Specialist DARKWEB lab..png

Darknet and crypto Workshop,

 21-22 October 2021

09:00 EST 

 THE FIRST 20 PLACES AT HALF PRICE OF £125/ $165/ CAD$216/ EURO 169. THEREAFTER £255 PER PERSON 

 

 

 

 

 

Feedback from previous courses

"I have been around the child exploitation world for 12 years and I have to say this has been one of the best courses I have been on!!!. It was well put together and very informative. I appreciated the hands on practical aspect of the course as it assisted me in understanding the concepts that were being taught. 

You both have a wealth of knowledge and I thank you for sharing!"

"Thank you so much for the outstanding course. The content and examples were excellent. Thank you so much again for all the information shared and I am looking forward to taking more courses"

"I sat the course last year to see if it was worth it, and immediately booked my entire team onto the next. Crazy good. "

About the Course

a 2 day intensive workshop on crypto currency awareness and tracking, with darkweb understanding and tracking techniques. 

 

Key takeaways:

  • Crypto currency structure and networks

  • How it all works and what is visible

  • Awareness around different coins

  • Setting up systems to monitor and track

  • Covert and hidden investigators tradecraft and methodology.

  • Understanding the blockchain, pools and exchanges

  • Tools awareness to assist and track coin transactions.

  • Exploits and weaknesses

  • Email support and advice post course.

  • Course certificate to enhance career development

 

What You Will Learn from This Masterclass:

  • MASTER network understanding around crypto

  • CAPTURE data relating to transactions and analysis

  • EQUIP yourself with the latest and updated methods and tradecraft to proactive investigation.

  • ADOPT the latest cutting-edge tools in relation to crypto monitoring.

  • STEP UP investigative skills to meet the new challenges offered by online tools and techniques

  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations when deployed

  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.

 

Mission Statement

The workshop, held over 2 days, covers the very best up to date methods and tradecraft to equip the modern day darkweb investigator with all the latest cutting edge tools and proactive investigation methodology. The content of this unique course not offered anywhere else. The course material is supported by real world examples and incidents. This is not a general lecture course. This course will provide the student with the understanding of how to accomplish effective investigation of OSINT and Darknet investigations. The course will allow Law enforcement to step up their investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.  The course is strictly restricted to Government and police as it contains new and innovative methodology and techniques.

Course structure

The course is designed to take the student through the full spectrum of topics necessary to be an effective Cyber Internet investigator. Whether it’s chasing cryptocurrencies, tracking paedophiles through keywords or images, or simply finding deep buried and historic data on your target, on the Darknet or the open web, this is the course for you. From network exploration and how we all leave digital footprints, to device tracking and bitcoin analysis, The course focusses on all online offenders and organised criminal gangs from financial criminal behaviour to offenders against children. 

The course also covers in detail, tracking and tracing images, Exif and meta-data, and live internet searches. The foray into the Darknet includes everything you need to know about anonymous networks their use, finding targets and tracing data on hidden networks. What cryptocurrency is and how it facilitates crime on the Darknet and how law enforcement can trace and analyse transactions.

Students will receive

Students will each receive an electronic copy of the course material, handouts and cheat-sheets for quick reference to detailed information sources and a course ONLINE LIBRARY   with associated software and resource material. Included on the LIBRARY are the software tools used during the course, tutorials and over 1000 OSINT tool links to ensure they continue to have the tools they need, post course.

 

Understanding the Dark Web 

Understanding what the Darknet really is can be a challenge.  The technology behind the Darknet is not a single program or location. This session will explore what the Darknet is and how it differs from the Deepweb.

 

Setting up a safe browser to track and trace covertly

 This session will look at the Tor network how it works and methods for using it during an investigation.

 

CryptoCurrency and its use in the Darknet

Do you need to understand how to track the funds through various cryptocurrencies?  How do wallets work and is there any evidence I can use when I find one? This session will provide you with the ability to understand and deal with Bitcoin and other cryptocurrencies during you investigations.

 

Advanced Darknet/Dark Web Investigations, identifying the anonymous user

Are there legally available methods which we can implement to identify anonymous users on the Internet? The answer is definitely yes.  This session will discuss the techniques available to the investigator to identify users of anoymization on the Internet.

 

Covert online searching and profile building 

Tracking duplicates, sources uploading, meta data and exif data interrogation and identifiers to establish device, location, source and tracking. Hashing and searching for sharing and uploading significant images. Providing sufficient data and intel to support dissemination to active teams and support warrants and DSA.

Darkweb images track and trace

Tracking duplicates, sources uploading, meta data and exif data interrogation and identifiers to establish device, location, source and tracking. Hashing and searching for sharing and uploading significant images. Providing sufficient data and intel to support dissemination to active teams and support warrants and DSA. 

Darkweb forum and marketplace interrogation

Looking at interrogating the data travelling in and out of a marketplace to identify the users

Tools 

Provision and access to over 1200 OSINT tools on my dedicated investigator training site which is a library of tools collected over the last 35 years in LEA. These cover everything. Delegates will be given access forever. Historic and specific searching. 

Website analysis 

Deep and covert searching of links and connections into a website; common or accessed sites sharing the same server space. Identifying IP and owners of sites and upload location. Possible server vulnerabilities and exploits  

Social engineering tricks and exploits 
This session gives the delegate an understanding of the origins, impact and harm that the modern criminal social engineer plays in crime and intelligence security in the modern day internet. It covers both attack and defence. Can we identify, exploit and copy their tactics? 

Tradecraft 

Covert (non attrib) and non identifying search methods. Deep searching and analysis. Alternative tool and site searching. footprint reduction and incognito browsing. Non identifying profile creation using virtual mobiles and emails to allow registration. 

OSINT legend building 

Non attributable SN profile and legend building, tradecraft and good digital hygiene around this area. 

Other identifiers of value 

Mac IMSI and IMEI, SSID and BSSID identifiers that will be of significant value to the investigation. Their anomalies, values, and potential. Port scanning and network analysis 

Location

Online secure 

 

Screen Shot 2020-04-23 at 10.39.20.png
400dpiLogoCropped.png
Screen Shot 2019-11-09 at 12.12.04.png