Interpol is Training Police to Fight DarkNet Crime

ziffdarknet-darknet-training-2sqligallerysliderimage.jpgParticipants in the first Darknet police training course in Singapore.

Police officers from around a dozen countries have just completed a five-day course on Tor hidden services, illegal marketplaces and crypto currencies to help them investigate crimes on the DarkNet.

Interpol has just completed its first training course designed to help police officers to use and understand the DarkNet. The five-day course was held in Singapore, and attended by officers from Australia, Finland, France, Ghana, Hong Kong, Indonesia, Japan, Netherlands, Singapore, Sri Lanka and Sweden. According to Interpol, the next course will be held in Brussels.

The students did not, it seems, explore the DarkNet itself. Interpol said in a statement that its Cyber Research Lab "created its own private DarkNet network, private cryptocurrency and simulated marketplace, recreating the virtual 'underground' environment used by criminals to avoid detection."

This simulated DarkNet enabled students to play roles as vendors, buyers and administrators to learn how Tor network hidden services actually work. "Exercises also included live law enforcement 'take downs' of the simulated market places."

Tor, the onion router, is designed to provide online privacy, which makes it attractive to governments, political activists, journalists, and "whistle blowers" such as Edward Snowden. But online privacy also attracts people who want to pursue illegal activities, such as drug dealing. This aspect will attract an increasing amount of attention from law enforcement officers as the DarkNet expands and more people learn how to protect their privacy.

Interpol, the International Criminal Police Organization, was founded in 1923 to help fight crime on a global basis, and 190 countries are members. It has no police officers, but enables the exchange of information about organized crime, drug trafficking, weapons smuggling, money laundering, child pornography, online crime and so on. "It is strictly forbidden for the Organisation to undertake any intervention or activities of a political, military, religious or racial character."

Police forces have had some successes in the past two years, taking down the Silk Road drug-dealing site in 2013 and more than 400 services in Operation Onymous in November 2014. However, new services soon emerge to replace them.

ZDNet

 

« Medical Devices are Vulnerable to Hackers
The UK Government is Offering £5000 Cyber Secure Vouchers to SMEs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

Jiran Security

Jiran Security

Jiran Security provides data and application security solution over email, mobile device and endpoints.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

InfoGuard

InfoGuard

InfoGuard is a leading Swiss company providing comprehensive cyber security and network solutions.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

Zeusmark

Zeusmark

Zeusmark are a digital brand security company. We enable companies to successfully defend their brands, revenue and consumers online.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

Eastern Cyber Resilience Centre (ECRC)

Eastern Cyber Resilience Centre (ECRC)

The Eastern Cyber Resilience Centre is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Fletch

Fletch

Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpreting every threat article every day and matching those threats to a company’s exposure.