Many criminal investigators and analysts have heard of virtual private networks, proxies, and Tor. But, most would not feel comfortable conducting an investigation in which one of these tools was deployed. Similarly, both the Deepnet and Darknet are widely discussed but often not understood. At the same time, criminal investigators and analysts increasingly are required to conduct investigations and collect criminal intelligence information in these spaces or when these tools are being used.
Tor is most commonly used to hide one’s identity. But, it can also be used by an insider to breach a firewall or Internet filter, and is a gateway to what is commonly called the Darknet. While Tor is the most common onion router, it is definitely not the only one. And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools.
This webinar is not intended to make attendees experts, but rather to demystify the topic. It will give investigators and analysts the foundation that they need to understand these tools and communities — both how they are exploited by criminals and how they can be used by investigator and analysts.
Presented by: Chuck Cohen, Cohen Training & Consulting.