Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Dark Web Analysis

You're reading from   Hands-On Dark Web Analysis Learn what goes on in the Dark Web, and how to work with it

Arrow left icon
Product type Paperback
Published in Dec 2018
Publisher
ISBN-13 9781789133363
Length 210 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Sion Retzkin Sion Retzkin
Author Profile Icon Sion Retzkin
Sion Retzkin
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Understanding the Deep and Dark Web FREE CHAPTER 2. Working with the Deep Web 3. The Future of the Dark Web 4. Installing a Linux Virtual Machine (VM) 5. Accessing the Dark Web with Tor Browser 6. Installing Tails OS 7. Installing Whonix 8. Installing Qubes OS 9. What Goes on in the Dark Web - Case Studies 10. The Dangers of the Dark Web 11. Using the Dark Web for Your Business 12. Assessment 13. Another Book You May Enjoy

Law enforcement agencies 


As I wrote before, law enforcement agencies have a strong presence on the Dark Web. The officers working for these agencies can engage in undercover sting operations to capture criminals and other people engaged in illegal activity. Using Tor provides anonymity and hides the source IPs of the officers' computers, which otherwise would have blown their cover.

In the same manner, law enforcement agencies perform discreet online surveillance of services and websites without revealing themselves, by using Tor.

 

 

In order to better explain how law enforcement can operate on the Dark Web, I'd like to tell you about Operation Bayonet, a Dutch-led sting operation, to take down Hansa, a Dark Web market site, numbering 3,600 dealers offering more than 24,000 drug product listings, as well as fraud tools and counterfeit documents. They were able to monitor Hansa's buyers and sellers, using various tools and methods, and discreetly altered Hansa's code to grab additional information...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image