Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Sweetie - Child Predator Investigatons

 

Rating :

 

Comments

 
  • kbacon5
    kbacon5 at October 27,2016
    This is a tough issue and it seems like there is no easy answer. It is very sad what is going on in the deep web and disheartening that people use tools that ideally would be used for promoting free speech, to commit crimes and aide criminals. It would be interesting if there was no anonymity on the internet and you had to be yourself and login with your real name. However, this is not a good solution in countries where freedom of speech is being suppressed. It is a tough issue and this was an interesting, but disheartening video on the topic.
  • BBurgess
    BBurgess at November 15,2016
    The deep web is a free place to do what ever it is you like anonymously. Its disturbing all the different things you can find there and the sick people that want to do such things as harm children, assassinations, ect. Using the onion router or TOR to achieve this privacy in surfing has become very popular with people who do not want to be tracked by governments and entities to which they could get in trouble or prosecuted. TOR routes data in an interesting way and poses a tremendous obstacle for law enforcement to get over when trying to track down a users origin or identity. I use to use the TOR Browser for security purposes with every day work, but I have gotten away from using it. This was a very interesting video. Thank you.
  • Safiyah
    Safiyah at November 23,2016
    As dgrove said, it was not necessarily a new concept, but there was some more detail here than I had been aware of as far as the deep web. Unfortunately, the gun seller and child exploitation did not come as a surprise, though they served as a disturbing reminder of the darker side of human beings. That said, this really is just a tool that can be used for good or evil like a hammer, as the TOR guy mentioned. Ultimately, it seems like the Deep Web is what we would have had in the early stages of the internet, where law enforcement's and the general population's understanding of how it works was not yet what it is today and criminals are ahead of the game in finding creative ways to anonymously commit crimes.
  • kticfrs500
    kticfrs500 at November 29,2016
    It was a good video discussing the more philosophical side of Darknet/Deep Web/TOR. Just like having a lot of money within close reach that can save a life by financing an expensive operation or buy drug money that is used by an addict who then decides to drive a vehicle that hits the person in my previous comment. This particular means of acquiring power/access can empower a suppressed human being in an oppressive country to exercise some freedom of speech or it can give a kingpin even more power by being able to sell drugs not just on the streets but online as well. Just like commentator said…do we want the devil we know or the devil we don’t?
  • jgala
    jgala at November 29,2016
    This video just shows the basics of the dark side of the internet but in reality there are multiple goods being traded to people online. Fake passports being used to enter multiple countries illegally to trading child pornography which needs to be reported to law enforcement so that quick actions can be taken. But as the technology is used for good cause by letting social media activist to journalist convey the actual truth rather than just relying on media which may cover up facts should also be considered. Edward Snowden was right in his place to uncover the mass surveillance of people as legally we all have right to our privacy which is being breached at multiple governmental organization across multiple countries. TOR is the actual project of U.S. Government but they use it to hide their data from other people and vice versa, but still it is difficult to control the exit nodes that handle all the data being transferred.
    • «
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved