Searching for the Digital Evidence in Your Physical Crime Scene: Part 1

Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital “footprints” that can help you during your investigations, no matter your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative … Continue reading Searching for the Digital Evidence in Your Physical Crime Scene: Part 1

Free

High-Tech Crimes: Asked and Answered

Join a team of experts from NW3C as they provide thoughtful and detailed answers to the high-tech crime questions you submit. Click here to submit questions regarding digital forensics, cyber investigations, or information security and a panel of NW3C experts will provide answers during this live session. Presented by: Chris Atha, High-Tech Crime Specialist, NW3C Norm Gibson, High-Tech Crime Specialist, NW3C … Continue reading High-Tech Crimes: Asked and Answered

Free

AirTags and Tracking Technology: Investigative and Legal Perspectives

This webinar will examine the investigative and legal considerations related to tracking technology, and the impact of ultra-wideband location networks such as Apple AirTags and other similar emerging technologies. We will use case analysis to illustrate key questions and considerations for both investigators and prosecutors given the increasing criminal use of this technology and proactive … Continue reading AirTags and Tracking Technology: Investigative and Legal Perspectives

Free

Leveraging Open Source Intelligence to Investigate Fraud Rings

Fraudsters, whether acting alone or as part of an organized, global crime ring, are using every means available to perpetrate and orchestrate large scale schemes against corporations and governments. Open source intelligence (OSINT) can be used to identify assets and information to piece together the traditionally opaque network of people involved in fraud schemes. OSINT … Continue reading Leveraging Open Source Intelligence to Investigate Fraud Rings

Cyber Organized Crime

Cybercrimes can and have been committed by organized criminal groups.  This webinar introduces participants to the notion of cyber organized crime, the cyber-dependent and cyber-enabled crimes committed by organized criminal groups, the structure and organization of cyber organized criminal groups and roles of members within these groups, and the tools used by these groups. The … Continue reading Cyber Organized Crime

Parallel Investigation Techniques

This webinar will show how parallel investigation techniques commence with a review of tactics and strategies that can be introduced in related fraud enquires. The importance protecting the tradecraft deployed and the use of open and closed source research will be discussed to include comparable techniques used in covert sensitive investigations. Money laundering utilizing virtual, … Continue reading Parallel Investigation Techniques

Free

Malware-as-a-Service

The webinar covers one type of “crime as a service” (CaaS) offered on clearnet and darknet spaces, namely malware as a service (MaaS). Specifically, this webinar introduces participants to MaaS, the Clearnet and Darknet sites where malware and MaaS are marketed, advertised, and sold, and information about them is distributed. Particularly, attention will be paid … Continue reading Malware-as-a-Service

Clearnet Investigations of Cyber-Enabled Fraud

Chat rooms, discussion forums, and VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams.  This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime. Participants will … Continue reading Clearnet Investigations of Cyber-Enabled Fraud