Recorded on June 15, 2020
This webinar will build on concepts and
techniques discussed in the previous What Investigators Need to Know about Hiding on
the Internet: Proxies and VPNs webinar. You can register for that
on-demand webinar at: https://www.nw3c.org/webinars/Register?id=10838.
But, it is not necessary for an investigator or analyst to have attended the
previous webinar to attend, understand, and gain valuable investigative insights
from this deep dive webinar.
Tor is most commonly used to hide one’s identity. But it can also be used by
an insider to breach a firewall or internet filter and is a gateway to what is
commonly called the darknet. While Tor is the most common anonymity
network, it is definitely not the only one. And, while Tor Hidden Service
servers are the most well-known portion of the darknet, there are other areas
accessible through other networks. You can exchange Child Sexual Abuse
Material, discuss criminal tradecraft, buy and sell illicit drugs, find stolen
personal identifying information, and negotiate with those offering hacking
as-a-service on dark markets and in darknet vendor shops.
This webinar is not intended to make attendees experts, but rather
to demystify the topic. It includes case studies and a discussion of
specific investigative techniques.The webinar will give investigators and analysts
the foundation that they need to understand these tools and communities—both how
they are exploited by criminal and how they can be used by investigator and
Chuck Cohen, Vice President,