Index/Topics/Network investigative techniques

Network investigative techniques

Using network investigative techniques to unmask users

Fact-Checks

5 results
Jan 18, 2026
Most Viewed

How does the FBI's Operation Onion Peeler impact Tor user anonymity?

Operation Onion Peeler— the FBI’s investigation that targeted Silk Road and related Tor hidden services—did not “break” Tor’s cryptography but demonstrated that targeted law-enforcement techniques, op...

Jan 12, 2026
Most Viewed

What tools does the FBI use to deanonymize dark web users?

The FBI uses a layered toolkit to deanonymize dark‑web users that combines malware-style Network Investigative Techniques (NITs), network and timing analysis (including controlling or observing Tor no...

Jan 23, 2026
Most Viewed

What methods do law enforcement agencies use to de-anonymize Tor users?

Law enforcement agencies use a toolbox of technical and traditional investigative methods to , including running Tor relays to perform timing/correlation analysis, deploying malware or against endpoin...

Jan 14, 2026

How have intelligence agencies historically used traffic correlation or other methods to deanonymize Tor users?

Intelligence agencies have combined traffic-correlation (controlling or observing entry and exit points), active network manipulation (BGP hijacks/interception), targeted malware and “network investig...

Jan 8, 2026

Have there been recent high-profile cases where Tor users were identified by authorities (2023–2025)?

Tor remains a designed-to-anonymize network that complicates attribution, but adversaries — states, criminals, and malware authors — have technical means to reduce that anonymity under some conditions...