Conducting Investigations on the Dark Web

Abstract:

Recent years have seen the expansion of the dark web for use in criminal activity. The takedown of the Silk Road, and more recently Alphabay and Hansa, brought public attention to the dark side of the web, while law enforcement has the increased task of how to respond to criminal behaviour online. This paper provides an overview of the dark web, including a discussion of law enforcement and intelligence community techniques in investigating dark web markets.


AUTHORS

Photo of Chuck Easttom

CEC-Security
U.S.

Chuck Easttom holds a Doctor of Science (D.Sc.) in Cyber Security as well as three master’s    degrees (one in applied computer science and one in systems engineering). He is the author of 26 computer science books used as textbooks at over 60 universities. He has also authored dozens of scientific papers on a range of topics and is an inventor with 5 computer science related patents. He is a member of the IEEE and ACM, and a Distinguished Speaker of the ACM. He is also a reviewer for several scientific journals. He is involved in research in a variety of areas including cryptography, cyber warfare, engineering processes, and digital forensics.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Media Parner to JIW.

Media Partner

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com