Inside the Dark Web: Exploring Cybercrime with Expert David Décary-Hétu

Inside the Dark Web: Exploring Cybercrime with Expert David Décary-Hétu

Author: Jim Love December 31, 2025 Duration: 53:02

In this episode, the host shares a pre-recorded favorite interview with David Decary-Hetu, a criminologist at the University of Montreal. They discuss the dark web, its technology, and its role in cybercrime. Decary-Hetu explains how the dark web operates, its users, and the dynamics between researchers and law enforcement in tackling cyber threats. Key topics include the economics of illicit markets, the cat-and-mouse game between law enforcement and criminals, the role of cryptocurrencies, and the evolution of cyber threats. The episode offers insights into the social aspects of cybercrime and the measures being taken to combat it.

00:00 Introduction and Sponsor Message
00:52 Understanding the Dark Web
02:16 Interview with David Decary-Hetu
05:10 The Basics of the Dark Web
06:27 Technology Behind the Dark Web
14:49 Law Enforcement Challenges
21:50 Trust and Transactions on the Dark Web
23:45 Recruitment and Structure of Cybercriminals
26:42 Cultural Dynamics in Hacking Communities
27:32 Researching the Impact of Technology on Crime
29:01 Challenges in Policing the Dark Web
30:12 The Role of Social Engineering in Cybercrime
31:18 Law Enforcement Strategies and Conditional Deterrence
32:09 The Evolution of Cybercrime and Cryptocurrency
41:24 Legal and Ethical Considerations in Cybercrime
43:47 Advice for Policymakers and Corporations
48:44 Educational Resources and Conferences
50:57 Conclusion and Final Thoughts


Every morning, Jim Love sifts through the noise of the digital world to bring you a clear, concise briefing on what actually matters. Cybersecurity Today isn't about fearmongering; it's about practical awareness. You'll hear straightforward analysis of the most recent attacks targeting companies, from sophisticated ransomware campaigns to stealthy data theft. Jim breaks down the implications of major breach disclosures, explaining not just what was stolen, but how it happened and who is affected. The focus remains on actionable intelligence-concrete steps and strategic thinking that can help protect your organization's data and infrastructure. This daily podcast serves as an essential filter for IT professionals, business leaders, and anyone responsible for digital assets, transforming complex threats into understandable insights. Tune in for a grounded perspective on navigating an online landscape where the risks are constantly evolving, and the need for clear, timely information has never been greater.
Author: Language: English Episodes: 100

Cybersecurity Today
Podcast Episodes
Cisco SD-WAN Bug Actively Exploited [not-audio_url] [/not-audio_url]

Duration: 10:15
Cisco SD-WAN Bug Actively Exploited, MCP Azure Takeover Demo, CarGurus Data Leak, and Secret Service Scam Recovery Host Jim Love covers four cybersecurity stories: CSA warns a critical Cisco Catalyst SD-WAN controller vu…
Discord Finds Age Identification May Have Privacy Concerns [not-audio_url] [/not-audio_url]

Duration: 9:21
Discord Drops Persona Age Verification, SolarWinds Serv-U Critical RCEs, Splunk Windows Priv Esc, and Smart TV Screenshot Surveillance Lawsuits In this episode of Cybersecurity Today, host Jim Love covers Discord ending…
CISA Orders Emergency Patch for Actively Exploited Dell Flaw; [not-audio_url] [/not-audio_url]

Duration: 8:33
CISA Orders Emergency Patch for Actively Exploited Dell Flaw; Texas Sues TP-Link; Massive ID Verification Data Leak; SSA Database Leak Allegations Host Jim Love covers four cybersecurity stories: Cybersecurity Today woul…
OpenClaw: Info Stealers Take Your Soul [not-audio_url] [/not-audio_url]

Duration: 10:32
Info Stealers Target OpenClaw, a Robot Vacuum API Flaw Exposes Thousands, Best Buy Fraud Shows Zero Trust Context, and Canada Goose Data Leaked via Supplier The episode covers multiple security incidents and lessons. Hud…
BeyondTrust Zero-Day Exploited, [not-audio_url] [/not-audio_url]

Duration: 10:33
This episode covers multiple active threats and security changes. It warns of an actively exploited critical BeyondTrust remote access vulnerability (CVE-2026-1731, CVSS 9.9) enabling pre-authentication remote code execu…