This thesis identifies mechanisms that law enforcement can utilize to track cyber criminals who use anonymous internet networks.
Anonymous networks are important for maintaining one’s privacy on the internet; however, these networks can be used for both good and bad. While a humanitarian worker may use one to spread the word about atrocities committed by an oppressive regime, a person with malicious intent might use it to compromise a system anonymously. To this extent, it is important for law enforcement to understand anonymous networks and how they can be countered in a criminal investigation. Many attacks against networks such as Tor already exist. Some of these attacks require resources inaccessible to the average investigator. (Published abstract provided)
Popular TopicsCriminal investigation Law enforcement Cyber criminal
- A Randomized Controlled Trial of the Impact of Body-Worn Camera Activation on the Outcomes of Individual Incidents
- Randomized Trial of Family Therapy Versus Nonfamily Treatment for Adolescent Behavior Problems in Usual Care
- A high resolution study of long-term vertebrate decomposition in human and animal model systems