Most investigators have heard of the Darknet. It is widely discussed but often not understood. Tor and other Darknets are often used by offenders to obfuscate their identity and location. Also, Darknets and Dark Markets are increasingly where and how child exploitation is facilitated. Tor is most used to hide one’s identity. But it can also be a gateway to what is commonly called the Darknet. While Tor is the most common anonymity network, there are others. You can obtain CSEM, discuss your crimes, hone your tradecraft, normalize your behavior, monetize the exploitation of children, and negotiate with those offering hacking as-a-service on dark markets and in darknet vendor shops. This workshop is intended to demystify the topic for those who investigate the sexual victimization of children. It includes case studies and a discussion of specific investigative techniques. This session will give attendees the foundation that they need to understand these tools and communities—both how they are exploited by criminals and how they can be used by investigators and analysts.
Learning Objectives:
Upon completion, participants will understand the five uses of the Tor darknet service.
Upon completion, participants will be able to describe how Tor networks function operationally.
Upon completion, participants will understand how specific crimes involving child exploitation were facilitated using Tor.