Live Webinars


Intellectual Property Crime Investigations
Tue, Oct 20, 2020 2:00pm-3:00pm Eastern
Duration: 60 Minutes

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Registrations will close 24 hours before webinar start time.

Intellectual Property (IP) Crimes come in many different forms, including counterfeiting, copyright infringement, and trade secrets, just to name a few. This webinar will provide a global perspective on IP crimes, basic investigative techniques, and the importance of public/private sector partnerships when conducting these investigations.

Presented by:
D. Scott Bailey, Economic Crime Specialist, NW3C

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C. 

Webinar Fee: $0.00 per attendee




Beyond Prosecution: Forensics for Public Safety
Mon, Oct 26, 2020 12:00pm-1:30pm Eastern
Duration: 90 Minutes

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

On average, seventy percent of convicted sex offenders are placed on probation. This webinar will identify and explain information forensic examiners can provide to the sentencing court and probation officers which will enhance offender supervision in the community. While this information is usually not relevant to prove legal thresholds of a crime, it is critical to safely supervising convicted offenders. Join two law enforcement professionals to learn how you can augment your reports to help protect the community.

Presented by:
Jim Tanner, Ph.D. President, KBSolutions Inc.
Bryan Franke, CFCE, CEECS, CFSI, President, 2CSolutions LLC

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C. 

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Cryptocurrency, Compliance, and Financial Crimes
Wed, Nov 04, 2020 1:00pm-2:15pm Eastern
Duration: 75 Minutes

This webinar will discuss cryptocurrency general information for detailed discussion regarding legitimate use versus illegitimate use, common financial crimes, and avoidance of compliance requirements. Further, the webinar will delve into exchanges, transactions, opportunities for data collection and analysis, the value to criminal or compliance investigations and a review of current case studies.

Presented by:
Patrick Larsen, CEO, ZenLedger.io
Andrew Gordon, President, Gordon Law Group

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C. 

Webinar Fee: $0.00 per attendee




Prosecuting Intellectual Property Crimes
Tue, Nov 10, 2020 1:00pm-2:00pm Eastern
Duration: 60 Minutes

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Registrations will close 24 hours before webinar start time.

This webinar will discuss various approaches to prosecuting intellectual property crimes while emphasizing the importance of communication between the prosecutor and the investigator.

Presented by:
Patrick Beasley, Twenty-Second Judicial District, State of Mississippi

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C. 

Webinar Fee: $0.00 per attendee




With Elder Abuse on the Rise, is Your Department Ready to Respond?
Wed, Nov 18, 2020 1:00pm-2:00pm Eastern
Duration: 60 Minutes

This session presented by the National Center on Elder Abuse will showcase available tools to combat elder exploitation, including mobile apps, databases, trainings, and guides.

The session will also feature an introduction to EAGLE, the Elder Abuse Guide for Law Enforcement. These incentives are funded by the Department of Justice and developed by law enforcement for law enforcement. EAGLE provides guidelines on evidence collection, a state-by-state penal code database, older adult resources in your area, and law enforcement roll call videos.

Presented by:
Julie Schoen, National Center on Elder Abuse/University of Southern California,
Keck School of Medicine
Lauren Rosell, National Center on Elder Abuse/University of Southern California,
Keck School of Medicine
Alexis Calleros, National Center on Elder Abuse/University of Southern California, Keck School of Medicine

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.  


 


Webinar Fee: $0.00 per attendee




Of Ponzis and Pyramids: Effective Use of a Forensic Auditor in Investment Fraud Investigations
Tue, Dec 01, 2020 1:00pm-2:30pm Eastern
Duration: 90 Minutes

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email .

This webinar is live only and will not be available on-demand
Registrations will close 24 hours before webinar start time.

Investment frauds result in the theft of millions of dollars from investors on a yearly basis, many times without the victims knowing that they have been defrauded.  Fraudsters may target those of modest means or those with small fortunes, yet their methods are almost always the same.  Learning how to identify common types of investment frauds, the effective methods for investigating such schemes, and how to successfully prosecute these crimes is key to protecting unsuspecting investors from these scams.

This course will focus on common types of investment frauds, including Ponzi and Pyramid schemes, the effective use of forensic auditors throughout such investigations, and what steps need to be taken by the prosecution team to successfully hold these fraudsters accountable. 

Presented by:
Philip Apruzzese, New York Office of the Attorney General
Jason Blair, New York Office of the Attorney General

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C. 

Webinar Fee: $0.00 per attendee




NDCAC Resources for Law Enforcement in the Digital Age
Tue, Dec 15, 2020 1:00pm-2:00pm Eastern
Duration: 75 Minutes

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

This webinar is live only and will not be available on-demand. 
Registrations will close 24 hours before webinar start time.

The NDCAC is a national center established under the Department of Justice designed to help facilitate technical knowledge management, to foster the sharing of solutions and know-how among law enforcement agencies. Their mission is to strengthen law enforcement’s relationships with the communications industry, leverage/share the collective technical knowledge and resources of the law enforcement community, and address challenges posed to law enforcement by advanced communications services and technologies.  This one hour webinar will introduce you to the many resources available through the NDCAC to include technical solutions, trainings, tools, and analytics.

Presented by:
Alan Kivi, National Domestic Communications Assistance Center (NDCAC)

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

Webinar Fee: $0.00 per attendee


On-Demand Webinars


Wellness in 2020 Policing
Duration: 75 Minutes

Recorded on October 1, 2020

The year 2020 has brought an onslaught of new challenges in the criminal justice world! While officer wellness has always been an important topic, it is especially critical now. During this webinar we will share the experience of two law enforcement professionals who know the importance and necessity of wellness and mental health programs for criminal justice professionals. Audience interaction will also determine the topics for our next wellness webinars.

Presented by:
Lt. William D. Walsh, Patrol Commander and Health and Wellness Coordinator, Voorhees Police Department (NJ)
Thomas E. Coghlan, PsyD, ret. Det., NYPD, Clinical Psychologist, Owner, Blue Line Psychological Services, PLLC
Elizabeth Strong, MA Forensic Psychology, Program Manager, Wellness and Mental Health Initiative at NW3C

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.  

Webinar Fee: $0.00 per attendee




Intelligence Sharing: Effectively Combat Money Laundering
Duration: 90 Minutes

Recorded on September 29, 2020

Laundering being missed? Law enforcement and government agencies globally have examples of intelligence failures that could have led to offenders being brought to justice earlier if relevant data had been shared between partners. In this webinar, we will discuss whether there are means of more effectively sharing intelligence to fight financial crime and criminals.

Presented by:
Colin Tansley, Intelect Group

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent.

Webinar Fee: $0.00 per attendee




Technical Detection Methods for Insider Risk Mitigation Part 2
Duration: 75 Minutes

Recorded on September 24, 2020

Effective insider risk mitigation requires the collection, aggregation, and analysis of data from a multitude of data sources within an organization. In this presentation, we will present an overview of the current state of the practice in technical detection methods for insider risk mitigation, and present strategies organizations can use to protect their critical assets from insider misuse.

Presented by:
Dan Costa, Technical Manager, CERT National Insider Threat Center

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C. 

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Building an Effective Insider Risk Management Program Part 1
Duration: 75 Minutes

Recorded on September 22, 2020

This session will discuss strategies for building, implementing, and operating an effective insider risk management program that is integrated into an organization-wide enterprise risk management strategy.  Best practices will be discussed addressing prevention, detection, investigation, and response strategies to reduce the risk of malicious and non-malicious insiders impacting the critical assets of your organization.

Presented by:
Randy Trzeciak, Director National Insider Threat Center; CERT Division, Software Engineering Institute

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C. 

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Information Exposed: Opting Out & Managing the World of Connected Devices
Duration: 90 Minutes

Recorded on September 15, 2020

Investigators need to understand the dark side of information sharing and the potential risks it brings to victims, witnesses, and investigators. To avoid potentially dangerous individuals, first responders, security professionals, and intelligence officers choose to keep their families and homes off the grid. Employees and agencies are at greater risk now more than ever because fraudulent predators are taking advantage of those unfamiliar with working from home. Hacking, phishing, and scamming are on the rise, and the threats are expected to increase. Helping the public and high-risk targets protect their personally identifiable information is a priority during these uncertain times. Opting out of online personal data aggregates and managing the technology devices inside your home can reduce the risk to you and your family. This webinar is meant to help facilitate your understanding of the dark side of information sharing and how to protect your, your family’s, and the high-risk targets’ personal privacy in a very open online world. There is no one solution, no one vendor, that has all the answers. Knowledge from this session will enable you to begin to remove, obstruct, or obscure the open source information that leaves you, your family, and high-risk targets vulnerable online.

Learning Objectives:

• Understand the dark side of information sharing.
• Identify private lives and public information available through websites, social networks, and “Invisible Web” sources.
• Discover ways to protect your privacy by implementing basic security practice online, at home, and on social media.

Presented by:
Cynthia Hetherington, Hetherington Group

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




DFIR Dictionary Part 1
Duration: 60 Minutes

Recorded on September 8, 2020

Merriam Webster is our go to source for thousands of definitions. Digital Forensics and Incident Response use terms that are not typically defined in mainstream dictionaries. A quick review of any common list-serve reveals a lexicon of hundreds, if not thousands of unique terms and words. This webinar series will start with the most basic of DFIR definitions and build upon them. Our content will be rooted in empirical facts with a misting of industry history and professional experiences.

Presented by:
Chris Atha, High-tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Chasing Ghosts: First-Party Fraud and Synthetic Identities (credit cards)
Duration: 75 Minutes

Recorded on August 25, 2020

In this ever-changing fraud environment we live in, one thing has remained constant, investigating first-party fraud and the use of synthetic identities has always been difficult. Join us for an interactive presentation that will not only educate you but give you resources to assist in your investigations. There will be content on synthetic identity creation and use, CPNs (credit privacy number), assumed identity fraud, bustouts, collusive/shell merchants, false fraud claims, manufactured spend and much, much more. We’ll also discuss trends in the industry and how Capital One can assist in your investigations.

Presented by:
Geraldine Schmitt, Capital One US Card, Principal Fraud Investigative Analyst

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Eyes Wide Open: New Insights Into Digital Video Forensics
Duration: 75 Minutes

Recorded on August 18,2020

From targeting child predators to identifying deepfake videos, this presentation will introduce a new approach to uncovering previously unavailable information from digital video files.  Learn how the source of a video file can be identified, even from social media platforms.  Take a deeper dive into the authenticity of those files to show the truth in video.

Presented by:
Brandon Epstein, Director of Training, Medex Forensics
Bertram Lyons, Managing Director, Software at Medex Forensics
Walter Bruehs, FBI

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Hiding In Plain Sight: Diving into Video Layering Techniques
Duration: 60 Minutes

Recorded on August 6, 2020

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

This webinar will highlight possible missed evidence in cases and highlight a new method for hiding illegal Child Sexual Abuse Material (CSAM) from investigators. Join us and learn about the potential hiding technique, including how to replicate it for testing purposes and discover it in your cases if it’s being utilized. To date, automated tools have not been discovering the hidden evidence in this example and you will learn how to detect it and ensure that you are finding any potential hidden evidence.

Presented by:
Olin Rankin, High-Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Identify, Investigate, Recover Cash and Prosecute Payment Card Money Laundering Crimes
Duration: 75 Minutes

Recorded on July 23, 2020

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Today’s law enforcement agencies are facing a financial crimes epidemic. Millions of consumers are victims of credit card fraud and ID theft each year, resulting in the loss of billions of dollars. The magnitude of the problem is overwhelming and when coupled with the effort involved to work those cases, many agencies choose to let them pass. They don’t understand the problem, let alone how to analyze these cases and prosecute the individuals who perpetrated the crime. Agencies have been slow to make progress, but it doesn't have to be this way.

Join us to hear ERAD's Chief Operating Officer, Steve Beckerman, provide insights on the latest trends in payment card money laundering and important interdiction techniques to help you better apprehend, prosecute and convict more criminals.

Presented by:
Steve Beckerman, Chief Operating Officer, ERAD

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




What Is There To Know About Credit Card Fraud?
Duration: 75 Minutes

Recorded on July 16, 2020

What is there to know about credit card fraud? Everything! Join us for an interactive presentation discussing the three main types of credit card fraud (Transaction fraud, Identity fraud and Payment fraud). There will be content on cyber fraud, the dark web and how that world operates. We’ll also discuss trends in the industry and how Capital One can assist in your investigations.

Presented by:
Jeremy Geisel, National Law Enforcement Strategy Manager, Capital One Credit Card Division

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration
Duration: 60 Minutes

Recorded on July 9, 2020

Though the use of computer forensics in criminal investigations has expanded in recent years, there is limited empirical evidence about the prevalence of the use of digital evidence in the court system and its impact on prosecutorial outcomes.  This webinar will discuss how digital evidence has performed in the U.S. Courts of Appeal, and how the U.S. Courts of Appeal generally views the science behind computer forensics.  Participants will understand: (1) the most common legal basis for appeals related to digital evidence, (2) the most frequent outcomes for those appeals, (3) the most prevalent challenges to digital forensics, and (4) which appeals are the most likely to result in an affirmed or reversed decision for the defendant.

Presented by:
Martin Novak, Senior Computer Scientist, National Institute of Justice

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




An Agency’s Cybersecurity and the Integrity of Digital Evidence?
Duration: 75 Minutes

Recorded on July 8, 2020

This webinar will examine a law enforcement agency's cybersecurity challenges resulting from the cyber threats faced by municipalities, counties, and state governments. The webinar will explore how a cyber incident for a law enforcement agency can impact (even lose) a criminal case for the prosecution or negatively impact the agency’s credibility in general.  When providing agency cybersecurity, not all postures and solutions are the same.

Presented by:
Carter Schoenberg, Executive Vice President of Cybersecurity Solutions at IPKeys Power Partners

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




ecoATM, Support for Criminal Investigations involving Mobile Devices
Duration: 75 Minutes

Recorded on June 30, 2020

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Cell phones are a way of life in modern society. While these devices are used daily for normal communication purposes, they are used for criminal purposes. They are stolen, used to plan crimes, research crimes, and take images of unlawful activities then discarded. Law Enforcement’s ability to recover/obtain these discarded phones can be crucial to a variety of investigations.

Presented by:
Doug Muldoon, Director of Law Enforcement Relations, ecoATM
Jim Smith, Director of Law Enforcement Relations, ecoATM

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Bad Medicine - Healthcare Fraud and Money Laundering
Duration: 90 Minutes

Recorded on June 22, 2020

In early 2020 the U.S. Treasury released its National Strategy for Combating Terrorist and Other Illicit Financing.  First and foremost, at the top of the list of illicit finance was healthcare fraud.  With major cases like last year’s conviction for a USD $1 billion fraud scheme, healthcare fraud takes resources away from those who need it the most and the proceeds are used to fuel lavish lifestyles, corruption, and other crime. Attendees will be given examples of how the fentanyl crisis has been exploited by corrupt practitioners based on following the illicit transactions related to these schemes.  This session will also explore healthcare fraud and money laundering investigations, giving attendees insight into how to detect and pursue these significant and detrimental cases. 

Presented by:
Michael Schidlow, Scienter Group

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Tor, Darknet, and Dark Markets: A Deep Dive for Criminal Investigators and Analysts
Duration: 2 Hours 30 Minutes

Recorded on June 15, 2020

This webinar will build on concepts and techniques discussed in the previous What Investigators Need to Know about Hiding on the Internet:  Proxies and VPNs webinar.  You can register for that on-demand webinar at:  https://www.nw3c.org/webinars/Register?id=10838. But, it is not necessary for an investigator or analyst to have attended the previous webinar to attend, understand, and gain valuable investigative insights from this deep dive webinar.      

Tor is most commonly used to hide one’s identity. But it can also be used by an insider to breach a firewall or internet filter and is a gateway to what is commonly called the darknet. While Tor is the most common anonymity network, it is definitely not the only one.  And, while Tor Hidden Service servers are the most well-known portion of the darknet, there are other areas accessible through other networks. You can exchange Child Sexual Abuse Material, discuss criminal tradecraft, buy and sell illicit drugs, find stolen personal identifying information, and negotiate with those offering hacking as-a-service on dark markets and in darknet vendor shops.

This webinar is not intended to make attendees experts, but rather to demystify the topic. It includes case studies and a discussion of specific investigative techniques.The webinar will give investigators and analysts the foundation that they need to understand these tools and communities—both how they are exploited by criminal and how they can be used by investigator and analysts.  
 
Presented by:
Chuck Cohen, Vice President, NW3C

Webinar Fee: $0.00 per attendee




Autopsy: Utilizing the Portable Case Option Part 2
Duration: 75 Minutes

Recorded on June 11, 2020

Part 2 of a 2 Part Series

Autopsy is a free and open source digital forensics platform with many features comparable to those found in the leading commercial tools. This is Part 2 in our 2-part Autopsy webinar series; Part 1 walked through setting up a new case and effective tool usage and Part 2 will explore utilizing Autopsy’s Portable Case.  Attendees will learn why a portable case is a good option for a forensic examiner to pass digital evidence to the investigators or prosecutors for further analysis and review.  With a portable case, the examiner can focus on processing the digital evidence, allowing the investigator to review the results of the examination and determine if there are items of evidentiary value.

This webinar will focus on how to create a portable case, as well as how to effectively walk investigators and prosecutors through using a portable case to review digital evidence to identify data of evidentiary value.

Attendees should be familiar with the basic inner workings of digital forensics, as this webinar series will not delve into explaining how each ingest module works. A deeper dive into Autopsy and other digital forensic suites is covered in our DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (IDFA - AFT) course.

Presented by:
JD Nickolas, High-Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Understanding Facebook Search Warrant Returns
Duration: 60 Minutes

Recorded on June 4, 2020

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Data of evidentiary value in criminal cases is generated both on the suspect device and the services it utilizes. While recovery of data from the suspect device is regularly performed, user account data stored off-device from these services often remains overlooked. This overlooked data is increasingly becoming crucial evidence in cases. In this webinar, we will manually review a Facebook search warrant return examining the different artifacts that can be provided within a return. Once manual examination is complete, a review of the same return with an automated tool will be conducted so the two methods of examination can be compared.

Presented by:
John McLead, NW3C

Webinar Fee: $0.00 per attendee




Encryption, Encoding, Inaccessible Data and Devices
Duration: 75 Minutes

Recorded June 2, 2020

Hash, encryption, full disk, file based, and the list goes on! Words used correctly and incorrectly when examiners discuss or even report on evidence. This webinar is intended to lay the framework for a factual understanding of how encryption and hashing are used in our digital investigations. Real-world applications of hashing, and encryption will be shown, with an emphasis on how they impact investigations in 2020. Questions such as: "Does the application encrypt data?", "How is it encrypted?", and "Why can’t I decrypt it?" will be discussed.

Presented by:
Chris Atha, NW3C

Webinar Fee: $0.00 per attendee




Autopsy: Open Source Digital Forensics Basics Part 1
Duration: 90 Minutes

Recorded May 28, 2020

Part 1 of a 2 Part Series

Autopsy is a free and open source digital forensics platform with many features comparable to those found in the leading commercial tools.  It can be installed on Windows, macOS, and Linux operating systems.  This is part 1 in our 2-part webinar series focused on using Autopsy to perform digital forensic examinations.

This webinar will start by be walking through setting up a new case and exploring effective tool usage.  Attendees will then learn digital forensics best practices and methods for quickly locating items of evidentiary value, based on the results of the following processes:

 Compute a MD5 verification hash of an evidence file
 File Hashing | Notable HDB | Irrelevant HDB
 File Signature Analysis
 Data Carving | File System Recovery
 Extract EXIF Metadata
 Keyword Searches
 Display results in various viewer components

Attendees should be familiar with the basic inner workings of digital forensics, as this webinar series will not delve into explaining how each ingest module works.  A deeper dive into Autopsy and other digital forensic suites, is covered in our DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (IDFA - AFT) course.

Presented by:
JD Nickolas, NW3C

Webinar Fee: $0.00 per attendee




Narcotics and Counterfeit Goods: A Match Made in Heaven
Duration: 90 Minutes

Recorded May 27, 2020

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

This webinar is a detailed case study of a successful investigation, from inception to trial, of a criminal case involving the sale of counterfeit merchandise, pirated CDs and DVDs, and synthetic cannabinoids in state court. The webinar will provide a detailed analysis of the three-year investigation and trial of a local retail store merchant that utilized his business as a front to conduct the illicit sale of drugs and counterfeit merchandise in Meridian, Mississippi. Attendees will learn how law enforcement officers at the local, state, and federal level properly deconflicted this case. Lastly, the presenters will address the challenges they faced during the investigation and prosecution of this matter and discuss how these issues were successfully resolved.

Presented by:
Patrick E. Beasley, Assistant District Attorney, Mississippi Office of the District Attorney, 6th Judicial Circuit Court
Leland “Lee” McDivitt, Senior Investigator, Mississippi Office of the Attorney General

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Why’d it have to be snakes?: Python Programming for Law Enforcement Part 4
Duration: 90 Minutes

Recorded May 26, 2020

Part 4 of a 4 Part Series

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst’s repertoire. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day-to-day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

Session 4
• Classes/objects• I/O• Reading file• Writing file• Append• Closing file• Coding Example• Imports libraries• CSV library• CSV Example• Coding Example• Random name• RegEx• Coding Example• MySQL Connector• Built-In Functions• Questions

Presented by:
Jasen Wells, FDLE

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Overcoming Defenses in Child Exploitation Cases
Duration: 90 Minutes

Recorded May 21, 2020

Using several case studies, this webinar will address defenses in child exploitation cases including SODDI, innocent download, virus, download/delete and mental disabilities. How to overcome these defenses and avoid pitfalls during cross-examination (attempts by defense to get witness to support their claimed defense). Will include pretrial issues, jury selection, testimony, handling of digital evidence, summation, and how to use graphics and PowerPoint in your trials.

Presented by:
Kateri Gasper, Assistant District Attorney, Queens County District Attorney’s Office

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Why’d it have to be snakes?: Python Programming for Law Enforcement Part 3
Duration: 90 Minutes

Recorded May 20, 2020

Part 3 of a 4 Part Series

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst’s repertoire. Python for Law Enforcement is a four-part webinar series that is geared for law enforcement. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day-to-day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

Session 3
• While loop• For loop• Break/continue• Coding Example• Functions• Inheritance
• Modules• Coding Example• Print• User input• Conditional statements• Coding Example • Questions

Presented by:
Jasen Wells, FDLE

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Optimizing Child Exploitation Investigations with FlashL1ght
Duration: 60 Minutes

Recorded May 14, 2020

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

With hundreds of CyberTips per month, ICAC task forces suffer from major backlog and the psychological effects of officers being regularly exposed to child exploitation. Using our cutting-edge AI algorithms, FlashL1ght addresses both these pain points with an on-premise, stand-alone solution. Join us for this live demo to see how simple and time efficient FlashL1ght is.

This webinar is sponsored by L1ght. NW3C is providing the webinar so that attendees can have more information with which to evaluate how this capability might add value to them and the organizations they serve. NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Presented by:
Zohar Levkovitz
Ron Porat
Roni Gur

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




The Art of Social Engineering: How to understand and use it as a tool for proactive investigations
Duration: 90 Minutes

Recorded May 7, 2020

Our online world and the use of electronic devices have led to most of our interactions in the online world. Technology contributes to people’s perception of things being real when they are not.This has enabled people to be manipulated through the Art of Social Engineering.

This webinar will delve into the science of Social Engineering and explain how people get manipulated. We will also talk about how Social Engineering in proactive investigations to engage suspects and have them unwittingly provide you information and more importantly evidence that can be used for your investigations.

Presented by:
John Pizzuro

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Why’d it have to be snakes?: Python Programming for Law Enforcement Part 2
Duration: 90 Minutes

Recorded May 6, 2020

Part 2 of a 4 Part Series

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst’s repertoire. Python for Law Enforcement is a four-part webinar series that is geared for law enforcement. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day-to-day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

Session 2
• Psuedo-code• Syntax• Comments• Variables• Global variables• Data types/type casting• Logic/Boolean• Operators• Lists• If/else• Switch• Coding Example• Questions

Presented by:
Jasen Wells, FDLE

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Teen Sexting
Duration: 75 Minutes

Recorded May 5, 2020

Sexting among teens & preteens is rampant and, in many cases, leads to coercion, revenge porn, sextortion, or human trafficking. Who is sexting? Why? Where are they sexting? What platforms are they using – which are changing all the time? Which of these platforms can provide law enforcement with information to assist in investigations? Issues include deciding whether to arrest/prosecute, education/presentations to schools and parents. Insight and suggestions on sexting, sextortion, and revenge porn based upon case studies.

Presented by:
Kateri Gasper, Assistant District Attorney, Queens County District Attorney’s Office

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Why’d it have to be snakes?: Python Programming for Law Enforcement Part 1
Duration: 90 Minutes

Recorded April 29, 2020

Part 1 of a 4 Part Series

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst’s repertoire. Python for Law Enforcement is a four-part webinar series that is geared for law enforcement. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day-to-day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

Session 1
• Intro • Problem Statement (Example: Data format different)• Programming Language
• Analyzing data• Automating processes• What is Python• Law enforcement software that uses Python• IDE• Versions• Resources• Python Docs• W3 Schools• Forums• Questions

Presented by:
Jasen Wells, FDLE

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Follow the Money: FinCrime Investigation Case Studies
Duration: 90 Minutes

Recorded April 28, 2020

Money laundering is a global, trillion-dollar crime that extends into all areas of commerce. The reality is that money laundering isn’t just a standalone crime, it is also a symptom of additional crimes which generate illicit proceeds. Whether due to lone wolf criminals, as the result of transnational organized crime, or international corruption, money laundering can be challenging to prove as both a factual matter and as part of a criminal prosecution.

This learning session will outline not only the essential elements of a criminal case of money laundering, but also examine how additional charges can be brought to flush out the elements of that charge. Attendees will get a better understanding of the prosecutor’s approach to money laundering (and its related crimes), as well as tools to follow the transactions that can substantiate such a charge. By moving from the academic to applied subject matter, attendees will get deep insight into how to both trace illicit assets, as well as how to prepare their findings for criminal cases. The webinar will rely on real-world examples of financial crime and explain how cases like those can be further built out by investigators, analysts, and compliance officers.

Presented by:
Michael Schidlow, Scienter Group

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Financial Crimes Against Seniors Part 3 - Response, Prosecution, and Prevention
Duration: 90 Minutes

Recorded April 27, 2020

A collaborative project of NW3C, the Regional Information Sharing Systems (RISS), and the Elder Justice Initiative, this webinar is the third in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Responding to a senior call
• Prosecuting elder exploitation
• Promoting awareness and prevention

Presented by:
Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee




Building Your Capture The Flag Tool Kit
Duration: 75 Minutes

Recorded April 23, 2020

NW3C offers daily Capture The Flag (CTF) challenges at https://nw3.ctfd.io/ . Challenges are designed to help forensic examiners hone, refine, and practice their skills.  The CTF scoreboard encourages friendly competition. Solution videos are  available following the challenge conclusions. 
 
This webinar will provide information on developing a forensic toolkit not only to help solve CTF challenges, but also to help with real-word challenges.  Webinar attendees will receive a manifest of software shown in the video, and a special webinar viewer only challenge, on which they can test their new toolkit.  

Presented by:
Chris Atha, NW3C

Webinar Fee: $0.00 per attendee




Financial Crimes Against Seniors Part 2- Investigations and Resources
Duration: 90 Minutes

Recorded April 20, 2020

A collaborative project of NW3C, the Regional Information Sharing Systems (RISS), and the Elder Justice Initiative, this webinar is the second in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Investigating the crimes
• Resources for investigators
• Creating an investigative plan

Presented by:
Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee




What Investigators Need to Know about Hiding on the Internet: Proxies and VPNs
Duration: 90 Minutes

Recorded April 16, 2020

Criminal investigators and analysts need to understand how it is possible for people to conceal and obfuscate their identity and location on the internet.  Two primary methods are through the use of proxies and virtual private networks (VPNs).  This ability to hide one’s identity and location on the internet can be both a challenge and an opportunity.  Various methods of concealing identity and location, while engaged in activities on the internet, provides an opportunity for investigators to engage in covert online research while also providing a means for criminals to engage in surreptitious communication in furtherance of nefarious activities.  As technologies, such as digital device fingerprinting, emerge as ways to attribute identity this becomes a topic about which every investigator and analyst must become familiar.

This webinar will include an overview of how the web was designed and functions.  A basic overview of IP fingerprinting, browser/software fingerprinting, and device fingerprinting will set the stage for a deeper dive into proxies and VPNs—two of the most common methods used both by criminals and criminal investigators to conceal their identities and locations while engaging in online social networking and online communication. 

Presented by:
Chuck Cohen, NW3C

Webinar Fee: $0.00 per attendee




Financial Crimes Against Seniors - Part 1
Duration: 90 Minutes

Recorded April 13, 2020

A collaborative project of NW3C, the Regional Information Sharing Systems (RISS), and the Elder Justice Initiative, this webinar is the first in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Overview of Elder Abuse and Financial Exploitation
• Types of Abusers
• Scams Targeting Seniors

Presented by:
Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee




Smart, Clean and Actionable Data with Quick Data Analytic Reports in an Instant
Duration: 100 Minutes

Recorded April 8, 2020

This webinar will share insight gleaned from working with numerous professionals like yourself on how they migrated from manual and semi-manual data analytics to complete data analytic automation. The presenter will demonstrate methods of collecting data and then automatically extracting and visualizing the key elements using models like Flow of Funds and Financial Ratios. These models, and others available in ScanWriter, aid in quickly gaining insight into the records.

The presenter will demonstrate how ScanWriter can:

• Utilize automatic data capture technology for processing case documents.
• Organize and identify indicators of financial exploitation and its trends and patterns.
• Perform quick data analysis to aid in additional investigation.
• Apply financial analysis best practices for fraud examiners.
• Recognize how data capture and analysis automation can help
   law enforcement professionals prevent and resolve fraud, waste, and abuse

Presented by:
Michelle Dulog, Personable Inc.

PLEASE NOTE: The polling questions and 100 minutes of viewing credit were only available for the live event. You will still receive an NW3C certificate for viewing 80 minutes of the on-demand webinar.

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

This webinar is sponsored by Personable Inc. NW3C is providing the webinar so that attendees can have more information with which to evaluate how this capability might add value to them and the organizations they serve. NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Surviving and Thriving in the Court Room
Duration: 90 Minutes

Recorded April 7, 2020

The essence of any good investigation, is the conviction of the persons responsible for committing those crimes. This webinar will focus on testifying in court and the post arrest process in preparing for trial. This webinar will also focus on what to incorporate or not incorporate in your reports. We will discuss how to negate arguments made by defense counsel, how to testify, how to be more credible, how to prepare and ultimately set yourself up for success in any trial. Different types of court proceedings and strategies will also be discussed.

Presented by:
John Pizzuro

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

 

Webinar Fee: $0.00 per attendee




Using OSINT to Track Suspicious Cryptocurrency Activity
Duration: 90 Minutes

Recorded March 31, 2020

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Investigators face a great challenge in finding cryptocurrency wallets’ footprints across the web and understanding who may be behind it. The webinar will focus on tracking those digital footprints on all levels of the internet, using advanced OSINT technologies, tying malicious activities to networks of harmful individuals. By utilizing processes that involve Artificial Intelligence, including NLP (Natural Language Processing) and OCR (Optical Character Recognition), mentions of crypto wallets, be it in posts, images, or more, used for criminal and terrorist activities can be identified and flagged. The use of a proprietary deep crypto-wallet analysis can also visualize the values, growth, and interactions of these wallets across time. We will demonstrate the use of OSINT solutions as we conduct quick and comprehensive searches, deep analyses, and assess real-time threats to track the wallet’s presence and identity across the open, deep, and dark web.

Presented by:
Johnmichael O'Hare
Arieh Ben-Am

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

This webinar is sponsored by Cobwebs Technologies NW3C is providing the webinar so that attendees can have more information with which to evaluate how this capability might add value to them and the organizations they serve. NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration .

Webinar Fee: $0.00 per attendee




Of Eggplants and Umbrellas: The Legal and Investigative Implications of Emojis
Duration: 90 Minutes

Recorded March 25, 2020

This webinar, presented by cyber crime attorneys and a former prosecutor, discusses investigative uses of emojis, particularly in the context of child exploitation, and the legal context of this growing medium, including current case law and implications for practice.

Presented by:
Matthew Osteen, NW3C
Robert Peters, Zero Abuse Project,
Alicia Loy, NW3C

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




The Neurological and Psychological Elements of Victims, Witnesses and Suspects
Duration: 90 Minutes

Recorded March 4, 2020

This webinar will focus on how the advent of technology and neuroscience has impacted victims and made them more vulnerable to the criminal element. We will go over the psychological aspects of criminal mindset as well as the investigator's mindset in order to set them up for success. This webinar will focus on the understanding of human behavior, what to look for, how to understand people and influence your outcome.

Presented by:
John Pizzuro

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
Duration: 90 Minutes

Recorded March 2, 2020

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each other. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And, they increasingly choose to use platforms that make this communication openly available for others to view. This means that evidence associated with not just metadata, but also content of communications can often be collected through open sources long after the communication is completed.

While evidence of criminality and victimization can be recovered through open source investigative techniques, many of the commercial tools marketed to criminal investigators and analysts are expensive. This sometimes places them outside the reach of police departments. And, social media companies are increasingly blocking API connections for commercial tools that allow the tools to be used for “surveillance”. For these reasons, it is increasingly important for criminal investigators and analysts to build an inexpensive cyber-OSINT toolbox.

This Webinar will discuss the rapidly evolving ecosystem of online social media and how people are changing how they choose to communicate. It will then detail and demonstrate free and inexpensive cyber-OSINT tools that criminal investigators and analysts can use to start build a cyber-OSINT toolbox.

Presented by:
Chuck Cohen, NW3C

Webinar Fee: $0.00 per attendee




Checkm8 & CheckRa1n: New Tools for iOS Extractions
Duration: 75 Minutes

Recorded February 20, 2020

If anything about mobile forensics could be considered buzzworthy in the past year, it would be the release of the Checkm8 Boot ROM exploit created by axi0mX in October. Allowing critical access to 11 generations of iPhones and iDevices, checkm8 is a new opportunity to access data previously locked behind a secure wall. But beyond the hype, what data can you actually access using this newfound exploit, and what do you do once you’ve extracted data using Checkm8?

In this webinar, we will discuss the benefits, challenges and the utility of Checkm8 and Checkra1n to mobile forensic examiners and investigators. We will also explore how examiners can use Checkra1n to gain access to devices and what that access means in practical terms for your investigations.

Presented by:
Chris Atha, NW3C
Greg Masterson, MSAB

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




What Might Your Forensic Acquisitions Be Hiding?
Duration: 60 Minutes

Recorded February 6, 2020

The process of acquiring forensic images is well understood, and the industry has never been better equipped for the analysis. However, common practices are set to fail, and analysis may be missing malware and indicators of compromise. This webinar will highlight short comings in commons methods and provide a framework for an improved approach; to allow for more efficient and thorough investigations.

Presented by:
Chris Atha, High-Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Counterfeit Goods: Money Laundering in Plain Sight
Duration: 90 Minutes

Recorded February 5, 2020

The sale of counterfeit goods may be thought of as a relatively harmless crime, when in reality production, sale, and distribution of counterfeit goods represents money laundering, corruption, fraud, human trafficking, sanctions evasion, and terrorist finance. Much like the sale of illegal narcotics, the production, distribution, and sale of counterfeit goods can yield hundreds of billions of dollars every year. As a result, transnational and localized organized crime groups are involved at every step of the operation. This session will highlight the risks involved with the sale of counterfeit goods, as well as the illicit actors involved, and how these goods make their way into the stream of commerce. This session will explain the nexus between organized criminal activity and the sale of counterfeit goods, while drawing sharp correlations to traditional anti-money laundering controls. Attendees will learn the risk indicators of the sale of counterfeit goods, as well as how to use open source databases to enhance due diligence searches for potential vendors linked to the sale of counterfeit goods. The session will provide recommendations on how to leverage analytics and gap analysis to further detect potentially high-risk customers, products, and transactions.

Presented by:
Michael Schidlow, Scienter Group

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Gas Pump Skimming
Duration: 75 Minutes

Recorded January 23, 2020

The webinar will discuss the anatomy of gas pump skimming from the manufacturing of the skimmers to laundering of the proceeds. The instructor will discuss the various types of skimmers, how the card numbers are harvested, as well as the various methods of cashing out.

Presented by:
Jasen Wells, FDLE

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




What some BODY is saying, through their body language
Duration: 75 Minutes

Recorded January 14, 2020

Have you ever wondered what people are saying through their body language? This webinar will focus on nonverbal behavior and one's ability to "read" people. This webinar will enhance your ability to decode emotions and behaviors and look for deceptive behaviors. You will also learn how your body language can influence what others around you think.

Presented by:
John Pizzuro

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Dark Web and Open Source Information Primer
Duration: 90 Minutes

Recorded November 14, 2019

A primer on the dark web and information available on the internet from free sources that can help investigators as they work to solve almost all types of cases.

Presented by:
Casey Bohn, High-Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Office 365 Forensics and Business Email Compromises
Duration: 60 Minutes

Recorded November 13, 2019

This webinar will discuss the types of evidence that should be collected in response to a business email compromise/ Office 365 email investigation, methods of email compromise (phishing, malware, brute force attacks, external compromise/credential stuffing), types of data at risk and commonly seen schemes.

•Evidence Collection and Analysis
•Review of the Office 365/ Azure Admin Centers
•Collecting evidence from Office 365 (logs, rule/forwarding/ Sharepoint/Onedrive data)
•Extracting mailboxes with the Office 365 eDiscovery tool
•Analyzing and interpreting the types of log data available in Office 365
•Steps to secure the Office 365 environment during an incident

Presented by:
Adam Hart, Associate Principal-Forensic Services, Charles River Associates

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Cloud Combat: Debating Law Enforcement Access to Overseas Data
Duration: 90 Minutes

Recorded November 7, 2019

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Two attorneys clash in this heated exchange on whether, and how, law enforcement can obtain evidence stored electronically overseas. A former prosecutor and a high-tech crime attorney square off in several rounds of debate. Each round involves a hypothetical that incorporates relevant, cutting-edge evidentiary questions including overseas servers, CLOUD Act considerations, space-based data storage, and pertinent international law.

Presented by:
Robert Peters, Senior Cyber and Economic Crime Attorney, NW3C
Matt Osteen, Cyber and Economic Crime Attorney, NW3C

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Case Study: Methods to Detect Forged Documents
Duration: 60 Minutes

Recorded October 15, 2019

Digital evidence has become an essential part of every legal matter, whether it be a criminal, civil or internal investigation. Using a case study, this session will demonstrate the methods used to determine that an email submitted as evidence in federal court had been forged. The methods demonstrated in this case study may be reliably referenced when reviewing any questionable digital documents, without the need for specialized software. This presentation will demonstrate the probative value of digital forensics in fraud investigations.

You Will Learn How To:

• Recognize the value of digital forensics in fraud cases.
• Identify methods to examine digital files and metadata.
• Determine how to make and report on evidence-based
  conclusions.
• Recall a practical example of how these methods were applied.

Presented by:
Matt Danner

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




The Tables Have Turned: Igniting the Power of Survivors in Abuse Investigation and Prosecution
Duration: 90 Minutes

Recorded October 9, 2019

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

A former prosecutor and an abuse survivor who wore a wire and recorded the perpetrator’s confession share their investigative tips, best practices for interacting with survivors, and trial strategies to dismantle the power dynamics of perpetrator and victim. Learn approaches to maximize case outcome and strength of survivors throughout the entire investigative process.

Presented by:
Robert Peters, Senior Cyber and Economic Crime Attorney, NW3C
Amber Higgins, Educational Initiatives Liaison, SHIELD Task Force

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Through the Looking Glass: Protecting Yourself While Conducting Internet-Based Investigations
Duration: 75 Minutes

Recorded October 3, 2019

“Through the looking glass” is a metaphorical expression meaning: on the strange side, in the twilight zone, or in a strange, parallel world. While the internet can be considered a strange, parallel world, it can also be an informative, interesting, yet scary place when conducting different types of investigations. There are various technologies and methods that you can use to protect your identity and information while conducting internet-based investigations. This session will illustrate these technologies and methods to keep you safe when investigating online.
 
You Will Learn How To:
 
• Identify the methods criminals use to find your data.
• Compare various technologies and software tools to protect your identity while  investigating online.
• Examine various methods to employ to hide your own tracks.

Presented by:
Ryan Duquette, Partner, Security and Privacy Risk Consulting

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




The Truth About the Dark Web Fraud Trade
Duration: 60 Minutes

Recorded October 1, 2019

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. What is the dark web fraud economy? What drives it? What can we do about it?

Presented by:
Emily Wilson, VP of Research Terbium Labs

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Mindhunters: Exploiting Offender Psychology in Proactive Operations and Abuse Investigations
Duration: 90 Minutes

Recorded September 26, 2019

This training is intended for U. S. Criminal Justice Practitioners. Please register using your agency-issued email.

Learn psychological insights and practical strategies to exploit internet sex offender dynamics. Discover how to apply the behavioral profiles of solicitation and child pornography offenders in a variety of settings, including conducting proactive operations or pretext phone calls, crafting undercover personas and interviewing perpetrators. This webinar will also address how to attack sex offender risk assessments, with perspectives from prosecution and forensic psychology.

Presented by:
Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C
Joseph Remy, Assistant Prosecutor, Burlington County Prosecutor’s Office
Dr. Timothy Saar, Owner/Psychologist, Saar Psychological Group, PLLC
Joseph Remy, Assistant Prosecutor, Burlington County Prosecutor’s Office

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




How to Convict a Child Pornographer
Duration: 90 Minutes

Recorded September 12, 2019

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

The investigation and prosecution of child pornography has exponentially increased nationwide in recent years, while tactics utilized by online sexual offenders continue to evolve and adapt with emerging technology. This webinar will focus on several key aspects of obtaining convictions, including practical investigative considerations, establishing perpetrator identity, utilizing prior bad acts evidence, countering common defense strategies, and communicating the severity of these egregious offenses to judges and juries.

Presented by:
Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C 
Chief Craig Corkrean, Granville Police Department

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




NW3C’s Utility Suite: What is it, and how can it help in your investigations
Duration: 60 MInutes

Recorded August 20, 2019

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

During this webinar, we will be discussing the tools included within the NW3C Utility Suite - what they do, how they work, and how they can help in your investigations. The tools that will be discussed include: Quick Hashing Utility, Batch Hashing Utility, Hex Viewer, Date/Time Utility, Recycle Bin Parser, SQLite Extraction Utility, and USN Journal Converter. These tools are available to Law Enforcement as a free download from NW3C’s website.

Presented by:
Justin Wykes,High-Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Traumatic Cases and Events: How to Become Resilient and Move Forward
Duration: 90 Minutes

Recorded July 23, 2019

This webinar is meant for individuals who are looking to build resiliency to combat the effects of trauma. Traumatic events can set your life on one course or another. These events occur frequently in the course of investigations and working with child exploitation cases. Rather than allow these events to define us or take us over, learn how to recognize different types of trauma through warning signs and become aware of the impact it has in not only your life but those around you. Throughout this webinar, you will also learn how trauma is encoded within your body and how through simple techniques you limit the impact trauma has on your life. You will also learn how to reframe any situation for your benefit and tools on how to shift your mind to not only overcome any situation but also thrive. Take charge of your feelings, life and outcome!

Presented by:
John Pizzuro

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Busting Bitcoin Bandits
Duration: 60 minutes

Recorded July 18, 2019

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

An underground movement of hackers is taking over victim telephones and draining their financial accounts!  In the past 12 months, a California high-tech task force named REACT has identified more than 800 victims and nearly $50 million in losses of cash and cryptocurrency.  Please join Santa Clara County Prosecutor Erin West and DA Investigator David Berry as they explain this phenomenon known as “sim-swapping” and detail how the hackers are able to access phones, hijack social media, and ultimately steal millions of dollars.  We will take a look at this new class of criminals and identify ways to protect ourselves against this growing crime wave.

Presented by:
Erin West, Prosecutor, Santa Clara Prosecutors Office
Caleb Tuttle, Detective, Santa Clara Sheriff's Office 

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Phishing to Laundering: From Clicks to Cash-Out
Duration: 75 Minutes

Recorded June 19, 2019

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

It is widely acknowledged that phishing is responsible for >90% of breaches occurring today. Basic phishing primarily exploits human behavior to entice a victim to ‘click the link’ or ‘open the attachment’ thus often handing over to the criminal the golden nugget – valid access credentials. While we are all taught not to click or open the attachment, the scheme is still highly successful and profitable. In fact, recent reporting indicates that regardless of the amount of training provided, organizations will likely see at least 4% of their workforce click on a link thus resulting in some sort of compromise.

During this webinar, a panel of NCFTA experts will explain how phishing campaigns are conducted; from developing a “phish kit”, to weaponizing a botnet for delivery, using any stolen credentials for financial gain, then laundering millions of dollars all over the world to fund their lavish lifestyles at your expense.

Presented by:
Kyle Hettinger, Training Coordinator and Senior Intelligence Analyst, NCFTA
Taylor Transue, Cyber Intelligence Analyst, NCFTA
Owen Nearhoof, Cyber Intelligence Analyst, NCFTA

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Being Mickey in a Goofy World: Understanding User Attacks
Duration: 60 Minutes

Recorded June 5, 2019

Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation he will walk through the various attacks, including email, social media, and in person. Using various war stories, he will explain how the attacker views the user and what they do to increase the success rate of these attacks.

Presented by:
Kevin Johnson, Secure Ideas

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Law Enforcement Investigations on the Darknet: Case studies from the co-founder of the Tor Project
Duration: 75 Minutes

Recorded May 9, 2019

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

In this webinar, Andrew Lewman will share and explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. Using these real-world, darknet-based examples that have been selected for a law enforcement-based audience, Andrew will walk through examples of different methodologies law enforcement can use to de-anonymize threat actors, the different tools and approaches one can take to conducting these types of investigations, best practices, lessons learned, and more.

Presented by:
Andrew Lewman, Dark Owl

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Leveraging Partnerships and Avoiding Multi-Agency Pitfalls
Duration: 90 Minutes

Recorded May 7, 2019

Have you ever wished that everyone was in the same boat as you and, more importantly, rowing in the same direction? Today we live in a global society which consists of various teams and departments working with and against each other.  We face individual and institutional challenges that sometimes inhibit our ability to succeed. Investigations today, comprise public and private entities, investigators from different departments, attorneys, and others that can impact your investigation or goals. This webinar will teach attendees the art of leverage and how to maintain, develop and execute partnerships that will provide long term success. True success comes when you are able to maintain partnerships and rely on each other for that success. This webinar will provide attendees with strategies used by some of the most successful fortune 500 companies. Attendees will be able to implement these strategies directly to their teams and their investigations. This webinar will give them insight on how to develop relationships and leverage people in order to be more efficient and provide them with lasting success.

Presented by:
John Pizzuro

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Cybercrime Basics: Investigation and Prosecution of Credit Card Fraud
Duration: 90 Minutes

Recorded April 9, 2019

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

This webinar will cover credit card fraud and identity theft from initial investigative steps to arrest and prosecution. The presenters will discuss how to identify points of compromise including low hanging fruit, skimmers and indicators of malware. Specifics regarding point of infection, log analysis, and signature analysis will be covered, as well as, charges, pleas, grand jury and trial considerations along with post-conviction steps.

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Blockchain Tracing: Cryptocurrency Anti-Money Laundering and Financial Investigation Workshop
Duration: 90 minutes

Recorded March 28, 2019

CipherTrace’s cryptocurrency anti-money laundering and financial investigation webinar provides hands-on instruction on blockchain and blockchain tracing. Attendees will learn a risk-based approach to tracing source of blockchain funds and de-anonymizing cryptocurrency transactions with cryptocurrency forensic tools. They will develop and hone digital forensic investigation techniques. The course will equip attendees with an understanding of cryptocurrency fundamentals and the specific understanding of tracing cryptocurrency transactions. Improve the efficiency and effectiveness of blockchain forensic investigations by learning how to best leverage tools and resources to reduce investigation time and improve information yield. CipherTrace provides the infrastructure to enable secure, verifiable and legal commerce for cryptocurrency markets.

Presented By:
Pamela Garner, Director of Forensics and Training, CipherTrace
Paul Reyff, Vice President of Sales, CipherTrace

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Cognitive Interviewing & Courtroom Testimony
Duration: 90 minutes

Recorded March 6, 2019

Have you ever wanted to communicate more effectively? Relate better to the jury while testifying? Be more successful and obtain more information while interviewing? This webinar will give attendees techniques and insight on how to employ cognitive interviewing skills to interview suspects, witnesses, and victims. Attendees will gain a better understanding of human behavior as it relates to neuroscience and become more effective in obtaining information and having suspects, witnesses and victims cooperate. Attendees will be able to understand linguistics and language, interpret body language, and how to gain rapport with a jury and handle cross-examinations more effectively while testifying.

Presented by:
John Pizzuro

The views and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.

NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee