TOR, Onion routers, Deepnet, and Darknet: The Criminal Investigative Frontier |
|
Tor, Onion Routers, Deepnet, and Darknet: The Criminal Investigative Frontier 90 minute live Webinar followed by 15 minutes of interactive questions and answers Most criminal investigators and analysts have heard of Tor and many have a basic understanding. But, few investigators and analysts would feel comfortable conducting an investigation in which Tor was used during the commission of a crime. Similarly, both the Deepnet and Darknet are widely discussed by often not understood. At the same time, criminal investigators and analysts increasingly are required to conduct investigations and collect criminal intelligence information in these spaces or when these tools are being used. Tor is most commonly used to hide one’s identity. But, it can also be used by an insider to breach a firewall or Internet filter, and is a gateway to what is commonly called the Darknet. While Tor is the most common onion router, it is definitely not the only one. And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools. This Webinar is not intended to make attendees experts, but rather to demystify the topic. It will give investigators and analysts the foundation that they need to understand these tools and communities—both how they are exploited by criminal and how they can be used by investigator and analysts. The goal of this Webinar is simplify a complicated topic with a focus on details that are most relevant to investigators and analysts. Presenter: Charles Cohen, Cohen Training and Consulting, LLC All Contents Copyright © 2019
|