Hiding in Plain Sight

With caseloads increasing and data storage sizes exploding, computer forensic examiners are feeling the pressure to clear data and close cases quicker. With the ease of access to pirated material and the lack of legal recourse for such media, many examiners quickly clear the material to ensure there is no illegal material and move on. … Continue reading Hiding in Plain Sight

Free

Wrangling Routers and Corralling Devices

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email. Registrations will close 24 hours before webinar start time. With wireless devices being everywhere and easy to conceal, sometimes you have to do a good Ol' Round-up. Looking at routers can help corral those pesky, missing, or unknown devices. While … Continue reading Wrangling Routers and Corralling Devices

Free

Asset Tracing Intelligence: Automating Check Image and Bank Records Analysis

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email. Registrations will close 24 hours before webinar start time. What if you could process thousands of check images and bank transactions from PDF to Excel in less than 10 minutes? What if you could create a flow of funds visualization in … Continue reading Asset Tracing Intelligence: Automating Check Image and Bank Records Analysis

Free

Internet Identifiers: Names and Numbers for Law Enforcement

Registrations will close 24 hours before webinar start time The Internet Corporation for Assigned Names and Numbers (ICANN) and the American Registry for Internet Numbers (ARIN) have joined together to develop a presentation specifically designed for law enforcement focused on cyber security and the roles our organizations play in helping to combat this ever-evolving problem. … Continue reading Internet Identifiers: Names and Numbers for Law Enforcement

Free

Springtime SQLite Survival Series Part III – What the Hex is going on in this SQLite database?

SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS®, Android®, and macOS as one of the most prevalent and relevant data storage mechanisms. Join Maggie Gaffney (Teel Tech) and Chris Atha (NW3C) for part three of their three-part Springtime SQLite Survival Series. Part III will tackle … Continue reading Springtime SQLite Survival Series Part III – What the Hex is going on in this SQLite database?

Free

Anti-Money Laundering Training in a Post Pandemic Era

Registrations will close 24 hours before webinar start time. Implementing a successful anti-money laundering training program is a challenge in a post-pandemic era. Combining the human element and technology is key to communicating the patterns of money laundering, terrorist financing, and national security threats to financial investigators and anti-money laundering compliance professionals. Presented by: Kim Manchester, Founder, … Continue reading Anti-Money Laundering Training in a Post Pandemic Era

Free

Linguistic Forensic Science: A Primer for Cybercrime Investigators, Digital Forensic Examiners, and Prosecutors

This webinar will explain how language can be used as a forensic science tool, underlying research rigor, and acceptable application. It will familiarize participants with historical and emerging use in investigations and prosecutions, the potential relevance to online and digital evidence, and the basic legal considerations for appropriate use in litigation. Presented by: Carole Chaski, … Continue reading Linguistic Forensic Science: A Primer for Cybercrime Investigators, Digital Forensic Examiners, and Prosecutors

Free

What Criminal Justice Practitioners Should Know About Ransomware in 2021

This webinar will focus on the state of ransomware in August 2021 related criminal communities, nuances of extortion, and other information of value to investigators, digital forensic examiners, and prosecutors confronted with the onslaught of this crime.  Please join our presenters as they dissect the technical and the criminal justice challenges as this problem continues … Continue reading What Criminal Justice Practitioners Should Know About Ransomware in 2021

Free

Capture The Flag: Asked and Answered!

Join a team of experts from the NW3C as they provide thoughtful and detailed answers to the CTF questions you submit. Head over to nw3.ctfd.io and click the link on the home page to submit any question regarding CTF, digital forensics, cyber investigations, or information security and a panel of NW3C experts will provide answers during this live … Continue reading Capture The Flag: Asked and Answered!

Free

Preservation Letters & Their Vital Role in any Investigation

In today’s world, social media dominates the way people communicate and it's where criminals exploit users. In many instances, evidence has been lost from online platforms such as Snapchat, Kik, and Facebook during an investigation because the evidence wasn't preserved.  In this class, we'll discuss the importance of preservation letters and how they can play … Continue reading Preservation Letters & Their Vital Role in any Investigation

Free