| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Network Investigative Techniques are used to investigate cyber criminal activities. These techniques have been used to unmask users of TOR whom are downloading illegal content from the Tor network. This talk will discuss such techniques, discuss ethical and legal issues and describe a methodology to test and verify such techniques. Dr. Matthew has taught Computer Science and assembly and reverse engineering for 6 years at the collegiate level. He has been called as an expert witness on more that a dozen Federal Cases, where he had to reverse engineer the NIT code provided by the government. His expert declarations have been used by the ACLU in their "Challenging government hacking in criminal cases" guide for attorneys and by lawyers in federal cases.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast