Military

NW3C-FC 122 - Intellectual Property Theft Training

From baby formula to auto parts, criminals counterfeit all kinds of products. This one-day training is a real “eye-opener” for investigators and prosecutors about the potential dangers and economic repercussions of counterfeit products. In response to the serious threat of counterfeit products and other types of intellectual property (IP) crime, the National White Collar Crime Center and the National Association of Attorneys General are providing training to state and local law enforcement in the area of IP crime.

NW3C-FC 122 - Intellectual Property Theft Training (Sept 2018)

From baby formula to auto parts, criminals counterfeit all kinds of products. This one-day training is a real “eye-opener” for investigators and prosecutors about the potential dangers and economic repercussions of counterfeit products. In response to the serious threat of counterfeit products and other types of intellectual property (IP) crime, the National White Collar Crime Center and the National Association of Attorneys General are providing training to state and local law enforcement in the area of IP crime.

Introduction to Cell Phone Call/Communication Detail Records

This presentation will provide an overview of cell phone call/communication detail records (CDRs) and will focus on historical records available from primary cell phone companies, including logs of phone calls, short message service text messages, and Internet activity. The overview will also provide a brief introduction to cell phone-created CDRs, which may be available from non-cell phone sources such as email providers, smart phone application providers, and non-cellular-based Internet service providers.

Cybercop 201 Digital Evidence Examination & Processing

The "Cybercop (CC) 201 - Digital Evidence Examination and Processing" course builds on the concepts introduced in "CC 101 - Basic Digital Forensic Imaging." It covers the architecture and functionality of the Windows NT File System, the FAT and the ExFAT File System, and related directory entry information for locating files on electronic devices. Topical areas include file headers and file hashing, recovery of deleted files and long file names, and techniques for discovering potential evidence that might otherwise be overlooked.

Webinar: Implementing Evidence Based Practices and Services with Fidelity

Although crime control policy and program development processes are increasingly being informed by scientific evidence, identifying and adopting what works is only part of what’s needed to realize positive outcomes. Evidence-based programs and practices (EBPs) still have to be implemented with fidelity and integrity in order to be successful. Unfortunately, implementation is not an easy task. Implementation science, however, can help practitioners tackle implementation challenges so the promise of EBPs can be more fully realized.

CI 201 - Social Media & Open Source Intelligence (May 24 2018)

This course covers the skills investigators need to conduct successful online investigations involving social media. Topics include internet basics such as IP addresses and domains, an overview of currently popular social media platforms, and best practices for building an online undercover profile. Instructors demonstrate both open-source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

Course structure:

Cyber Investigation 150 Introduction to Cellular Investigations ICI (May 23 2018)

This course covers the acquisition and analysis of the various types of call detail records obtained from cellular providers. It focuses on data analysis using Microsoft Excel, as well as techniques for presenting findings in case reports or in court. Students receive a copy of PerpHound, the National White Collar Crime Center's (NW3C) free software tool for the analysis of call detail records. This course also covers best practices for seizing, preserving, and acquiring evidence internal to a cellular phone.

Cyber Investigation 101 Secure Techniques for Onsite Preview - STOP (May 22 2018)

The "Cyber Investigation (CI) 101 - Secure Techniques for Onsite Preview" course covers the usage and configuration of two tools (Paladin/Autopsy and osTriage) designed to preview a non-mobile digital device and export files of evidentiary value. DAY ONE is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered on. DAY TWO is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered off.

Cyber Security 235 Basic Network Intrusion Investigations (May 2018)

This course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises. Additional topics include key cybersecurity concepts and issues, as well as the various classifications and types of network attacks.

CI 201 - Social Media & Open Source Intelligence (May 21 2018)

This course covers the skills investigators need to conduct successful online investigations involving social media. Topics include internet basics, such as IP addresses and domains; an overview of currently popular social media platforms; and best practices for building an online undercover profile. Instructors will demonstrate both open-source and commercially-available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

Pages