Criminal violence - Property Crime: Fraud - Money laundering - theft and robbery - homicide - rape - extortion - arson — Read-Me.Org -Open Access to All
Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts by Guest User
Trajectories of Handgun Carrying in Rural Communities From Early Adolescence to Young Adulthood

This study found distinct patterns of handgun carrying from adolescence to young adulthood in rural settings. Findings suggest that promoting handgun safety in rural areas should start early. Potential high-risk trajectories, including carrying at high frequencies, should be the focus of future work to explore the antecedents and consequences of handgun carrying in rural areas.

JAMA Netw Open. 2022 Apr 1;5(4):e225127. doi: 10.1001/jamanetworkopen.2022.5127. PMID: 35377427; PMCID: PMC8980900.

Rural-Urban Variation in the Association of Adolescent Violence and Handgun Carrying in the United States, 2002-2019

This cross-sectional study found that associations of interpersonal violence with handgun carrying were stronger in relative terms in urban areas than in rural areas; however, a higher percentage of rural than urban adolescents carried handguns, resulting in a greater absolute prevalence of handgun carrying associated with violence in rural areas than in urban areas. These findings suggest opportunities for preventing handgun carrying-related harms may differ between rural and urban

communities. 10.1001/jamanetworkopen.2023.1153. PMID: 36853603; PMCID: PMC9975933

Multimodal Classification of Onion Services for Proactive Cyber Threat Intelligence Using Explainable Deep Learning

By Harsha Moraliyage; Vidura Sumanasena; Daswin De Silva; Rashmika Nawaratne; Lina Sun; Damminda Alahakoon

The dark web has been confronted with a significant increase in the number and variety of onion services of illegitimate and criminal intent. Anonymity, encryption, and the technical complexity of the Tor network are key challenges in detecting, disabling, and regulating such services. Instead of tracking an operational location, cyber threat intelligence can become more proactive by utilizing recent advances in Artificial Intelligence (AI) to detect and classify onion services based on the content, as well as provide an interpretation of the classification outcome. In this paper, we propose a novel multimodal classification approach based on explainable deep learning that classifies onion services based on the image and text content of each site. A Convolutional Neural Network with Gradient-weighted Class Activation Mapping (Grad-CAM) and a pre-trained word embedding with Bahdanau additive attention are the core capabilities of this approach that classify and contextualize the representative features of an onion service. We demonstrate the superior classification accuracy of this approach as well as the role of explainability in decision-making that collectively enables proactive cyber threat intelligence in the dark web. 

IEEE Access, vol. 10, pp. 56044-56056, 2022,

Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach

By Saiba Nazah; Shamsul Huda; Jemal Abawajy; Mohammad Mehedi Hassan

The Dark Web is one of the most challenging and untraceable mediums adopted by the cyber criminals, terrorists, and state-sponsored spies to fulfil their illicit motives. Cyber-crimes happening inside the Dark Web are like real world crimes. However, the sheer size, unpredictable ecosystem and anonymity provided by the Dark Web services are the essential confrontations to trace the criminals. To discover the potential solutions towards cyber-crimes evaluating the sailing Dark Web crime threats is a crucial step. In this paper, we will appraise the Dark Web by analysing the crimes with their consequences and enforced methods as well as future manoeuvres to lessen the crime threats. We used Systematic Literature Review (SLR) method with the aspiration to provide the direction and aspect of emerging crime threats in the Dark Web for the researchers and specialist in Cyber security field. For this SLR 65 most relevant articles from leading electronic databases were selected for data extraction and synthesis to answer our predefined research questions. The result of this systematic literature review provides (i) comprehensive knowledge on the growing crimes proceeding with Dark Web (ii) assessing the social, economic and ethical impacts of the cyber-crimes happening inside the Dark Web and (iii) analysing the challenges, established techniques and methods to locate the criminals and their drawbacks. Our study reveals that more in depth researches are required to identify criminals in the Dark Web with new prominent way, the crypto markets and Dark Web discussion forums analysis is crucial for forensic investigations, the anonymity provided by Dark Web services can be used as a weapon to catch the criminals and digital evidences should be analysed and processed in a way that follows the law enforcement to make the seizure of the criminals and shutting down the illicit sites in the Dark Web. 

 IEEE Access, vol. 8, pp. 171796-171819, 2020, 

The Dark Web Phenomenon: A Review and Research Agenda

Javeriah Saleem, Rafiqul Islam and Muhammad Ashad Kabir   

The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well-planned, coordinated, and malicious cyberattacks. Cyber security experts agree that online criminal activities are increasing exponentially, and they are also becoming more rampant and intensified. These illegal cyber activities include various destructive crimes that may target a single person or a whole nation, for example, data breaches, ransomware attacks, black markets, mafias, and terrorist attacks. So, maintaining data privacy and secrecy is the new dilemma of the era. This paper has extensively reviewed various attacks and attack patterns commonly applied in the dark web. We have also classified these attacks in our unique trilogies classification system. Furthermore, a detailed overview of existing threat detection techniques and their limitations is discussed for anonymity providing services like Tor, I2P, and Freenet. Finally, the paper has identified significant weaknesses that make the dark web vulnerable to different attacks.

 IEEE Access, vol. 10, pp. 33628-33660, 2022

The Dark Web as a Phenomenon: A Review and Research Agenda

By Abhineet Gupta 

The internet can broadly be divided into three parts: surface, deep and dark among which the latter offers anonymity to its users and hosts. The dark web has become notorious in the media for being a hidden part of the web where all manner of illegal activities take place. The more restrictions placed upon the free exchange of information, goods and services between people the more likely there exist hidden spaces for it to take place. The ‘black market’ of the internet – the dark web - represents such a hidden space. This review looks at the purposes it is widely used for with an emphasis on cybercrime, and how the law enforcement plays the role of its adversary. The review describes these hidden spaces, sheds light on their history, the activities that they harbour – including cybercrime, the nature of attention they receive, and methodologies employed by law enforcement in an attempt to defeat their purpose. More importantly, it is argued that these spaces should be considered a phenomenon and not an isolated occurrence to be taken as merely a natural consequence of technology. The review is conducted by looking at existing literature in academic journal databases. It contributes to the area of the dark web by serving as a reference document and by proposing a research agenda.  

Melbourne: University of Melbourne, 2018.  46p.