• N2K CyberWire
  • Search the site
  • Industry Insights
  • Podcasts
  • Briefings
  • Stories
  • Events
  • Glossary
  • N2K Pro
  • CISO Perspectives
  • Podcasts
  • Briefings
  • Pro Academy New
  • Hash Table
  • 1st Principles Course
  • About
  • Our Story
  • Press
  • Team
  • Testimonials
  • Sponsor
  • Partners
  • Dev
  • API
  • Account
  • Profile
  • Logout
Home
Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CISO Perspectives
Podcasts
Briefings
Pro Academy New
Hash Table
1st Principles Course
Dev
API
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
 
June 18, 2025
Join Pro
LOGIN
Podcasts
CISO Perspectives (public)
Ep 5
CSO Perspectives (public) 5.17.21
Ep 5 | 5.17.21
Share on LinkedInShare on FacebookShare on Twitter

Dark web and TOR: what kind of intelligence can you find there?

Subscribe
Apple Podcasts icon
Apple Podcasts
Apple Podcasts icon
Apple Podcasts
Spotify icon
Spotify
Overcast icon
Overcast
Overcast icon
Overcast
Castbox icon
Castbox
RSS icon
RSS
Show Notes

Rick Howard discusses counterintelligence operations by commercial vendors on the dark web and the kinds of intelligence that can be found.

Resources:

  • "Everything About Tor: What is Tor? How Tor Works?” By Aditya Tiwari
  • “Fraud Guides Top List of Most Frequently Sold Type of Data on Major dark web Marketplaces,” by terbiumlabs
  • “History,” by TOR
  • “Honey Onions: Exposing Snooping Tor HSDir Relays,’ by Guevara Noubir and Amirali Sanatinia
  • "How the FBI relies on dark web intel firms as frontline investigators,” by Chris Bing
  • "InfoSec at Your Service,” By Michelle Drolet
  • “It’s About To Get Even Easier to Hide on the dark web,” by Andy Greenberg
  • "The Onion Router and the Darkweb,” by Corianna Jacoby and Ming Chow
  • "What is the dark web? How to access it and what you'll find,” By Darren Guccione
  • "What's the difference between the deep web and the dark web?” Juliet Beauchamp and J.M. Porup, IDG Tech Talk
CISO Perspectives (public)
Podcast Info
HOST(S):
Kim Jones
Kim Jones is an intelligence, security, and risk management expert with nearly 40 years of experience in information security strategy, governance and compliance, and security operations. He has built, operated, and led security programs across industries, and is the principal architect of one of Arizona State University's cybersecurity education programs. Kim also teaches in SANS' leadership curriculum and UC Berkeley's MICS program. He holds a B.S. in Computer Science from West Point, an M.S. in Information Assurance from Norwich University, and CISM and CISSP certifications.
Follow Kim Jones
Schedule: Tuesdays (in season)
Creator: N2K CyberWire
CISO Perspectives (public)
N2K CyberWire
Privacy
Terms
Sponsorship Terms
Contact Us
©2025 N2K Networks, Inc. All rights reserved. CyberWire® is a registered trademark of N2K Networks, Inc.