Clearnet Investigations of Cyber-Enabled Fraud

Clear

Register Here​​

March 30-31, 2023 from 10 a.m. to 4 p.m. EST with an hour lunch break. 

Chat rooms, discussion forums, and VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams.  This course introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

 » Read more

Darknet Markets, Forums, and Investigations

LECC_Darknet

Register here

March 8-9, 2023, or March 20-21, 2023

10am-4pm (EST) with an hour lunch break

This introductory course familiarizes participants with illegal darknet markets and associated forums, particularly the illicit goods and services offered, as well as successful law enforcement operations targeting these sites. Participants will gain practical knowledge, skills, and abilities (KSAs), including how to access the darknet, create anonymous accounts, enact operational security, and how to apply these KSAs to conduct darknet investigations.

 » Read more

Cryptocurrency Investigations

LECC_Crypto

Register here

March 8-9 or March 23-24, 2023.

10 a.m. to 4 p.m. EST with an hour lunch break.

Taught by academics and investigators who consistently engage with various aspects of cryptocurrency in their careers, this 2-day course educates participants on cryptocurrency and its relevance to criminal justice agents and investigations. The course will cover in depth topics such as the different categories of cryptocurrency, common cryptocurrencies,

 » Read more

Using the Internet to Solve Crimes

uisc

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

This webinar will demonstrate the skills needed to conduct internet-based investigations. Attendees will learn about the current publicly available open source investigative techniques (OSINT) that can be used in intelligence gathering will be discussed. Attendees will also gain valuable insight into learning new ways to gather intelligence from public or open sources available without the need for subpoenas or search warrants.

 » Read more

Intelligence Analysis: Asked and Answered

itla

Join some experts from NW3C as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. Click here  to submit questions regarding intelligence analysis skills, information collection, or general comments of analytic tradecraft and the NW3C experts will provide answers during this live session.

Presented by:
Randy Stickley, Intelligence Specialist, NW3C
Justin Parker, Senior Intelligence Analyst, Iowa Department of Public Safety/Division of Intelligence and Fusion Center
Heaven Henwood,

 » Read more

Using Video Technology to Solve Crimes

vtsc

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Video surveillance is used in most investigations and almost everything we do is now being recorded from businesses, homes, cell phones, and other recorders. Attendees will learn about video surveillance technology and how we perceive recorded images. We will discuss best practices in properly obtaining video surveillance and various types of recorders to obtain the best quality videos. 

 » Read more

Malware-as-a-Service

Nov_2

The webinar covers one type of “crime as a service” (CaaS) offered on clearnet and darknet spaces, namely malware as a service (MaaS). Specifically, this webinar introduces participants to MaaS, the Clearnet and Darknet sites where malware and MaaS are marketed, advertised, and sold, and information about them is distributed. Particularly, attention will be paid to the M.O., tactics, targets, and tools used by perpetrators of this cybercrime.

Presenters:

Abraham Riviera,

 » Read more

Clearnet Investigations of Cyber-Enabled Fraud

Nov_7

Chat rooms, discussion forums, and VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams.  This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime. Participants will gain practical knowledge of the ways perpetrators of cyber-enabled fraud can be identified on these platforms, and the tools that can be used to identify the individuals and groups that commit these cybercrimes,

 » Read more

Cyber Organized Crime

COC

Cybercrimes can and have been committed by organized criminal groups.  This webinar introduces participants to the notion of cyber organized crime, the cyber-dependent and cyber-enabled crimes committed by organized criminal groups, the structure and organization of cyber organized criminal groups and roles of members within these groups, and the tools used by these groups. The clearnet and darknet spaces where these groups operate will also be explored.

Presented by:

Dr. Marie-Helen Maras,

 » Read more

Using Social Media to Solve Crimes

bigstock-Computer-Keyboard-With-Social--14993582@200x150

Students will learn the skills needed to conduct investigations using social media. Students will learn about the different social media companies and how their information can assist in investigations using a court order or using open-source intelligence techniques. A case study will be presented that was solved using Internet-based investigations and social media. Students will be provided with a copy of the presentation and search warrant templates for social media records.

Presented by:
Jeffrey German,

 » Read more

IACP Conference