PSP

Bitcoin & Cryptocurrency Investigations: Beyond the Basics

Building upon the previous cryptocurrency webinar, "Bitcoin 101: What Are Cryptocurrency and Blockchain All About?" presented by Cobwebs, this webinar will introduce investigative techniques to show how open-source information can be leveraged to attribute identities to wallets and addresses. This webinar will also briefly demonstrate the OSINT and cryptocurrency analysis capabilities of Cobwebs.

ICAC UC Chat Techniques Tips and Tricks

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Undercover chat investigations are used to help intercept child predators from victimizing children in our communities. In this webinar, we will provide an overview of the chat techniques used in child exploitation cases. We will cover different apps that were used and how they assisted in identifying the targets and discuss some of the interview techniques that helped lead to confessions.

*This webinar is not a replacement for the ICAC UC Chat Investigations Course.

Presented by:
Moe McClanahan, High-Tech Crime Specialist, NW3C
Robert Leazenby, High-Tech Crimes Specialist Supervisor, NW3C
Brent Metcalfe, High-Tech Crime Specialist, NW3C

Nutrition Status Check: Dietary Supplements for the Criminal Justice Professional

In this webinar, you will learn what dietary supplements are, what supplements can be helpful and which ones are risky or just a waste of money, supplements for different life stages and conditions, and where and how to buy quality supplements.

Presented by:
Rana Parker, MPH, RDN Dietitian Nutritionist, Los Angeles Police Department

Parallel Investigation Techniques

This webinar will show how parallel investigation techniques commence with a review of tactics and strategies that can be introduced in related fraud enquires. The importance protecting the tradecraft deployed and the use of open and closed source research will be discussed to include comparable techniques used in covert sensitive investigations. Money laundering utilizing virtual, or cryptocurrency will be featured to examine current tradecraft. Additionally, this presentation will include discussion of the impact on not-for-profits as well as a look at mortgage fraud. Supporting case studies will highlight the merit of covert/sensitive law enforcement investigative techniques. The presentation will emphasize the link between tax avoidance, money laundering, and terrorist funding. Finally, proper legislation and an effective suspicious transaction reporting process will complete the program.

Data Validation of Digital Forensic Evidence

Is information from mobile extractions, Cloud Source and Google Timeline a solid piece of evidence? In this webinar, we will see how to make your digital evidence become a strong basis for courtroom testimony when validated with phone records, cell coverage, and other sources. Prove your data and set a solid foundation for justice.

Presented by:
Nicola Chermello, CEO and Co-Founder of SecurCube

NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

AirTags and Tracking Technology: Investigative and Legal Perspectives

This webinar will examine the investigative and legal considerations related to tracking technology, and the impact of ultra-wideband location networks such as Apple AirTags and other similar emerging technologies. We will use case analysis to illustrate key questions and considerations for both investigators and prosecutors given the increasing criminal use of this technology and proactive use during investigations.

Presented by:
Justin Fitzsimmons, Associate Vice President, NW3C
Jim Emerson, Vice President, NW3C

How Do I Get My Fraud Investigated?

This webinar will examine the evolving complexity of investigation of fraud, money laundering, and terrorist financing by a team of UK detectives fighting financial crime both within the UK and globally for over 30 years. The webinar will use notable cases to study investigative approaches, placement, integration with other enforcement, investigative techniques, and critical "toolkit". These UK pioneers of advance fee fraud (aka 419 scams) investigations who worked with U.S. counterparts will use historical lessons and bring the audience up to date on these crimes as they relate to money laundering, the roles of informal banking, and exploitation of not-for-profits, and use of virtual currency. This webinar will also examine lessons related to gaps in legislation, the health of financial intelligence in vulnerable nation states, and offer discussion and debate regarding successful global investigative strategies for U.S. investigators.

Metaverse, Web3, and Blockchain - Security Observations

The Metaverse, while still a concept at the moment, will become a reality in the not-too-distant future. It consists of the opportunities created by combining the advances and affordances of augmented reality such as AR and VR and virtual (gaming) worlds with the decentralized nature and composability of Web3, crypto assets, DeFi, and the underlying blockchain technology. Cybercriminals see this market as a hot spot as they can make quick profits here and this webinar will explore some of the opportunities and risks.

Presented by:
Anna Collard, SVP of Content Strategy and Evangelist for KnowBe4Africa

NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

CI101 Basic Cyber Investigations: Digital Footprints

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individuals digital footprint, protecting privacy on social media, and the consequences of oversharing personal information; as well as steps to take after becoming a target of doxing.

*Current landscape. Emerging technology and trends that can aid criminals in the commission of identity theft, credit card theft, child exploitation, and production of counterfeit documents.
*Personally identifiable information (PII). Learn what PII is, why it can threaten individuals safety, and the scams and exploits criminals use to obtain it.
*Minimizing your digital footprint. Learn how and why you should remove PII, and how to find where information may be located. Instructors demonstrate how to secure digital devices and request removal of data from a website.
*Social media. Use security and privacy settings to control the amount of available information on multiple platforms.
*Resources. Identify resources that can help victims of identity theft, doxing, and other related crimes.

Pages