Skip to main content

Training Delivery - Webinar

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20201103-135524-67

Submitted by Bryan Lee Dail on

Today?'s law enforcement agencies are facing a financial crimes epidemic. Millions of consumers are victims of credit card fraud and ID theft each year, resulting in the loss of billions of dollars. The magnitude of the problem is overwhelming and when coupled with the effort involved to work those cases, many agencies choose to let them pass. They don?'t understand the problem, let alone how to analyze these cases and prosecute the individuals who perpetrated the crime. Agencies have been slow to make progress, but it doesn't have to be this way.

20201103-135454-19

Submitted by Bryan Lee Dail on

Money laundering is a global, trillion-dollar crime that extends into all areas of commerce. The reality is that money laundering isn?'t just a standalone crime, it is also a symptom of additional crimes which generate illicit proceeds. Whether due to lone wolf criminals, as the result of transnational organized crime, or international corruption, money laundering can be challenging to prove as both a factual matter and as part of a criminal prosecution.

20201103-135446-43

Submitted by Bryan Lee Dail on

A collaborative project of NW3C and the Elder Justice Initiative, this webinar is the third in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

* Responding to a Senior Call
* Prosecuting Elder Exploitation
* Promoting Awareness and Prevention

20201103-95201-27

Submitted by Bryan Lee Dail on

A collaborative project of NW3C and the Elder Justice Initiative, this webinar is the second in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

* Investigating the Crimes
* Resources for Investigators
* Creating an Investigative Plan

20201103-95153-45

Submitted by Bryan Lee Dail on

A collaborative project of NW3C and the Elder Justice Initiative, this webinar is the first in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

*Overview of Elder Abuse and Financial Exploitation
*Types of Abusers
*Scams Targeting Seniors

20201103-95052-56

Submitted by Bryan Lee Dail on

Hash, encryption, full disk, file based, and the list goes on! Words used correctly and incorrectly when examiners discuss or even report on evidence. This webinar is intended to lay the framework for a factual understanding of how encryption and hashing are used in our digital investigations. Real world applications of hashing, and encryption will be shown, with an emphasis on how they impact investigations in 2020. Questions such as: "Does the application encrypt data?", "How is it encrypted?", and "Why can?'t I decrypt it?" will be discussed.

20201103-95042-18

Submitted by Bryan Lee Dail on

Cell phones are a way of life in modern society. While these devices are used daily for normal communication purposes, they are used for criminal purposes. They are stolen, used to plan crimes, research crimes, and take images of unlawful activities then discarded. Law Enforcement?'s ability to recover/obtain these discarded phones can be crucial to a variety of investigations.

20201103-95032-55

Submitted by Bryan Lee Dail on

Merriam Webster is our go to source for thousands of definitions. Digital Forensics and Incident Response use terms that are not typically defined in mainstream dictionaries. A quick review of any common list-serve reveals a lexicon of hundreds, if not thousands of unique terms and words. This webinar series will start with the most basic of DFIR definitions and build upon them. Our content will be rooted in empirical facts with a misting of industry history and professional experiences.

20201103-95002-47

Submitted by Bryan Lee Dail on

This webinar will cover credit card fraud and identity theft from initial investigative steps to arrest and prosecution. The presenters will discuss how to identify points of compromise including low hanging fruit, skimmers and indicators of malware. Specifics regarding point of infection, log analysis, and signature analysis will be covered as well as charges, pleas, grand jury and trial considerations along with post-conviction steps.

20201103-94951-37

Submitted by Bryan Lee Dail on

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each other. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And, they increasingly choose to use platforms that make this communication openly available for others to view.

Subscribe to Training Delivery - Webinar