cyber criminals to join and gather to commit their crimes(Nuruddin & Nur Razia, 2019).
Literature Review Cont … Dark Web Technology Accessing the Dark Web requires a certain degree of savvy internet prowess, with a required list of steps that must be taken to not only enter this enshrouded world while maintaining the utmost privacy ( Sheils , 2019). The content which only exists on personal encrypted networks or peer-to-peer configurations. It can only be accessed using special software and decryption tools such as a Tor browser (also called The Onion Router) and most of the websites on the Dark Web contain fishy content which need that kind of encryption. Your activities, IP addresses, choices, likes and dislikes and lots of other data is traced and tracked on the Clearnet, while the Onion network is a lot more privacy-respecting network and doesn’t store information related to you, or your activities which makes it an excellent choice for users who love to keep their privacy private (Hale, 2020).
Literature Review Cont … Danger of Dark Web According to researchers, only 4 percent of internet content is indexed and, thus, accessible through search engines like Google while the rest is hidden on the Deep Web, a subset of the World Wide Web, where content is not indexed by standard search engines that are not accessible to most internet users ( Satar , 2019). Submarines, drugs and firearms are among the products sold through electronic commerce (e-commerce) websites in dark web ( Yusmizal Dolah Aling , 2019). Terrorist groups like ISIS and Al-Qaeda can hide deep in the Dark Net's digital shadows and use anonymous encrypted messages to spread their extremist ideologies. The dark web offers these radical groups the ability to recruit and radicalize, spread propaganda, raise funds, and coordinate actions and attacks (Danielle LeFrancois , 2017-2018). Dark web also motivates hackers to break into someone's computer and steal or destroy personal or financial data (Danielle LeFrancois , 2017-2018).
Literature Review Cont … Dark web in Malaysia In Malaysia perspective, it is hard to determine what is the current awareness and activities among the local internet users. Dark web in Malaysia is still in silence, most of the Malaysian people does not know what the dark web is and its danger to their live and society. The Malaysian Royal Police Department (PDRM) and the Malaysia Communication and Multimedia Commission (MCMC) need to be at the forefront because the sale of drugs, guns and assassins is done in the dark web (Muhamad, 2019). Cybersecurity expert, technical experts and innovative approaches are all needed to combat crime on the Dark Web ( Satar , 2019). According to the chief of Cyber Security Unit, Malaysian Cyber Consumer Association (MCCA), the situation was like a time bomb that would explode at any time because too many Malaysian data leaks were detected in the dark web ( Yusmizal Dolah Aling , 2019). Protecting your business against the types of cybercrimes bought, sold, and advertised on the Dark Web requires your cybersecurity policies, tools, and measures. But as it is extremely difficult for law enforcement to commit cybercrime, your company needs to be more vigilant than ever before about the cybersecurity (Crawley, 2019). President of MCCA said, it is time for a new law to be introduced to address the problems of cyber users, especially the Dark Web, as any illegal sale will jeopardize the country's economy ( Yusmizal Dolah Aling , 2019).
Literature Review Cont … Potential Solutions Although the dark web is very hard to handle, researchers have found a few methods to extract data from the dark web and do the analysis to gain important information from dark web, and one of it is using the Crawler. Crawler is a software program that traverse the World Wide Web information space by adhering to hypertext links and retrieving web documents in accordance with standard HTTP protocols. Crawlers have many uses in different applications and research areas, especially in search engines, that aim to get the latest data, and where crawlers make copies of all the pages they visit for later processing. In other words, search engine index websites so they can find them easily and quickly when users search for a specific topic ( Bassel AlKhatib , 2019). This shows that there are still hopes for us to counter the dark web, even though may not 100% but at least we can do something to protect ourselves, family, friends and our beloved country from the dangerously dark web.
Methodology Used Data collection In this research I will collect the data from the observation, reading the current and previous research papers, articles or books and use the quantitative research methodology whereby I will organize a few interview sessions with someone in Malaysia Royal Police Department (PDRM), Malaysia Communication and Multimedia Commission (MCMC), Malaysian Cyber Consumer Association (MCCA), and Malaysia Cybersecurity Malaysia (CSM). I may use the same or different sets of interview questionnaires depending on the roles of each agencies. From the interview session it can strengthen my data from the observation and readings. Data Analysis From the collected data I will do the analysis by categorize the types of criminal first, I will put a weightage for each criminal type to identify the max, mid and min. Secondly, I will also list down the solution methods which is currently being used by all the authorities and cross check to remove redundancy, from the list I can do comparison with other techniques which being used by other countries or organizations. Collection data from articles or papers reading will help me to identify any different techniques used by other parties and compare it with existing technique by Malaysian authorities to come out with future suggestion or methods or framework to help the Malaysian authorities combating the dark web.
Time schedule/work plan No Activity Expected Start Date Expected End Date 1 Identify problems, initial review for data collection 15 Apr 2020 18 Apr 2020 2 Set objectives and scope 19 Apr 2020 20 Apr 2020 3 Set the research questions 21 Apr 2020 22 Apr 2020 4 Data collection from literature review 23 Apr 2020 29 Apr 2020 5 Analyze literature review data 30 Apr 2020 2 May 2020 6 Plan the interview sessions 3 May 2020 3 May 2020 7 Contact all relevant authorities 4 May 2020 8 May 2020 Interview session with Malaysia Royal Police Department (PDRM) 11 May 2020 11 May 2020 Interview session with Malaysia Communication and Multimedia Commission (MCMC) 13 May 2020 13 May 2020 Interview session with Malaysian Cyber Consumer Association (MCCA) 18May 2020 18 May 2020 Interview session with Malaysia Cybersecurity Malaysia (CSM). 20 May 2020 20 May 2020 8 Analyze interview data 21 May 2020 23 May 2020 9 Cross check LR data and Interview Data 1 Jun 2020 3 Jun 2020 10 Final analysis 4 Jun 2020 7 Jun 2020 11 Reflection 8 Jun 2020 9 Jun 2020 12 Preparing reports 10 Jun 2020 19 Jun 2020 13 Preparing slide presentation 20 Jun 2020 22 Jun 2020 14 Presentation 24 Jun 2020 24 Jun 2020
Budget/estimated cost built up No Item Quantity Total Price (RM) 1 A4 Papers 1 bundle 10 2 Printer Cartridge ( Laserjet Color) 1 150 3 Research Book 1 20 4 Photostat 100 20 5 Stationary 1 10 6 Car fuel (Interview sessions) 4 Places 200 7 Tolls (Interview sessions) 4 Places 40 8 Miscellaneous 1 50 Total 500
Expected Findings
C ountless internet users try to enter the d ark w eb every day . Some are looking for something in particular that simply can’t be sourced on the regular internet, others are simply curious and excited to search what is inside the dark web . Many of them are aware how dangerous the dark web and have their own precaution actions to protect themselves, but most of them are know nothing and they are vulnerable to the dangerous of dark web. In Malaysia context, it is questionable that Malaysian people aware of the dark web visibility. The awareness about the dark web and it dangerous not in clear picture from the authorities. Information, analysis, statistics and study about dark web in Malaysia are still in vague, it is a great opportunity and honour for me to do a research about the dark web in Malaysia perspective. The collaboration and result of the research can identify what types of criminal that often committed by Malaysian internet users and can be used to suggest the preventive action and solution to combat the dark web as well as awareness programs for the public by the authorities. And I would like to recommend to the MCCA, MCMC, Cybersecurity and PDRM to collaborate to organize a few conferences in Malaysia so that we can invite the academician, authorities and anybody who are interested about the dark web to attend the conferences. Perhaps, from there we can do further discussions and find new solutions intellectually. Conclusion
References Bassel AlKhatib , R. B. (2019, April). Crawling the Dark Web: A Conceptual Perspective, Challenges and Implementation. Journal of Digital Information Management . Bellaby , R. (2019, Aug 17). Why people need the dark web, whether they want it or not. LSE USAPP . Bernama . (2019, Jan 30). Dark Web: Polis masih siasat dakwaan penjualan maklumat pelajar UiTM. Bernama . Crawley, K. (2019, Aug 22). How to prevent crime on the Deep Web and Dark Web. cybersecurity.att.com . Danielle LeFrancois , C. R. (2017-2018). Hackers and the Dark Net: A Look into Hacking and the Deep Web. 5 (1). Hale, J. (2020, Jan 17). What is the dark web? From drugs and guns to the Chloe Ayling kidnapping, a look inside the encrypted network. The Sun . Muhamad, H. (2019, May 5). PDRM perlu tingkat kecanggihan teknologi atasi jenayah 'dark web' - Akhbar Satar . Astro Awani . Nuruddin, R., & Nur Razia, M. S. (2019, Aug). A nest for cyber criminals - The Dark Web. Academia.edu . Satar , A. (2019, Jan 25). How crimes are hidden in the dark web. Astro Awani . Sheils , C. (2019, October 1). The Deep Web and The Dark Web. TheDarkWebLinks . (2019). What is the Deep Web? The Definitive Guide [2019]. Retrieved from https://www.thedarkweblinks.com/what-is-the-deep-web/ Yusmizal Dolah Aling , M. S. (2019, Sep 29). Beli bom dalam talian . Harian Metro .