Online Crime and Criminal Investigations: A Deep Dive on Proxies, VPNs, Darknets and Dark Markets

Online Crime and Criminal Investigations: A Deep Dive on Proxies, VPNs, Darknets and Dark Markets

Criminal investigators and analysts need to understand how it is possible for people to conceal and obfuscate their identity and location on the Internet. Various methods of concealing identity and location, while engaged in activities on the Internet, provide an opportunity for investigators to engage in covert online research while also providing a means for criminals to engage in surreptitious communication in furtherance of nefarious activities. As technologies, such as digital device fingerprinting, emerge as ways to attribute identity this becomes a topic with which every investigator and analyst must become familiar. This class will include an overview of how the web was designed and functions.

Like Proxies and VPNs, Tor is most used to hide one’s identity. But it can also be used by an insider to breach a firewall or internet filter and is a gateway to what is commonly called the Darknet. While Tor is the most common anonymity network, it is not the only one.  You can purchase weapons and contraband, exchange instrumentalities of identity-based criminality, discuss criminal tradecraft, and negotiate with those offering hacking as-a-service on dark markets and in Darknet vendor shops.

A basic overview of IP fingerprinting, browser/software fingerprinting, and device fingerprinting will set the stage for a deeper dive into proxies, VPNs, Darknets, and Dark Markets.  This class is not intended to make attendees experts, but rather to demystify the topic for those who conduct criminal investigations involving hate and identity-based bias crimes. It includes case studies and a discussion of specific investigative techniques. The session will give criminal investigators and analysts the foundation that they need to understand these tools and communities—both how they are exploited by criminals and how they can be used by investigators and analysts.

NOTICE: Course contains graphic content including profanity and sexual and violent images.

Presented by:
Chuck Cohen, Vice President, NW3C


Mandatory Software Requirements
• Operating system. Your computer must be running Microsoft Windows 10 or macOS v10.12 or later. Make sure your operating system is fully updated prior to class.
• Smartphones and tablets are prohibited.

Mandatory Software Requirements
• The browser and network from which you access the training must allow connections to Cisco WebEx. You can test the ability to access WebEx at: https://www.webex.com/test-meeting.html.
• While you can use the browser-based version, installing the WebEx client will provide the best attendee experience.

Mandatory Hardware Requirements
• Dual Monitors. Using a computer with dual monitors is not required but will allow you to follow along and practice with tools and resources that are being demonstrated during the training.  You do not need a camera or microphone, but external speakers for your computer will be beneficial.
 Hard-wired, high-speed Internet connection. A wireless Internet connection may be sufficient, however, a wired connection will improve latency and buffering, and will also provide better connection speeds and stability overall.
• Microphone and speakers. You do not need a microphone but external audio speakers is recommended.

Event Information

Event Date 09-22-2022 9:00 am
Event End Date 09-22-2022 4:00 pm
Capacity 305
Registered 0
Available Place 305
Individual Price Free
Location Online

About Us

Lancaster County Emergency Management Agency (LEMA) is located in Manheim Borough, northern Lancaster County. 

Contact Us

My Online Courses

You are not currently enrolled in any online courses!

Newsletter Sign Up