Working Unseen on the Internet
This chapter introduces the reader to the techniques and tools required to work unseen on the Internet, particularly, by any investigative targets. The chapter discusses the types of Internet anonymization in use and how those tools can be implemented by the investigator. The chapter also stresses the need for investigators to use these anonymizing techniques consistent with their agency or company’s mission and legal requirements. The discussion starts with common techniques, such as the use of factious personas and emails and use of open or public Wi-Fi networks. It then quickly proceeds to the use of web anonymizers, proxy servers, Virtual Private Networks (VPN), The Onion Router (Tor), and The Amnesic ...
Get Investigating Internet Crimes now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.