Training on Intelligence and Evidence Gathering in Darknet Environments
Online Training on Intelligence and Evidence Gathering in Darknet Environments for Law Enforcement
Cybercrime poses a growing risk to individuals and large organizations in the USA and around the world. As such, efforts and resources should be allocated by law enforcement agencies to enforcement of policies, regulations and laws in effort to reduce and mitigate the risks of online crime. Unfortunately, the implementation of existing law enforcement efforts in preventing online crime and deterring criminals’ initiation of criminal events both online and offline is still unknown. We believe that in order to design online environments that are effective in reducing and mitigating victims’ harm, as well as preventing the initiating of online and offline criminal events, law enforcement agencies should draw on an evidence based cyber security approach.
An Evidence Based Cybersecurity is an approach aiming to support law enforcement agencies’ and policy makers’ decision-making processes regarding the deployment of enforcement efforts by calling for rigorous scientific investigations of the effectiveness of these policies, tools, and efforts in achieving their goals in the field. This approach focuses on the human players who use cyberspace for various purposes, the various junctions along the cybercrime ecosystem on which these actors meet, and the technology they use in order to support their operations. The proposed training aims at preparing law enforcement agents such as detectives, investigators and special agents to become effective professionals through exposure to theoretical knowledge, practical skills and hands-on experience that are most needed by governmental, private and law enforcement organizations.
The Evidence Based Cybersecurity Research Group and the Georgia International Law Enforcement Exchange at Georgia State University’s Andrew School of Policy Studies offer an online training program on Intelligence and Evidence Gathering in Darknet Environments. The three-day workshop will be implemented online, and will leverage the Evidence Based Cybersecurity research group’s internet network, which is separated from GSU’s network, and allows the group to assess the effectiveness of security tools and policies, as well as gather intelligence from the darknet without jeopardizing the GSU internet users’ community.
The training program will implement a wide range of activities including a set of lectures and hands-on exercises in an effort to deliver key methodological and technical skills which are necessary for developing a cost-effective intelligence and evidence gathering by law enforcement agencies. The interdisciplinary team of educators (composed of Criminology, Computer Science and Computer Information System scholars) will support workshop participants’ development of knowledge in a number of areas as well as critical thinking, which is essential for designing an effective response to online crime challenges.
Comments from Course Participants, June 29-July 1, 2020
“All instructors are true subject matter experts in this field. I enjoyed the lecture followed by the practical hands on training with the student assistants in the breakout rooms. Great class!”
“Most valuable experience: To see the extent of my company’s interests being trafficked [on dark web marketplaces. Telegram gives access to chat threads and posts vanity photos of fraudulent activity that will help initiate an investigation and possibly mitigate vulnerabilities for fraud loss from credit and gift cards.”
“I have attended other darkweb classes and this by far has been my favorite and most helpful.”
“The availability of the one on one assistance was by far the most effective training I have had on the darkweb. There was more of an opportunity to ask questions and gain better understanding.”
Comments from Course Participants, April 26-29, 2020
“The training is valuable in both law enforcement and corporate environments.”
“The training can provide law enforcement with a baseline approach to scaling /modifying their investigations.”
“I gained a great deal of knowledge in regard to crypto currency, darknet background and how to gather intelligence and evidence that will stand up in court. The actual ‘building’ of a system that allows connectivity to the darknet, utilization of tools to collect evidence and preserve evidence was in-depth.”
Presenters

Dr. David Maimon, Director Center for Evidence Based Cybersecurity, Georgia State University
David Maimon is an Associate Professor in the Department of Criminal Justice and Criminology at Georgia State University. He received his Ph.D. in Sociology from The Ohio State University in 2009. Prior to joining Georgia State University ranks, David held a professor position at the University of Maryland. David’s research interests include theories of human behaviors, cyber-enabled and cyber-dependent crimes and experimental research methods. His current research focuses on computer hacking and the progression of system trespassing events, computer networks vulnerabilities to cyber attacks, and decision-making process in cyber space. He is also conducting research on intellectual property and cyber fraud.

Dr. Robert Harrison, Associate Director, Evidence-Based Cybersecurity, Georgia State University
Robert Harrison is a Professor in Computer Science at Georgia State University. He received his Ph.D., in Molecular Biophysics from Yale University in 1985. His Lab works involves bioinformatics, machine learning, computational biology, and performance. Lately, he have been developing highly efficient algorithms for Restricted Boltzmann Machines and their intersection with Fuzzy Logic.

Dr. Yubao Wu, Associate Director, Evidence-Based Cybersecurity, Georgia State University
Dr. Yubao (Robert) Wu is an Assistant Professor in Computer Science at Georgia State University. He received his Ph.D. in Electrical Engineering and Computer Science from Case Western Reserve University. Dr. Wu’s research focuses on big data analytics, data mining, and bioinformatics. He is especially interested in analyzing and mining large-scale networks and their applications in biomedical and social domains.

Marie Ouellet, Assistant Professor at Georgia State University
Marie Ouellet is an Assistant Professor in the Department of Criminal Justice and Criminology at Georgia State University. She is interested in understanding how delinquent groups emerge and evolve, and how networks structure this process. Her main research applies network methods to the study of co-offenders, delinquent peer groups, gangs, and white-collar crime. Some of her current work draws on the policing subculture literature to explore how misconduct spreads through exposure to delinquent peers. Ouellet’s work has been published in Criminology, Journal of Research in Crime and Delinquency, and Social Networks.

Johnny Lee, Forensic Investigator, CyberSecurity & Data Privacy Specialist , Digital Hawkshaw, Speaker, Writer, Attorney
Johnny Lee is a forensic investigator, management consultant, and attorney, specializing in data analytics, digital forensics, and electronic discovery in support of investigations, data breach response, and litigation. He also provides advisory services to companies working to address complex Cybersecurity, Blockchain, Information Governance, and Data Privacy issues.
Johnny is a frequent speaker, author, panelist, and contributor on issues involving CyberSecurity, Forensic Investigations, Blockchain, eDiscovery, Data Analytics, Information Governance, Records Management, and the effective use (and risk management) of Information Technology. He operates the ForensicUpdate.com blog, and he can be found on Twitter via the handle @ForensicUpdate. Johnny received his Juris Doctorate from the Georgia State University College of Law and his Bachelor’s degree from Emory University. In 2000, he was admitted to the State Bar of Georgia, where he maintains an active law license.

Kausar Kenning, Vice President, Cybersecurity Analytics and AI, E*Trade
A highly accomplished analytical professional with a strong background in cyber security, fraud, internal audit, data security, data governance, and data management. Kausar is very experienced in leveraging advanced data analytics for Cyber Intel and fraud with a strong focus on User Behavior Analytics. Specialized in providing actionable business intelligence to leadership to make data- driven decisions that affect the bottom line and the organization. Kausar is highly skilled at growing and leading successful teams and is recognized for well-defined business acumen. She holds an M.S. in Data Analytics and has earned a PMP and CISA certification.

Robert Friedmann, Georgia State University
Dr. Robert R. Friedmann is director of the Georgia International Law Enforcement Exchange and Professor Emeritus of Criminal Justice at Georgia State University’s Andrew Young School of Policy Studies. He was the Distinguished Chair of Public Safety Partnerships (2007-2010) and served as Chair (1989-2002) of the Criminal Justice Department at Georgia State University. Dr. Friedmann received his B.S. (Sociology and Anthropology, and Philosophy) from the University of Haifa, Israel (1974); his M.A. and Ph.D. (Sociology) from the University of Minnesota (1978); and his M.S.S.W. (Social Work) from the University of Wisconsin-Madison (1981). His interest and published work focus on community policing, terrorism, and crime analysis.
Dr. Friedmann works closely with a number of police departments, in the U.S. and internationally, on community policing and homeland security.

Jordan Howell, Research Coordinator for Evidence Based Cybersecurity, Georgia State University
C. Jordan Howell is a doctoral candidate at the University of South Florida and the research coordinator for the Evidence-Based Cybersecurity Research Group at Georgia State University. Jordan received his master’s in criminology in 2016, a graduate certificate in digital forensics in 2017, and anticipates graduating with his Ph.D. in criminology in May, 2020. He has published several papers in theoretical criminology, and his main research interest is cybercrime. Currently, Jordan’s work focuses on cybercrime intervention using experimental designs and developing analytic strategies capable of predicting cybercrime involvement. Additionally, Jordan is dedicated to making cybercrime research more accessible to those entering the field, which he does through teaching various digital forensics courses at the graduate level.

Dhara Shah, Ph.D. Student
Dhara Shah is a student with a passion for telling the stories of data, backed by a strong background in computer science and mathematics. She is currently working on her Ph.D. in computer science at Georgia State. Using machine learning techniques and graph information retrieval, she converts data to information. Before being a computer science major, she obtained a master’s of philosophy in pure mathematics from India.

Aaron Lewis, Graduate Assistant at Evidence-Based Cybersecurity
Aaron Lewis is a Graduate student pursuing his masters degree in the Computer Science at Georgia State University. Aaron’s primary interests are cybersecurity and data science, and he has 3 years of experience working at IIT at Georgia State University. Aaron is working on the Honeypot project, and his primary focus is on monitoring server traffic and creating machine learning tools to gain insights about methods of attack.
Tentative Schedule
Day | Time | Topic | Speaker |
Day 1 | 09:00-10:30 | Evidence Based Cybersecurity and relevance to law enforcement operations | David Maimon |
10:45-12:00 | Cybercrime investigations and prosecutions | Jordan Howell | |
12:00-13:00 | Lunch Break | ||
13:00-14:30 | Challenges to cybercrime investigations and prosecutions | Johnny Lee | |
14:45-16:00 | Building your network | Aaron Lewis | |
Day 2 | 09:00-10:30 | Accessing the Darknet and finding darkmarkets | David Maimon |
10:45-12:00 | Finding dark markets and forums and Maintaining identities | David Maimon | |
12:00-13:00 | Lunch Break | ||
13:00-14:30 | Crypto currencies | David Maimon,Yubao Wu, Robert Harrison | |
14:45-16:00 | Collecting intelligence and building Database | Yubao Wu | |
Day 3 | 09:00-10:30 | Scrapers | Yubao Wu |
10:45-12:00 | Parsers | Yubao Wu | |
12:00-13:00 | Lunch Break | ||
13:00-14:30 | Coding and Analyses | Marie Ouellet | |
14:45-16:00 | Collaboration with Academia and the private industry | David Maimon, Robert Friedmann, Kausar Kennings |
Registration
Where: Online
Cost: $2,000.00 per participant
Payment: By check only
Make check payable to Georgia State University *
Mail to:
GILEE
Georgia State University
P. O. Box 3992
Atlanta, GA 30302-3992
*Please email gilee@gsu.edu if your agency/company needs an invoice
Register: https://gilee.formstack.com/forms/ebcs_cybersecurity_registration