Live Webinars


The Functionality of Privacy Coins
Tue, Dec 10, 2019 11:00 AM Eastern
Duration: 60 Minutes

We will be hearing from Coin Center, Chainalysis, and Ciphertrace on the functionality of, and challenges presented by, privacy coins.

Presented by:
Jerry Brito, Coin Center
Dave Jevans, Ciphertrace
Jonathan Levin, Chainalysis
Jason Weinstein, Steptoe
Alan Cohn, Steptoe

Webinar Fee: $0.00 per attendee




What some BODY is saying, through their body language
Tue, Jan 14, 2020 1:00 PM Eastern
Duration: 75 Minutes

Have you ever wondered what people are saying through their body language? This Webinar will focus on nonverbal behavior and one's ability to "read" people. This Webinar will enhance your ability to decode emotions and behaviors and look for deceptive behaviors. You will also learn how your body language can influence what others around you think.

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee




Gas Pump Skimming
Thu, Jan 23, 2020 2:00 PM Eastern
Duration: 75 Minutes

The webinar will discuss the anatomy of gas pump skimming from the manufacturing of the skimmers to laundering of the proceeds. The instructor will discuss the various types of skimmers, how the card numbers are harvested as well as the various methods of cashing out.

Presented by: Jasen Wells

Webinar Fee: $0.00 per attendee




Counterfeit Goods: Money Laundering in Plain Sight
Wed, Feb 05, 2020 2:00 PM Eastern
Duration: 90 Minutes

The sale of counterfeit goods may be thought of as a relatively harmless crime, when in reality production, sale, and distribution of counterfeit goods represents money laundering, corruption, fraud, human trafficking, sanctions evasion, and terrorist finance. Much like the sale of illegal narcotics, the production, distribution, and sale of counterfeit goods can yield hundreds of billions of dollars every year. As a result, transnational and localized organized crime groups are involved at every step of the operation. This session will highlight the risks involved with the sale of counterfeit goods, as well as the illicit actors involved, and how these goods make their way into the stream of commerce. This session will explain the nexus between organized criminal activity and the sale of counterfeit goods, while drawing sharp correlations to traditional anti-money laundering controls. Attendees will learn the risk indicators of the sale of counterfeit goods, as well as how to use open source databases to enhance due diligence searches for potential vendors linked to the sale of counterfeit goods. The session will provide recommendations on how to leverage analytics and gap analysis to further detect potentially high-risk customers, products, and transactions.

Presented by: Michael Schidlow, Scienter Group

Webinar Fee: $0.00 per attendee




The Neurological and Psychological Elements of Victims, Witnesses and Suspects
Wed, Mar 04, 2020 1:00 PM Eastern
Duration: 90 Minutes

This Webinar will focus on how the advent of technology and neuroscience has impacted victims and made them more vulnerable to the criminal element. We will go over the psychological aspects of criminal mindset as well as the investigators mindset in order to set them up for success. This Webinar will focus on the understanding of Human Behavior, what to look for how to understand people and influence your outcome.

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee




Surviving and Thriving in the Court Room
Tue, Apr 07, 2020 1:00 PM Eastern
Duration: 90 Minutes

The essence of any good investigation, is the conviction of the person's responsible for committing those crimes. This Webinar will focus on testifying in court and the post arrest process in preparing for trial. This webinar will also focus on what to incorporate or not incorporate in your reports. We will discuss how to negate arguments made by defense counsel, how to testify, how to be more credible, how to prepare and ultimately set yourself up for success in any trial. Different types of court proceedings and strategies will also be discussed.

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee


On-Demand Webinars


Aerial Data: Introduction to Drone Investigations
Duration: 90 minutes

With applications from aerial photography to racing to delivery services, drones are becoming more and more popular in both commercial and recreational spaces. Criminal use of drones is also increasing, and drone forensics is quickly becoming an important subfield of digital forensics. This presentation introduces the history of drones and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones. Topics include gathering evidence both internal and external to the drone, as well as methods for manually processing flight logs and displaying data in Google Earth.

Presented by: Jerry Jones, NW3C

Webinar Fee: $0.00 per attendee




Being Mickey in a Goofy World: Understanding User Attacks
Duration: 60 Minutes

Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation he will walk through the various attacks, including email, social media, and in person. Using various war stories, he will explain how the attacker views the user and what they do to increase the success rate of these attacks.

Presented by: Kevin Johnson, Secure Ideas

Webinar Fee: $0.00 per attendee




Bio Hacking: Brain-Based Interviewing, Communication, & Leadership
Duration: 90 minutes
This webinar will provide attendees with a basic knowledge of Neuro Linguistic Programming and other cognitive techniques to aid in interviewing suspects, witnesses, and victims. This webinar will help individuals be a more effective communicator and leader, giving the attendees greater insights and understanding on how to get people to do what they need.

Presented by: John Pizzuro, CEO, John Pizzuro Speaking & Consulting

Webinar Fee: $39.00 per attendee




Blockchain Tracing: Cryptocurrency Anti-Money Laundering and Financial Investigation Workshop
Duration: 90 minutes

CipherTrace’s cryptocurrency anti-money laundering and financial investigation Webinar provides hands-on instruction on blockchain and blockchain tracing. Attendees will learn a risk-based approach to tracing source of blockchain funds and de-anonymizing cryptocurrency transactions with cryptocurrency forensic tools. They will develop and hone digital forensic investigation techniques. The course will equip participants with an understanding of cryptocurrency fundamentals and the specific understanding of tracing cryptocurrency transactions. Improve the efficiency and effectiveness of blockchain forensic investigations by learning how to best leverage tools and resources to reduce investigation time and improve information yield. CipherTrace provides the infrastructure to enable secure, verifiable and legal commerce for cryptocurrency markets.

Presented By:
Pamela Garner, Director of Forensics and Training, CipherTrace
Paul Reyff, Vice President of Sales, CipherTrace

Webinar Fee: $0.00 per attendee




Busting Bitcoin Bandits
Duration: 60 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

An underground movement of hackers is taking over victim telephones and draining their financial accounts!  In the past 12 months, a California high tech task force named REACT has identified more than 800 victims and nearly $50 million in losses of cash and cryptocurrency.  Please join Santa Clara County Prosecutor Erin West and DA Investigator David Berry as they explain this phenomenon known as “sim-swapping” and detail how the hackers are able to access phones, hijack social media, and ultimately steal millions of dollars.  We will take a look at this new class of criminals and identify ways to protect ourselves against this growing crime wave.

Presented by:
Erin West, Prosecutor, Santa Clara Prosecutors Office
Caleb Tuttle, Detective, Santa Clara Sheriff's Office 

Webinar Fee: $0.00 per attendee




Case Study: Methods to Detect Forged Documents
Duration: 60 Minutes

Digital evidence has become an essential part of every legal matter, whether it be a criminal, civil or internal investigation. Using a case study, this session will demonstrate the methods used to determine that an email submitted as evidence in federal court had been forged. The methods demonstrated in this case study may be reliably referenced when reviewing any questionable digital documents, without the need for specialized software. This presentation will demonstrate the probative value of digital forensics in fraud investigations.

You Will Learn How To:

• Recognize the value of digital forensics in fraud cases.
• Identify methods to examine digital files and metadata.
• Determine how to make and report on evidence-based
  conclusions.
• Recall a practical example of how these methods were applied.

Presented by: Matt Danner

Webinar Fee: $0.00 per attendee




Cloud Combat: Debating Law Enforcement Access to Overseas Data
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Two attorneys clash in this heated exchange on whether, and how, law enforcement can obtain evidence stored electronically overseas. A former prosecutor and a high-tech crime attorney square off in several rounds of debate. Each round involves a hypothetical that incorporates relevant, cutting-edge evidentiary questions including overseas servers, CLOUD Act considerations, space-based data storage, and pertinent international law.

Presented by: Robert Peters, Senior Cyber and Economic Crime Attorney, NW3C & Matt Osteen, Cyber and Economic Crime Attorney, NW3C

Webinar Fee: $0.00 per attendee




Cognitive Interviewing & Courtroom Testimony
Duration: 90 minutes

Have you ever wanted to communicate more effectively? Relate better to the jury while testifying? Be more successful and obtain more information while interviewing? This webinar will give participants techniques and insight on how to employ cognitive interviewing skills to interview suspects, witnesses, and victims.  Participants will gain a better understanding of human behavior as it relates to neuroscience and become more effective in obtaining information and having suspects, witnesses and victims cooperate. Participants will be able to understand linguistics and language, interpret body language, and how to gain rapport with a jury and handle cross-examinations more effectively while testifying.

Webinar Fee: $0.00 per attendee




Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
Duration: 90 minutes

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And, they increasingly choose to use platforms that make this communication openly available for others to view. This means that evidence associated with not just metadata, but also content of communications can often be collected through open sources long after the communication is completed.

While evidence of criminality and victimization can be recovered through open source investigative techniques, many of the commercial tools marketed to criminal investigators and analysts are expensive. This sometimes places them outside the reach of police departments. And, social media companies are increasingly blocking API connections for commercial tools that allow the tools to be used for, “surveillance”. For these reasons, it is increasingly important for criminal investigators and analysts to build an inexpensive cyber-OSINT toolbox.

This Webinar will discuss the rapidly evolving ecosystem of online social media and how people are changing how they choose to communicate. It will then detail and demonstrate free and inexpensive cyber-OSINT tools that criminal investigators and analysts can use to start build a cyber-OSINT toolbox.

Presented by: Chuck Cohen, Cohen Training & Consulting

Webinar Fee: $39.00 per attendee




Creating an Anonymous Persona for Online Operations
Duration: 110 minutes
In this webinar, we will provide an overview of the technical and non-technical requirements that investigators need to understand prior to creating their online personas in order to operate anonymously. Students will learn:

• Basic technology requirements prior to creating a persona;
• Some best practices in creating and interacting withas your online persona;
• Lessons learned from real-world cases;
• Challenges facing investigators; and
• What dark-web operators are teaching each other and how investigators can learn from that.

Presenter: Steve Mancini, CTO and Director of Strategic Operations, NCFTA

Webinar Fee: $39.00 per attendee




Cybercrime Basics for Prosecutors: From the Cloud to Seizing the Device
Duration: 90 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will define what cybercrime is and its sources of evidence. The Electronic Communications Privacy Act (ECPA) will be covered to include preservation letters, content versus non-content, when process gets rejected, precluding versus delayed notice, and the Cloud Act. California’s new General Data Protection Regulation (GDPR) law passed earlier this year will be discussed. The presenters will explore using traditional investigative methods and when to seize a device and when to search a device. Lastly, what are the cybercrime defenses one can expect to be argued?

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Thomas Huynh, Deputy Attorney General, NJ Office of the Attorney General

Webinar Fee: $0.00 per attendee




Cybercrime Basics: Investigation and Prosecution of Credit Card Fraud
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will cover credit card fraud and identity theft from initial investigative steps to arrest and prosecution. The presenters will discuss how to identify points of compromise including low hanging fruit, skimmers and indicators of malware. Specifics regarding point of infection, log analysis, and signature analysis will be covered as well as charges, pleas, grand jury and trial considerations along with post-conviction steps.

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C

Webinar Fee: $0.00 per attendee




Dark Web and Open Source Information Primer
Duration: 90 Minutes

A primer on the dark web and information available on the internet from free sources that can help investigators as they work to solve almost all types of cases.

Presented by: Casey Bohn, High-Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Emerging Legal Issues in Tech: From the Cloud Act to Hacking Back
Duration: 90 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will discuss the following topics:

• The Cloud Act
• Border Searches of Technology
• Right to be Forgotten
• Revisions to Federal Rules of Evidence
• Hacking Back and the Law
• Compelled Decryption

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Thomas Huynh, Deputy Attorney General, NJ Office of the Attorney General

Webinar Fee: $0.00 per attendee




Financial Crimes Against Seniors - Part 1
Duration: 60 minutes
A collaborative project of NW3C and the Elder Justice Initiative, this webinar is the first in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Overview of Elder Abuse and Financial Exploitation
• Types of Abusers
• Scams Targeting Seniors

Presented by: Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee




Financial Crimes Against Seniors Part 2- Investigations and Resources
Duration: 60 minutes
A collaborative project of NW3C and the Elder Justice Initiative, this webinar is the second in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Investigating the crimes
• Resources for investigators
• Creating an investigative plan

Presented by: Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee




Financial Crimes Against Seniors Part 3 - Response, Prosecution, and Prevention
Duration: 60 minutes
A collaborative project of NW3C and the Elder Justice Initiative, this webinar is the third in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Responding to a senior call
• Prosecuting elder exploitation
• Promoting awareness and prevention

Presented by: Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee




How to Convict a Child Pornographer
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.


The investigation and prosecution of child pornography has exponentially increased nationwide in recent years, while tactics utilized by online sexual offenders continue to evolve and adapt with emerging technology. This webinar will focus on several key aspects of obtaining convictions, including practical investigative considerations, establishing perpetrator identity, utilizing prior bad acts evidence, countering common defense strategies, and communicating the severity of these egregious offenses to judges and juries.


Presented by Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C and Chief Craig Corkrean, Granville Police Department

Webinar Fee: $0.00 per attendee




How Virtual Currency is Changing the Way We Investigate
Duration: 90 minutes
This webinar will discuss the impact virtual currency has on investigations. Starting with a brief introduction into what virtual currency is, how to get it, who is using it and why, we will then discuss some high profile cases, such as Silk Road and the recent Alpha Bay and Hansa takedowns; we will discuss how virtual currency has fueled the rise in ransomware over the past few years; additionally, we will also cover some methods and tools investigators are leveraging to ’follow the money’. Finally, we will discuss where virtual currency is going. Upon completion of this webinar, students will:

• Better understand what virtual currency is, how to get it, sell it, etc.
• Understand who uses virtual currency.
• Understand the role of virtual currency in ransomware.
• Be familiar with some of the tools to help with investigations.
• Better overall understanding of how virtual currency has impacted the entire underground eco-system.

Presenters:
Steve Mancini, CTO and Director of Strategic Operations, NCFTA
Sean Wolfgang, Intelligence Analyst III, NCFTA

Webinar Fee: $39.00 per attendee




Intel Collection for LE Part 1: Expanding the Known, Finding the Unknown, and Protecting Your Agency
Duration: 90 minutes
This webinar is intended for LAW ENFORCEMENT. Please register using your agency-issued email.

With the vast amount of data available and the calls for stopping law enforcement’s access to data, this two-part webinar series will act as a guide through it all. These presentations will give you hands-on techniques to collect Intel. Part one will cover:

• Protecting your agency - The Cornerstone to Intel Collection is justifying your collection techniques
• Tracking international and domestic money
• Working with the financial sector to identify human trafficking, terrorism finance and international criminal gangs
• Tracking cash flow through MSBs for criminal purposes
• FinCEN -Beyond running the name of your subject
• Bitcoin investigations - This is not a "what is Bitcoin" session, it is a hands-on way to identify people using Bitcoin in your jurisdiction for illicit means.

Presented by: Kevin Branzetti
Employed as the Deputy Chief of Intelligence in
the Manhattan District Attorney's Office

Webinar Fee: $39.00 per attendee




Intel Collection Part 2: Tips, Tricks and Techniques for Intel Collection
Duration: 90 minutes
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email .

With the vast amount of data available and the calls for stopping law enforcement’s access to data, part two of this series covers tracking and using international phone numbers, IP addresses, social media tools and techniques, tips for legal process to social media companies, and free law enforcement tools. We will also discuss rules for using social media in investigations.
 
This webinar will build on concepts and techniques discussed in the Intel Collection for LE Part 1: Expanding the Known, Finding the Unknown and Protecting Your Agency webinar. It is not necessary for you to have attended the previous webinar to attend, understand and gain valuable knowledge from this informative webinar.

Presented by: Kevin Branzetti
Employed as the Deputy Chief of Intelligence in the Manhattan District Attorney’s Office

Webinar Fee: $39.00 per attendee




Intro to Cell Phone Call/Communication Detail Records
Duration: 90 minutes
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This presentation will be an overview of cell phone call/communication detail records (CDRs) and will focus on historical records available from the primary cell phone companies including logs of phone calls, SMS (short message service) text messages, and Internet activity. The overview will also provide a brief introduction to cell phone-created CDRs which may be available from non-cell phone sources such as email providers, smartphone application providers, and, non-cellular-based Internet service providers (ISPs).

Presented by: Breck McDaniel, President/Owner, Geocell, LLC

Webinar Fee: $39.00 per attendee




Intro to Cell Phone Info for Investigations
Duration: 90 minutes
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This presentation will be an overview of the various bits of information available to investigators from cell phones. The presentation will cover information available from physical cell phones such as digital data extractions, the cell phone providers such as phone call/communication detail records (CDRS, location data such as historic cell site/sector data, and, Internet cloud-based sources such as smartphone apps, websites, etc. The overview will also provide a brief introduction to the major forms of cell phone surveillances possible by law enforcement.

Presented by: Breck McDaniel, President/Owner, Geocell, LLC

Webinar Fee: $39.00 per attendee




Intro to Cell Phone Location Data for Investigations
Duration: 90 minutes

This webinar is intended for LAW ENFORCEMENT PERSONNEL to include investigators, prosecutors, and analysts. Please register using your agency-issued email.

This presentation will be an overview of the various forms of location data available from cell phone use including historical call/communication detail records (CDRs) from the cell phone companies, location data stored within cell phones themselves and typically available through digital forensic extractions, as well as, location data available from the various real-time surveillance options, smartphone app providers, website usages, etc. 

Presented by: Breck McDaniel President/Owner, Geocell, LLC

Webinar Fee: $39.00 per attendee




Introduction to FinCEN
Duration: 90 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar is intended as a Financial Crimes Enforcement Network (FinCEN) overview. It will include information on products and services, Bank Secrecy Act records and information, and how FinCEN is used in investigations.

Presented by: James Emery, FinCEN

Webinar Fee: $0.00 per attendee




Investigating Terrorist Financing with Chainalysis Reactor
Duration: 60 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Terrorist organizations are using cryptocurrencies as a new way to raise funds and facilitate operations. This poses a challenge to both public and private sector organizations, but also creates a new opportunity for lead development centered on blockchain data. This webinar will review an analysis of recent cases of terrorist organizations using Bitcoin, provide an overview of Chainalysis data and the Reactor software solution and speak to the future of terrorist financing through cryptocurrency and how to stop them.

Presented by: Collin Almquist, Chainalysis

Webinar Fee: $0.00 per attendee




Law Enforcement Cyber Center: A Valuable Resource for Investigators
Duration: 60 minutes

The Law Enforcement Cyber Center (LECC) was developed to enhance the awareness, expand the education, and build the capacity of justice and public safety agencies to prevent, investigate, prosecute, and respond to cyber threats and cyber crimes. It is intended to be a national resource for law enforcement and related justice and public safety entities. During the webinar, participants will review the website and learn about the many valuable resources that can be utilized.

The Law Enforcement Cyber Center is a collaborative project between the National White Collar Crime Center (NW3C), the International Association of Chiefs of Police (IACP), the Police Executive Research Forum (PERF), and is funded through the Bureau of Justice Assistance.

Presented by: Jeff Lybarger & Josh Santy, NW3C

Webinar Fee: $0.00 per attendee




Law Enforcement Investigations on the Darknet: Case studies from the co-founder of the Tor Project
Duration: 75 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

In this webinar, Andrew Lewman will share and explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. Using these real-world, darknet-based examples that have been selected for a law-enforcement based audience, Andrew will walk-through examples of different methodologies law enforcement can use to de-anonymize threat actors, the different tools and approaches one can take to conducting these types of investigations, best practices, lessons learned, and more.

Webinar Fee: $0.00 per attendee




Leveraging Partnerships and Avoiding Multi-Agency Pitfalls
Duration: 90 Minutes

Have you ever wished that everyone was in the same boat as you, and more importantly rowing in the same direction? Today we live in a global society which consists of various teams and departments working with and against each other.  We face individual and institutional challenges that sometimes inhibit our ability to succeed. Investigations today, comprise public, and private entities, investigators from different departments, attorneys, and others that can impact your investigation or goals. This webinar will teach students the art of leverage and how to maintain, develop and execute partnerships that will provide long term success. True success comes when you are able to maintain partnerships and rely on each other for that success. This webinar will provide students with strategies used by some of the most successful fortune 500 companies. Students will be able to implement these strategies directly to their teams and their investigations. This webinar will give them insight on how to develop relationships and leverage people in order to be more efficient and provide them with lasting success.

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee




Mindhunters: Exploiting Offender Psychology in Proactive Operations and Abuse Investigations
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Learn psychological insights and practical strategies to exploit Internet sex offender dynamics. Discover how to apply the behavioral profiles of solicitation and child pornography offenders in a variety of settings, including while conducting proactive operations or pretext phone calls, crafting undercover personas and interviewing perpetrators. This webinar will also address how to attack sex offender risk assessments, with perspectives from prosecution and forensic psychology.

Presented by:
Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C
Joseph Remy, Assistant Prosecutor, Burlington County Prosecutor’s Office
Dr. Timothy Saar, Owner/Psychologist, Saar Psychological Group, PLLC

Joseph Remy, Assistant Prosecutor, Burlington County Prosecutor’s Office

Webinar Fee: $0.00 per attendee




Mobile Extractions + Power Analytics: Using XRY and PLX Together to Solve Your Investigations
Duration: 60 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

In most investigations today mobile phone data is one of the most critical sources of evidence. The reasons are clear, given the volume and variety of data in today’s smart phones and the depth with which our mobile devices capture our activities. This presentation will focus on what types of data can be recovered from mobile devices using XRY and how to then export that data into PLX. You will learn how PLX can then help you swiftly organize, analyze, and dissect the many different sources of information you have, including mobile device data, in one easy to use platform.

Presented by:
Kaitlyn Ziola, PenLink
Jacob Hulsey, Director of Customer Success, MSAB

Webinar Fee: $0.00 per attendee




NW3C’s Utility Suite: What is it, and how can it help in your investigations
Duration: 60 MInutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

During this webinar we will be discussing the tools included within the NW3C Utility Suite. What they do, how they work, and how they can help in your investigations. The tools that will be discussed include: Quick Hashing Utility, Batch Hashing Utility, Hex Viewer, Date/Time Utility, Recycle Bin Parser, SQLite Extraction Utility, and USN Journal Converter. These tools are available to Law Enforcement as a free download from NW3C’s website.

Presented by: Justin Wykes,High-Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Office 365 Forensics and Business Email Compromises
Duration: 60 Minutes

This webinar will discuss the types of evidence that should be collected in a response to a business email compromise/ Office 365 email investigation. Methods of email compromise (phishing, malware, brute force attacks, external compromise/credential stuffing),Types of data at risk and commonly seen schemes.

Evidence Collection and Analysis
•Review of the Office 365/ Azure Admin Centers
•Collecting evidence from Office 365 (logs, rule/forwarding/ Sharepoint/Onedrive data)
•Extracting mailboxes with the Office 365 eDiscovery tool.
•Analyzing and interpreting the types of log data available in Office 365
•Steps to secure the Office 365 environment during an incident

Presented by: Adam Hart, Associate Principal-Forensic Services, Charles River Associates

Webinar Fee: $0.00 per attendee




Online Officer Safety: Protecting Yourself in Cyberspace
Duration: 90 minutes

Police officers, crime analysts, and other criminal justice professionals are high value targets for cyber criminals. Too often, they are also soft targets. This Webinar will cover the fundamentals of securing wireless networks both at home and when traveling, understanding and controlling social media footprints, and securing digital devices. Many police officers have a personal and family security plan. In 2018, it is important for those plans to extend to the internet, how you connect to the internet, and the devices that are used to make those connections. This Webinar will provide specific, critical recommendations to develop good cyber security plans, processes, and practices.

Presented by: Chuck Cohen, Cohen Training & Consulting

Webinar Fee: $39.00 per attendee




Phishing to Laundering: From Clicks to Cash-Out
Duration: 75 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

It is widely acknowledged that Phishing is responsible for >90% of breaches occurring today. Basic phishing primarily exploits human behavior to entice a victim to ‘click the link’ or ‘open the attachment’ thus often handing over to the criminal the golden nugget – valid access credentials. While we are all taught not to click or open the attachment, the scheme is still highly successful and profitable. In fact, recent reporting indicates that regardless of the amount of training provided, organizations will likely see at least 4% of their workforce click on a link thus resulting in some sort of compromise.

During this webinar, a panel of NCFTA experts will explain how phishing campaigns are conducted; from developing a “phish kit”, to weaponizing a botnet for delivery, using any stolen credentials for financial gain, then laundering millions of dollars all over the world to fund their lavish lifestyles at your expense, etc.

Presented by:
Kyle Hettinger, Training Coordinator and Senior Intelligence Analyst, NCFTA
Taylor Transue, Cyber Intelligence Analyst, NCFTA
Owen Nearhoof, Cyber Intelligence Analyst, NCFTA

Webinar Fee: $0.00 per attendee




Protecting Sand Castles in the Tsunami: Applications and the Shifting Sands of Security
Duration: 60 Minutes

In this presentation Kevin Johnson of Secure Ideas will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things. We will explore the vulnerabilities, how they are attacked, and what it means to all of us.

Presented by: Kevin Johnson, Secure Ideas

Webinar Fee: $0.00 per attendee




Removing Your Personal Identifying Information
Duration: 90 Minutes

Everyone is at risk for identity theft, online and physical stalking, and harassment. Beyond social media, your public records are for sale, so your home address and assets are easily located through simple online searches. This course provides a through description of how and where your data is stored and how to remove it.

In this introductory hands-on class, participants will review a case study detailing how a fraudulent and nefarious actor obtains personal identifying information and how it can be used against you. You will learn “Opt Out” procedures for public service and security personnel and explore the tools and methodologies used to operate discreetly on the Internet. Upon completion of the class, field investigators will be able to identify how private lives and public information are available through websites, social networks, and “Invisible Web” sources; and will have the ability to protect their privacy by implementing basic security practices online, at home, and on social media.

Presented by: Cynthia Hetherington, Hetherington Group

Webinar Fee: $0.00 per attendee




ScanWriter: Dynamic Data Analytic Skills With Intuitive Data Presentations
Duration: 100 Minutes

This second session of Personable’s ScanWriter will demonstrate the newest features and capabilities of the program’s data capture and data analytics functions, to include:

• Automated integration of various data elements captured from bank records, check  images, deposit   slips, credit card statements, phone records, etc.

• Automated categorization, transformation, and exporting of financial records into meaningful business models for lead generation, investigative guidance, and analysis.

• Introduction to ScanWriter’s data analytics tools for modeling including flow of funds, all transactions, Benford’s Law, Beneish’s M-score, phone records analysis, and financial ratios model.

Presented by: Michelle Dulog, Personable Inc.

If you missed the first event ScanWriter: Smart, Clean and Actionable Data in an Instant, simply click here to register and watch it prior to this next event.

Webinar Fee: $0.00 per attendee




ScanWriter: Smart, Clean and Actionable Data in an Instant
Duration: 100 minutes

This webinar will demonstrate the features and capabilities of the latest version of Personable’s ScanWriter tool as well as integration with Microsoft’s Power BI. ScanWriter automates manual data entry from any electronic document which improves productivity and efficiency.

Webinar Fee: $0.00 per attendee




Seven Samurai: Understanding Attacks to Drive Defenses
Duration: 60 Minutes

This presentation uses war stories from decades of working in IT and security to explore the attacks we see today.  Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today.  These stories will explain how the attack was performed and why an attacker would take that direction.

Presented by: Kevin Johnson, Secure Ideas 

Webinar Fee: $0.00 per attendee




The Benefits of Triage: How to Quick Start Your Digital Investigation
Duration: 90 minutes

Learn the art of digital forensic triage- how to conduct an initial investigation quickly based on the scope of the investigation you are about to conduct. If 90% of cases can be solved with 10% of the data, let's get to that point early and make decisions on the need for further deep dive, due diligence, or peace of mind examination of devices based off facts. Join ADF Digital Forensic Specialist and Trainer, Rich Frawley, as he leads participants through a typical investigation to demonstrate the speed, accuracy, and best practices for using triage in the field or in the lab.

Webinar Fee: $0.00 per attendee




The Opioid and Fentanyl Crisis: Drug Investigations and the Link to the Dark Web
Duration: 90 minutes
This webinar is intended for LAW ENFORCEMENT OFFICERS who are either engaged, or looking to be engaged, in cyber drug investigations.

This webinar will discuss the current opioid/fentanyl crisis from a cyber perspective, providing information to enhance the effectiveness of federal, state and local law enforcement’s investigations.

• The dark web ecosystem: forums and marketplaces.
• Dark web and clearnet sources for drug listings and marketplace discussion.
• Cyber tactics and techniques used by vendors and what law enforcement should know.
• Best practices for state/local investigators.
• Successes and challenges for cyber-enabled drug investigations.

Presenters:
Kyle Hettinger, Team Lead, Brand and Consumer Protection, NCFTA
Brendan Lyle, Intelligence Analyst, Brand and Consumer Protection, NCFTA

Webinar Fee: $39.00 per attendee




The Role of Online Social Media in Predicting and Interdicting Spree Violence
Duration: 100 minutes
Online social media is changing how people communicate and interact with world around them. Increasingly, those contemplating engaging in acts of spree violence express themselves in online social media. It is important for investigators and analysts who conduct threat assessments to understand how this expression plays a key role in predicting and interdicting violence. When there are acts of spree violence, items of evidentiary value can now often be recovered from online communities. This evidence can help to shed light on the thought processes and motivations that led to the tipping point of violence.

This webinar will explore the interaction between social media and spree violence through a historical examination of case studies ranging in time from 1927 to 2015. Investigators and analysts, ranging from school resource officers to those who strategically analyze the tipping points for radicalization, can benefit from this training.

Presenter: Chuck Cohen, Managing Member of Cohen Training & Consulting, LLC

Webinar Fee: $39.00 per attendee




The Tables Have Turned: Igniting the Power of Survivors in Abuse Investigation and Prosecution
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

A former Prosecutor and an abuse survivor who wore a wire and recorded the perpetrator’s confession share their investigative tips, best practices for interacting with survivors, and trial strategies to dismantle the power dynamics of perpetrator and victim. Learn approaches to maximize case outcome and strength of survivors throughout the entire investigative process.

Presented by: Robert Peters, Senior Cyber and Economic Crime Attorney, NW3C &
Amber Higgins, Educational Initiatives Liaison, SHIELD Task Force

Webinar Fee: $0.00 per attendee




The Truth About the Dark Web Fraud Trade
Duration: 60 Minutes

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. What is the dark web fraud economy? What drives it? What can we do about it?

Presented by: Emily Wilson, VP of Research Terbium Labs

Webinar Fee: $0.00 per attendee




Through the Looking Glass: Protecting Yourself While Conducting Internet-Based Investigations
Duration: 75 MInutes

“Through the looking glass” is a metaphorical expression meaning: on the strange side, in the twilight zone, or in a strange, parallel world. While the internet can be considered a strange, parallel world, it can also be an informative, interesting, yet scary place when conducting different types of investigations. There are various technologies and methods that you can use to protect your identity and information while conducting internet-based investigations. This session will illustrate these technologies and methods to keep you safe when investigating online.
 
You Will Learn How To:
 
• Identify the methods criminals use to find your data.
• Compare various technologies and software tools to protect your identity while  investigating online.
• Examine various methods to employ to hide your own tracks.

Presented by: Ryan Duquette, Partner, Security and Privacy Risk Consulting

Webinar Fee: $0.00 per attendee




Tor, Onion Routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
Duration: 90 minutes

Many criminal investigators and analysts have heard of VPNs, proxies, and Tor. But, most would not feel comfortable conducting an investigation in which one of these tools was deployed. Similarly, both the Deepnet and Darknet are widely discussed but often not understood. At the same time, criminal investigators and analysts increasingly are required to conduct investigations and collect criminal intelligence information in these spaces or when these tools are being used.

Tor is most commonly used to hide one’s identity. But, it can also be used by an insider to breach a firewall or Internet filter, and is a gateway to what is commonly called the Darknet. While TOR is the most common onion router, it is definitely not the only one. And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools.

This Webinar is not intended to make attendees experts, but rather to demystify the topic. It will give investigators and analysts the foundation that they need to understand these tools and communities—both how they are exploited by criminal and how they can be used by investigator and analysts.

Presented by: Chuck Cohen, Cohen Training & Consulting

Webinar Fee: $39.00 per attendee




Traumatic Cases and Events: How to Become Resilient and Move Forward
Duration: 90 Minutes

This webinar is meant for individuals who are looking to build resiliency to combat the effects of trauma. Traumatic events can set your life on one course or another. These events occur frequently in the course of investigations and working with child exploitation cases. Rather than allow these events to define us or take us over, learn how to recognize different types of trauma through warning signs and become aware of the impact it has in not only your life but those around you. Throughout this webinar you will also learn how trauma is encoded within your body and how through simple techniques you limit the impact trauma has on our lives. You will also learn how to reframe any situation for your benefit. You will learn tools on how to shift your mind to not only overcome and situation but also thrive. Take charge of your feelings, life and outcome!

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee




Understanding Cellular Intercept
Duration: 60 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

TrustComm provides cellular intercept capabilities to the field. This webinar will be an introduction to this type of technology, how it works and how it supports law enforcement, military and first responders in meeting the mission.

Presented by: Ian Canning COO, TrustComm

Webinar Fee: $0.00 per attendee




Zip File Forensics
Duration: 60 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

We will review the effects that various Zip programs have on date time stamps, understand the cause of that effect and dive deep into the internal structure of a Zip archive. Attendees will learn how to manually carve zip file elements, edit the structure as necessary to combine the carvings into a single viable zip file.

Presented by: Blazer Catzen

Webinar Fee: $0.00 per attendee