Counterfeit Goods: Money Laundering in Plain Sight

Scientor

The sale of counterfeit goods may be thought of as a relatively harmless crime, when in reality production, sale, and distribution of counterfeit goods represents money laundering, corruption, fraud, human trafficking, sanctions evasion, and terrorist finance. Much like the sale of illegal narcotics, the production, distribution, and sale of counterfeit goods can yield hundreds of billions of dollars every year. As a result, transnational and localized organized crime groups are involved at every step of the operation.

 » Read more

Gas Pump Skimming

Gas Pump Skimming

The webinar will discuss the anatomy of gas pump skimming from the manufacturing of the skimmers to laundering of the proceeds. The instructor will discuss the various types of skimmers, how the card numbers are harvested as well as the various methods of cashing out.

Presented by: Jasen Wells

 » Read more

The Functionality of Private Coins

Blockchain Alliance

We will be hearing from Coin Center, Chainalysis, and Ciphertrace on the functionality of, and challenges presented by, privacy coins.

Presented by:
Jerry Brito, Coin Center
Dave Jevans, Ciphertrace
Jonathan Levin, Chainalysis
Jason Weinstein, Steptoe
Alan Cohn, Steptoe

 » Read more

What’s New in DF330- Advanced Android and iOS Forensic Analysis

NW3C Webinars

This webinar will highlight the changes to the DF330 course and will focus on the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically-sound methods and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Core skills include analyzing artifacts such as device information, call history, voicemail, messages,

 » Read more

Office 365 Forensics and Business Email Compromises

CRA Webinars

This webinar will discuss the types of evidence that should be collected in a response to a business email compromise/ Office 365 email investigation. Methods of email compromise (phishing, malware, brute force attacks, external compromise/credential stuffing),Types of data at risk and commonly seen schemes.

Evidence Collection and Analysis
•Review of the Office 365/ Azure Admin Centers
•Collecting evidence from Office 365 (logs, rule/forwarding/ Sharepoint/Onedrive data)
•Extracting mailboxes with the Office 365 eDiscovery tool.

 » Read more

Cloud Combat: Law Enforcement Access to Overseas Data

Cloud Combat

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Two attorneys clash in this heated exchange on whether, and how, law enforcement can obtain evidence stored electronically overseas. A former prosecutor and a high-tech crime attorney square off in several rounds of debate. Each round involves a hypothetical that incorporates relevant, cutting-edge evidentiary questions including overseas servers,

 » Read more

The Truth About the Dark Web Fraud Trade

Terbium Labs

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. What is the dark web fraud economy? What drives it? What can we do about it?

Presented by: Emily Wilson, VP of Research Terbium Labs

 » Read more

Zip File Forensics

4C Webinars

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

We will review the effects that various Zip programs have on date time stamps, understand the cause of that effect and dive deep into the internal structure of a Zip archive. Attendees will learn how to manually carve zip file elements, edit the structure as necessary to combine the carvings into a single viable zip file.

 » Read more

NW3C’s Utility Suite

NW3C Utility Suite

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

During this webinar we will be discussing the tools included within the NW3C Utility Suite. What they do, how they work, and how they can help in your investigations. The tools that will be discussed include: Quick Hashing Utility, Batch Hashing Utility, Hex Viewer,

 » Read more

IACP Conference