Justice Information Sharing

FC101 Financial Investigations Practical Skills

This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues.

Emerging issues. Current trends in various types of financial crimes. Recent cases and their implications.
Financial records. Learn to obtain and manage bank records, including basic spreadsheeting skills.
Working with data. Extract leads and draw conclusions from bank records and other financial data.
Hands-on experience. Work a mock financial case as part of an investigative team.

DF320 Advanced Digital Forensic Analysis: macOS

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes, but is not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

DF205 Intermediate Digital Forensic Analysis: SQLite Primer

Mobile devices dominate the intake list, and the desks of most digital forensics analyst globally. Devices are becoming more secure, with an increase in security the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

What is SQLite and how to identify and analyze logically
Recognizing relevant locations of valuable data within SQLite database.
Develop skills needed for crafting custom SQLite queries.
Learn how to recognize and decode a variety of common timestamp formats.
Learn how to perform SQLite analysis with automation.

DF203 Intermediate Digital Forensic Analysis: Forensic Video Analysis

This course provides training on digital forensics for video, specifically targeting common file formats rather than proprietary video encodings or delivery methods. It aims to prepare investigators to answer critical questions about the file and ensure key evidence is not overlooked. This training is designed to support investigations by providing the necessary expertise to handle the complexities of video evidence in the digital age, addressing possible pitfalls including deepfakes, manipulated video, and potential overlooked evidence.

Key concepts covered in this course include:
Digital video file creation
Tool and result verification
Metadata and parsing
Image classification
Hash value comparison
Image/video classification and reporting results

Lunch and Learn with Binance, Roblox, and Kodex

Join us for the Learn and Lunch webinar series, where legal experts from Binance, the worlds largest cryptocurrency exchange, and Roblox, a popular gaming platform, come together to provide valuable insights for professionals navigating the intersection of law enforcement and digital platforms.

The presentation will cover two key areas. First, experts from Binance will provide crucial updates on cryptocurrency investigations, including best practices for handling crypto-related legal processes and the latest market changes that could impact your work. As cryptocurrency continues to play a growing role in digital investigations, understanding these evolving legal frameworks is essential for law enforcement and legal professionals. Next, experts from Roblox will guide attendees through the platforms key safety features, explaining how law enforcement can effectively engage with Roblox. The session will also include a walkthrough on submitting information requests to Roblox, focusing on data availability, retention policies, and the primary identifiers needed to locate requested data. This section aims to equip attendees with practical tools to navigate Roblox's legal processes efficiently.

Throughout the webinar, participants will have the opportunity to hear directly from experts, ask questions, and share ideas for improving legal procedures within these dynamic industries. The event will conclude with an interactive Q&A session, allowing attendees to engage in a collaborative dialogue with industry leaders. Do not miss this chance to enhance your understanding of cryptocurrency investigations and digital platform legal processes.

Presented by:
Jarek Jakubcek, Head of LE Training, Binance
AJ Iafrate, Government Relations North America, Kodex Global

Open-Source Investigative Methods for Counter Narcotics and Human Trafficking Investigations

Threat actors are increasing their use of the Internet, social media and apps to conceal and advance their trafficking operations. Open-source information can provide investigators with intelligence and investigative leads related to narcotics and human trafficking operations. This webinar will provide attendees with introductory methods related to open-source information collection as it applies to identifying online profiles and activity related to narcotics and human trafficking. Attendees will learn how to safely navigate social media platforms while adhering to local laws and methods of collection.

Presented by:
Adam Scarisbrick, Senior Instructor, Hetherington Group

Shutting Down America's Largest Illicit Online Gift Card Marketplace

Organized retail crime is on the rise, affecting both the retail and financial industries. In a landmark case titled Operation Bad Bot, Homeland Security Investigations (HSI) unraveled a complex, online gift card fraud scheme, culminating in the shutdown of a marketplace with more than $22 million in stolen gift cards and the arrest and prosecution of the Canadian man behind the scheme. In this webinar, you will take a deep dive into Operation Bad Bot, learn how HSI solved this case, and hear how HSI worked with the U.S. Department of Justice to prosecute the perpetrator.

Presented by:
Dariush Vollenweider, Group Supervisor, U.S. Department of Homeland Security
Alan Stevens, Assistant U.S. Attorney, U.S. Department of Justice

NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, opinions, or view of NW3C.

Telegram Investigations

This webinar will cover investigations into Telegram app. For many, Telegram has been a frustration as they do not know how the app works, and just what investigative avenues can be pursued. This webinar will cover how Telegram functions, how Telegram channels work, how Telegram Bots work to facilitate sales, and also explore the T.O.N. (The Open Network) crypto currency that is built upon the Telegram network. Case studies will be shown, as well in depth investigative techniques. There has never been a more comprehensive webinar about the end-to-end encryption messaging app than this!

Presented by:
Keven Hendricks, Detective, City of New Brunswick, NJ, Police Department

CI130 Basic Cyber Investigations: Cellular Records Analysis

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers; and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of NW3Cs PerpHound tool, which assists in the plotting of call detail record locations.

*Cellular technology. Land-line and cellular networks. Types and generations of cell phones. Cell site design and its implications for law enforcement.
*Analysis of call detail records. Request information from service providers. Convert records into a useful format. *Merge two related spreadsheets. Read and analyze using filters, sorting, and pivot tables. Plot location information.
*Hands-on experience. Hands-on experience with NW3Cs free software tool PerpHound and Microsoft Excel to analyze various types of records that are available from cellular providers.

DF310 Advanced Digital Forensic Analysis: Windows

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

Pages