Why do we need to learn Linux forensics? Well, nowadays when you look at the number of tools available on different penetration testing systems running Linux, you should stop and ask yourself a basic question “are these tools and systems always going to be used for ethical purposes?” The answer is definitely, NO! Another reason to consider learning Linux forensics is that not everyone uses Windows. You may arrive at a crime scene only to find that your suspect’s computer is a Linux operating system!
Tag: Webinar
Spotlight: Your Forensic Goldmine in iOS & macOS
Spotlight is the default indexing engine on iOS™ and macOS®. It is ON by default and stores information about almost every file and folder on the file system. This information includes hundreds of different types of metadata from file-paths and MAC timestamps to document titles, authors, dates viewed and image/video exif tag information. It is not limited to files; emails, notes, text messages, and internet history are all found here. We will explore how to exploit this information with freeware tools we developed and explain how best to interact with and interpret this data.
NDCAC Resources for Law Enforcement in the Digital Age
his training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.
This webinar is live only and will not be available on-demand.
Registrations will close 24 hours before webinar start time.
The NDCAC is a national center established under the Department of Justice designed to help facilitate technical knowledge management, to foster the sharing of solutions and know-how among law enforcement agencies. Their mission is to strengthen law enforcement’s relationships with the communications industry,
Cryptocurrency, Compliance, and Financial Crimes
This webinar will discuss cryptocurrency general information for detailed discussion regarding legitimate use versus illegitimate use, common financial crimes, and avoidance of compliance requirements. Further, the webinar will delve into exchanges, transactions, opportunities for data collection and analysis, the value to criminal or compliance investigations and a review of current case studies.
Presented by:
Patrick Larsen, CEO, ZenLedger.io
Andrew Gordon, President, Gordon Law Group
Cryptocurrency, Compliance, and Financial Crimes
This webinar will discuss cryptocurrency general information for detailed discussion regarding legitimate use versus illegitimate use, common financial crimes, and avoidance of compliance requirements. Further, the webinar will delve into exchanges, transactions, opportunities for data collection and analysis, the value to criminal or compliance investigations and a review of current case studies.
Presented by:
Patrick Larsen, CEO, ZenLedger.io
Andrew Gordon, President, Gordon Law Group
Beyond Prosecution: Forensics for Public Safety
On average, seventy percent of convicted sex offenders are placed on probation. This webinar will identify and explain information forensic examiners can provide to the sentencing court and probation officers which will enhance offender supervision in the community. While this information is usually not relevant to prove legal thresholds of a crime, it is critical to safely supervising convicted offenders. Join two law enforcement professionals to learn how you can augment your reports to help protect the community.
Mobile Forensics: Taking the Logic Out of Traditional Logical Collections
Proper handling of digital evidence is crucial for best success. Why wait weeks, months, or years to access and extract data from mobile devices for your investigations? Access is the cornerstone of digital forensics; without access, vital intelligence is often overlooked. Unfortunately, traditional collection methods are limited, creating backlog and potentially jeopardizing access to time-sensitive data. This webinar will demonstrate modern approaches to digital forensics that enable you to achieve same day results (often within hours) and extract more data from locked and encrypted mobile devices.
US State and Local Government Cybersecurity Landscape and Resources
As technology touches every aspect of our lives and work, cybersecurity has become as critical as physical security. From malware to scams to targeted attacks, this presentation by the Multi-State Information Sharing and Analysis Center (MS-ISAC) will provide a detailed, discussion of the current and emerging cyber threats to U.S. state, local, tribal, and territorial (SLTT) governments, with a focus on how these threats are impacting law enforcement officials, and resources to mitigate them. The MS-ISAC is the U.S.
The Intersection of Human Trafficking and Financial Investigations
Proactive investigations of human trafficking involve the use of advanced investigative methods and criminal intelligence, with pre-planning and active collaboration between law enforcement, prosecutors, victim service providers, and other key interdisciplinary partners. These approaches go beyond traditional vice sting operations, and include leveraging existing data sources and criminal intelligence to target specific types of human trafficking (e.g, illicit massage businesses, trafficking of minors, labor trafficking, etc.), outreach to vulnerable populations, and other strategies.
Deciphering Cryptocurrency: A Technical and Criminal Law Approach
This webinar is live only and will not be available on-demand.
Registrations will close 24 hours before webinar start time.
Starting with a basic overview of cryptocurrencies, this course will focus on some of the more technical aspects of the crypto industry. Additionally, this course will look at the ability of criminals to utilize cryptocurrency, the potential future of crypto and considerations for how to seize cryptocurrency as part of criminal investigations.