Spotlight: Your Forensic Goldmine in iOS & macOS

Champlain Webinar

Spotlight is the default indexing engine on iOS™ and macOS®. It is ON by default and stores information about almost every file and folder on the file system. This information includes hundreds of different types of metadata from file-paths and MAC timestamps to document titles, authors, dates viewed and image/video exif tag information. It is not limited to files; emails, notes, text messages, and internet history are all found here. We will explore how to exploit this information with freeware tools we developed and explain how best to interact with and interpret this data.

 » Read more

NDCAC Resources for Law Enforcement in the Digital Age

NDCAC Webinar LECC

his training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

This webinar is live only and will not be available on-demand.
Registrations will close 24 hours before webinar start time.

The NDCAC is a national center established under the Department of Justice designed to help facilitate technical knowledge management, to foster the sharing of solutions and know-how among law enforcement agencies. Their mission is to strengthen law enforcement’s relationships with the communications industry,

 » Read more

Cryptocurrency, Compliance, and Financial Crimes

Cryptocurrency LECC

This webinar will discuss cryptocurrency general information for detailed discussion regarding legitimate use versus illegitimate use, common financial crimes, and avoidance of compliance requirements. Further, the webinar will delve into exchanges, transactions, opportunities for data collection and analysis, the value to criminal or compliance investigations and a review of current case studies.

Presented by:
Patrick Larsen, CEO, ZenLedger.io
Andrew Gordon, President, Gordon Law Group

 » Read more

Cryptocurrency, Compliance, and Financial Crimes

Cryptocurrency LECC

This webinar will discuss cryptocurrency general information for detailed discussion regarding legitimate use versus illegitimate use, common financial crimes, and avoidance of compliance requirements. Further, the webinar will delve into exchanges, transactions, opportunities for data collection and analysis, the value to criminal or compliance investigations and a review of current case studies.

Presented by:
Patrick Larsen, CEO, ZenLedger.io
Andrew Gordon, President, Gordon Law Group

 » Read more

Beyond Prosecution: Forensics for Public Safety

KB Solutions_LECC

On average, seventy percent of convicted sex offenders are placed on probation. This webinar will identify and explain information forensic examiners can provide to the sentencing court and probation officers which will enhance offender supervision in the community. While this information is usually not relevant to prove legal thresholds of a crime, it is critical to safely supervising convicted offenders. Join two law enforcement professionals to learn how you can augment your reports to help protect the community.

 » Read more

Mobile Forensics: Taking the Logic Out of Traditional Logical Collections

Grayshift_LECC

Proper handling of digital evidence is crucial for best success. Why wait weeks, months, or years to access and extract data from mobile devices for your investigations? Access is the cornerstone of digital forensics; without access, vital intelligence is often overlooked. Unfortunately, traditional collection methods are limited, creating backlog and potentially jeopardizing access to time-sensitive data. This webinar will demonstrate modern approaches to digital forensics that enable you to achieve same day results (often within hours) and extract more data from locked and encrypted mobile devices.

 » Read more

US State and Local Government Cybersecurity Landscape and Resources

MSISAC_LECC

As technology touches every aspect of our lives and work, cybersecurity has become as critical as physical security. From malware to scams to targeted attacks, this presentation by the Multi-State Information Sharing and Analysis Center (MS-ISAC) will provide a detailed, discussion of the current and emerging cyber threats to U.S. state, local, tribal, and territorial (SLTT) governments, with a focus on how these threats are impacting law enforcement officials, and resources to mitigate them. The MS-ISAC is the U.S.

 » Read more

The Intersection of Human Trafficking and Financial Investigations

IACP Webinar Image 2

Proactive investigations of human trafficking involve the use of advanced investigative methods and criminal intelligence, with pre-planning and active collaboration between law enforcement, prosecutors, victim service providers, and other key interdisciplinary partners. These approaches go beyond traditional vice sting operations, and include leveraging existing data sources and criminal intelligence to target specific types of human trafficking (e.g, illicit massage businesses, trafficking of minors, labor trafficking, etc.), outreach to vulnerable populations, and other strategies.

 

 » Read more

Deciphering Cryptocurrency: A Technical and Criminal Law Approach

Deciphering Cryptocurrency

This webinar is live only and will not be available on-demand.
Registrations will close 24 hours before webinar start time.

Starting with a basic overview of cryptocurrencies, this course will focus on some of the more technical aspects of the crypto industry. Additionally, this course will look at the ability of criminals to utilize cryptocurrency, the potential future of crypto and considerations for how to seize cryptocurrency as part of criminal investigations.

 » Read more

Information Exposed: Opting Out & Managing the World of Connected Devices

Hetherington Webinar

Investigators need to understand the dark side of information sharing and the potential risks it brings to victims, witnesses, and investigators. To avoid potentially dangerous individuals, first responders, security professionals, and intelligence officers choose to keep their families and homes off the grid. Employees and agencies are at greater risk now more than ever because fraudulent predators are taking advantage of those unfamiliar with working from home. Hacking, phishing, and scamming are on the rise,

 » Read more

IACP Conference