Click here to download a copy of NW3C W-9 form.

Webinars

Our fee-based and complimentary webinars include individual access to the live event, unlimited individual access to the recorded event for a minimum of 30 days, and an individual certificate of training for CEUs. Group rates are available. Contact webinars@nw3c.org for additional information.

Click to see Terms & Conditions .


IMPORTANT:
If you have already registered for a webinar and need the access link or to check registration status, you must be logged into the site. If you are not logged in, please do so now.


Notice:
All event registration information must reflect the name of the individual attending.If you are purchasing for someone else, supply the information requested for the person who is attending the event.


Jump to

Live Webinars


Course
Sandcastles in a Storm: Application Vulnerabilities and How They Weaken our Organizations
Thu, Jul 11, 2019 2:00 PM Eastern
Duration: 60 minutes

In this presentation Kevin Johnson of Secure Ideas will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things. We will explore the vulnerabilities, how they are attacked, and what it means to all of us.

Presented by: Kevin Johnson, Secure Ideas

Webinar Fee: $0.00 per attendee


Course
Busting Bitcoin Bandits
Thu, Jul 18, 2019 1:00 PM Eastern
Duration: 75 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

An underground movement of hackers is taking over victim telephones and draining their financial accounts!  In the past 12 months, a California high tech task force named REACT has identified more than 800 victims and nearly $50 million in losses of cash and cryptocurrency.  Please join Santa Clara County Prosecutor Erin West and DA Investigator David Berry as they explain this phenomenon known as “sim-swapping” and detail how the hackers are able to access phones, hijack social media, and ultimately steal millions of dollars.  We will take a look at this new class of criminals and identify ways to protect ourselves against this growing crime wave.

Presented by:
Erin West, Prosecutor, Santa Clara Prosecutors Office
David Berry, District Attorney Investigator, Santa Clara Prosecutors Office

Webinar Fee: $0.00 per attendee


Course
Traumatic Cases and Events: How to Become Resilient and Move Forward
Tue, Jul 23, 2019 1:00 PM Eastern
Duration: 90 minutes

This webinar is meant for individuals who are looking to build resiliency to combat the effects of trauma. Traumatic events can set your life on one course or another. These events occur frequently in the course of investigations and working with child exploitation cases. Rather than allow these events to define us or take us over, learn how to recognize different types of trauma through warning signs and become aware of the impact it has in not only your life but those around you. Throughout this webinar you will also learn how trauma is encoded within your body and how through simple techniques you limit the impact trauma has on our lives. You will also learn how to reframe any situation for your benefit. You will learn tools on how to shift your mind to not only overcome and situation but also thrive. Take charge of your feelings, life and outcome!

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee


Course
Zip File Forensics
Wed, Aug 21, 2019 1:00 PM Eastern
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

We will review the effects that various Zip programs have on date time stamps, understand the cause of that effect and dive deep into the internal structure of a Zip archive. Attendees will learn how to manually carve zip file elements, edit the structure as necessary to combine the carvings into a single viable zip file.

Presented by: Blazer Catzen

Webinar Fee: $0.00 per attendee


Course
Digital Evidence: Putting the Digital Pieces Together for a Judge and Jury
Tue, Aug 27, 2019 1:00 PM Eastern
Duration: 90 MInutes

Modern criminal cases almost always have a technology connection and putting the pieces together can be overwhelming for prosecutors who may not have the background or experience the investigators have. This webinar will provide an overview of the various types of digital evidence in criminal investigations and concepts for explaining them to a judge and jury.

Presented by Kevin Metcalf, National Child Protection Task Force

Webinar Fee: $0.00 per attendee


Course
How to Convict a Child Pornographer
Thu, Sep 12, 2019 1:00 PM Eastern
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.


The investigation and prosecution of child pornography has exponentially increased nationwide in recent years, while tactics utilized by online sexual offenders continue to evolve and adapt with emerging technology. This webinar will focus on several key aspects of obtaining convictions, including practical investigative considerations, establishing perpetrator identity, utilizing prior bad acts evidence, countering common defense strategies, and communicating the severity of these egregious offenses to judges and juries.


Presented by Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C

Webinar Fee: $0.00 per attendee


Course
Mindhunters: Exploiting Offender Psychology in Proactive Operations and Abuse Investigations
Thu, Sep 26, 2019 1:00 PM Eastern
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Learn psychological insights and practical strategies to exploit Internet sex offender dynamics. Discover how to apply the behavioral profiles of solicitation and child pornography offenders in a variety of settings, including while conducting proactive operations or pretext phone calls, crafting undercover personas, identifying device usage, and interviewing perpetrators. This webinar will also address how to attack sex offender risk assessments, with perspectives from prosecution and forensic psychology.

Presented by:
Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C

Dr. Timothy Saar, Owner/Psychologist, Saar Psychological Group, PLLC

Joseph Remy, Assistant Prosecutor, Burlington County Prosecutor’s Office

Webinar Fee: $0.00 per attendee


On-Demand Webinars

Course
Aerial Data: Introduction to Drone Investigations
Duration: 90 minutes

With applications from aerial photography to racing to delivery services, drones are becoming more and more popular in both commercial and recreational spaces. Criminal use of drones is also increasing, and drone forensics is quickly becoming an important subfield of digital forensics. This presentation introduces the history of drones and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones. Topics include gathering evidence both internal and external to the drone, as well as methods for manually processing flight logs and displaying data in Google Earth.

Presented by: Jerry Jones, NW3C

Webinar Fee: $0.00 per attendee


Course
Being Mickey in a Goofy World: Understanding User Attacks
Duration: 60 Minutes

Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation he will walk through the various attacks, including email, social media, and in person. Using various war stories, he will explain how the attacker views the user and what they do to increase the success rate of these attacks.

Presented by: Kevin Johnson, Secure Ideas

Webinar Fee: $0.00 per attendee


I registered for this Live webinar


Course
Bio Hacking: Brain-Based Interviewing, Communication, & Leadership
Duration: 90 minutes
This webinar will provide attendees with a basic knowledge of Neuro Linguistic Programming and other cognitive techniques to aid in interviewing suspects, witnesses, and victims. This webinar will help individuals be a more effective communicator and leader, giving the attendees greater insights and understanding on how to get people to do what they need.

Presented by: John Pizzuro, CEO, John Pizzuro Speaking & Consulting

Webinar Fee: $39.00 per attendee


Course
Blockchain Tracing: Cryptocurrency Anti-Money Laundering and Financial Investigation Workshop
Duration: 90 minutes

CipherTrace’s cryptocurrency anti-money laundering and financial investigation Webinar provides hands-on instruction on blockchain and blockchain tracing. Attendees will learn a risk-based approach to tracing source of blockchain funds and de-anonymizing cryptocurrency transactions with cryptocurrency forensic tools. They will develop and hone digital forensic investigation techniques. The course will equip participants with an understanding of cryptocurrency fundamentals and the specific understanding of tracing cryptocurrency transactions. Improve the efficiency and effectiveness of blockchain forensic investigations by learning how to best leverage tools and resources to reduce investigation time and improve information yield. CipherTrace provides the infrastructure to enable secure, verifiable and legal commerce for cryptocurrency markets.

Presented By:
Pamela Garner, Director of Forensics and Training, CipherTrace
Paul Reyff, Vice President of Sales, CipherTrace

Webinar Fee: $0.00 per attendee


Course
Cognitive Interviewing & Courtroom Testimony
Duration: 90 minutes

Have you ever wanted to communicate more effectively? Relate better to the jury while testifying? Be more successful and obtain more information while interviewing? This webinar will give participants techniques and insight on how to employ cognitive interviewing skills to interview suspects, witnesses, and victims.  Participants will gain a better understanding of human behavior as it relates to neuroscience and become more effective in obtaining information and having suspects, witnesses and victims cooperate. Participants will be able to understand linguistics and language, interpret body language, and how to gain rapport with a jury and handle cross-examinations more effectively while testifying.

Webinar Fee: $0.00 per attendee


Course
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
Duration: 90 minutes

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And, they increasingly choose to use platforms that make this communication openly available for others to view. This means that evidence associated with not just metadata, but also content of communications can often be collected through open sources long after the communication is completed.

While evidence of criminality and victimization can be recovered through open source investigative techniques, many of the commercial tools marketed to criminal investigators and analysts are expensive. This sometimes places them outside the reach of police departments. And, social media companies are increasingly blocking API connections for commercial tools that allow the tools to be used for, “surveillance”. For these reasons, it is increasingly important for criminal investigators and analysts to build an inexpensive cyber-OSINT toolbox.

This Webinar will discuss the rapidly evolving ecosystem of online social media and how people are changing how they choose to communicate. It will then detail and demonstrate free and inexpensive cyber-OSINT tools that criminal investigators and analysts can use to start build a cyber-OSINT toolbox.

Presented by: Chuck Cohen, Cohen Training & Consulting

Webinar Fee: $39.00 per attendee


Course
Creating an Anonymous Persona for Online Operations
Duration: 110 minutes
In this webinar, we will provide an overview of the technical and non-technical requirements that investigators need to understand prior to creating their online personas in order to operate anonymously. Students will learn:

• Basic technology requirements prior to creating a persona;
• Some best practices in creating and interacting withas your online persona;
• Lessons learned from real-world cases;
• Challenges facing investigators; and
• What dark-web operators are teaching each other and how investigators can learn from that.

Presenter: Steve Mancini, CTO and Director of Strategic Operations, NCFTA

Webinar Fee: $39.00 per attendee


Course
Cybercrime Basics for Prosecutors: From the Cloud to Seizing the Device
Duration: 90 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will define what cybercrime is and its sources of evidence. The Electronic Communications Privacy Act (ECPA) will be covered to include preservation letters, content versus non-content, when process gets rejected, precluding versus delayed notice, and the Cloud Act. California’s new General Data Protection Regulation (GDPR) law passed earlier this year will be discussed. The presenters will explore using traditional investigative methods and when to seize a device and when to search a device. Lastly, what are the cybercrime defenses one can expect to be argued?

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Thomas Huynh, Deputy Attorney General, NJ Office of the Attorney General

Webinar Fee: $0.00 per attendee


Course
Cybercrime Basics: Investigation and Prosecution of Credit Card Fraud
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will cover credit card fraud and identity theft from initial investigative steps to arrest and prosecution. The presenters will discuss how to identify points of compromise including low hanging fruit, skimmers and indicators of malware. Specifics regarding point of infection, log analysis, and signature analysis will be covered as well as charges, pleas, grand jury and trial considerations along with post-conviction steps.

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C

Webinar Fee: $0.00 per attendee


Course
Emerging Legal Issues in Tech: From the Cloud Act to Hacking Back
Duration: 90 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will discuss the following topics:

• The Cloud Act
• Border Searches of Technology
• Right to be Forgotten
• Revisions to Federal Rules of Evidence
• Hacking Back and the Law
• Compelled Decryption

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Thomas Huynh, Deputy Attorney General, NJ Office of the Attorney General

Webinar Fee: $0.00 per attendee


Course
Financial Crimes Against Seniors - Part 1
Duration: 60 minutes
A collaborative project of NW3C and the Elder Justice Initiative, this webinar is the first in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Overview of Elder Abuse and Financial Exploitation
• Types of Abusers
• Scams Targeting Seniors

Presented by: Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee


Course
Financial Crimes Against Seniors Part 2- Investigations and Resources
Duration: 60 minutes
A collaborative project of NW3C and the Elder Justice Initiative, this webinar is the second in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Investigating the crimes
• Resources for investigators
• Creating an investigative plan

Presented by: Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee


Course
Financial Crimes Against Seniors Part 3 - Response, Prosecution, and Prevention
Duration: 60 minutes
A collaborative project of NW3C and the Elder Justice Initiative, this webinar is the third in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Responding to a senior call
• Prosecuting elder exploitation
• Promoting awareness and prevention

Presented by: Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee


Course
How Virtual Currency is Changing the Way We Investigate
Duration: 90 minutes
This webinar will discuss the impact virtual currency has on investigations. Starting with a brief introduction into what virtual currency is, how to get it, who is using it and why, we will then discuss some high profile cases, such as Silk Road and the recent Alpha Bay and Hansa takedowns; we will discuss how virtual currency has fueled the rise in ransomware over the past few years; additionally, we will also cover some methods and tools investigators are leveraging to ’follow the money’. Finally, we will discuss where virtual currency is going. Upon completion of this webinar, students will:

• Better understand what virtual currency is, how to get it, sell it, etc.
• Understand who uses virtual currency.
• Understand the role of virtual currency in ransomware.
• Be familiar with some of the tools to help with investigations.
• Better overall understanding of how virtual currency has impacted the entire underground eco-system.

Presenters:
Steve Mancini, CTO and Director of Strategic Operations, NCFTA
Sean Wolfgang, Intelligence Analyst III, NCFTA

Webinar Fee: $39.00 per attendee


Course
Intel Collection for LE Part 1: Expanding the Known, Finding the Unknown, and Protecting Your Agency
Duration: 90 minutes
This webinar is intended for LAW ENFORCEMENT. Please register using your agency-issued email.

With the vast amount of data available and the calls for stopping law enforcement’s access to data, this two-part webinar series will act as a guide through it all. These presentations will give you hands-on techniques to collect Intel. Part one will cover:

• Protecting your agency - The Cornerstone to Intel Collection is justifying your collection techniques
• Tracking international and domestic money
• Working with the financial sector to identify human trafficking, terrorism finance and international criminal gangs
• Tracking cash flow through MSBs for criminal purposes
• FinCEN -Beyond running the name of your subject
• Bitcoin investigations - This is not a "what is Bitcoin" session, it is a hands-on way to identify people using Bitcoin in your jurisdiction for illicit means.

Presented by: Kevin Branzetti
Employed as the Deputy Chief of Intelligence in
the Manhattan District Attorney's Office

Webinar Fee: $39.00 per attendee


Course
Intel Collection Part 2: Tips, Tricks and Techniques for Intel Collection
Duration: 90 minutes
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email .

With the vast amount of data available and the calls for stopping law enforcement’s access to data, part two of this series covers tracking and using international phone numbers, IP addresses, social media tools and techniques, tips for legal process to social media companies, and free law enforcement tools. We will also discuss rules for using social media in investigations.
 
This webinar will build on concepts and techniques discussed in the Intel Collection for LE Part 1: Expanding the Known, Finding the Unknown and Protecting Your Agency webinar. It is not necessary for you to have attended the previous webinar to attend, understand and gain valuable knowledge from this informative webinar.

Presented by: Kevin Branzetti
Employed as the Deputy Chief of Intelligence in the Manhattan District Attorney’s Office

Webinar Fee: $39.00 per attendee


Course
Intro to Cell Phone Call/Communication Detail Records
Duration: 90 minutes
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This presentation will be an overview of cell phone call/communication detail records (CDRs) and will focus on historical records available from the primary cell phone companies including logs of phone calls, SMS (short message service) text messages, and Internet activity. The overview will also provide a brief introduction to cell phone-created CDRs which may be available from non-cell phone sources such as email providers, smartphone application providers, and, non-cellular-based Internet service providers (ISPs).

Presented by: Breck McDaniel, President/Owner, Geocell, LLC

Webinar Fee: $39.00 per attendee


Course
Intro to Cell Phone Info for Investigations
Duration: 90 minutes
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This presentation will be an overview of the various bits of information available to investigators from cell phones. The presentation will cover information available from physical cell phones such as digital data extractions, the cell phone providers such as phone call/communication detail records (CDRS, location data such as historic cell site/sector data, and, Internet cloud-based sources such as smartphone apps, websites, etc. The overview will also provide a brief introduction to the major forms of cell phone surveillances possible by law enforcement.

Presented by: Breck McDaniel, President/Owner, Geocell, LLC

Webinar Fee: $39.00 per attendee


Course
Intro to Cell Phone Location Data for Investigations
Duration: 90 minutes

This webinar is intended for LAW ENFORCEMENT PERSONNEL to include investigators, prosecutors, and analysts. Please register using your agency-issued email.

This presentation will be an overview of the various forms of location data available from cell phone use including historical call/communication detail records (CDRs) from the cell phone companies, location data stored within cell phones themselves and typically available through digital forensic extractions, as well as, location data available from the various real-time surveillance options, smartphone app providers, website usages, etc. 

Presented by: Breck McDaniel President/Owner, Geocell, LLC

Webinar Fee: $39.00 per attendee


Course
Introduction to FinCEN
Duration: 90 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar is intended as a Financial Crimes Enforcement Network (FinCEN) overview. It will include information on products and services, Bank Secrecy Act records and information, and how FinCEN is used in investigations.

Presented by: James Emery, FinCEN

Webinar Fee: $0.00 per attendee


Course
Investigating Terrorist Financing with Chainalysis Reactor
Duration: 60 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Terrorist organizations are using cryptocurrencies as a new way to raise funds and facilitate operations. This poses a challenge to both public and private sector organizations, but also creates a new opportunity for lead development centered on blockchain data. This webinar will review an analysis of recent cases of terrorist organizations using Bitcoin, provide an overview of Chainalysis data and the Reactor software solution and speak to the future of terrorist financing through cryptocurrency and how to stop them.

Presented by: Collin Almquist, Chainalysis

Webinar Fee: $0.00 per attendee


Course
Law Enforcement Cyber Center: A Valuable Resource for Investigators
Duration: 60 minutes

The Law Enforcement Cyber Center (LECC) was developed to enhance the awareness, expand the education, and build the capacity of justice and public safety agencies to prevent, investigate, prosecute, and respond to cyber threats and cyber crimes. It is intended to be a national resource for law enforcement and related justice and public safety entities. During the webinar, participants will review the website and learn about the many valuable resources that can be utilized.

The Law Enforcement Cyber Center is a collaborative project between the National White Collar Crime Center (NW3C), the International Association of Chiefs of Police (IACP), the Police Executive Research Forum (PERF), and is funded through the Bureau of Justice Assistance.

Presented by: Jeff Lybarger & Josh Santy, NW3C

Webinar Fee: $0.00 per attendee


Course
Law Enforcement Investigations on the Darknet: Case studies from the co-founder of the Tor Project
Duration: 75 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

In this webinar, Andrew Lewman will share and explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. Using these real-world, darknet-based examples that have been selected for a law-enforcement based audience, Andrew will walk-through examples of different methodologies law enforcement can use to de-anonymize threat actors, the different tools and approaches one can take to conducting these types of investigations, best practices, lessons learned, and more.

Webinar Fee: $0.00 per attendee


Course
Leveraging Partnerships and Avoiding Multi-Agency Pitfalls
Duration: 90 Minutes

Have you ever wished that everyone was in the same boat as you, and more importantly rowing in the same direction? Today we live in a global society which consists of various teams and departments working with and against each other.  We face individual and institutional challenges that sometimes inhibit our ability to succeed. Investigations today, comprise public, and private entities, investigators from different departments, attorneys, and others that can impact your investigation or goals. This webinar will teach students the art of leverage and how to maintain, develop and execute partnerships that will provide long term success. True success comes when you are able to maintain partnerships and rely on each other for that success. This webinar will provide students with strategies used by some of the most successful fortune 500 companies. Students will be able to implement these strategies directly to their teams and their investigations. This webinar will give them insight on how to develop relationships and leverage people in order to be more efficient and provide them with lasting success.

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee


Course
Mobile Extractions + Power Analytics: Using XRY and PLX Together to Solve Your Investigations
Duration: 60 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

In most investigations today mobile phone data is one of the most critical sources of evidence. The reasons are clear, given the volume and variety of data in today’s smart phones and the depth with which our mobile devices capture our activities. This presentation will focus on what types of data can be recovered from mobile devices using XRY and how to then export that data into PLX. You will learn how PLX can then help you swiftly organize, analyze, and dissect the many different sources of information you have, including mobile device data, in one easy to use platform.

Presented by:
Kaitlyn Ziola, PenLink
Jacob Hulsey, Director of Customer Success, MSAB

Webinar Fee: $0.00 per attendee


Course
Online Officer Safety: Protecting Yourself in Cyberspace
Duration: 90 minutes

Police officers, crime analysts, and other criminal justice professionals are high value targets for cyber criminals. Too often, they are also soft targets. This Webinar will cover the fundamentals of securing wireless networks both at home and when traveling, understanding and controlling social media footprints, and securing digital devices. Many police officers have a personal and family security plan. In 2018, it is important for those plans to extend to the internet, how you connect to the internet, and the devices that are used to make those connections. This Webinar will provide specific, critical recommendations to develop good cyber security plans, processes, and practices.

Presented by: Chuck Cohen, Cohen Training & Consulting

Webinar Fee: $39.00 per attendee


Course
Removing Your Personal Identifying Information
Duration: 90 Minutes

Everyone is at risk for identity theft, online and physical stalking, and harassment. Beyond social media, your public records are for sale, so your home address and assets are easily located through simple online searches. This course provides a through description of how and where your data is stored and how to remove it.

In this introductory hands-on class, participants will review a case study detailing how a fraudulent and nefarious actor obtains personal identifying information and how it can be used against you. You will learn “Opt Out” procedures for public service and security personnel and explore the tools and methodologies used to operate discreetly on the Internet. Upon completion of the class, field investigators will be able to identify how private lives and public information are available through websites, social networks, and “Invisible Web” sources; and will have the ability to protect their privacy by implementing basic security practices online, at home, and on social media.

Presented by: Cynthia Hetherington, Hetherington Group

Webinar Fee: $0.00 per attendee


Course
ScanWriter: Dynamic Data Analytic Skills With Intuitive Data Presentations
Duration: 100 Minutes

This second session of Personable’s ScanWriter will demonstrate the newest features and capabilities of the program’s data capture and data analytics functions, to include:

• Automated integration of various data elements captured from bank records, check  images, deposit   slips, credit card statements, phone records, etc.

• Automated categorization, transformation, and exporting of financial records into meaningful business models for lead generation, investigative guidance, and analysis.

• Introduction to ScanWriter’s data analytics tools for modeling including flow of funds, all transactions, Benford’s Law, Beneish’s M-score, phone records analysis, and financial ratios model.

Presented by: Michelle Dulog, Personable Inc.

If you missed the first event ScanWriter: Smart, Clean and Actionable Data in an Instant, simply click here to register and watch it prior to this next event.

Webinar Fee: $0.00 per attendee


Course
ScanWriter: Smart, Clean and Actionable Data in an Instant
Duration: 100 minutes

This webinar will demonstrate the features and capabilities of the latest version of Personable’s ScanWriter tool as well as integration with Microsoft’s Power BI. ScanWriter automates manual data entry from any electronic document which improves productivity and efficiency.

Webinar Fee: $0.00 per attendee


Course
Seven Samurai: Understanding Attacks to Drive Defenses
Duration: 60 Minutes

This presentation uses war stories from decades of working in IT and security to explore the attacks we see today.  Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today.  These stories will explain how the attack was performed and why an attacker would take that direction.

Presented by: Kevin Johnson, Secure Ideas 

Webinar Fee: $0.00 per attendee


Course
The Benefits of Triage: How to Quick Start Your Digital Investigation
Duration: 90 minutes

Learn the art of digital forensic triage- how to conduct an initial investigation quickly based on the scope of the investigation you are about to conduct. If 90% of cases can be solved with 10% of the data, let's get to that point early and make decisions on the need for further deep dive, due diligence, or peace of mind examination of devices based off facts. Join ADF Digital Forensic Specialist and Trainer, Rich Frawley, as he leads participants through a typical investigation to demonstrate the speed, accuracy, and best practices for using triage in the field or in the lab.

Webinar Fee: $0.00 per attendee


Course
The Opioid and Fentanyl Crisis: Drug Investigations and the Link to the Dark Web
Duration: 90 minutes
This webinar is intended for LAW ENFORCEMENT OFFICERS who are either engaged, or looking to be engaged, in cyber drug investigations.

This webinar will discuss the current opioid/fentanyl crisis from a cyber perspective, providing information to enhance the effectiveness of federal, state and local law enforcement’s investigations.

• The dark web ecosystem: forums and marketplaces.
• Dark web and clearnet sources for drug listings and marketplace discussion.
• Cyber tactics and techniques used by vendors and what law enforcement should know.
• Best practices for state/local investigators.
• Successes and challenges for cyber-enabled drug investigations.

Presenters:
Kyle Hettinger, Team Lead, Brand and Consumer Protection, NCFTA
Brendan Lyle, Intelligence Analyst, Brand and Consumer Protection, NCFTA

Webinar Fee: $39.00 per attendee


Course
The Role of Online Social Media in Predicting and Interdicting Spree Violence
Duration: 100 minutes
Online social media is changing how people communicate and interact with world around them. Increasingly, those contemplating engaging in acts of spree violence express themselves in online social media. It is important for investigators and analysts who conduct threat assessments to understand how this expression plays a key role in predicting and interdicting violence. When there are acts of spree violence, items of evidentiary value can now often be recovered from online communities. This evidence can help to shed light on the thought processes and motivations that led to the tipping point of violence.

This webinar will explore the interaction between social media and spree violence through a historical examination of case studies ranging in time from 1927 to 2015. Investigators and analysts, ranging from school resource officers to those who strategically analyze the tipping points for radicalization, can benefit from this training.

Presenter: Chuck Cohen, Managing Member of Cohen Training & Consulting, LLC

Webinar Fee: $39.00 per attendee


Course
Tor, Onion Routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
Duration: 90 minutes

Many criminal investigators and analysts have heard of VPNs, proxies, and Tor. But, most would not feel comfortable conducting an investigation in which one of these tools was deployed. Similarly, both the Deepnet and Darknet are widely discussed but often not understood. At the same time, criminal investigators and analysts increasingly are required to conduct investigations and collect criminal intelligence information in these spaces or when these tools are being used.

Tor is most commonly used to hide one’s identity. But, it can also be used by an insider to breach a firewall or Internet filter, and is a gateway to what is commonly called the Darknet. While TOR is the most common onion router, it is definitely not the only one. And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools.

This Webinar is not intended to make attendees experts, but rather to demystify the topic. It will give investigators and analysts the foundation that they need to understand these tools and communities—both how they are exploited by criminal and how they can be used by investigator and analysts.

Presented by: Chuck Cohen, Cohen Training & Consulting

Webinar Fee: $39.00 per attendee


Course
Understanding Cellular Intercept
Duration: 60 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

TrustComm provides cellular intercept capabilities to the field. This webinar will be an introduction to this type of technology, how it works and how it supports law enforcement, military and first responders in meeting the mission.

Presented by: Ian Canning COO, TrustComm

Webinar Fee: $0.00 per attendee