Training

FC101 Financial Investigations Practical Skills

This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues.

Emerging issues. Current trends in various types of financial crimes. Recent cases and their implications.
Financial records. Learn to obtain and manage bank records, including basic spreadsheeting skills.
Working with data. Extract leads and draw conclusions from bank records and other financial data.
Hands-on experience. Work a mock financial case as part of an investigative team.

DF320 Advanced Digital Forensic Analysis: macOS

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes, but is not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

DF205 Intermediate Digital Forensic Analysis: SQLite Primer

Mobile devices dominate the intake list, and the desks of most digital forensics analyst globally. Devices are becoming more secure, with an increase in security the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

What is SQLite and how to identify and analyze logically
Recognizing relevant locations of valuable data within SQLite database.
Develop skills needed for crafting custom SQLite queries.
Learn how to recognize and decode a variety of common timestamp formats.
Learn how to perform SQLite analysis with automation.

RVCRI Rural Resources: Grants, Training, and More! Webinar - November 2024

Discover powerful resources to strengthen rural communities! Join the Rural Violent Crime Reduction Initiative (RVCRI) team on November 21, 2024, at 2:00 pm ET for a valuable webinar on available funding, training, and specialized support to help rural law enforcement agencies strengthen their capabilities.

Effective De-Escalation Strategies for School Resource Officers, Security Personnel, and School Staff in a K–12 Environment

Given the variety of behavioral challenges that can occur in a school environment, it is essential for school resource officers, security personnel, and school staff to possess strong de-escalation skills. These abilities are crucial for preventing situations from escalating and for responding effectively to the unique needs of each student. Through effective de-escalation, stakeholders can improve student safety, maintain a positive learning environment, enhance trust between officers and students, and reduce student involvement in the juvenile justice system.

DF203 Intermediate Digital Forensic Analysis: Forensic Video Analysis

This course provides training on digital forensics for video, specifically targeting common file formats rather than proprietary video encodings or delivery methods. It aims to prepare investigators to answer critical questions about the file and ensure key evidence is not overlooked. This training is designed to support investigations by providing the necessary expertise to handle the complexities of video evidence in the digital age, addressing possible pitfalls including deepfakes, manipulated video, and potential overlooked evidence.

Key concepts covered in this course include:
Digital video file creation
Tool and result verification
Metadata and parsing
Image classification
Hash value comparison
Image/video classification and reporting results

Open-Source Investigative Methods for Counter Narcotics and Human Trafficking Investigations

Threat actors are increasing their use of the Internet, social media and apps to conceal and advance their trafficking operations. Open-source information can provide investigators with intelligence and investigative leads related to narcotics and human trafficking operations. This webinar will provide attendees with introductory methods related to open-source information collection as it applies to identifying online profiles and activity related to narcotics and human trafficking. Attendees will learn how to safely navigate social media platforms while adhering to local laws and methods of collection.

Presented by:
Adam Scarisbrick, Senior Instructor, Hetherington Group

Telegram Investigations

This webinar will cover investigations into Telegram app. For many, Telegram has been a frustration as they do not know how the app works, and just what investigative avenues can be pursued. This webinar will cover how Telegram functions, how Telegram channels work, how Telegram Bots work to facilitate sales, and also explore the T.O.N. (The Open Network) crypto currency that is built upon the Telegram network. Case studies will be shown, as well in depth investigative techniques. There has never been a more comprehensive webinar about the end-to-end encryption messaging app than this!

Presented by:
Keven Hendricks, Detective, City of New Brunswick, NJ, Police Department

Shutting Down America's Largest Illicit Online Gift Card Marketplace

Organized retail crime is on the rise, affecting both the retail and financial industries. In a landmark case titled Operation Bad Bot, Homeland Security Investigations (HSI) unraveled a complex, online gift card fraud scheme, culminating in the shutdown of a marketplace with more than $22 million in stolen gift cards and the arrest and prosecution of the Canadian man behind the scheme. In this webinar, you will take a deep dive into Operation Bad Bot, learn how HSI solved this case, and hear how HSI worked with the U.S. Department of Justice to prosecute the perpetrator.

Presented by:
Dariush Vollenweider, Group Supervisor, U.S. Department of Homeland Security
Alan Stevens, Assistant U.S. Attorney, U.S. Department of Justice

NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, opinions, or view of NW3C.

Lunch and Learn with Binance, Roblox, and Kodex

Join us for the Learn and Lunch webinar series, where legal experts from Binance, the worlds largest cryptocurrency exchange, and Roblox, a popular gaming platform, come together to provide valuable insights for professionals navigating the intersection of law enforcement and digital platforms.

The presentation will cover two key areas. First, experts from Binance will provide crucial updates on cryptocurrency investigations, including best practices for handling crypto-related legal processes and the latest market changes that could impact your work. As cryptocurrency continues to play a growing role in digital investigations, understanding these evolving legal frameworks is essential for law enforcement and legal professionals. Next, experts from Roblox will guide attendees through the platforms key safety features, explaining how law enforcement can effectively engage with Roblox. The session will also include a walkthrough on submitting information requests to Roblox, focusing on data availability, retention policies, and the primary identifiers needed to locate requested data. This section aims to equip attendees with practical tools to navigate Roblox's legal processes efficiently.

Throughout the webinar, participants will have the opportunity to hear directly from experts, ask questions, and share ideas for improving legal procedures within these dynamic industries. The event will conclude with an interactive Q&A session, allowing attendees to engage in a collaborative dialogue with industry leaders. Do not miss this chance to enhance your understanding of cryptocurrency investigations and digital platform legal processes.

Presented by:
Jarek Jakubcek, Head of LE Training, Binance
AJ Iafrate, Government Relations North America, Kodex Global

Pages