Training

Webinar - Investigating crime and non-traditional spaces: Gaming consoles and underground illicit forums.

In recent decades, gaming consoles have developed from simple, single-function machines into sophisticated personal computing devices, containing personal information and facilitating communication between users. Due to the popularity of gaming consoles among all ages, it is important for state, local, tribal and territorial criminal justice agents to understand how gaming consoles are used in the commission of crime.  This webinar identifies the types of data accessible from gaming consoles and how to leverage data extracted from gaming consoles to obtain attribution and for intelligence p

Webinar - Investigating crime and non-traditional spaces: Gaming consoles and underground illicit forums

In recent decades, gaming consoles have developed from simple, single-function machines into sophisticated personal computing devices, containing personal information and facilitating communication between users. Due to the popularity of gaming consoles among all ages, it is important for state, local, tribal and territorial criminal justice agents to understand how gaming consoles are used in the commission of crime.  This webinar identifies the types of data accessible from gaming consoles and how to leverage data extracted from gaming consoles to obtain attribution and for intelligence p

NDCAC Resources for Law Enforcement in the Digital Age

The NDCAC is a national center established under the Department of Justice designed to help facilitate technical knowledge management, to foster the sharing of solutions and know-how among law enforcement agencies. Their mission is to strengthen law enforcement's relationships with the communications industry, leverage/share the collective technical knowledge and resources of the law enforcement community, and address challenges posed to law enforcement by advanced communications services and technologies. This 75 minute webinar will introduce you to the many resources available through the NDCAC to include technical solutions, training, investigative tools (social media search warrant parsers and open-source searches), and analytics.

Presented by:
Christopher Tucker, Special Agent, Homeland Security Investigations

This webinar is live only and will not be available on-demand

NW3C does not share webinar attendees' personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, opinions, or view of NW3C

NW3C receives funding from components of the United States Department of Justice Office of Justice Programs including BJA, OJJDP, OVC, and OVW to provide much of its training at no cost to U.S. state, local, tribal and territorial criminal justice agencies. NW3C also provides training to criminal justice and regulatory professionals, in both the public and private sectors, around the world through other funding sources.

Shamrock Crypto Series: Understanding Stablecoins

This webinar in the Shamrock Crypto Series will cover stablecoins, specifically USDT (Tether) and USDC. The various types of stablecoins, such as algorithmic and fiat-collateralized, will be covered in-depth. Attendees will learn how stablecoins interact on the various blockchains, such as Ethereum, Polygon, TON, and Tron. With stablecoins becoming a preferred alternative to the traditionally volatile cryptocurrencies, attendees of this webinar will walk away with a better understanding of how stablecoins function, investigatory avenues, and effective methods for the seizing of stablecoins involved in illicit activity.

Presented by:
Keven Hendricks, Detective, City of New Brunswick, NJ Police Department

NW3C does not share attendees' personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, opinions, or views of NW3C.

Shamrock Crypto Series: Virtual Currency Kiosks

This webinar is part of the Operations Shamrock - Shamrock Crypto Series that will cover virtual currency kiosks, also known as, Bitcoin ATMs. Attendees will learn what these machines are and are not, how they work, and why you shouldn't seize them.

Presented by:

Matt Hogan, Detective, Connecticut State Police

NW3C does not share webinar attendees' personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, opinions, or view of NW3C.

FC125 Technology-Facilitated Elder Fraud

This course is designed specifically for law enforcement officers and investigators, providing the tools and knowledge needed to combat the growing threat of technology facilitated scams targeting older adults. Participants will learn to identify and investigate various digital fraud tactics, from tech support scams to government imposter fraud, and artificial intelligence schemes. The course covers the latest technology and platforms used by criminals, as well as effective techniques for tracing, reporting, and prosecuting these crimes while approaching victims with care. By the end, law enforcement professionals will be better equipped to protect vulnerable seniors and disrupt digital fraud networks in their communities.

Key concepts covered in this course include:
Technology Facilitated Scams
Scam Strategies
Perpetrator Tactics
Interview Techniques
Public and Private Resources

IA101 Foundations of Intelligence Analysis Training

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included NW3C, Law Enforcement Intelligence Units (LEIU), the International Association of Law Enforcement Intelligence Analysis (IALEIA), and the Regional Information Sharing System (RISS).

*Analysis basics. History and purpose of intelligence analysis. Legal issues and ethics. Sources of information. The intelligence cycle.
*Types of analysis. Crime patterns. Associations. Flow. Communications. Financial analysis.
*Creative and critical thinking. Brainstorming. Mind mapping. Steps to critical thinking.
*Deterring crime. Strategic analysis as a tool for law enforcement personnel.
*Hands-on experience. Work as part of a team to analyze information pertaining to several hypothetical cases.

DF330 Advanced Digital Forensic Analysis: iOS & Android

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically-sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, available acquisition options, accessing locked devices, and the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the hunt methodology for analyzing third party applications not supported by commercial forensic tools.

Mobile device hardware fundamentals. How mobile devices work, store data, and interact with a variety of networks.
Device handling. Properly preserving data for imaging and analysis. Identifying potential threats to data integrity.
Device acquisition and security. Acquisition options (physical, logical, device backups). Bypassing passcodes and properly defeating encrypted backups of iOS devices.
Advanced analysis techniques. Mounting images, partitioning scheme and default folder structure, types of artifacts (plists, SQLite databases, etc.).

IA103 Introduction to Strategic Intelligence Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

FC201 Financial Records Investigative Skills

This course builds on the concepts introduced in FC101 (FIPS) and FC105 (FREA), introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises. Students conduct a mock investigation that includes interviews, data analysis, and the examination of various documents.

*Money laundering. Methods of laundering money. Tracing illegal funds. Emerging issues. FinCEN.
*Spreadsheeting skills. Spreadsheet architecture. Formulas and calculations. Pivot tables.
*Working with financial data. Benfords law analysis. Disentangling commingled funds.
*Hands-on experience. Work a mock financial case as part of an investigative team.

Pages