Course
Description Chat rooms, discussion forums, and VoIP,
instant messaging, and social media platforms have been used to facilitate
cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC
scams. This course introduces participants to cyber-enabled fraud, types
of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime. Participants will gain practical knowledge
of the ways perpetrators of cyber-enabled fraud can be identified
on these platforms, and the tools that can be used to
identify the individuals and groups that commit these cybercrimes,
the roles and associations of individuals within groups, and the
tools and tactics they use to commit various forms of cyber-enabled
fraud. At the end of the course, participants will be able to: • Identify different types of cyber-enabled fraud
and describe threat actors who commit cyber-enabled fraud.
• Identify the platforms used by threat actors in the commission ofcyber-enabled fraud.
• Explain and differentiate between the methods used
by threat actors of cyber- enabled fraud on clearnet and darknet
spaces. • Identify investigative tools and techniques used in
cyber-enabled fraud and describe their purpose for investigation.
• Identify open-source tools used in successful cyber-enabled fraud investigations and describe their outputs. • Describe the types of information derived by
investigative techniques that help identify cyber-enabled fraud perpetrators and
potential problems that may occur. Upon successful completion of the course, participants will receive a
certificate of course completion, and, upon request, can receive Internet Fraud
Alerts (IFAs), as well as technical assistance from the NCFTA through
investigative requests for information (RFIs). This course is funded by the U.S. Bureau of Justice
Assistance. The course is only open to U.S. state, local, tribal. and territorial law
enforcement agencies, prosecutors, inspectors general, and
judges. |