Juvenile Justice Agencies

CI240 Intermediate Cyber Investigations: Virtual Currency (Oct. 13, 2020, Virtual)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

DF330 Advanced Digital Forensic Analysis: iOS & Android (Oct. 13, 2020, Virtual)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

Technical Detection Methods for Insider Risk Mitigation Part 2

Effective insider risk mitigation requires the collection, aggregation, and analysis of data from a multitude of data sources within an organization. In this webinar, the presenter will provide an overview of the current state of the practice in technical detection methods for insider risk mitigation and present strategies organizations can use to protect their critical assets from insider misuse. 

Presented by Dan Costa, Technical Manager, CERT National Insider Threat Center

Building an Effective Insider Risk Management Program Part 1

This session will discuss strategies for building, implementing, and operating an effective insider risk management program that is integrated into an organization-wide enterprise risk management strategy. Best practices will be discussed addressing prevention, detection, investigation, and response strategies to reduce the risk of malicious and non-malicious insiders impacting the critical assets of your organization. 

Presented by Randy Trzeciak, Director National Insider Threat Center; CERT Division, Software Engineering Institute

Deciphering Cryptocurrency: A Technical and Criminal Law Approach

Starting with a basic overview of cryptocurrencies, this webinar will focus on some of the more technical aspects of the crypto industry. Additionally, this webinar will look at criminals' abilities to use cryptocurrency, the potential future of crypto, and considerations for how to seize cryptocurrency as part of criminal investigations.

Intelligence Sharing: Effectively Combat Money Laundering

Laundering being missed? Law enforcement and government agencies globally have examples of intelligence failures that could have led to offenders being brought to justice earlier if relevant data had been shared between partners. In this webinar, the presenter will discuss whether there are means of more effectively sharing intelligence to fight financial crime and criminals.

DFIR Dictionary Part 1

Merriam-Webster is our go-to source for thousands of definitions. Digital Forensics and Incident Response (DFIR) use terms that are not typically defined in mainstream dictionaries. A quick review of any common listserve reveals a lexicon of hundreds, if not thousands, of unique terms and words. This webinar series will start with the most basic of DFIR definitions and build upon them. The webinar content will be rooted in empirical facts with a misting of industry history and professional experiences.

IA102 Introduction to Link Analysis (Sept. 1, 2020, Virtual)

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis. 

Information Exposed: Opting Out & Managing the World of Connected Devices

Investigators need to understand the dark side of information sharing and the potential risks it brings to victims, witnesses, and investigators. To avoid potentially dangerous individuals, first responders, security professionals, and intelligence officers choose to keep their families and homes off the grid. Employees and agencies are at greater risk now more than ever because fraudulent predators are taking advantage of those unfamiliar with working from home. Hacking, phishing, and scamming are on the rise, and the threats are expected to increase. Helping the public and high-risk targets protect their personally identifiable information is a priority during these uncertain times. Opting out of online personal data aggregates and managing the technology devices inside your home can reduce the risk to you and your family. This webinar is meant to help facilitate your understanding of the dark side of information sharing and how to protect your, your family's, and the high-risk targets' personal privacy in a very open online world. There is no one solution, no one vendor, that has all the answers. Knowledge from this session will enable you to begin to remove, obstruct, or obscure the open source information that leaves you, your family, and high-risk targets vulnerable online.

Chasing Ghosts: First-party Fraud and Synthetic Identities (credit cards)

In this ever-changing fraud environment we live in, one thing has remained constant, investigating first-party fraud and the use of synthetic identities has always been difficult. Join us for an interactive presentation that will not only educate you but give you resources to assist in your investigations. There will be content on synthetic identity creation and use, CPNs (credit privacy number), assumed identity fraud, bustouts, collusive/shell merchants, false fraud claims, manufactured spend and much, much more. We'll also discuss trends in the industry and how Capital One can assist in your investigations.

Pages