Interpol is Training Police to Fight DarkNet Crime

ziffdarknet-darknet-training-2sqligallerysliderimage.jpgParticipants in the first Darknet police training course in Singapore.

Police officers from around a dozen countries have just completed a five-day course on Tor hidden services, illegal marketplaces and crypto currencies to help them investigate crimes on the DarkNet.

Interpol has just completed its first training course designed to help police officers to use and understand the DarkNet. The five-day course was held in Singapore, and attended by officers from Australia, Finland, France, Ghana, Hong Kong, Indonesia, Japan, Netherlands, Singapore, Sri Lanka and Sweden. According to Interpol, the next course will be held in Brussels.

The students did not, it seems, explore the DarkNet itself. Interpol said in a statement that its Cyber Research Lab "created its own private DarkNet network, private cryptocurrency and simulated marketplace, recreating the virtual 'underground' environment used by criminals to avoid detection."

This simulated DarkNet enabled students to play roles as vendors, buyers and administrators to learn how Tor network hidden services actually work. "Exercises also included live law enforcement 'take downs' of the simulated market places."

Tor, the onion router, is designed to provide online privacy, which makes it attractive to governments, political activists, journalists, and "whistle blowers" such as Edward Snowden. But online privacy also attracts people who want to pursue illegal activities, such as drug dealing. This aspect will attract an increasing amount of attention from law enforcement officers as the DarkNet expands and more people learn how to protect their privacy.

Interpol, the International Criminal Police Organization, was founded in 1923 to help fight crime on a global basis, and 190 countries are members. It has no police officers, but enables the exchange of information about organized crime, drug trafficking, weapons smuggling, money laundering, child pornography, online crime and so on. "It is strictly forbidden for the Organisation to undertake any intervention or activities of a political, military, religious or racial character."

Police forces have had some successes in the past two years, taking down the Silk Road drug-dealing site in 2013 and more than 400 services in Operation Onymous in November 2014. However, new services soon emerge to replace them.

ZDNet

 

« Medical Devices are Vulnerable to Hackers
The UK Government is Offering £5000 Cyber Secure Vouchers to SMEs »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

Cyber Affairs

Cyber Affairs

Cyber Affairs is the first Italian press agency entirely dedicated to cyber security.

NSIDE Attack Logic

NSIDE Attack Logic

NSIDE Attack Logic simulates real-world cyber attacks to detect vulnerabilities in corporate networks and systems.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Cybil

Cybil

Cybil is a publicly-available portal where members of the international cyber capacity building community can find and share information to support the design and delivery of programs and projects.

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

Reality Defender

Reality Defender

Reality Defender stops deepfakes before they become a problem. Our proprietary deepfake and generative content fingerprinting technology detects video, audio, and image deepfakes.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.