Most investigators have heard of the Darknet. It is widely discussed but often not understood. Tor and other Darknets are often used by offenders to obfuscate their identity and location. Also, Darknets and Dark Markets are increasingly where and how child exploitation is facilitated. Tor is most used to hide one’s identity. But it can also be a gateway to what is commonly called the Darknet. While Tor is the most common anonymity network, there are others. You can obtain CSEM, discuss your crimes, hone your tradecraft, normalize your behavior, monetize the exploitation of children, and negotiate with those offering hacking as-a-service on dark markets and in darknet vendor shops. This workshop is intended to demystify the topic for those who investigate the sexual victimization of children. It includes case studies and a discussion of specific investigative techniques. This session will give attendees the foundation that they need to understand these tools and communities—both how they are exploited by criminals and how they can be used by investigators and analysts.
Learning Objectives:
Upon completion, participants will understand common weak points that that be exploited during criminal investigations.
Upon completion, participants will understand how specific criminal investigations of offenders using Tor Hidden Services Servers to distribute CSAM were successfully conducted.
Upon completion, participants will have been exposed to free operating systems that focus on privacy and are commonly subverted by those who disseminate CSAM, online child exploitation, and child trafficking.