Opioid Investigations: Extracting critical data

Cobwebs Webinar

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Facing social media barriers and the ability to mitigate their ever-changing platforms is something an investigator or analyst does not have time to do. The growing use of social media platforms, mobile apps, and dark web sources contribute to the significant rise of illegal activities on the internet.

 » Read more

Busting Bitcoin Bandits

Santa Clara DA Webinars

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

An underground movement of hackers is taking over victim telephones and draining their financial accounts!  In the past 12 months, a California high tech task force named REACT has identified more than 800 victims and nearly $50 million in losses of cash and cryptocurrency. 

 » Read more

Phishing to Laundering: From Clicks to Cash-Out

NCFTA

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

During this webinar, a panel of NCFTA experts will explain how phishing campaigns are conducted; from developing a “phish kit”, to weaponizing a botnet for delivery, using any stolen credentials for financial gain, then laundering millions of dollars all over the world to fund their lavish lifestyles at your expense,

 » Read more

Being Mickey in a Goofy World: Understanding User Attacks

Secure Ideas

Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation he will walk through the various attacks, including email, social media, and in person, Using various war stories, he will explain how the attacker views the user and what they do to increase the success rate of these attacks.

Presented by: Kevin Johnson, Secure Ideas

 » Read more

Law Enforcement Investigations on the Darknet: Case studies from the co-founder of the Tor Project

Dark Owl

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

In this webinar, Andrew Lewman will share and explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. Using these real-world, darknet-based examples that have been selected for a law-enforcement based audience, Andrew will walk-through examples of different methodologies law enforcement can use to de-anonymize threat actors,

 » Read more

Seven Samurai: Understanding Attacks to Drive Defenses

Secure Ideas

This presentation uses war stories from decades of working in IT and security to explore the attacks we see today.  Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today.  These stories will explain how the attack was performed and why an attacker would take that direction.

Presented by: Kevin Johnson, Secure Ideas

 » Read more

Cybercrime Basics: Investigation and Prosecution of Credit Card Fraud

DCJ Webinars

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will cover credit card fraud and identity theft from initial investigative steps to arrest and prosecution. The presenters will discuss how to identify points of compromise including low hanging fruit, skimmers and indicators of malware. Specifics regarding point of infection, log analysis,

 » Read more

IACP Conference