Training Delivery - Webinar

Transnational Gift Card Scam and Money Laundering Investigation

Case synopsis of a Transnational Gift Card Scam laundering $26 million in fraudulently obtained gift cards through major retailers across the United States. Suspects were targeting victims with multiple different scams (Grandparent Scam, Arrest Warrant Scam, Apple Scam, Norton Anti-virus Scam, Publishers Clearing House Scams, and more). Victims were told to purchase Walmart and Target gift cards and provide the card information over the phone to the Scammers. Scammers would electronically transmit the cards to money mules across the U.S. and the cards were redeemed for Apple Products and other gift cards.

Presented by:
Detective Jeff Prater, Colleyville, TX, Police Department Special Investigations Unit, US Secret Service Cyber Crimes Task Force.

NW3C does not share webinar attendees' personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, opinions, or view of NW3C

Using Autopsy to Triage Systems

In this webinar, we will explore the features in Autopsy that can be used to triage a system. We will start with a brief intro to Autopsy then look at the following Triage features: Ingest File Filters/Profiles, Autopsy Live Triage Drive and Autopsy Logical Imager. These features can help with the triage of systems and determine if a deeper dive is warranted. A demonstration of the features will be part of the presentation.

Presented by:
Mark McKinnon, Senior Security Analyst, Sleuthkit Labs

NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, opinions, or view of NW3C.

Using Community-Based Strategies to Drive Down Violent Crime: The DOJ Roadmap and How to Receive Free TTA

In recent years, communities across the country have experienced substantial increases in gun violence. While some cities have made progress in reducing these crimes, pressing concerns remain for residents, community and business leaders, law enforcement and city officials, prosecutors, public health providers, and more. In response to these concerns, the United States Department of Justice launched the Violent Crime Reduction Roadmap (Roadmap).

Student Engagement: Building Positive Relationships to Improve School Safety Knowledge College

An essential role of school resource officers and other school-based security professionals is providing a safe and secure environment that promotes student success. A fundamental principle in providing for this safety is developing positive student-officer engagement aimed at building relationships that support school safety through prevention and intervention, thereby reducing the need for criminal enforcement action.

NDCAC Resources for Law Enforcement in the Digital Age

The NDCAC is a national center established under the Department of Justice designed to help facilitate technical knowledge management, to foster the sharing of solutions and know-how among law enforcement agencies. Their mission is to strengthen law enforcement's relationships with the communications industry, leverage/share the collective technical knowledge and resources of the law enforcement community, and address challenges posed to law enforcement by advanced communications services and technologies. This one-hour webinar will introduce you to the many resources available through the NDCAC to include technical solutions, training, investigative tools (social media search warrant parsers and open-source searches), and analytics.

This webinar is live only and will not be available on-demand

Presented by:
Christopher Tucker, Special Agent, Homeland Security Investigations

Virtual Kidnapping: Unraveling the Tactics of this Scam

In 2024, one of the first cybercrime cases to make the news involved the virtual kidnapping of a Chinese student in the United States. Using this incident as a case study, this webinar critically examines the case and identifies how this new case compares to past virtual kidnapping incidents in the United States. Special attention is paid to the tactics, tools, targets, and modus operandi of virtual kidnappers who target U.S. victims.

Presented by:
Marie-Helen Maras, Full Professor and Director, Center for Cybercrime Studies, John Jay College of Criminal Justice
Jana Arsovska, Associate Professor of Sociology, John Jay College of Criminal Justice, Research Associate, Center for Cybercrime Studies
Major George Perera, Commander Miami-Dade Police Departments Strategic Innovation and High Technology Crimes Bureau

Expanding Your Arsenal with Malware Analysis

Expand your DFIR skills by diving into the world of malware analysis. In this webinar, you will learn essential techniques and strategies for incorporating malware analysis into your skillset, enabling you to effectively identify, analyze, and mitigate malicious software threats. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks.

Presented by:
Ali Hadi, Research Director, Champlain College
Marium Khader, Assistant Professor, Champlain College

Preparation and Response Strategies: Lessons Learned From a Mass Shooting at The Covenant School in Nashville, Tennessee

On March 27, 2023, the nation suffered a mass shooting at The Covenant School, a parochial school in Nashville, Tennessee. In the incident, three children and three adults were killed by a single armed suspect, who was also killed in the response by the Metropolitan Nashville Police Department (MNPD).

The Great Corn Caper

In 2011, FBI agents were concluding a routine liaison visit with officials at DuPont Pioneer's offices near Des Moines, Iowa when one of the agents asked if company officials had any unusual activity recently. Specifically, they were looking for anything that may involve targeting the company's intellectual property (IP). The company official subsequently detailed a recent incident where an Asian male had been found digging in one of their grower fields. Grower fields operate like laboratories where companies can test their products. This happenstance piece of information from a routine public/private sector outreach meeting would eventually lead agents on cat-and-mouse surveillance operations across the Midwest. It took them on a deep dive into the biotechnology of proprietary corn breeding. The case was dubbed "Operation Purple Maze," which was a successful Economic Espionage/Theft of Trade Secrets cases involving the theft of bio-engineered corn seed. Omaha FBI SA Militello will discuss the liaison between the FBI and private industry and their techniques and processes related to suspected IP theft investigations.

Presented by:
Special Agent, Byron Militello, Omaha FBI Field Office, Des Moines Resident Agency

Intelligence Analyst Management: Asked and Answered

Join experts from NW3C and the National Network of Fusion Centers as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. In this session, our panel has a wealth of experience with managing intelligence analysts and intelligence projects. This panel will provide perspectives from large and smaller intelligence units at the local and state law enforcement levels. Click here to submit questions regarding intelligence analysis skills, analyst and project management, information collection, or general comments of analytic tradecraft and the NW3C experts will provide answers during this live session.

Presented by:

Heaven Henwood, Law Enforcement Supervisor
Scott Faralli, Director
Devon Rhoads, Assistant Director
Justin Parker, Training Manager

NW3C does not share attendees' personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, opinions, or view of NW3C.

Pages