Change search
Link to record
Permanent link

Direct link
Publications (5 of 5) Show all publications
Wilson, T. J., Bergman, J., Jackson, A. & Popov, O. B. (2024). Preventing Machines From Lying: Why Interdisciplinary Collaboration is Essential for Understanding Artefactual or Artefactually Dependent Expert Evidence. Journal of Criminal Law, 88(2), 105-129
Open this publication in new window or tab >>Preventing Machines From Lying: Why Interdisciplinary Collaboration is Essential for Understanding Artefactual or Artefactually Dependent Expert Evidence
2024 (English)In: Journal of Criminal Law, ISSN 0022-0183, Vol. 88, no 2, p. 105-129Article in journal (Refereed) Published
Abstract [en]

This article demonstrates a significantly different approach to managing probative risks arising from the complex and fast changing relationship between law and computer science. Law's historical problem in adapting to scientific and technologically dependent evidence production is seen less as a socio-techno issue than an ethical failure within criminal justice. This often arises because of an acceptance of epistemological incomprehension between lawyers and scientists. Something compounded by the political economy of criminal justice and safeguard evasion within state institutions. What is required is an exceptionally broad interdisciplinary collaboration to enable criminal justice decision-makers to understand and manage the risk of further ethical failure. If academic studies of law and technology are to address practitioner concerns, it is often necessary, however, to step down the doctrinal analysis to a specific jurisdictional level.

Keywords
Explaining/understating AI/ML-assisted decisions, interdisciplinary methodology in law and technology studies, neoliberalism, ethics and criminal justice systems
National Category
Peace and Conflict Studies Other Social Sciences not elsewhere specified Other Legal Research Criminology
Identifiers
urn:nbn:se:su:diva-226528 (URN)10.1177/00220183231226087 (DOI)001147232400001 ()2-s2.0-85183011804 (Scopus ID)
Available from: 2024-02-14 Created: 2024-02-14 Last updated: 2025-02-24Bibliographically approved
Bergman, J. & Popov, O. B. (2024). Recognition of tor malware and onion services. Journal of Computer Virology and Hacking Techniques, 20, 261-275
Open this publication in new window or tab >>Recognition of tor malware and onion services
2024 (English)In: Journal of Computer Virology and Hacking Techniques, E-ISSN 2263-8733, Vol. 20, p. 261-275Article in journal (Refereed) Published
Abstract [en]

The transformation of the contemporary societies through digital technologies has had a profound effect on all human activities including those that are in the realm of illegal, unlawful, and criminal deeds. Moreover, the affordances provided by the anonymity creating techniques such as the Tor protocol which are beneficial for preserving civil liberties, appear to be highly profitable for various types of miscreants whose crimes range from human trafficking, arms trading, and child pornography to selling controlled substances and racketeering. The Tor similar technologies are the foundation of a vast, often mysterious, sometimes anecdotal, and occasionally dangerous space termed as the Dark Web. Using the features that make the Internet a uniquely generative knowledge agglomeration, with no borders, and permeating different jurisdictions, the Dark Web is a source of perpetual challenges for both national and international law enforcement agencies. The anonymity granted to the wrong people increases the complexity and the cost of identifying both the crimes and the criminals, which is often exacerbated with lack of proper human resources. Technologies such as machine learning and artificial intelligence come to the rescue through automation, intensive data harvesting, and analysis built into various types of web crawlers to explore and identify dark markets and the people behind them. It is essential for an effective and efficient crawling to have a pool of dark sites or onion URLs. The research study presents a way to build a crawling mechanism by extracting onion URLs from malicious executables by running them in a sandbox environment and then analysing the log file using machine learning algorithms. By discerning between the malware that uses the Tor network and the one that does not, we were able to classify the Tor using malware with an accuracy rate of 91% with a logistic regression algorithm. The initial results suggest that it is possible to use this machine learning approach to diagnose new malicious servers on the Tor network. Embedding this kind of mechanism into the crawler may also induce predictability, and thus efficiency in recognising dark market activities, and consequently, their closure. 

Keywords
Tor, Malware, Machine learning, Forensics
National Category
Computer Sciences
Identifiers
urn:nbn:se:su:diva-217293 (URN)10.1007/s11416-023-00476-z (DOI)000978451300001 ()2-s2.0-85153934241 (Scopus ID)
Available from: 2023-05-24 Created: 2023-05-24 Last updated: 2024-09-16Bibliographically approved
Bergman, J. & Popov, O. B. (2023). Exploring Dark Web Crawlers: A Systematic Literature Review of Dark Web Crawlers and Their Implementation. IEEE Access, 11, 35914-35933
Open this publication in new window or tab >>Exploring Dark Web Crawlers: A Systematic Literature Review of Dark Web Crawlers and Their Implementation
2023 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 11, p. 35914-35933Article, review/survey (Refereed) Published
Abstract [en]

Strong encryption algorithms and reliable anonymity routing have made cybercrime investigation more challenging. Hence, one option for law enforcement agencies (LEAs) is to search through unencrypted content on the Internet or anonymous communication networks (ACNs). The capability of automatically harvesting web content from web servers enables LEAs to collect and preserve data prone to serve as potential leads, clues, or evidence in an investigation. Although scientific studies have explored the field of web crawling soon after the inception of the web, few research studies have thoroughly scrutinised web crawling on the “dark web”, or ACNs, such as I2P, IPFS, Freenet, and Tor. The current paper presents a systematic literature review (SLR) that examines the prevalence and characteristics of dark web crawlers. From a selection of 58 peer-reviewed articles mentioning crawling and the dark web, 34 remained after excluding irrelevant articles. The literature review showed that most dark web crawlers were programmed in Python, using either Selenium or Scrapy as the web scraping library. The knowledge gathered from the systematic literature review was used to develop a Tor-based web crawling model into an already existing software toolset customised for ACN-based investigations. Finally, the performance of the model was examined through a set of experiments. The results indicate that the developed crawler was successful in scraping web content from both clear and dark web pages, and scraping dark marketplaces on the Tor network. The scientific contribution of this paper entails novel knowledge concerning ACN-based web crawlers. Furthermore, it presents a model for crawling and scraping clear and dark websites for the purpose of digital investigations. The conclusions include practical implications of dark web content retrieval and archival, such as investigation clues and evidence, and related future research topics.

Keywords
Cybercrime, digital forensics, systematic literature review, dark web crawling, Tor
National Category
Computer Sciences
Identifiers
urn:nbn:se:su:diva-217299 (URN)10.1109/ACCESS.2023.3255165 (DOI)000972255300001 ()2-s2.0-85149895587 (Scopus ID)
Available from: 2023-05-24 Created: 2023-05-24 Last updated: 2023-05-24Bibliographically approved
Bergman, J. & Popov, O. (2022). The Digital Detective's Discourse - A toolset for forensically sound collaborative dark web content annotation and collection. The Journal of Digital Forensics, Security and Law, 17(1), Article ID 5.
Open this publication in new window or tab >>The Digital Detective's Discourse - A toolset for forensically sound collaborative dark web content annotation and collection
2022 (English)In: The Journal of Digital Forensics, Security and Law, ISSN 1558-7215, E-ISSN 1558-7223, Vol. 17, no 1, article id 5Article in journal (Refereed) Published
Abstract [en]

In the last decade, the proliferation of machine learning (ML) algorithms and their application on big data sets have benefited many researchers and practitioners in different scientific areas. Consequently, the research in cybercrime and digital forensics has relied on ML techniques and methods for analyzing large quantities of data such as text, graphics, images, videos, and network traffic scans to support criminal investigations. Complete and accurate training data sets are indispensable for efficient and effective machine learning models. An essential part of creating complete and accurate data sets is annotating or labelling data. We present a method for law enforcement agency investigators to annotate and store specific dark web content. Using a design science strategy, we design and develop tools to enable and extend web content annotation. The annotation tool was implemented as a plugin for the Tor browser. It can store web content, thus automatically creating a dataset of dark web data pertinent to criminal investigations. Combined with a central storage management server, enabling annotation sharing and collaboration, and a web scraping program, the dataset becomes multifold, dynamic, and extensive while maintaining the forensic soundness of the data saved and transmitted. To manifest our toolset's fitness of purpose, we used our dataset as training data for ML based classification models. A five cross-fold validation technique was used to evaluate the classifiers, which reported an accuracy score of 85 - 96%. In the concluding sections, we discuss the possible use-cases of the proposed method in real-life cybercrime investigations, along with ethical concerns and future extensions.

Keywords
digital forensics, dark web, annotation, cybercrime, Tor
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:su:diva-203570 (URN)10.15394/jdfsl.2022.1740 (DOI)000768186200001 ()
Available from: 2022-04-05 Created: 2022-04-05 Last updated: 2022-04-05Bibliographically approved
Popov, O., Bergman, J. & Valassi, C. (2018). A Framework for Forensically Sound Harvesting the Dark Web. In: Proceedings of the Central European Cybersecurity Conference 2018: . Paper presented at Central European Cybersecurity Conference 2018, Ljubljana, Slovenia, November 15 - 16, 2018 (pp. 13:1-13:7). Association for Computing Machinery (ACM), Article ID 13.
Open this publication in new window or tab >>A Framework for Forensically Sound Harvesting the Dark Web
2018 (English)In: Proceedings of the Central European Cybersecurity Conference 2018, Association for Computing Machinery (ACM), 2018, p. 13:1-13:7, article id 13Conference paper, Published paper (Refereed)
Abstract [en]

The generative and transformative nature of the Internet which has become a synonym for the infrastructure of the contemporary digital society, is also a place where there are unsavoury and illegal activities such as fraud, human trafficking, exchange of control substances, arms smuggling, extremism, and terrorism. The legitimate concerns such as anonymity and privacy are used for proliferation of nefarious deeds in parts of the Internet termed as a deep web and a dark web. The cryptographic and anonymity mechanisms employed by the dark web miscreants create serious problems for the law enforcement agencies and other legal institutions to monitor, control, investigate, prosecute, and prevent the range of criminal events which should not be part of the Internet, and the human society in general. The paper describes the research on developing a framework for identifying, collecting, analysing, and reporting information from the dark web in a forensically sound manner. The framework should provide the fundamentals for creating a real-life system that could be used as a tool by law enforcement institutions, digital forensics researchers and practitioners to explore and study illicit actions and their consequences on the dark web. The design science paradigms is used to develop the framework, while international security and forensic experts are behind the ex-ante evaluation of the basic components and their functionality, the architecture, and the organization of the system. Finally, we discuss the future work concerning the implementation of the framework along with the inducement of some intelligent modules that should empower the tool with adaptability, effectiveness, and efficiency.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2018
Keywords
Digital forensics, dark web, forensic soundness
National Category
Computer Sciences
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-164354 (URN)10.1145/3277570.3277584 (DOI)978-1-4503-6515-4 (ISBN)
Conference
Central European Cybersecurity Conference 2018, Ljubljana, Slovenia, November 15 - 16, 2018
Available from: 2019-01-15 Created: 2019-01-15 Last updated: 2023-07-22Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-2653-9325

Search in DiVA

Show all publications