Conducting Secure Online Investigations in 2022

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email. Remaining anonymous and protected online is key to any web intelligence investigation. With social media platforms becoming more efficient at finding and closing fictitious accounts, creating and operating avatars for online investigations is becoming more difficult. This presentation will give … Continue reading Conducting Secure Online Investigations in 2022

Free

Identify, Investigate, Recover Digital Cash, and Prosecute Money Laundering Crimes

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email. Today’s law enforcement agencies are facing a financial crimes epidemic. Millions of consumers are victims of credit card fraud and ID theft each year resulting in the loss of billions. Human traffickers, fuel thieves, and drug dealers are laundering money … Continue reading Identify, Investigate, Recover Digital Cash, and Prosecute Money Laundering Crimes

Free

Reconstructing User Activities from a Memory Dump

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email. Child exploitation cases often involve analyzing digital device storage drives to reconstruct user activities. While much can be learned from disk analysis, Random Access Memory (RAM) is a particularly rich source of potential evidence related to user activities. Specifically, reconstruction … Continue reading Reconstructing User Activities from a Memory Dump

Free

Using Cellular Records to Solve Crimes

The webinar will introduce students to cellular network technology and how to correctly identify the cellular provider from a phone number. Search warrant language will be discussed on how to obtain all available cellular records. Various types of cellular records will be shown along with identifying and analyzing the cell site location information. Different types … Continue reading Using Cellular Records to Solve Crimes

Free

Searching for the Digital Evidence in Your Physical Crime Scene: Part 1

Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital “footprints” that can help you during your investigations, no matter your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative … Continue reading Searching for the Digital Evidence in Your Physical Crime Scene: Part 1

Free

High-Tech Crimes: Asked and Answered

Join a team of experts from NW3C as they provide thoughtful and detailed answers to the high-tech crime questions you submit. Click here to submit questions regarding digital forensics, cyber investigations, or information security and a panel of NW3C experts will provide answers during this live session. Presented by: Chris Atha, High-Tech Crime Specialist, NW3C Norm Gibson, High-Tech Crime Specialist, NW3C … Continue reading High-Tech Crimes: Asked and Answered

Free

AirTags and Tracking Technology: Investigative and Legal Perspectives

This webinar will examine the investigative and legal considerations related to tracking technology, and the impact of ultra-wideband location networks such as Apple AirTags and other similar emerging technologies. We will use case analysis to illustrate key questions and considerations for both investigators and prosecutors given the increasing criminal use of this technology and proactive … Continue reading AirTags and Tracking Technology: Investigative and Legal Perspectives

Free

Leveraging Open Source Intelligence to Investigate Fraud Rings

Fraudsters, whether acting alone or as part of an organized, global crime ring, are using every means available to perpetrate and orchestrate large scale schemes against corporations and governments. Open source intelligence (OSINT) can be used to identify assets and information to piece together the traditionally opaque network of people involved in fraud schemes. OSINT … Continue reading Leveraging Open Source Intelligence to Investigate Fraud Rings