Dark Web Investigations WEB

Description

The dark web hosts a wide range of illicit activity, including drug and human trafficking, card cloning, ransomware, money laundering, and more. Investigators must learn to identify key artifacts such as dark web addresses, encryption keys, VPNs, crypto wallets, marketplaces, P2P links, compromised data, dark web social media and chat sites, data leaks, and more.

This course focuses on understanding the dark web and the criminals who exploit it. Participants will learn how to trace and track activity across the surface, deep, and dark web using OSINT and private tools. Real-world case studies and a live tour of the dark web will guide investigators through uncovering hidden networks helping them gain a general understanding of the dark web.

Upon Completion:

Participants will be able to: 

  1. Gain general education on the web.
    1. Surface, deep and dark web.
    2. Centralized Platforms
    3. Decentralized Platforms
  2. Learning about dark web access and investigations.
    1. The Onion Router (TOR)
    2. Virtual Private Networks (VPNs)
  3. Learn OSINT and pay for tools used to access the dark web.
    1. Tour the dark web using TOR
    2. Investigate the dark web using privatized software.  
  4. Learn about smart technology and collecting digital evidence.
    1. Identify artifacts, such as dark web addresses, encryption keys, marketplaces, chat rooms, platforms, hidden chats and forums, hidden apps, virtual boxes for investigations, compromised data, data dumps, and more.
  5. Demonstration of the private software, Dark Blue by CACI.
  6. See a Case Study.