Interpol is Training Police to Fight DarkNet Crime

ziffdarknet-darknet-training-2sqligallerysliderimage.jpgParticipants in the first Darknet police training course in Singapore.

Police officers from around a dozen countries have just completed a five-day course on Tor hidden services, illegal marketplaces and crypto currencies to help them investigate crimes on the DarkNet.

Interpol has just completed its first training course designed to help police officers to use and understand the DarkNet. The five-day course was held in Singapore, and attended by officers from Australia, Finland, France, Ghana, Hong Kong, Indonesia, Japan, Netherlands, Singapore, Sri Lanka and Sweden. According to Interpol, the next course will be held in Brussels.

The students did not, it seems, explore the DarkNet itself. Interpol said in a statement that its Cyber Research Lab "created its own private DarkNet network, private cryptocurrency and simulated marketplace, recreating the virtual 'underground' environment used by criminals to avoid detection."

This simulated DarkNet enabled students to play roles as vendors, buyers and administrators to learn how Tor network hidden services actually work. "Exercises also included live law enforcement 'take downs' of the simulated market places."

Tor, the onion router, is designed to provide online privacy, which makes it attractive to governments, political activists, journalists, and "whistle blowers" such as Edward Snowden. But online privacy also attracts people who want to pursue illegal activities, such as drug dealing. This aspect will attract an increasing amount of attention from law enforcement officers as the DarkNet expands and more people learn how to protect their privacy.

Interpol, the International Criminal Police Organization, was founded in 1923 to help fight crime on a global basis, and 190 countries are members. It has no police officers, but enables the exchange of information about organized crime, drug trafficking, weapons smuggling, money laundering, child pornography, online crime and so on. "It is strictly forbidden for the Organisation to undertake any intervention or activities of a political, military, religious or racial character."

Police forces have had some successes in the past two years, taking down the Silk Road drug-dealing site in 2013 and more than 400 services in Operation Onymous in November 2014. However, new services soon emerge to replace them.

ZDNet

 

« Medical Devices are Vulnerable to Hackers
The UK Government is Offering £5000 Cyber Secure Vouchers to SMEs »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Kingsley Napley

Kingsley Napley

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area.

SevenShift

SevenShift

SevenShift is a security consulting firm with a wealth of experience in the worlds of Cybersecurity and Internet of Things (IoT).

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

Mayhem

Mayhem

Mayhem, by ForAllSecure, is a developer-first application and API security testing solution.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.

SentryMark

SentryMark

Stay a Step Ahead of Emerging Threats. Deviate from the traditional siloed defenses and get the proactive and responsive cybersecurity solutions and services you deserve with SentryMark today.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).

Prefactor

Prefactor

Prefactor was built because the problem of authenticating and authorizing users continues to be a battle engineers face globally.