The WRCTC delivers relevant, operational-level training to local, state and federal law enforcement agencies and community-based organizations in support of national priorities, and serves as a force multiplier in the global narcotics threat and transnational organized crime reduction efforts.
What We offer:
Length: 3 Days (24 Hours)
Designed For: Law Enforcement Officers
Description: This three day, 24 hour course gives a foundation and framework for investigating the dark web for narcotics, gangs, transnational organized crime, and other criminal activity. This is a practical hands-on course which provides the opportunity to become immersed in best practices for dark web investigators. This course in non-technical in that no prerequisites or prior training in code or script is required. Basic knowledge of search functions is helpful but will be reviewed.
Dark Web investigations, unlike traditional online investigations add a new dimension of anonymity to the criminals using this platform. It indicates a higher level of sophistication and knowledges a greater difficulty for investigators to detect, engage, and communicate. More difficult still is the evidence collection and chain of custody as well as documenting evidence in these investigations. With the general public’s increased awareness of the Dark Web, the risk of our communities being victimized increases. Law enforcement can no longer neglect this expanded platform of drug trafficking, human trafficking, transnational organized crime, and other crimes.This course focuses on investigations of the violators using the dark web and participation is limited to law enforcement and military personnel assigned to investigate such matters. The course begins with a foundation and ends with practical investigation techniques.
The course places particular emphasis on the following:
- 1st and 4th amendment considerations in Dark Web investigations
- Journalist investigating law enforcement and Freedom of Information Act Requests
- Predicates for narcotics investigations
- Case law
- Operational Security for the law enforcement Dark Web investigator
- Back Stopping for Deep/Dark and Mobile Messaging applications
- Design and setup of hardware and tools
- Indicators of Compromise (IOC’s) IP address, Email, URL, URI
- VPN vs Proxy vs Encryption
- Anonymizers and emulators for undercover investigators
- Documenting the investigation
- Virtual machines
- Remote and external operating systems
- Open source investigations- tools techniques and tradecraft
- Law enforcement portals and their perspective
- Preservation, subpoenas, search warrants, and non-disclosure requests
- Three levels of online subpoenas-preparation, design, creation, maintenance, and deployment