Cloud Combat: Law Enforcement Access to Overseas Data

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. Two attorneys clash in this heated exchange on whether, and how, law enforcement can obtain evidence stored electronically overseas. A former prosecutor and a high-tech crime … Continue reading Cloud Combat: Law Enforcement Access to Overseas Data

Free

Office 365 Forensics and Business Email Compromises

This webinar will discuss the types of evidence that should be collected in a response to a business email compromise/ Office 365 email investigation. Methods of email compromise (phishing, malware, brute force attacks, external compromise/credential stuffing),Types of data at risk and commonly seen schemes. Evidence Collection and Analysis •Review of the Office 365/ Azure Admin … Continue reading Office 365 Forensics and Business Email Compromises

Free

Dark Web and Open Source Information Primer

A primer on the dark web and information available on the internet from free sources that can help investigators as they work to solve almost all types of cases. Presented by: Casey Bohn, High-Tech Crime Specialist, NW3C

Free

What’s New in DF330- Advanced Android and iOS Forensic Analysis

This webinar will highlight the changes to the DF330 course and will focus on the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically-sound methods and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially … Continue reading What’s New in DF330- Advanced Android and iOS Forensic Analysis

Free

The Functionality of Private Coins

We will be hearing from Coin Center, Chainalysis, and Ciphertrace on the functionality of, and challenges presented by, privacy coins. Presented by: Jerry Brito, Coin Center Dave Jevans, Ciphertrace Jonathan Levin, Chainalysis Jason Weinstein, Steptoe Alan Cohn, Steptoe

Free

Gas Pump Skimming

The webinar will discuss the anatomy of gas pump skimming from the manufacturing of the skimmers to laundering of the proceeds. The instructor will discuss the various types of skimmers, how the card numbers are harvested as well as the various methods of cashing out. Presented by: Jasen Wells

Free

Counterfeit Goods: Money Laundering in Plain Sight

The sale of counterfeit goods may be thought of as a relatively harmless crime, when in reality production, sale, and distribution of counterfeit goods represents money laundering, corruption, fraud, human trafficking, sanctions evasion, and terrorist finance. Much like the sale of illegal narcotics, the production, distribution, and sale of counterfeit goods can yield hundreds of … Continue reading Counterfeit Goods: Money Laundering in Plain Sight

Free

The Neurological and Psychological Elements of Victims, Witnesses and Suspects

This Webinar will focus on how the advent of technology and neuroscience has impacted victims and made them more vulnerable to the criminal element. We will go over the psychological aspects of criminal mindset as well as the investigators mindset in order to set them up for success. This Webinar will focus on the understanding … Continue reading The Neurological and Psychological Elements of Victims, Witnesses and Suspects

Free

Of Eggplants and Umbrellas: The Legal and Investigative Implications of Emojis

This webinar, presented by cyber crime attorneys and a former prosecutor, discusses investigative uses of emojis, particularly in the context of child exploitation, and the legal context of this growing medium, including current case law and implications for practice. Presented by: Matthew Osteen, NW3C, Robert Peters, Zero Abuse Project, Alicia Loy, NW3C

Free