References
- Balduzzi, M., & Ciancaglini, V. n.d.. Cybercrime in the Deep Web. In Black Hat EU, Amsterdam 2015. Retrieved from https://www.blackhat.com/docs/eu-15/materials/eu-15-Balduzzi-Cybercrmine-In-The-Deep-Web-wp.pdf.
- Bergman, M. K. (2001). White paper: the deep web: surfacing hidden value. Journal of electronic publishing, 7(1).10.3998/3336451.0007.104
- Bernstein, M. S., Monroy-Hernandez, A., Harry, D., Andre, P., Panovich, K., & Vargas, G. n.d.. 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community. 8.
- Best, C. (2011). Challenges in open source intelligence. Intelligence and Security Informatics Conference (EISIC), IEEE: 58-62).10.1109/EISIC.2011.41
- Cardenas-Haro, J. A., & Dawson, M. (2017). Tails Linux Operating System: The Amnesiac Incognito System in Times of High Surveillance, Its Security Flaws, Limitations, and Strengths in the Fight for Democracy in Security Solutions for Hyperconnectivity and the Internet of Things, 260-271. IGI Global.10.4018/978-1-5225-0741-3.ch010
- Committee on Homeland Security 8chan Inquiry before the U.S. House of Representatives, 106th Cong. (2019).
- Dawson, M., & Cárdenas-Haro, J. A. (2017). Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 1(1), 47-55.10.4018/IJHIoT.2017010104
- Dawson, M., Kisku, D. R., Gupta, P., Sing, J. K., & Li, W. (Eds.). (2016). Developing Next-Generation Countermeasures for Homeland Security Threat Prevention. IGI Global.10.4018/978-1-5225-0703-1
- Denis, M., Zena, C., & Hayajneh, T. (2016). Penetration testing: Concepts, attack methods, and defense strategies. 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). doi:10.1109/lisat.2016.749415610.1109/LISAT.2016.7494156
- Duggan, M., & Smith, A. (2013). 6% of online adults are reddit users. Pew Internet & American Life Project, 3: 1-10.
- Griffith, E. (2018). The Dark Side of Crypto Revolution. Accessed December 10, 2018. https://www.wired.com/story/the-dark-side-of-the-crypto-revolution/.
- Harris, S., & Meyers, M. (2002). CISSP. McGrawHill/Osborne
- Janczewski, L., & Colarik, A. (2007). Cyber Warfare and Cyber Terrorism. Hershey. PA: IGI Global. doi:10.4018/978-1-59140-991-510.4018/978-1-59140-991-5
- Lapowsky, I. (2018). How Russian Facebook Ads Divided and Targeted US Voters Before the 2016 Election. Accessed December 3, 2018. https://www.wired.com/story/russian-facebookads-targeted-us-voters-before-2016-election/.
- Lima, D. (2016). Lessons to be learned from Adult FriendFinder hack of 412M accounts. Accessed December 19, 2018. https://www.bizjournals.com/southflorida/news/2016/11/21/lessons-to-be-learned-from-adult-friendfinder-hack.html.
- Nagle, A. (2017). Kill all normies: Online culture wars from 4chan and Tumblr to Trump and the alt-right. John Hunt Publishing.
- Osint framework. n.d.. Accessed January 9, 2021. https://osintframework.com/.
- Pingle, B., Mairaj, A., & Javaid, A. Y. (2018). Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use. 2018 IEEE International Conference on Electro/Information Technology (EIT). doi:10.1109/eit.2018.850008210.1109/EIT.2018.8500082
- Qin, J., Zhou, Y., Lai, G., Reid, E., Sageman, M., & Chen, H. (2005). The dark web portal project: collecting and analysing the presence of terrorist groups on the web, in Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics, 623-624. Springer-Verlag.10.1007/11427995_78
- Shoaib, M., Ilyas, M., & Khiyal, M. S. (2013). Official digital currency. Eighth International Conference on Digital Information Management (ICDIM 2013). doi:10.1109/icdim.2013.669398210.1109/ICDIM.2013.6693982
- Telford, T., & Timberg, C. (2018). Marriott discloses massive data breach affecting up to 500 million guests. Accessed December 19, 2018. https://www.washingtonpost.com/business/2018/11/30/marriott-discloses-massive-data-breach-impacting-million-guests/?noredirect=on&utm_term=.717f57eb3cea.
- Wang, J., & Yang, T. (2018). Subliminal Channel and Digital Currency Pay Security. 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). doi:10.1109/icitbs.2018.0004110.1109/ICITBS.2018.00041
- Wang, P., Dawson, M., & Williams, K. L. (2018). Improving Cyber Defense Education through National Standard Alignment: Case Studies. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 2(1), 12-28.10.4018/IJHIoT.2018010102