Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

5/19/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

International Consortium Launches to Prevent Criminal Use of Dark Web and Virtual Currencies

Seven European countries launch project to curtail criminals and attackers from using blockchain technology to avoid law detection.

Vienna - A group of 15 consortium members from seven European countries has initiated this week a new project to curtail criminals and attackers from using blockchain technology to avoid law detection, while at the same time respecting the privacy rights of legitimate users. Blockchain technology is an electronic ledger under decentralized control, which allows it to evade traditional investigative measures.

The best-known application of blockchain technology is Bitcoin, which has many legitimate uses but is also used for criminal purposes in the so-called dark web (i.e., the part of the internet that is beyond the reach of Google and other search engines). The attackers who froze computers in 150 countries last Friday, 12 May, demanded a ransom paid in Bitcoin.

The researchers are in a consortium undertaking a three-year, €5 million project, funded by the European Union aimed at developing technical solutions for investigating and mitigating crime and terrorism involving virtual currencies and underground market transactions.

The researchers, including four law enforcement agencies (LEAs) and INTERPOL, aim to develop and implement tools to reveal common characteristics of criminal transactions, detect anomalies in their usage, and identify money-laundering techniques. The researchers will also conduct training activities in order to develop skills and knowledge among EU law enforcement agencies. As part of their project, which is called TITANIUM (Tools for the Investigation of Transactions in Underground Markets), the researchers plan to test and validate their tools and services on the premises of the LEAs to assess the effectiveness and overall impact of the project results.

Project co-ordinator Ross King, a senior scientist at the AIT Austrian Institute of Technology GmbH, said, “Criminal and terrorist activities related to virtual currencies and darknet markets evolve quickly and vary in technical sophistication, resilience and intended targets.”

To counter such activities, Dr King said it was necessary to develop efficient and effective forensics tools enabling the reasonable use of different types of data from different sources including virtual currency ledgers, online forums, peer-to-peer networks of underground markets, and seized devices.

Dr. King also emphasized that the tools developed within the TITANIUM project will respect individual privacy and other fundamental rights.  "The consortium will analyze legal and ethical requirements and define guidelines for storing and processing data, information, and knowledge involved in criminal investigations without compromising citizen privacy."

In addition to the AIT Austrian Institute of Technology GmbH, the partners in the TITANIUM consortium are:

Bundeskriminalamt (Germany)

Coblue Cybersecurity (Netherlands)

Countercraft S.L. (Spain)

dence GmbH (Germany)

Universität Innsbruck (Austria)

INTERPOL (International Criminal Police Organization)

Karlsruhe Institute of Technology (Germany)

Ministry of the Interior (Austria)

Ministry of the Interior (Spain)

National Bureau of Investigation (Finland)

TNO (Netherlands)

Trilateral Research (UK)

University College London (UK)

VICOMTECH-IK4 (Spain)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16531
PUBLISHED: 2019-09-20
LayerBB before 1.1.4 has multiple CSRF issues, as demonstrated by changing the System Settings via admin/general.php.
CVE-2019-9717
PUBLISHED: 2019-09-19
In Libav 12.3, a denial of service in the subtitle decoder allows attackers to hog the CPU via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c has a complex format argument to sscanf.
CVE-2019-9719
PUBLISHED: 2019-09-19
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf.
CVE-2019-9720
PUBLISHED: 2019-09-19
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf.
CVE-2019-16525
PUBLISHED: 2019-09-19
An XSS issue was discovered in the checklist plugin before 1.1.9 for WordPress. The fill parameter is not correctly filtered in the checklist-icon.php file, and it is possible to inject JavaScript code.