Recorded on June 15, 2020
This Webinar will build on concepts and techniques
discussed in the previous What Investigators Need to Know about Hiding on the
Internet: Proxies and VPNs Webinar. You can register for that On
Demand Webinar at: https://www.nw3c.org/webinars/Register?id=10838.
But, it is not necessary for an investigator or analyst to have attended the
previous Webinar to attend, understand, and gain valuable investigative insights
from this deep dive Webinar.
Tor is most commonly used to hide one’s identity. But it can also be used by
an insider to breach a firewall or Internet filter and is a gateway to what is
commonly called the Darknet. While Tor is the most common anonymity
network, it is definitely not the only one. And, while Tor Hidden Service
servers are the most well-known portion of the Darknet, there are other areas
accessible through other networks. You can exchange Child Sexual Abuse
Material, discuss criminal tradecraft, buy and sell illicit drugs, find stolen
personal identifying information, and negotiate with those offering hacking
as-a-service on Dark Markets and in Darknet Vendor Shops.
This Webinar is not intended to make attendees experts, but rather to
demystify the topic. It includes case studies and a discussion of specific
investigative techniques. The Webinar will give investigators and analysts
the foundation that they need to understand these tools and communities—both how
they are exploited by criminal and how they can be used by investigator and
Presented by: Chuck Cohen, Vice President,