Springtime SQLite Survival Series Part III – What the Hex is going on in this SQLite database?

SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS®, Android®, and macOS as one of the most prevalent and relevant data storage mechanisms. Join Maggie Gaffney (Teel Tech) and Chris Atha (NW3C) for part three of their three-part Springtime SQLite Survival Series. Part III will tackle … Continue reading Springtime SQLite Survival Series Part III – What the Hex is going on in this SQLite database?

Free

Anti-Money Laundering Training in a Post Pandemic Era

Registrations will close 24 hours before webinar start time. Implementing a successful anti-money laundering training program is a challenge in a post-pandemic era. Combining the human element and technology is key to communicating the patterns of money laundering, terrorist financing, and national security threats to financial investigators and anti-money laundering compliance professionals. Presented by: Kim Manchester, Founder, … Continue reading Anti-Money Laundering Training in a Post Pandemic Era

Free

Linguistic Forensic Science: A Primer for Cybercrime Investigators, Digital Forensic Examiners, and Prosecutors

This webinar will explain how language can be used as a forensic science tool, underlying research rigor, and acceptable application. It will familiarize participants with historical and emerging use in investigations and prosecutions, the potential relevance to online and digital evidence, and the basic legal considerations for appropriate use in litigation. Presented by: Carole Chaski, … Continue reading Linguistic Forensic Science: A Primer for Cybercrime Investigators, Digital Forensic Examiners, and Prosecutors

Free

What Criminal Justice Practitioners Should Know About Ransomware in 2021

This webinar will focus on the state of ransomware in August 2021 related criminal communities, nuances of extortion, and other information of value to investigators, digital forensic examiners, and prosecutors confronted with the onslaught of this crime.  Please join our presenters as they dissect the technical and the criminal justice challenges as this problem continues … Continue reading What Criminal Justice Practitioners Should Know About Ransomware in 2021

Free

Capture The Flag: Asked and Answered!

Join a team of experts from the NW3C as they provide thoughtful and detailed answers to the CTF questions you submit. Head over to nw3.ctfd.io and click the link on the home page to submit any question regarding CTF, digital forensics, cyber investigations, or information security and a panel of NW3C experts will provide answers during this live … Continue reading Capture The Flag: Asked and Answered!

Free

Preservation Letters & Their Vital Role in any Investigation

In today’s world, social media dominates the way people communicate and it's where criminals exploit users. In many instances, evidence has been lost from online platforms such as Snapchat, Kik, and Facebook during an investigation because the evidence wasn't preserved.  In this class, we'll discuss the importance of preservation letters and how they can play … Continue reading Preservation Letters & Their Vital Role in any Investigation

Free

Using GrayKey To Expedite Your Investigations

Mobile devices provide a wealth of digital evidence. They can indicate where devices have been, what they’ve done, who they’ve communicated with, when and why. Keeping up with technology is currently a challenge and will remain a challenge for years to come. iOS and Android platforms are constantly being updated on a regular basis, which … Continue reading Using GrayKey To Expedite Your Investigations

Free

Advancements in Handwriting Recognition for Financial Investigators

Collecting actionable insights from handwritten documents takes time, resources, and a skilled eye. In many cases, check images, deposit slips, and other handwritten forms come by the thousands.   The ScanWriter team will demonstrate the latest hyperautomation technology that captures and converts handwriting from any document into Excel or Business Intelligence analytics with accuracy. Join this … Continue reading Advancements in Handwriting Recognition for Financial Investigators

Free

Using GrayKey Passcode History File

GrayKey collections contain more than just the file system of an iOS device and this additional data is often overlooked. A notable example of this is the GrayKey passcode history file. Learn from Grayshift subject matter experts as they provide an overview of GrayKey passcode history file and how it can be used to maximize … Continue reading Using GrayKey Passcode History File

Free