Inside the Dark Web: Exploring Cybercrime with Expert David Décary-Hétu

Inside the Dark Web: Exploring Cybercrime with Expert David Décary-Hétu

Author: Jim Love December 31, 2025 Duration: 53:02

In this episode, the host shares a pre-recorded favorite interview with David Decary-Hetu, a criminologist at the University of Montreal. They discuss the dark web, its technology, and its role in cybercrime. Decary-Hetu explains how the dark web operates, its users, and the dynamics between researchers and law enforcement in tackling cyber threats. Key topics include the economics of illicit markets, the cat-and-mouse game between law enforcement and criminals, the role of cryptocurrencies, and the evolution of cyber threats. The episode offers insights into the social aspects of cybercrime and the measures being taken to combat it.

00:00 Introduction and Sponsor Message
00:52 Understanding the Dark Web
02:16 Interview with David Decary-Hetu
05:10 The Basics of the Dark Web
06:27 Technology Behind the Dark Web
14:49 Law Enforcement Challenges
21:50 Trust and Transactions on the Dark Web
23:45 Recruitment and Structure of Cybercriminals
26:42 Cultural Dynamics in Hacking Communities
27:32 Researching the Impact of Technology on Crime
29:01 Challenges in Policing the Dark Web
30:12 The Role of Social Engineering in Cybercrime
31:18 Law Enforcement Strategies and Conditional Deterrence
32:09 The Evolution of Cybercrime and Cryptocurrency
41:24 Legal and Ethical Considerations in Cybercrime
43:47 Advice for Policymakers and Corporations
48:44 Educational Resources and Conferences
50:57 Conclusion and Final Thoughts


Every morning, Jim Love sifts through the noise of the digital world to bring you a clear, concise briefing on what actually matters. Cybersecurity Today isn't about fearmongering; it's about practical awareness. You'll hear straightforward analysis of the most recent attacks targeting companies, from sophisticated ransomware campaigns to stealthy data theft. Jim breaks down the implications of major breach disclosures, explaining not just what was stolen, but how it happened and who is affected. The focus remains on actionable intelligence-concrete steps and strategic thinking that can help protect your organization's data and infrastructure. This daily podcast serves as an essential filter for IT professionals, business leaders, and anyone responsible for digital assets, transforming complex threats into understandable insights. Tune in for a grounded perspective on navigating an online landscape where the risks are constantly evolving, and the need for clear, timely information has never been greater.
Author: Language: English Episodes: 100

Cybersecurity Today
Podcast Episodes
Cisco Breached: Source Code Stolen - Cybersecurity Today [not-audio_url] [/not-audio_url]

Duration: 15:03
Cisco Source Code Stolen in Trivy Fallout, Axios Supply Chain Attack, and Active Exploitation of Fortinet and Citrix Flaws David Shipley reports multiple major security incidents: attackers used credentials stolen in the…
Russian State Hackers Go After IoS Devices [not-audio_url] [/not-audio_url]

Duration: 19:42
Mac Malware 'Infinity Stealer,' DarkSword iOS Exploits, China Telecom Espionage & TeamTNT Supply Chain Hits Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a c…
Anonymous Tip System Breach May Expose Tipsters [not-audio_url] [/not-audio_url]

Duration: 11:28
Anonymous Tip System Breach Exposes Millions of Records, Google Warns Q-Day by 2029, and New AI Documentation Supply-Chain Risks Cybersecurity Today would like to thank Meter for their support in bringing you this podcas…
Startup Accused Of Helping Fake Privacy and Security Audits [not-audio_url] [/not-audio_url]

Duration: 12:41
Compliance Startup Audit-Faking Claims, Trivy Supply-Chain Backdoor, Russia Targets Signal/WhatsApp, and Iran-Linked Stryker Disruption Cybersecurity Today would like to thank Meter for their support in bringing you this…
The Fundamental Mistake in Cybersecurity Risk Management [not-audio_url] [/not-audio_url]

Duration: 49:39
Cybersecurity Isn't Managing Risk—It's Managing Threats... And That's the Problem Host David Shipley speaks with Jeff Gardiner, a former university CISO and now at Morgan Stanley, about Gardiner's doctoral research argui…
Another Medical Device Firm Hit [not-audio_url] [/not-audio_url]

Duration: 14:24
Medical Device Breaches, Anti-Scam Pledge Scrutiny, AI Font Trick, and Iran-Linked Cyber Updates. Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete ne…