Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.
Anything illicit can be found on the dark web, including criminal activities such as drug, human, and arms trafficking, intellectual property theft, dirty prescriptions, card cloning, illegal credentials, hackers for hire, spam and ransomware development, money laundering, cryptocurrency tumbling, murder for hire, blackmail/extortion, red rooms, etc. When conducting criminal investigations across the nets (surface, deep, and dark), criminal investigators need to able to identify artifacts, including dark web addresses, encryption keys, virtual private networks, cryptocurrency exchanges, wallets, marketplaces, private chat rooms, and platforms, P2P links, data dumpsites, compromised data, de-hashing data, etc.; as well as tracing and tracking individuals through the nets, including the dark web.
This course will focus on criminals and the dark web. Diving deep into the internet and the anonymity of criminals, this course will assist in learning how the dark web functions and how to gather complex data using OSINT and private software tools. Many different case studies and hands-on examples will be provided.
This course will give hands-on skill development utilizing dark web investigation software. Attendees will be emailed directions and user keys the week before the course begins. This course comprises case studies, investigative examples, live demonstrations, the instructor's investigations, famous case studies such as Silk Road, WannaCry, AlphaBay, etc., and hands-on learning. The hands-on learning will be comprised of tracing a team of offenders from the surface web to hidden chats on the dark web. (2-day event)
Law enforcement participation with technology is voluntary but highly recommended, as they are not required to download the software and conduct any investigations. However, if LE decides to participate, ensure they bring a computer that the IT Department will not restrict.
Upon Completion:
Participants will be able to: