The internet is now an integral part of everyday life wherever you dress or eat. Almost all of the company’s operations circulate at some point via the Internet, and in our free time we continue to use the network, for example, when searching for various information.
When we don’t know the addresses of the web services we’re looking for, we use search engines like Google, Ping, Yahoo, Baidu and Yandex, of which Google alone has a market share of nearly 90 percent. Search engines are in themselves powerful and necessary helpers, but they only find information on the Internet’s public network, that is, from open sources indexed for that purpose.
The dark side of the internet
However, there is a lot of material on the internet that search engines cannot find. Where the visible network ends, the deep web of the Internet only begins. For example, search engines cannot find the information that only the licensee is supposed to have access to. These include email accounts, company intranets, many forums, and blogs, and more.
Even deeper on the Internet is the so-called dark web, which anonymizes its users. The most widely used encryption technologies in the dark network are TOR (The Onion Router) and I2P (Invisible Internet Project). For example, TOR technology includes seven layers of encryption before a sent message reaches the recipient. Because of this, it is almost impossible to find out the identity of a mobile in a dark network, or what Internet servers he has visited.
The dark network often acts as a marketplace for criminally obtained information, where the information can only be available for a short time. It is in the nature of the dark network that the material is reliable because the criminal buyer and seller must trust each other. Due to the massive amount of data and its only momentary visibility, it is imperative that the dark network be monitored in real time 24/7.
What can DARKSOC® do?
DARKSOC® is a modular service developed by Cyberwatch Finland with its partners that provides an overview of an organization’s current cyber readiness, solves potential problem areas, and then maintains a continuous cyber shield.
Currently, DARKSOC® ‘s back-end systems and servers around the globe collect data at nine gigabits per second in real time. It also provides access to encrypted platforms, data leakage platforms and black markets where major discussions and trading take place.
The material is filtered and sorted into an understandable format to understand its meaning and value specifically from the perspective of your own organization. It enables us to act quickly and make both operational and strategic decisions.
As a first step, DARKSOC® will determine the current state of the organization’s exposure. Exposure is caused by, for example, technical vulnerabilities, vulnerable personal information, unclassified trade secrets and financial information, unprotected source code, open channel discussions, openly shared internal emails, etc.
Susceptibility to exposure is increased by, for example, networked information and communication solutions, technological integrations with partners and third parties, all information presented online, the company itself, or other information published on the network, etc.
DARKSOC® ´s capability is based on insight into the number of human and organizational sensors – there are as many sensors in the world as there are Internet-connected terminals. DARKSOC® provides targeted assessment of an organization’s current state of cyber readiness, generates risk analysis, and operational and strategic recommendations. It includes proactive incident reports, threat modelling, threat and risk analyses of key targets and individuals, and information about painted individuals, activities, and organizations.
DARKSOC® is based on the scientific research that Cyberwatch Finland has been doing with research institutes for several years. As a result, an algorithm utilizing the methods of social physics has been developed, which is applied to the processing and analysis of information found in the deep layers of the Internet, the identification and management of organizational risks, and the construction of a strategic situational picture.