Criminality on the Tor Network
Course Credit?
Yes - UA 156Paid Position?
NoFaculty
Diana DolliverDescription
The Tor Network can be thought of as a corner of the internet that provides "anonymity" to its users. Tor does so by using a number of proxies to conceal your real IP address; through these methods, Tor allows for its users to browse the "clearnet" (i.e., the general internet that you are familiar with - Google, Facebook, Twitter, etc.) and also access .onion websites. Unfortunately, criminals have realized that an anonymous network like Tor offers an added layer of security from law enforcement detection. This is where Dr. Dolliver comes in... Dr. Dolliver has over 4 years of experience researching controlled substances and weapons markets on the Tor Network specifically and over 10 years of experience researching macro-level patterns of international drug trafficking and drug trafficking organizations. Her current research projects track drug and weapons markets on various international Tor marketplaces. Emerging Scholars working with Dr. Dolliver assist her in data collection, cleaning and coding, as well as analyzing the data for trends. Students may also have the opportunity to participate in the write-up of the findings, which will contribute to peer-reviewed manuscripts and conference presentations.
Special Directions
The work will be conducted in the Joint Electronic Crimes Task Force's (JECTF) Network Intrusion Lab. Due to the nature of the work and the location of the lab, all Emerging Scholars must successfully complete a background check and a non-disclosure form prior to the start date.
Special Skills
None needed; you do NOT have to be a computer expert to assist with this project. You simply have to be motivated and interested in the research topics.