Investigation Techniques for Unmasking TOR Users, Hidden Services and
Other Dark Web Operations


Sponsored By: TeleStrategies' ISS WorldŽ

November 21, 2017: Online Webinar

TIME:
9:00 AM - 10:00 AM New York Time, Eastern USA Time

Free for Law Enforcement, the government intelligence community and enterprise financial crime investigators. Registration with Government or Corporate e-mail address is required.

Click here to register  Click Here To Register


Investigation Techniques for Unmasking TOR Users, Hidden Services and Other Dark Web Operations

While it is true that TOR is an effective anonymizing technology, there are techniques that allow you to investigate TOR to reveal user and hidden server identities. This webinar will look at how TOR technologies are used to lockout law enforcement and intelligence analysts from intercepting and decoding content -- and what can be done to thwart criminals and terrorists who use TOR and encryption technologies. Specific topics covered include:

  • Understanding the TOR protocol and how it anonymizes communications
  • Understanding TOR hidden services, and how they are used in dark markets, ransomware, malware and content distribution
  • General approaches to defeating TOR
  • Investigation techniques: Network exploits, traffic correlation, server fingerprinting

Presented by:
Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies

Click here to register  Click Here To Register

Webinar FAQ's

All Contents Copyright © 2017
TeleStrategies, Inc.
6845 Elm Street, Suite 310
McLean, VA 22101

voice:
703-734-7050 fax:703-893-3197