Dark Web and Open Source Information Primer
This webinar will offer a primer on the dark web and how to find free information on the Internet that can help investigators as they work to solve almost all types of cases.
This webinar will offer a primer on the dark web and how to find free information on the Internet that can help investigators as they work to solve almost all types of cases.
A former prosecutor and a high-tech crime attorney will square off in several rounds of debate on whether, and how, law enforcement can obtain evidence stored electronically overseas. Each round will involve a hypothetical case that incorporates relevant, cutting-edge evidentiary questions on various topics including overseas servers, CLOUD Act considerations, space-based data storage, and pertinent international law.
Coinciding with the start of the second session of the 116th Congress, the National District Attorneys Association’s Capital Conference provides participants with the opportunity to hear directly from Administration, agency, and Capitol Hill speakers. Join them in the nation’s capital, Washington, DC, for an educational and networking event to connect directly and in-person with lawmakers.
The conference includes:
This national conference hosted by the National Center for Victims of Crime, National Training Institute, and National Crime Victim Bar Association will take place on December 4 – 6, 2019 in Denver, Colorado.
As the Internet continues to evolve, new layers populate where offenders commit criminal offenses. One such area is the Darknet. Participants will learn about the Darknet, how potential criminal activity is facilitated on the Darknet, and why this knowledge is crucial to investigating and prosecuting child exploitation cases. Additionally, participants will learn how to access other locations on the Darknet.
This webinar will highlight the changes to the DF330 course and will focus on the advanced skills and knowledge required to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices. Students will use forensically sound methods and techniques to analyze potential evidence, employing advanced techniques to uncover evidence that was potentially missed or misrepresented by commercial forensic tools. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Students will learn how to develop the "hunt" methodology for analyzing third party applications that are not supported by commercial forensic tools. In addition to finding data, students will learn how to analyze data by writing custom SQLite queries and will learn to use the terminal as a powerful tool in investigations.
In many sexual abuse cases, DNA or other traditional forensic evidence does not exist, and the outcome often depends on the abilities of a multidisciplinary team to maximize the strength of survivors throughout the investigation and at trial. A former prosecutor and an abuse survivor who recorded the perpetrator's confession share investigative tips, best practices for interacting with survivors, and trial strategies to dismantle the power dynamics of perpetrator and victim.
The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. What is the dark web fraud economy? What drives it? What can we do about it?
This webinar will discuss the types of evidence that should be collected in response to a business email compromise/Office 365 email investigation. It will also discuss methods of email compromise (phishing, malware, brute force attacks, and external compromise/credential stuffing), types of data at risk, and commonly seen schemes.
Digital evidence has become an essential part of every legal matter, whether it be a criminal, civil, or internal investigation. Using a case study, this session will demonstrate the methods used to determine that an email submitted as evidence in federal court had been forged. The methods demonstrated in this case study may be reliably referenced when reviewing any questionable digital documents without the need for specialized software. This presentation will demonstrate the probative value of digital forensics in fraud investigations.