This thesis identifies mechanisms that law enforcement can utilize to track cyber criminals who use anonymous internet networks.
Anonymous networks are important for maintaining one’s privacy on the internet; however, these networks can be used for both good and bad. While a humanitarian worker may use one to spread the word about atrocities committed by an oppressive regime, a person with malicious intent might use it to compromise a system anonymously. To this extent, it is important for law enforcement to understand anonymous networks and how they can be countered in a criminal investigation. Many attacks against networks such as Tor already exist. Some of these attacks require resources inaccessible to the average investigator. (Published abstract provided)
Similar Publications
- Raman Spectroscopy and Chemometrics for Forensic Bloodstain Analysis: Species Differentiation, Donor Age Estimation, and Dating of Bloodstains
- Testing the Invariance of Warrior and Guardian Orientations on the Prioritization of Procedural Justice: Do Officer Demographics Matter?
- Public Surveillance Cameras and Crime: The Impact of Different Camera Types on Crime and Clearances