This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.
This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.
This webinar will focus on how the advent of technology and neuroscience has impacted victims and made them more vulnerable to the criminal element. We will go over the psychological aspects of criminal mindset as well as the investigator's mindset in order to set them up for success. This webinar will focus on the understanding of human behavior, what to look for, and how to understand people and influence your outcome.
The essence of any good investigation, is the conviction of the person's responsible for committing those crimes. This Webinar will focus on testifying in court and the post arrest process in preparing for trial. This webinar will also focus on what to incorporate or not incorporate in your reports. We will discuss how to negate arguments made by defense counsel, how to testify, how to be more credible, how to prepare and ultimately set yourself up for success in any trial. Different types of court proceedings and strategies will also be discussed.
The sale of counterfeit goods may be thought of as a relatively harmless crime, when in reality production, sale, and distribution of counterfeit goods represents money laundering, corruption, fraud, human trafficking, sanctions evasion, and terrorist finance. Much like the sale of illegal narcotics, the production, distribution, and sale of counterfeit goods can yield hundreds of billions of dollars every year. As a result, transnational and localized organized crime groups are involved at every step of the operation. This session will highlight the risks involved with the sale of counterfeit goods, as well as the illicit actors involved, and how these goods make their way into the stream of commerce. This session will explain the nexus between organized criminal activity and the sale of counterfeit goods, while drawing sharp correlations to traditional anti-money laundering controls. Attendees will learn the risk indicators of the sale of counterfeit goods, as well as how to use open source databases to enhance due diligence searches for potential vendors linked to the sale of counterfeit goods. The session will provide recommendations on how to leverage analytics and gap analysis to further detect potentially high-risk customers, products, and transactions.
This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.
This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included the National White Collar Crime Center, Law Enforcement Intelligence Unit, the International Association of Law Enforcement Intelligence Analysis, and the Regional Information Sharing System.
This course builds on the concepts introduced in "Financial Crime (FC) 101 - Financial Investigations Practical Skills" and "FC 105 - Financial Records Examination and Analysis," introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises. Students conduct a mock investigation that includes interviews, data analysis, and the examination of various documents.
This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage, and use multiple methods to acquire forensically sound images of Apple Macintosh computers. Topics include how the macOS default file system stores data, what happens when files are sent to the macOS Trash, where operating system and application artifacts are stored, and how they can be analyzed. Forensic artifacts covered include password recovery, recently opened files and applications, encryption handling, Mail, Safari, Messages, FaceTime, Photos, Chrome, and Firefox.
This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.