Many criminal investigators and analysts have heard of virtual private networks, proxies, and Tor. But, most would not feel comfortable conducting an investigation in which one of these tools was deployed. Similarly, both the Deepnet and Darknet are widely discussed but often not understood. At the same time, criminal investigators and analysts increasingly are required to conduct investigations and collect criminal intelligence information in these spaces or when these tools are being used.
Tor is most commonly used to hide one's identity, but it can also be used by an insider to breach a firewall or Internet filter, and is a gateway to what is commonly called the Darknet. While Tor is the most common onion router, it is definitely not the only one. And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools.
This webinar will build on concepts and techniques discussed in the previous "What Investigators Need to Know about Hiding on the Internet" webinar. It is not necessary for an investigator or analyst to have attended the previous webinar to attend, understand, and gain valuable investigative insights from this deep-dive webinar.
Amount | Description |
---|---|
$39.00 | The cost includes individual access to the live event, unlimited individual access to the recorded event for 30 days, and an individual certificate of training for CEUs. Group rates are available. |