Counterfeit Goods: Money Laundering in Plain Sight

The sale of counterfeit goods may be thought of as a relatively harmless crime, when in reality production, sale, and distribution of counterfeit goods represents money laundering, corruption, fraud, human trafficking, sanctions evasion, and terrorist finance. Much like the sale of illegal narcotics, the production, distribution, and sale of counterfeit goods can yield hundreds of … Continue reading Counterfeit Goods: Money Laundering in Plain Sight

Free

The Neurological and Psychological Elements of Victims, Witnesses and Suspects

This Webinar will focus on how the advent of technology and neuroscience has impacted victims and made them more vulnerable to the criminal element. We will go over the psychological aspects of criminal mindset as well as the investigators mindset in order to set them up for success. This Webinar will focus on the understanding … Continue reading The Neurological and Psychological Elements of Victims, Witnesses and Suspects

Free

Of Eggplants and Umbrellas: The Legal and Investigative Implications of Emojis

This webinar, presented by cyber crime attorneys and a former prosecutor, discusses investigative uses of emojis, particularly in the context of child exploitation, and the legal context of this growing medium, including current case law and implications for practice. Presented by: Matthew Osteen, NW3C, Robert Peters, Zero Abuse Project, Alicia Loy, NW3C

Free

Coronavirus: Fighting Scams and Fraud During a Global Pandemic

This webinar is intended to inform law enforcement and criminal justice professionals to some scams and acts of fraud that are likely to be perpetrated during a pandemic. In response to the rapid spread of the coronavirus, NW3C recognizes the need for law enforcement training related to scams and fraud that are being used to … Continue reading Coronavirus: Fighting Scams and Fraud During a Global Pandemic

Free

Using OSINT to Track Suspicious Crypto Currency Activity

Investigators face a great challenge in finding cryptocurrency wallets’ footprints across the web and understanding who may be behind it. The webinar will focus on tracking those digital footprints on all levels of the internet, using advanced OSINT technologies, tying malicious activities to networks of harmful individuals. By utilizing processes that involve Artificial Intelligence, including … Continue reading Using OSINT to Track Suspicious Crypto Currency Activity

Free

Investigators, Examiners, and Analysts Working Remotely: Police and Prosecutor COVID-19 Challenges and Opportunities

The ongoing efforts to mitigate the spread of COVID-19 have resulted in social distancing and even isolation of both the general population and public safety professionals.  This new remote workspace and workflow reality, safeguards for minimizing human interaction while accessing agency critical facilities, combined with cancellation of face to face training events has led to … Continue reading Investigators, Examiners, and Analysts Working Remotely: Police and Prosecutor COVID-19 Challenges and Opportunities

Free

COVID-19 Considerations for Collecting and Handling Digital Evidence

The ongoing efforts to mitigate the spread of COVID-19 have resulted in social distancing of the general population while law enforcement professionals are still on the job. Key to rule of law is proper investigation of crime and collection of relevant evidence to support prosecution. This new law enforcement operational reality, safeguards for minimizing human … Continue reading COVID-19 Considerations for Collecting and Handling Digital Evidence

Free

What Investigators Need to Know about Hiding on the Internet: Proxies and VPNs

Criminal investigators and analysts need to understand how it is possible for people to conceal and obfuscate their identity and location on the Internet.  Two primary methods are through the use of proxies and virtual private networks (VPNs).  This ability to hide one’s identity and location on the Internet can be both a challenge and … Continue reading What Investigators Need to Know about Hiding on the Internet: Proxies and VPNs

Free

Building Your Capture The Flag Tool Kit

NW3C offers daily Capture The Flag (CTF) Challenges at https://nw3.ctfd.io/ .  Challenges are designed to help forensic examiners hone, refine, and practice their skills.  The CTF scoreboard encourages friendly competition. Solution videos are  available following the challenge conclusions. This webinar will provide information on developing a forensic toolkit not only to help solve CTF challenges, but also to … Continue reading Building Your Capture The Flag Tool Kit

Free