Training Delivery - Live Video (VTC)

Tor, Onion Routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators (May 2017)

Many criminal investigators and analysts have heard of VPNs, proxies, and Tor. Most would not feel comfortable conducting an investigation in which one of these tools was deployed. Similarly, both the Deepnet and Darknet are widely discussed, but often not understood. At the same time, criminal investigators and analysts increasingly are required to conduct investigations and collect criminal intelligence information in these spaces or when these tools are being used.

What Investigators Need to Know About Hiding on the Internet

When a person visits a website, blog, or social media platform, information about the person is visible to the site administrator, blogger, or social media company. This information can be used by a criminal investigator or analyst to identify and locate a suspect. It can also be used by a criminal to identify, compromise, and potentially locate an investigator. It is vitally important that investigators and analysts collecting information from the Internet, or communicating in a covert capacity on the Internet, understand these potential investigative leads and possible vulnerabilities.