Training Registration

What ICAC Investigators Need to Know about Hiding on the Internet: Proxies and VPNs
On Demand
Duration: 90 Minutes

Recorded on March 24, 2022

Criminal investigators and analysts need to understand how it is possible for people to conceal and obfuscate their identity and location on the Internet. Two primary methods are through the use of proxies and virtual private networks (VPNs). This ability to hide one’s identity and location on the Internet can be both a challenge and an opportunity. Various methods of concealing identity and location, while engaged in activities on the Internet, provide an opportunity for investigators to engage in covert online research while also providing a means for criminals to engage in surreptitious communication in furtherance of nefarious activities. As technologies, such as digital device fingerprinting, emerge as ways to attribute identity this becomes a topic about which every investigator and analyst must become familiar. This webinar will include an overview of how the web was designed and functions.

A basic overview of IP fingerprinting, browser/software fingerprinting, and device fingerprinting will set the stage for a deeper dive into proxies and VPNs—two of the most common methods used both by criminals and criminal investigators to conceal their identities and locations while engaging in online social networking and online communication.  

Presented by:
Chuck Cohen, Vice President, NW3C


Affirmation of Eligibility
By checking this box, I attest that the subject of this training is related to my work and that I am employed:

(Limit 100 character max.)

NW3C Privacy Statement
Yes, I have read, understand, and agree with the NW3C privacy statement.

OPTIONAL: Check this if you agree that NW3C may share my Personally Identifiable Information.
I agree that NW3C may share my Personally Identifiable Information, including, but not limited to, my email address, with third-party vendors in connection with this NW3C product in accordance with NW3C’s privacy statement.