Training Registration

What ICAC Investigators Need to Know about Hiding on the Internet: Tor, Darknets, & Dark Markets
On Demand
Duration: 2 Hours 30 Minutes

Recorded on April 19, 2022

This webinar will build on concepts and techniques discussed in the previous What ICAC Investigators Need to Know about Hiding on the Internet: Proxies and VPNs webinar. But, it is not necessary for an investigator or analyst to have attended the previous webinar to attend, understand, and gain valuable investigative insights from this deep dive webinar.     

Tor is most commonly used to hide one’s identity. But it can also be used by an insider to breach a firewall or Internet filter and is a gateway to what is commonly called the Darknet. While Tor is the most common anonymity network, it is definitely not the only one. And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other networks. You can exchange Child Sexual Abuse Material, discuss criminal tradecraft, buy and sell illicit drugs, find stolen personal identifying information, and negotiate with those offering hacking as-a-service on Dark Markets and in Darknet Vendor Shops.

This webinar is not intended to make attendees experts, but rather to demystify the topic. It includes case studies and a discussion of specific investigative techniques. The webinar will give investigators and analysts the foundation that they need to understand these tools and communities, both how they are exploited by criminals and how they can be used by investigators and analysts.  
Presented by:
Chuck Cohen, Vice President, NW3C

Affirmation of Eligibility
By checking this box, I attest that the subject of this training is related to my work and that I am employed:

(Limit 100 character max.)

NW3C Privacy Statement
Yes, I have read, understand, and agree with the NW3C privacy statement.

OPTIONAL: Check this if you agree that NW3C may share my Personally Identifiable Information.
I agree that NW3C may share my Personally Identifiable Information, including, but not limited to, my email address, with third-party vendors in connection with this NW3C product in accordance with NW3C’s privacy statement.