End to End encryption, Tor, VPNs, and other technological challenges have made it difficult to find and lure predators out of the shadows. In this workshop, the presenters will discuss advanced undercover chatting techniques they have been using over the last several years. These techniques were able to find and engage egregious predators all of whom had multiple victims. They will also discuss how to get around sending photos and images and how to turn the very techniques that predators use against children against them. Lastly, they will discuss various Darknet forums, predator strategies, and ways for investigators to bypass them.
Learning Objectives:
Structuring chats with serial offender's.
Assess offender's mindset and your capabilities.
Develop social engineering techniques while chatting with offenders.