Juvenile Justice Agencies

Nutrition Status Check: Dietary Supplements for the Criminal Justice Professional

In this webinar, you will learn what dietary supplements are, what supplements can be helpful and which ones are risky or just a waste of money, supplements for different life stages and conditions, and where and how to buy quality supplements.

Presented by:
Rana Parker, MPH, RDN Dietitian Nutritionist, Los Angeles Police Department

Parallel Investigation Techniques

This webinar will show how parallel investigation techniques commence with a review of tactics and strategies that can be introduced in related fraud enquires. The importance protecting the tradecraft deployed and the use of open and closed source research will be discussed to include comparable techniques used in covert sensitive investigations. Money laundering utilizing virtual, or cryptocurrency will be featured to examine current tradecraft. Additionally, this presentation will include discussion of the impact on not-for-profits as well as a look at mortgage fraud. Supporting case studies will highlight the merit of covert/sensitive law enforcement investigative techniques. The presentation will emphasize the link between tax avoidance, money laundering, and terrorist funding. Finally, proper legislation and an effective suspicious transaction reporting process will complete the program.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open-source and commercially-available investigative tools for social engineering, information gathering, and artifacts related to social media; as well as automated utilities to capture information and crawl websites.

*Internet basics. IP address assignment; resolving domains and IP addresses; networking overview.
*Popular sites. Facebook, Twitter, KiK Messenger, Snapchat, Instagram, tumblr, and more.
*The dark web. Surface, deep, and dark web; how data flows through the internet. Who uses the dark web and how?
*Tor. How to access Tor; how Tor traffic works; how a Tor Hidden Service works; installing and configuring the Tor Browser Bundle.

AirTags and Tracking Technology: Investigative and Legal Perspectives

This webinar will examine the investigative and legal considerations related to tracking technology, and the impact of ultra-wideband location networks such as Apple AirTags and other similar emerging technologies. We will use case analysis to illustrate key questions and considerations for both investigators and prosecutors given the increasing criminal use of this technology and proactive use during investigations.

Presented by:
Justin Fitzsimmons, Associate Vice President, NW3C
Jim Emerson, Vice President, NW3C

Data Validation of Digital Forensic Evidence

Is information from mobile extractions, Cloud Source and Google Timeline a solid piece of evidence? In this webinar, we will see how to make your digital evidence become a strong basis for courtroom testimony when validated with phone records, cell coverage, and other sources. Prove your data and set a solid foundation for justice.

Presented by:
Nicola Chermello, CEO and Co-Founder of SecurCube

NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

Metaverse, Web3, and Blockchain - Security Observations

The Metaverse, while still a concept at the moment, will become a reality in the not-too-distant future. It consists of the opportunities created by combining the advances and affordances of augmented reality such as AR and VR and virtual (gaming) worlds with the decentralized nature and composability of Web3, crypto assets, DeFi, and the underlying blockchain technology. Cybercriminals see this market as a hot spot as they can make quick profits here and this webinar will explore some of the opportunities and risks.

Presented by:
Anna Collard, SVP of Content Strategy and Evangelist for KnowBe4Africa

NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

How Do I Get My Fraud Investigated?

This webinar will examine the evolving complexity of investigation of fraud, money laundering, and terrorist financing by a team of UK detectives fighting financial crime both within the UK and globally for over 30 years. The webinar will use notable cases to study investigative approaches, placement, integration with other enforcement, investigative techniques, and critical "toolkit". These UK pioneers of advance fee fraud (aka 419 scams) investigations who worked with U.S. counterparts will use historical lessons and bring the audience up to date on these crimes as they relate to money laundering, the roles of informal banking, and exploitation of not-for-profits, and use of virtual currency. This webinar will also examine lessons related to gaps in legislation, the health of financial intelligence in vulnerable nation states, and offer discussion and debate regarding successful global investigative strategies for U.S. investigators.

FC122 Intellectual Property Theft Training

This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific folder that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

This course is presented in collaboration with the National Association of Attorneys General (NAAG).
Awareness. Types of IP crimes. The criminals who commit these crimes. Impacts and dangers.
Investigation. Online and traditional techniques. Working with brand experts and the private sector. Large amounts of evidence. Resources.
Statutes. Prosecutorial theories. State-specific discussion.
Hands-on experience. Work with real counterfeit products. Identify fakes with expert guidance.

IA105 Intelligence Writing and Briefing

This course covers basic intelligence writing and briefing principles as well as methods for effective and clear intelligence sharing. Topics covered include creative and critical thinking, critical reading skills, source evaluation, privacy and civil rights, intelligence writing style and structure, and generating and presenting intelligence briefings. With guidance from experienced experts, students gain hands-on experience by working through data sets based on real cases to produce intelligence products. Instructors and peers provide feedback on briefings and reports produced and presented in class.

*Foundational skills. Creative thinking. Critical thinking. Critical reading.
*Information sources. Identify sources of intelligence information. Evaluate sources for validity and reliability.
*Analytical reports. Develop a structured and actionable analytical report based on a data set given in class.
*Privacy considerations. Ensure protection of privacy and civil rights while producing intelligence products.
*Briefings. Construct and deliver an intelligence briefing based on a data set given in class.

Pages