O'Reilly logo

Investigating Internet Crimes by Art Bowker, Todd G. Shipley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

Working Unseen on the Internet

This chapter introduces the reader to the techniques and tools required to work unseen on the Internet, particularly, by any investigative targets. The chapter discusses the types of Internet anonymization in use and how those tools can be implemented by the investigator. The chapter also stresses the need for investigators to use these anonymizing techniques consistent with their agency or company’s mission and legal requirements. The discussion starts with common techniques, such as the use of factious personas and emails and use of open or public Wi-Fi networks. It then quickly proceeds to the use of web anonymizers, proxy servers, Virtual Private Networks (VPN), The Onion Router (Tor), and The Amnesic ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required