Course
Description
Cybercrimes can and have been committed by organized criminal groups.
This course introduces participants to cyber organized crime, the
cyber-dependent and cyber-enabled crimes committed by organized criminal groups,
the methods of operation of these groups, and the structure and organization of
cyber organized criminal groups and roles of members within these groups. This
course also identifies the clearnet and darknet spaces where these groups
operate. The course further covers the tools and techniques that can be used to
identify and investigate cyber organized crime.
At the end of the course, participants will be able to:
• Differentiate types of organized crime from cyber organized crime.
• Examine the structure and organization of cyber organized criminal groups
and describe the roles of members within cyber organized criminal groups.
• Identify the operational methods, tools, and platforms of cyber organized
criminals on clearnet and darknet platforms.
• Describe the capacity and scope of various open source and proprietary
hands-on intelligence collection tools and special investigative techniques
to identify and investigate cyber organized crime (COC).
• Demonstrate understanding of executing a plan for a sample case
investigation by:
(1) analyzing cases of cyber organized crime (e.g., comparing structures,
identifying roles of members, describing perpetrators, and explaining
their tactics, targets, tools, and methods of operation), and
(2) implementing special investigative techniques and tools.
Upon successful completion of the course, participants will receive a
certificate of course completion, and, upon request, can receive technical
assistance from the NCFTA through investigative requests for information
(RFIs).