Justice Information Sharing

Parallel Investigation Techniques

This webinar will show how parallel investigation techniques commence with a review of tactics and strategies that can be introduced in related fraud enquires. The importance protecting the tradecraft deployed and the use of open and closed source research will be discussed to include comparable techniques used in covert sensitive investigations. Money laundering utilizing virtual, or cryptocurrency will be featured to examine current tradecraft. Additionally, this presentation will include discussion of the impact on not-for-profits as well as a look at mortgage fraud. Supporting case studies will highlight the merit of covert/sensitive law enforcement investigative techniques. The presentation will emphasize the link between tax avoidance, money laundering, and terrorist funding. Finally, proper legislation and an effective suspicious transaction reporting process will complete the program.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open-source and commercially-available investigative tools for social engineering, information gathering, and artifacts related to social media; as well as automated utilities to capture information and crawl websites.

*Internet basics. IP address assignment; resolving domains and IP addresses; networking overview.
*Popular sites. Facebook, Twitter, KiK Messenger, Snapchat, Instagram, tumblr, and more.
*The dark web. Surface, deep, and dark web; how data flows through the internet. Who uses the dark web and how?
*Tor. How to access Tor; how Tor traffic works; how a Tor Hidden Service works; installing and configuring the Tor Browser Bundle.

Data Validation of Digital Forensic Evidence

Is information from mobile extractions, Cloud Source and Google Timeline a solid piece of evidence? In this webinar, we will see how to make your digital evidence become a strong basis for courtroom testimony when validated with phone records, cell coverage, and other sources. Prove your data and set a solid foundation for justice.

Presented by:
Nicola Chermello, CEO and Co-Founder of SecurCube

NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

Metaverse, Web3, and Blockchain - Security Observations

The Metaverse, while still a concept at the moment, will become a reality in the not-too-distant future. It consists of the opportunities created by combining the advances and affordances of augmented reality such as AR and VR and virtual (gaming) worlds with the decentralized nature and composability of Web3, crypto assets, DeFi, and the underlying blockchain technology. Cybercriminals see this market as a hot spot as they can make quick profits here and this webinar will explore some of the opportunities and risks.

Presented by:
Anna Collard, SVP of Content Strategy and Evangelist for KnowBe4Africa

NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

AirTags and Tracking Technology: Investigative and Legal Perspectives

This webinar will examine the investigative and legal considerations related to tracking technology, and the impact of ultra-wideband location networks such as Apple AirTags and other similar emerging technologies. We will use case analysis to illustrate key questions and considerations for both investigators and prosecutors given the increasing criminal use of this technology and proactive use during investigations.

Presented by:
Justin Fitzsimmons, Associate Vice President, NW3C
Jim Emerson, Vice President, NW3C

How Do I Get My Fraud Investigated?

This webinar will examine the evolving complexity of investigation of fraud, money laundering, and terrorist financing by a team of UK detectives fighting financial crime both within the UK and globally for over 30 years. The webinar will use notable cases to study investigative approaches, placement, integration with other enforcement, investigative techniques, and critical "toolkit". These UK pioneers of advance fee fraud (aka 419 scams) investigations who worked with U.S. counterparts will use historical lessons and bring the audience up to date on these crimes as they relate to money laundering, the roles of informal banking, and exploitation of not-for-profits, and use of virtual currency. This webinar will also examine lessons related to gaps in legislation, the health of financial intelligence in vulnerable nation states, and offer discussion and debate regarding successful global investigative strategies for U.S. investigators.

IA102 Introduction to Link Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

FC122 Intellectual Property Theft Training

This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific folder that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

This course is presented in collaboration with the National Association of Attorneys General (NAAG).
Awareness. Types of IP crimes. The criminals who commit these crimes. Impacts and dangers.
Investigation. Online and traditional techniques. Working with brand experts and the private sector. Large amounts of evidence. Resources.
Statutes. Prosecutorial theories. State-specific discussion.
Hands-on experience. Work with real counterfeit products. Identify fakes with expert guidance.

DF320 Advanced Digital Forensic Analysis: macOS

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes, but is not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

Pages