Live Webinars


Encryption, Encoding, Inaccessible Data and Devices
Tue, Jun 02, 2020 1:00 PM Eastern
Duration: 75 Minutes

Hash, encryption, full disk, file based, and the list goes on! Words used correctly and incorrectly when examiners discuss or even report on evidence. This webinar is intended to lay the framework for a factual understanding of how encryption and hashing are used in our digital investigations. Real world applications of hashing, and encryption will be shown, with an emphasis on how they impact investigations in 2020. Questions such as: "Does the application encrypt data?", "How is it encrypted?", and "Why can’t I decrypt it?" will be discussed.

Presented by: Chris Atha, NW3C

Webinar Fee: $0.00 per attendee




Understanding Facebook Search Warrant Returns
Thu, Jun 04, 2020 1:00 PM Eastern
Duration: 60 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Registrations will close 24 hours before webinar start time.

Data of evidentiary value in criminal cases is generated both on the suspect device and the services it utilizes. While recovery of data from the suspect device is regularly performed, user account data stored off-device from these services often remains overlooked. This overlooked data is increasingly becoming crucial evidence in cases. In this webinar, we will manually review a Facebook search warrant return examining the different artifacts that can be provided within a return. Once manual examination is complete, a review of the same return with an automated tool will be conducted so the two methods of examination can be compared.

Presented by: John McLead, NW3C

Webinar Fee: $0.00 per attendee




Mitigating and Prioritizing Investigative Case Load Post Corona
Tue, Jun 09, 2020 1:00 PM Eastern
Duration: 75 Minutes

Covid-19 and stay at home orders have impacted criminal investigations, creating a significant backlog and an overwhelming task for investigators. As businesses and life reopen in a post Corona world these investigations will need to be investigated. The sheer volume of backlog will make it difficult for investigators to manage the amount of investigations effectively. This webinar will go over strategies for efficiently managing, triaging and prioritizing investigations. We will discuss various methods and techniques to utilize in dealing with a significant case load and delve into some virtual investigative techniques that can be utilized in the future.

Presented by:  John Pizzuro

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




The Great Reset – Policing 2030
Wed, Jun 10, 2020 2:00 PM Eastern
Duration: 90 Minutes

Policing has experienced several eras since the inception of professional law enforcement in America. In the 1980’s we moved into a community policing/problem solving era. In the aftermath of 9/11/2001, law enforcement became more militarized. The current COVID-19 pandemic has already radically changed the American landscape, and altered the ways we look at air travel, public gatherings, and personal safety. Law enforcement was already facing significant challenges from the advent of vehicular automation, and funding for basic government services is under threat due to sustained changes in buying patterns, home values and the “new normal”. In this webinar, we will explore the impacts of these changes in the next decade to the police, and to the public they serve, in an era we’ll call “The Great Reset”.

Presented by: Bob Harrison, RAND Corporation

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

 

 

Webinar Fee: $0.00 per attendee




Autopsy: Utilizing the Portable Case Option Part 2
Thu, Jun 11, 2020 1:00 PM Eastern
Duration: 75 Minutes

Part 2 of a 2 Part Series

Autopsy is a free and open source digital forensics platform with many features comparable to This is Part 2 in our 2-part Autopsy webinar series; Part 1 walked through setting up a new case and effective tool usage.  Part 2 will explore utilizing Autopsy’s Portable Case.  Attendees will learn why a Portable Case is a good option for a forensic examiner to pass digital evidence to the investigators or prosecutors for further analysis and review.  With a portable case, the examiner can focus on processing the digital evidence, allowing the investigator to review the results of the examination and determine if there are items of evidentiary value.

This webinar will focus on how to create a portable case, as well as how to effectively walk investigators and prosecutors through using a portable case to review digital evidence to identify data of evidentiary value.

Attendees should be familiar with the basic inner workings of digital forensics, as this webinar series will not delve into explaining how each ingest module works.  A deeper dive into Autopsy and other digital forensic suites, is covered in our DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (IDFA - AFT) course.

Presented by: JD Nickolas, NW3C

Webinar Fee: $0.00 per attendee




Tor, Darknet, and Dark Markets: A Deep Dive for Criminal Investigators and Analysts
Mon, Jun 15, 2020 1:00 PM Eastern
Duration: 2 Hours 30 Minutes

This Webinar will build on concepts and techniques discussed in the previous What Investigators Need to Know about Hiding on the Internet:  Proxies and VPNs Webinar.  You can register for that On Demand Webinar at:  https://www.nw3c.org/webinars/Register?id=10838. But, it is not necessary for an investigator or analyst to have attended the previous Webinar to attend, understand, and gain valuable investigative insights from this deep dive Webinar.      

Tor is most commonly used to hide one’s identity. But it can also be used by an insider to breach a firewall or Internet filter and is a gateway to what is commonly called the Darknet.  While Tor is the most common anonymity network, it is definitely not the only one.  And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other networks.  You can exchange Child Sexual Abuse Material, discuss criminal tradecraft, buy and sell illicit drugs, find stolen personal identifying information, and negotiate with those offering hacking as-a-service on Dark Markets and in Darknet Vendor Shops.

This Webinar is not intended to make attendees experts, but rather to demystify the topic.  It includes case studies and a discussion of specific investigative techniques.  The Webinar will give investigators and analysts the foundation that they need to understand these tools and communities—both how they are exploited by criminal and how they can be used by investigator and analysts.  
 
Presented by:  Chuck Cohen, NW3C

Webinar Fee: $0.00 per attendee




Bad Medicine – Healthcare Fraud and Money Laundering
Mon, Jun 22, 2020 1:00 PM Eastern
Duration: 90 Minutes

In early 2020 the US Treasury released its National Strategy for Combating Terrorist and Other Illicit Finance.  First and foremost, at the top of the list of illicit finance was healthcare fraud.  With major cases like last year’s conviction for a USD $1 billion fraud scheme, healthcare fraud takes resources away from those who need it the most and the proceeds are used to fuel lavish lifestyles, corruption, and other crime.  Learners will be given examples of how the fentanyl crisis has been exploited by corrupt practitioners based on following the illicit transactions related to these schemes.  This session will also explore healthcare fraud and money laundering investigations, giving learners insights into how to detect and pursue these significant and detrimental cases. 

Presented by: Michael Schidlow, Scienter Group

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration
Thu, Jul 09, 2020 1:00 PM Eastern
Duration: 60 Minutes

Though the use of computer forensics in criminal investigations has expanded in recent years, there is limited empirical evidence about the prevalence of the use of digital evidence in the court system and its impact on prosecutorial outcomes.  This webinar will discuss how digital evidence has performed in the US. Courts of Appeal, and how the U.S. Courts of Appeal generally views the science behind computer forensics.  Participants will understand: (1) the most common legal basis for appeals related to digital evidence, (2) the most frequent outcomes for those appeals, (3) the most prevalent challenges to digital forensics, and (4) which appeals are the most likely to results in a affirmed or reversed decision for the defendant.

Presented by: Martin Novak

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

 

Webinar Fee: $0.00 per attendee


On-Demand Webinars


Autopsy: Open Source Digital Forensics Basics Part 1
Duration: 90 Minutes

Part 1 of a 2 Part Series

Autopsy is a free and open source digital forensics platform with many features comparable to those found in the leading commercial tools.  It can be installed on Windows, macOS, and Linux operating systems.  This is part 1 in our 2-part webinar series focused on using Autopsy to perform digital forensic examinations.

This webinar will start by be walking through setting up a new case and exploring effective tool usage.  Attendees will then learn digital forensics best practices and methods for quickly locating items of evidentiary value, based on the results of the following processes:

 Compute a MD5 verification hash of an evidence file
 File Hashing | Notable HDB | Irrelevant HDB
 File Signature Analysis
 Data Carving | File System Recovery
 Extract EXIF Metadata
 Keyword Searches
 Display results in various viewer components

Attendees should be familiar with the basic inner workings of digital forensics, as this webinar series will not delve into explaining how each ingest module works.  A deeper dive into Autopsy and other digital forensic suites, is covered in our DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (IDFA - AFT) course.

Presented by: JD Nickolas, NW3C

Webinar Fee: $0.00 per attendee




Narcotics and Counterfeit Goods: A Match Made in Heaven
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar is a detailed case study of a successful investigation, from inception to trial, of a criminal case involving the sale of counterfeit merchandise, pirated CDs and DVDs, and synthetic cannabinoids in state court.

This webinar will provide a detailed analysis of the three-year investigation and trial of a local retail store merchant that utilized his business as a front to conduct the illicit sale of drugs and counterfeit merchandise in Meridian, Mississippi.

The webinar will allow students to see how law enforcement officers at the local, state, and federal level properly deconflicted this case. Lastly, the presenters will address the challenges they faced during the investigation and prosecution of this matter and discuss how these issues were successfully resolved.

Presented by:

Patrick E. Beasley, Assistant District Attorney, Mississippi Office of the District Attorney – 6th Judicial Circuit Court

Leland “Lee” McDivitt, Senior Investigator, Mississippi Office of the Attorney General

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.


 

Webinar Fee: $0.00 per attendee




Why’d it have to be snakes?: Python Programming for Law Enforcement Part 4
Duration: 90 Minutes

Part 4 of a 4 Part Series

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst’s repertoire. Python for Law Enforcement is a four-part webinar series that is geared for law enforcement. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day-to-day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

Session 4
• Classes/objects• I/O• Reading file• Writing file• Append• Closing file• Coding Example• imports libraries• CSV library• CSV Example• Coding Example• Random name• RegEx• Coding Example• MySQL Connector• Built-In Functions• Questions

Presented by: Jasen Wells, FDLE

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

 

Webinar Fee: $0.00 per attendee




Overcoming Defenses in Child Exploitation Cases
Duration: 90 Minutes

Using several case studies this webinar will address defenses in child exploitation cases including SODDI, innocent download, virus, download/delete and mental disabilities. How to overcome these defenses and avoid pitfalls during cross-examination (attempts by defense to get witness to support their claimed defense). Will include pretrial issues, jury selection, testimony, handling of digital evidence, summation and how to use graphics and PowerPoint in your trials.

Presented by: Kateri Gasper, Assistant District Attorney, Queens County District Attorney’s Office

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Why’d it have to be snakes?: Python Programming for Law Enforcement Part 3
Duration: 90 Minutes

Part 3 of a 4 Part Series

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst’s repertoire. Python for Law Enforcement is a four-part webinar series that is geared for law enforcement. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day-to-day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

Session 3
• While loop• For loop• Break/continue• Coding Example• Functions• Inheritance
• Modules• Coding Example• Print• Userinput• Conditional statements• Coding Example • Questions

Presented by: Jasen Wells, FDLE

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

 

Webinar Fee: $0.00 per attendee




Optimizing Child Exploitation Investigations with FlashL1ght
Duration: 60 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

With hundreds of CyberTips per month, ICAC task forces suffer from major backlog and the psychological effects of officers being regularly exposed to child exploitation. Using our cutting-edge AI algorithms, FlashL1ght addresses both these pain points with an on-premise, stand-alone solution. Join us for this live demo to see how simple and time efficient FlashL1ght is.

This Webinar is sponsored by L1ght. NW3C is providing the webinar so that attendees can have more information with which to evaluate how this capability might add value to them and the organizations they serve. NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




The Art of Social Engineering: How to understand and use it as a tool for proactive investigations
Duration: 90 Minutes

Recorded May 7, 2020

Our online world and the use of electronic devices have led to most of our interactions in the online world. Technology contributes to people’s perception of things being real when they are not.This has enabled people to be manipulated through the Art of Social Engineering.

This webinar will delve into the science of Social Engineering and explain how people get manipulated. We will also talk about how Social Engineering in proactive investigations to engage suspects and have them unwittingly provide you information and more importantly evidence that can be used for your investigations.

Presented by: John Pizzuro

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Why’d it have to be snakes?: Python Programming for Law Enforcement Part 2
Duration: 90 Minutes

Recorded May 6, 2020

Part 2 of a 4 Part Series

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst’s repertoire. Python for Law Enforcement is a four-part webinar series that is geared for law enforcement. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day-to-day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

Session 2
• Psuedo-code• Syntax• Comments• Variables• Global variables• Data types/type casting• Logic/Boolean• Operators• Lists• If/else• Switch• Coding Example• Questions


NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.


Presented by: Jasen Wells, FDLE

Webinar Fee: $0.00 per attendee




Teen Sexting
Duration: 75 Minutes

Recorded May 5, 2020

Sexting among teens & preteens is rampant and, in many cases, leads to coercion, revenge porn, sextortion, or human trafficking. Who is sexting? Why? Where are they sexting? What platforms are they using – which are changing all the time? Which of these platforms can provide law enforcement with information to assist in investigations? Issues include deciding whether to arrest/prosecute, education/presentations to schools and parents. Insight and suggestions on sexting, sextortion, and revenge porn based upon case studies.

Presented by: Kateri Gasper, Assistant District Attorney, Queens County District Attorney’s Office

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Why’d it have to be snakes?: Python Programming for Law Enforcement Part 1
Duration: 90 Minutes

Recorded April 29, 2020

Part 1 of a 4 Part Series

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst’s repertoire. Python for Law Enforcement is a four-part webinar series that is geared for law enforcement. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day-to-day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

Session 1
• Intro • Problem Statement (Example: Data format different)• Programming Language
• Analyzing data• Automating processes• What is Python• Law enforcement software that uses Python• IDE• Versions• Resources• Python Docs• W3 Schools• Forums• Questions

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Presented by: Jasen Wells, FDLE

Webinar Fee: $0.00 per attendee




Follow the Money: FinCrime Investigation Case Studies
Duration: 90 Minutes

Recorded April 28, 2020

Money laundering is a global, trillion-dollar crime that extends into all areas of commerce. The reality is that money laundering isn’t just a standalone crime, it is also a symptom of additional crimes which generate illicit proceeds. Whether due to lone wolf criminals, or as the result of transnational organized crime, or international corruption, money laundering can be challenging to prove as both a factual matter and as part of a criminal prosecution.

This learning session will outline not only the essential elements of a criminal case of money laundering, but also examine how additional charges can be brought to flush out the elements of that charge. Learners will get a better understanding of the prosecutor’s approach to money laundering (and its related crimes), as well as tools to follow the transactions that can substantiate such a charge. By moving from the academic to applied subject matter, learners will get deep insight into how to both trace illicit assets, as well as how to prepare their findings for criminal cases. The webinar will rely on real-world examples of financial crime, and explain how cases like those can be further built out by investigators, analysts, and compliance officers.

Presented by Michael Schidlow, Scienter Group

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Financial Crimes Against Seniors Part 3 - Response, Prosecution, and Prevention
Duration: 90 Minutes

Recorded April 27, 2020

A collaborative project of NW3C, the Regional Information Sharing Systems (RISS), and the Elder Justice Initiative, this webinar is the third in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Responding to a senior call
• Prosecuting elder exploitation
• Promoting awareness and prevention

Presented by: Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee




Building Your Capture The Flag Tool Kit
Duration: 75 Minutes

Recorded April 23, 2020

NW3C offers daily Capture The Flag (CTF) Challenges at https://nw3.ctfd.io/ .  Challenges are designed to help forensic examiners hone, refine, and practice their skills.  The CTF scoreboard encourages friendly competition. Solution videos are  available following the challenge conclusions. 
 
This webinar will provide information on developing a forensic toolkit not only to help solve CTF challenges, but also to help with real-word challenges.  Webinar attendees will receive a manifest of software shown in the video, and a special webinar viewer only challenge, on which they can test their new toolkit.  

Presented by: Chris Atha, NW3C


 

Webinar Fee: $0.00 per attendee




Financial Crimes Against Seniors Part 2- Investigations and Resources
Duration: 90 Minutes

Recorded April 20, 2020

A collaborative project of NW3C, the Regional Information Sharing Systems (RISS), and the Elder Justice Initiative, this webinar is the second in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Investigating the crimes
• Resources for investigators
• Creating an investigative plan

Presented by: Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee




What Investigators Need to Know about Hiding on the Internet: Proxies and VPNs
Duration: 90 Minutes

Recorded April 16, 2020

Criminal investigators and analysts need to understand how it is possible for people to conceal and obfuscate their identity and location on the Internet.  Two primary methods are through the use of proxies and virtual private networks (VPNs).  This ability to hide one’s identity and location on the Internet can be both a challenge and an opportunity.  Various methods of concealing identity and location, while engaged in activates on the Internet, provides an opportunity for investigators to engage in covert online research while also providing a means for criminals to engage in surreptitious communication in furtherance of nefarious activities.  As technologies, such as digital device fingerprinting, emerge as ways to attribute identity this becomes a topic about which every investigator and analyst must become familiar.

This Webinar will include an overview of how the Web was designed and functions.  A basic overview of IP fingerprinting, browser/software fingerprinting, and device fingerprinting will set the stage for a deeper dive into proxies and VPNs—two of the most common methods used both by criminals and criminal investigators to conceal their identities and locations while engaging in online social networking and online communication. 

Presented by: Chuck Cohen, NW3C

Webinar Fee: $0.00 per attendee




Cyber Threat Intelligence for Investigators
Duration: 75 Minutes

Recorded April 15, 2020

The ongoing efforts to respond to the array of COVID 19 Internet threats have resulted in aggressive and focused work by the cybersecurity community in concert with Law Enforcement. Collaboration and human information sharing is many times less than adequate in keeping pace with this cyber threat landscape.  Cyber Threat Intelligence requires automation, application of large data, and machine speed information sharing.  While much of this intends to result in mitigation and cybersecurity solutions, a look under the hood immediately depicts many opportunities to support and enhance a range of cybercrime as well as cyber enabled crime investigations. This webinar will examine these topics and provide information as to benefit from these Cyber Intelligence Efforts to support your investigations.

Presented by:
Stacy Wright Director of Partnerships,Multi-State Information Sharing and Analysis Center
Jim Emerson Vice President, NW3C

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Financial Crimes Against Seniors - Part 1
Duration: 90 Minutes

Recorded April 13, 2020

A collaborative project of NW3C, the Regional Information Sharing Systems (RISS), and the Elder Justice Initiative, this webinar is the first in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

•Overview of Elder Abuse and Financial Exploitation
•Types of Abusers
•Scams Targeting Seniors

Presented by: Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee




COVID-19 Considerations for Collecting and Handling Digital Evidence
Duration: 75 Minutes

Recorded April 9, 2020

The ongoing efforts to mitigate the spread of COVID-19 have resulted in social distancing of the general population while law enforcement professionals are still on the job. Key to rule of law is proper investigation of crime and collection of relevant evidence to support prosecution. This new law enforcement operational reality, safeguards for minimizing human interaction while conducting patrol and investigative operations, and processing of crime scenes and collection of evidence are complicated by possible contamination of subjects, environments, and evidence. This presents a range of both physical and legal considerations in balancing human safety in the face of a highly contagious biohazard with sustained operational efficacy. This webinar will examine these topics and provide information as to addressing these challenges.

Presented by:
Jim Emerson, NW3C
Robert Peters, Zero Abuse Project
Brandon Epstein, Middlesex County, NJ Prosecutors Office

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.


 

Webinar Fee: $0.00 per attendee




Smart, Clean and Actionable Data with Quick Data Analytic Reports in an Instant
Duration: 100 Minutes

Recorded April 8, 2020

This webinar will share insight gleaned from working with numerous professionals like yourself on how they migrated from manual and semi-manual data analytics to complete data analytic automation. The presenter will demonstrate methods of collecting data and then automatically extracting and visualizing the key elements using models like Flow of Funds and Financial Ratios. These models, and others available in ScanWriter, aid in quickly gaining insight into the records.

The presenter will demonstrate how ScanWriter can:

• Utilize automatic data capture technology for processing case documents.
• Organize and identify indicators of financial exploitation and its trends and patterns.
.• Perform quick data analysis to aid in additional investigation.
• Apply financial analysis best practices for fraud examiners.
• Recognize how data capture and analysis automation can help law enforcement   professionals prevent and resolve fraud, waste, and abuse.

Presented by Michelle Dulog, Personable Inc.

PLEASE NOTE: The Polling questions and 100 mins of viewing credit were only available for the live event. You will still receive an NW3C certificate for viewing 80 minutes of the On-Demand webinar.

This Webinar is sponsored by Personable Inc. NW3C is providing the webinar so that attendees can have more information with which to evaluate how this capability might add value to them and the organizations they serve. NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.


 

Webinar Fee: $0.00 per attendee




Surviving and Thriving in the Court Room
Duration: 90 Minutes

Recorded April 7, 2020

The essence of any good investigation, is the conviction of the person's responsible for committing those crimes. This Webinar will focus on testifying in court and the post arrest process in preparing for trial. This webinar will also focus on what to incorporate or not incorporate in your reports. We will discuss how to negate arguments made by defense counsel, how to testify, how to be more credible, how to prepare and ultimately set yourself up for success in any trial. Different types of court proceedings and strategies will also be discussed.

Presented by: John Pizzuro

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.


 

Webinar Fee: $0.00 per attendee




Investigators, Examiners, and Analysts Working Remotely: Police and Prosecutor COVID-19 Challenges and Opportunities
Duration: 75 Minutes

Recorded April 2, 2020

The ongoing efforts to mitigate the spread of COVID-19 have resulted in social distancing and even isolation of both the general population and public safety professionals.  This new remote workspace and workflow reality, safeguards for minimizing human interaction while accessing agency critical facilities, combined with cancellation of face to face training events has led to a range of challenges as well as presented a number of opportunities to identify new efficiencies and modalities for both operations and training both during this ongoing scenario and possibly beyond. This webinar will examine these topics and provide information as to addressing the challenges and benefiting from the opportunities.  

Presented by:
Christopher W. Kelly Director, Digital Evidence Laboratory, Commonwealth of Massachusetts, Office of the Attorney General. 

Richard Frawley Forensic Specialist, Certified Trainer, Certified Forensic Computer Examiner, ADF Solutions

Lt. Colonel James J. Emerson, USMC (Ret.), Vice President, National White Collar Crime Center 

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration


 

Webinar Fee: $0.00 per attendee




Coronavirus: Fighting Scams and Fraud During a Global Pandemic
Duration: 75 Minutes

Recorded April 1, 2020

This webinar is intended to inform law enforcement and criminal justice professionals about some scams and acts of fraud that are likely to be perpetrated during a pandemic.
In response to the rapid spread of the coronavirus, NW3C and the Regional Information Sharing Systems (RISS) recognizes the need for law enforcement training related to scams and fraud that are being used to exploit a pandemic.

The highly contagious COVID-19 has impacted our way of life as we know it. As international, federal, state, county, local, private organizations, and individuals work together in response to the coronavirus, there are scammers and fraudsters attempting to capitalize given the opportunity. These scammers and fraudsters are preying on the fear of the public and the unknown factors of the coronavirus while using tactics such as phishing attacks, malware, sale of counterfeit goods, investment fraud, and more.

This webinar will bring current information on identifying and responding to scams and frauds amidst a pandemic. Information from the U.S. Center for Disease Control (CDC) and World Health Organization (WHO) will be referenced throughout this webinar.

NW3C and the RISS Centers strive to provide law enforcement with information that can be used to identify, report, investigate, and prosecute high-tech and economic crimes. NW3C and RISS also recognize that the ability of law enforcement to share accurate information and resources with the public is critical for the prevention of scams and fraud. Therefore, in this webinar, relevant resources and websites will be shared to present accurate information that will help identify, respond, and prevent the scams and fraud that have surfaced during this pandemic.

Presented by: NW3C Staff

Webinar Fee: $0.00 per attendee




Using OSINT to Track Suspicious Cryptocurrency Activity
Duration: 90 Minutes

Recorded March 31, 2020

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Investigators face a great challenge in finding cryptocurrency wallets’ footprints across the web and understanding who may be behind it. The webinar will focus on tracking those digital footprints on all levels of the internet, using advanced OSINT technologies, tying malicious activities to networks of harmful individuals. By utilizing processes that involve Artificial Intelligence, including NLP (Natural Language Processing) and OCR (Optical Character Recognition), mentions of crypto wallets, be it in posts, images, or more, used for criminal and terrorist activities can be identified and flagged. The use of a proprietary deep crypto-wallet analysis can also visualize the values, growth, and interactions of these wallets across time. We will demonstrate the use of OSINT solutions as we conduct quick and comprehensive searches, deep analyses, and assess real-time threats to track the wallet’s presence and identity across the open, deep and dark web.

Presented by:
Johnmichael O'Hare
Arieh Ben-Am

This Webinar is sponsored by Cobwebs Technologies NW3C is providing the webinar so that attendees can have more information with which to evaluate how this capability might add value to them and the organizations they serve. NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Of Eggplants and Umbrellas: The Legal and Investigative Implications of Emojis
Duration: 90 Minutes

Recorded March 25, 2020

This webinar, presented by cyber crime attorneys and a former prosecutor, discusses investigative uses of emojis, particularly in the context of child exploitation, and the legal context of this growing medium, including current case law and implications for practice.

Presented by: Matthew Osteen, NW3C, Robert Peters, Zero Abuse Project,
Alicia Loy, NW3C

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




The Neurological and Psychological Elements of Victims, Witnesses and Suspects
Duration: 90 MInutes

Recorded March 4, 2020

This Webinar will focus on how the advent of technology and neuroscience has impacted victims and made them more vulnerable to the criminal element. We will go over the psychological aspects of criminal mindset as well as the investigators mindset in order to set them up for success. This Webinar will focus on the understanding of Human Behavior, what to look for how to understand people and influence your outcome.

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee




Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
Duration: 90 Minutes

Recorded March 2, 2020

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each other. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And, they increasingly choose to use platforms that make this communication openly available for others to view. This means that evidence associated with not just metadata, but also content of communications can often be collected through open sources long after the communication is completed.

While evidence of criminality and victimization can be recovered through open source investigative techniques, many of the commercial tools marketed to criminal investigators and analysts are expensive. This sometimes places them outside the reach of police departments. And, social media companies are increasingly blocking API connections for commercial tools that allow the tools to be used for, “surveillance”. For these reasons, it is increasingly important for criminal investigators and analysts to build an inexpensive cyber-OSINT toolbox.

This Webinar will discuss the rapidly evolving ecosystem of online social media and how people are changing how they choose to communicate. It will then detail and demonstrate free and inexpensive cyber-OSINT tools that criminal investigators and analysts can use to start build a cyber-OSINT toolbox.

Presented by: Chuck Cohen, NW3C

Webinar Fee: $0.00 per attendee




Checkm8 & CheckRa1n: New Tools for iOS Extractions
Duration: 75 Minutes

Recorded February 20, 2020

If anything about mobile forensics could be considered buzzworthy in the past year, it would be the release of the Checkm8 Boot ROM exploit created by axi0mX in October. Allowing critical access to 11 generations of iPhones and iDevices, checkm8 is a new opportunity to access data previously locked behind a secure wall. But beyond the hype, what data can you actually access using this newfound exploit, and what do you do once you’ve extracted data using Checkm8?

In this webinar, we will discuss the benefits, challenges and the utility of Checkm8 and Checkra1n to mobile forensic examiners and investigators. We will also explore how examiners can use Checkra1n to gain access to devices and what that access means in practical terms for your investigations.

Presented by:
Chris Atha, NW3C
Greg Masterson, MSAB

Webinar Fee: $0.00 per attendee




What Might Your Forensic Acquisitions Be Hiding?
Duration: 60 Minutes

Recorded February 6, 2020

The process of acquiring forensic images is well understood, and the industry has never been better equipped for the analysis. However common practices are set to fail, and analysis may be missing malware and indicators of compromise. This webinar will highlight short comings in commons methods and provide a framework for an improved approach; to allow for more efficient and thorough investigations.

Presented by Chris Atha, High Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Counterfeit Goods: Money Laundering in Plain Sight
Duration: 90 Minutes

Recorded February 5, 2020

The sale of counterfeit goods may be thought of as a relatively harmless crime, when in reality production, sale, and distribution of counterfeit goods represents money laundering, corruption, fraud, human trafficking, sanctions evasion, and terrorist finance. Much like the sale of illegal narcotics, the production, distribution, and sale of counterfeit goods can yield hundreds of billions of dollars every year. As a result, transnational and localized organized crime groups are involved at every step of the operation. This session will highlight the risks involved with the sale of counterfeit goods, as well as the illicit actors involved, and how these goods make their way into the stream of commerce. This session will explain the nexus between organized criminal activity and the sale of counterfeit goods, while drawing sharp correlations to traditional anti-money laundering controls. Attendees will learn the risk indicators of the sale of counterfeit goods, as well as how to use open source databases to enhance due diligence searches for potential vendors linked to the sale of counterfeit goods. The session will provide recommendations on how to leverage analytics and gap analysis to further detect potentially high-risk customers, products, and transactions.

Presented by: Michael Schidlow, Scienter Group

Webinar Fee: $0.00 per attendee




Overview of NW3C
Duration: 60 Minutes

Recorded January 30, 2020

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will provide an overview of NW3C to all of the Law Enforcement Coordinators throughout the United States.

Presented by:
Jeff Lybarger, Director of Training & Curriculum Development, NW3C
Tyler Wotring, Director of High-Tech Initiatives, NW3C

Webinar Fee: $0.00 per attendee




Gas Pump Skimming
Duration: 75 Minutes

Recorded January 23, 2020

The webinar will discuss the anatomy of gas pump skimming from the manufacturing of the skimmers to laundering of the proceeds. The instructor will discuss the various types of skimmers, how the card numbers are harvested as well as the various methods of cashing out.

Presented by: Jasen Wells

Webinar Fee: $0.00 per attendee




What some BODY is saying, through their body language
Duration: 75 Minutes

Recorded January 14, 2020

Have you ever wondered what people are saying through their body language? This Webinar will focus on nonverbal behavior and one's ability to "read" people. This Webinar will enhance your ability to decode emotions and behaviors and look for deceptive behaviors. You will also learn how your body language can influence what others around you think.

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee




Dark Web and Open Source Information Primer
Duration: 90 Minutes

Recorded November 14, 2019

A primer on the dark web and information available on the internet from free sources that can help investigators as they work to solve almost all types of cases.

Presented by: Casey Bohn, High-Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Office 365 Forensics and Business Email Compromises
Duration: 60 Minutes

Recorded November 13, 2019

This webinar will discuss the types of evidence that should be collected in a response to a business email compromise/ Office 365 email investigation. Methods of email compromise (phishing, malware, brute force attacks, external compromise/credential stuffing),Types of data at risk and commonly seen schemes.

Evidence Collection and Analysis
•Review of the Office 365/ Azure Admin Centers
•Collecting evidence from Office 365 (logs, rule/forwarding/ Sharepoint/Onedrive data)
•Extracting mailboxes with the Office 365 eDiscovery tool.
•Analyzing and interpreting the types of log data available in Office 365
•Steps to secure the Office 365 environment during an incident

Presented by: Adam Hart, Associate Principal-Forensic Services, Charles River Associates

Webinar Fee: $0.00 per attendee




Cloud Combat: Debating Law Enforcement Access to Overseas Data
Duration: 90 Minutes

Recorded November 7, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Two attorneys clash in this heated exchange on whether, and how, law enforcement can obtain evidence stored electronically overseas. A former prosecutor and a high-tech crime attorney square off in several rounds of debate. Each round involves a hypothetical that incorporates relevant, cutting-edge evidentiary questions including overseas servers, CLOUD Act considerations, space-based data storage, and pertinent international law.

Presented by: Robert Peters, Senior Cyber and Economic Crime Attorney, NW3C & Matt Osteen, Cyber and Economic Crime Attorney, NW3C

Webinar Fee: $0.00 per attendee




Case Study: Methods to Detect Forged Documents
Duration: 60 Minutes

Recorded October 15, 2019

Digital evidence has become an essential part of every legal matter, whether it be a criminal, civil or internal investigation. Using a case study, this session will demonstrate the methods used to determine that an email submitted as evidence in federal court had been forged. The methods demonstrated in this case study may be reliably referenced when reviewing any questionable digital documents, without the need for specialized software. This presentation will demonstrate the probative value of digital forensics in fraud investigations.

You Will Learn How To:

• Recognize the value of digital forensics in fraud cases.
• Identify methods to examine digital files and metadata.
• Determine how to make and report on evidence-based
  conclusions.
• Recall a practical example of how these methods were applied.

Presented by: Matt Danner

Webinar Fee: $0.00 per attendee




The Tables Have Turned: Igniting the Power of Survivors in Abuse Investigation and Prosecution
Duration: 90 Minutes

Recorded October 9, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

A former Prosecutor and an abuse survivor who wore a wire and recorded the perpetrator’s confession share their investigative tips, best practices for interacting with survivors, and trial strategies to dismantle the power dynamics of perpetrator and victim. Learn approaches to maximize case outcome and strength of survivors throughout the entire investigative process.

Presented by: Robert Peters, Senior Cyber and Economic Crime Attorney, NW3C &
Amber Higgins, Educational Initiatives Liaison, SHIELD Task Force

Webinar Fee: $0.00 per attendee




Through the Looking Glass: Protecting Yourself While Conducting Internet-Based Investigations
Duration: 75 MInutes

Recorded October 3, 2019

“Through the looking glass” is a metaphorical expression meaning: on the strange side, in the twilight zone, or in a strange, parallel world. While the internet can be considered a strange, parallel world, it can also be an informative, interesting, yet scary place when conducting different types of investigations. There are various technologies and methods that you can use to protect your identity and information while conducting internet-based investigations. This session will illustrate these technologies and methods to keep you safe when investigating online.
 
You Will Learn How To:
 
• Identify the methods criminals use to find your data.
• Compare various technologies and software tools to protect your identity while  investigating online.
• Examine various methods to employ to hide your own tracks.

Presented by: Ryan Duquette, Partner, Security and Privacy Risk Consulting

Webinar Fee: $0.00 per attendee




The Truth About the Dark Web Fraud Trade
Duration: 60 Minutes

Recorded October 1, 2019

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. What is the dark web fraud economy? What drives it? What can we do about it?

Presented by: Emily Wilson, VP of Research Terbium Labs

Webinar Fee: $0.00 per attendee




Mindhunters: Exploiting Offender Psychology in Proactive Operations and Abuse Investigations
Duration: 90 Minutes

Recorded September 26, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Learn psychological insights and practical strategies to exploit Internet sex offender dynamics. Discover how to apply the behavioral profiles of solicitation and child pornography offenders in a variety of settings, including while conducting proactive operations or pretext phone calls, crafting undercover personas and interviewing perpetrators. This webinar will also address how to attack sex offender risk assessments, with perspectives from prosecution and forensic psychology.

Presented by:
Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C
Joseph Remy, Assistant Prosecutor, Burlington County Prosecutor’s Office
Dr. Timothy Saar, Owner/Psychologist, Saar Psychological Group, PLLC

Joseph Remy, Assistant Prosecutor, Burlington County Prosecutor’s Office

Webinar Fee: $0.00 per attendee




How to Convict a Child Pornographer
Duration: 90 Minutes

Recorded September 12, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.


The investigation and prosecution of child pornography has exponentially increased nationwide in recent years, while tactics utilized by online sexual offenders continue to evolve and adapt with emerging technology. This webinar will focus on several key aspects of obtaining convictions, including practical investigative considerations, establishing perpetrator identity, utilizing prior bad acts evidence, countering common defense strategies, and communicating the severity of these egregious offenses to judges and juries.


Presented by Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C and Chief Craig Corkrean, Granville Police Department

Webinar Fee: $0.00 per attendee




Zip File Forensics
Duration: 60 Minutes

Recorded August 21, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

We will review the effects that various Zip programs have on date time stamps, understand the cause of that effect and dive deep into the internal structure of a Zip archive. Attendees will learn how to manually carve zip file elements, edit the structure as necessary to combine the carvings into a single viable zip file.

Presented by: Blazer Catzen

Webinar Fee: $0.00 per attendee




NW3C’s Utility Suite: What is it, and how can it help in your investigations
Duration: 60 MInutes

Recorded August 20, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

During this webinar we will be discussing the tools included within the NW3C Utility Suite. What they do, how they work, and how they can help in your investigations. The tools that will be discussed include: Quick Hashing Utility, Batch Hashing Utility, Hex Viewer, Date/Time Utility, Recycle Bin Parser, SQLite Extraction Utility, and USN Journal Converter. These tools are available to Law Enforcement as a free download from NW3C’s website.

Presented by: Justin Wykes,High-Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Traumatic Cases and Events: How to Become Resilient and Move Forward
Duration: 90 Minutes

Recorded July 23, 2019

This webinar is meant for individuals who are looking to build resiliency to combat the effects of trauma. Traumatic events can set your life on one course or another. These events occur frequently in the course of investigations and working with child exploitation cases. Rather than allow these events to define us or take us over, learn how to recognize different types of trauma through warning signs and become aware of the impact it has in not only your life but those around you. Throughout this webinar you will also learn how trauma is encoded within your body and how through simple techniques you limit the impact trauma has on our lives. You will also learn how to reframe any situation for your benefit. You will learn tools on how to shift your mind to not only overcome and situation but also thrive. Take charge of your feelings, life and outcome!

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee




Busting Bitcoin Bandits
Duration: 60 minutes

Recorded July 18, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

An underground movement of hackers is taking over victim telephones and draining their financial accounts!  In the past 12 months, a California high tech task force named REACT has identified more than 800 victims and nearly $50 million in losses of cash and cryptocurrency.  Please join Santa Clara County Prosecutor Erin West and DA Investigator David Berry as they explain this phenomenon known as “sim-swapping” and detail how the hackers are able to access phones, hijack social media, and ultimately steal millions of dollars.  We will take a look at this new class of criminals and identify ways to protect ourselves against this growing crime wave.

Presented by:
Erin West, Prosecutor, Santa Clara Prosecutors Office
Caleb Tuttle, Detective, Santa Clara Sheriff's Office 

Webinar Fee: $0.00 per attendee




Phishing to Laundering: From Clicks to Cash-Out
Duration: 75 Minutes

Recorded June 19, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

It is widely acknowledged that Phishing is responsible for >90% of breaches occurring today. Basic phishing primarily exploits human behavior to entice a victim to ‘click the link’ or ‘open the attachment’ thus often handing over to the criminal the golden nugget – valid access credentials. While we are all taught not to click or open the attachment, the scheme is still highly successful and profitable. In fact, recent reporting indicates that regardless of the amount of training provided, organizations will likely see at least 4% of their workforce click on a link thus resulting in some sort of compromise.

During this webinar, a panel of NCFTA experts will explain how phishing campaigns are conducted; from developing a “phish kit”, to weaponizing a botnet for delivery, using any stolen credentials for financial gain, then laundering millions of dollars all over the world to fund their lavish lifestyles at your expense, etc.

Presented by:
Kyle Hettinger, Training Coordinator and Senior Intelligence Analyst, NCFTA
Taylor Transue, Cyber Intelligence Analyst, NCFTA
Owen Nearhoof, Cyber Intelligence Analyst, NCFTA

Webinar Fee: $0.00 per attendee




Being Mickey in a Goofy World: Understanding User Attacks
Duration: 60 Minutes

Recorded June 5, 2019

Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation he will walk through the various attacks, including email, social media, and in person. Using various war stories, he will explain how the attacker views the user and what they do to increase the success rate of these attacks.

Presented by: Kevin Johnson, Secure Ideas

Webinar Fee: $0.00 per attendee




ScanWriter: Dynamic Data Analytic Skills With Intuitive Data Presentations
Duration: 100 Minutes

Recorded May 16, 2019

This second session of Personable’s ScanWriter will demonstrate the newest features and capabilities of the program’s data capture and data analytics functions, to include:

• Automated integration of various data elements captured from bank records, check  images, deposit   slips, credit card statements, phone records, etc.

• Automated categorization, transformation, and exporting of financial records into meaningful business models for lead generation, investigative guidance, and analysis.

• Introduction to ScanWriter’s data analytics tools for modeling including flow of funds, all transactions, Benford’s Law, Beneish’s M-score, phone records analysis, and financial ratios model.

Presented by: Michelle Dulog, Personable Inc.

If you missed the first event ScanWriter: Smart, Clean and Actionable Data in an Instant, simply click here to register and watch it prior to this next event.

Webinar Fee: $0.00 per attendee




Law Enforcement Investigations on the Darknet: Case studies from the co-founder of the Tor Project
Duration: 75 Minutes

Recorded May 9, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

In this webinar, Andrew Lewman will share and explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. Using these real-world, darknet-based examples that have been selected for a law-enforcement based audience, Andrew will walk-through examples of different methodologies law enforcement can use to de-anonymize threat actors, the different tools and approaches one can take to conducting these types of investigations, best practices, lessons learned, and more.

Webinar Fee: $0.00 per attendee




Leveraging Partnerships and Avoiding Multi-Agency Pitfalls
Duration: 90 Minutes

Recorded May 7, 2019

Have you ever wished that everyone was in the same boat as you, and more importantly rowing in the same direction? Today we live in a global society which consists of various teams and departments working with and against each other.  We face individual and institutional challenges that sometimes inhibit our ability to succeed. Investigations today, comprise public, and private entities, investigators from different departments, attorneys, and others that can impact your investigation or goals. This webinar will teach students the art of leverage and how to maintain, develop and execute partnerships that will provide long term success. True success comes when you are able to maintain partnerships and rely on each other for that success. This webinar will provide students with strategies used by some of the most successful fortune 500 companies. Students will be able to implement these strategies directly to their teams and their investigations. This webinar will give them insight on how to develop relationships and leverage people in order to be more efficient and provide them with lasting success.

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee




Seven Samurai: Understanding Attacks to Drive Defenses
Duration: 60 Minutes

Recorded May 2, 2019

This presentation uses war stories from decades of working in IT and security to explore the attacks we see today.  Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today.  These stories will explain how the attack was performed and why an attacker would take that direction.

Presented by: Kevin Johnson, Secure Ideas 

Webinar Fee: $0.00 per attendee




Removing Your Personal Identifying Information
Duration: 90 Minutes

Recorded April 30, 2019

Everyone is at risk for identity theft, online and physical stalking, and harassment. Beyond social media, your public records are for sale, so your home address and assets are easily located through simple online searches. This course provides a through description of how and where your data is stored and how to remove it.

In this introductory hands-on class, participants will review a case study detailing how a fraudulent and nefarious actor obtains personal identifying information and how it can be used against you. You will learn “Opt Out” procedures for public service and security personnel and explore the tools and methodologies used to operate discreetly on the Internet. Upon completion of the class, field investigators will be able to identify how private lives and public information are available through websites, social networks, and “Invisible Web” sources; and will have the ability to protect their privacy by implementing basic security practices online, at home, and on social media.

Presented by: Cynthia Hetherington, Hetherington Group

Webinar Fee: $0.00 per attendee




Investigating Terrorist Financing with Chainalysis Reactor
Duration: 60 minutes

Recorded April 24, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Terrorist organizations are using cryptocurrencies as a new way to raise funds and facilitate operations. This poses a challenge to both public and private sector organizations, but also creates a new opportunity for lead development centered on blockchain data. This webinar will review an analysis of recent cases of terrorist organizations using Bitcoin, provide an overview of Chainalysis data and the Reactor software solution and speak to the future of terrorist financing through cryptocurrency and how to stop them.

Presented by: Collin Almquist, Chainalysis

Webinar Fee: $0.00 per attendee




Cybercrime Basics: Investigation and Prosecution of Credit Card Fraud
Duration: 90 Minutes

Recorded April 9, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will cover credit card fraud and identity theft from initial investigative steps to arrest and prosecution. The presenters will discuss how to identify points of compromise including low hanging fruit, skimmers and indicators of malware. Specifics regarding point of infection, log analysis, and signature analysis will be covered as well as charges, pleas, grand jury and trial considerations along with post-conviction steps.

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C

Webinar Fee: $0.00 per attendee




Blockchain Tracing: Cryptocurrency Anti-Money Laundering and Financial Investigation Workshop
Duration: 90 minutes

Recorded March 28, 2019

CipherTrace’s cryptocurrency anti-money laundering and financial investigation Webinar provides hands-on instruction on blockchain and blockchain tracing. Attendees will learn a risk-based approach to tracing source of blockchain funds and de-anonymizing cryptocurrency transactions with cryptocurrency forensic tools. They will develop and hone digital forensic investigation techniques. The course will equip participants with an understanding of cryptocurrency fundamentals and the specific understanding of tracing cryptocurrency transactions. Improve the efficiency and effectiveness of blockchain forensic investigations by learning how to best leverage tools and resources to reduce investigation time and improve information yield. CipherTrace provides the infrastructure to enable secure, verifiable and legal commerce for cryptocurrency markets.

Presented By:
Pamela Garner, Director of Forensics and Training, CipherTrace
Paul Reyff, Vice President of Sales, CipherTrace

Webinar Fee: $0.00 per attendee




Cognitive Interviewing & Courtroom Testimony
Duration: 90 minutes

Recorded March 6, 2019

Have you ever wanted to communicate more effectively? Relate better to the jury while testifying? Be more successful and obtain more information while interviewing? This webinar will give participants techniques and insight on how to employ cognitive interviewing skills to interview suspects, witnesses, and victims.  Participants will gain a better understanding of human behavior as it relates to neuroscience and become more effective in obtaining information and having suspects, witnesses and victims cooperate. Participants will be able to understand linguistics and language, interpret body language, and how to gain rapport with a jury and handle cross-examinations more effectively while testifying.

Webinar Fee: $0.00 per attendee




Cybercrime Basics for Prosecutors: From the Cloud to Seizing the Device
Duration: 90 minutes

Recorded March 13, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will define what cybercrime is and its sources of evidence. The Electronic Communications Privacy Act (ECPA) will be covered to include preservation letters, content versus non-content, when process gets rejected, precluding versus delayed notice, and the Cloud Act. California’s new General Data Protection Regulation (GDPR) law passed earlier this year will be discussed. The presenters will explore using traditional investigative methods and when to seize a device and when to search a device. Lastly, what are the cybercrime defenses one can expect to be argued?

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Thomas Huynh, Deputy Attorney General, NJ Office of the Attorney General

Webinar Fee: $0.00 per attendee




Mobile Extractions + Power Analytics: Using XRY and PLX Together to Solve Your Investigations
Duration: 60 minutes

Recorded February 26, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

In most investigations today mobile phone data is one of the most critical sources of evidence. The reasons are clear, given the volume and variety of data in today’s smart phones and the depth with which our mobile devices capture our activities. This presentation will focus on what types of data can be recovered from mobile devices using XRY and how to then export that data into PLX. You will learn how PLX can then help you swiftly organize, analyze, and dissect the many different sources of information you have, including mobile device data, in one easy to use platform.

Presented by:
Kaitlyn Ziola, PenLink
Jacob Hulsey, Director of Customer Success, MSAB

Webinar Fee: $0.00 per attendee




Understanding Cellular Intercept
Duration: 60 minutes

Recorded February 13, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

TrustComm provides cellular intercept capabilities to the field. This webinar will be an introduction to this type of technology, how it works and how it supports law enforcement, military and first responders in meeting the mission.

Presented by: Ian Canning COO, TrustComm

Webinar Fee: $0.00 per attendee




Emerging Legal Issues in Tech: From the Cloud Act to Hacking Back
Duration: 90 minutes

Recorded February 5, 2019

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will discuss the following topics:

• The Cloud Act
• Border Searches of Technology
• Right to be Forgotten
• Revisions to Federal Rules of Evidence
• Hacking Back and the Law
• Compelled Decryption

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Thomas Huynh, Deputy Attorney General, NJ Office of the Attorney General

Webinar Fee: $0.00 per attendee




ScanWriter: Smart, Clean and Actionable Data in an Instant
Duration: 100 minutes

Recorded January 24, 2019

This webinar will demonstrate the features and capabilities of the latest version of Personable’s ScanWriter tool as well as integration with Microsoft’s Power BI. ScanWriter automates manual data entry from any electronic document which improves productivity and efficiency.

Webinar Fee: $0.00 per attendee




The Benefits of Triage: How to Quick Start Your Digital Investigation
Duration: 90 minutes

Recorded January 15, 2019

Learn the art of digital forensic triage- how to conduct an initial investigation quickly based on the scope of the investigation you are about to conduct. If 90% of cases can be solved with 10% of the data, let's get to that point early and make decisions on the need for further deep dive, due diligence, or peace of mind examination of devices based off facts. Join ADF Digital Forensic Specialist and Trainer, Rich Frawley, as he leads participants through a typical investigation to demonstrate the speed, accuracy, and best practices for using triage in the field or in the lab.

Webinar Fee: $0.00 per attendee




Law Enforcement Cyber Center: A Valuable Resource for Investigators
Duration: 60 minutes

Recorded December 13, 2018

The Law Enforcement Cyber Center (LECC) was developed to enhance the awareness, expand the education, and build the capacity of justice and public safety agencies to prevent, investigate, prosecute, and respond to cyber threats and cyber crimes. It is intended to be a national resource for law enforcement and related justice and public safety entities. During the webinar, participants will review the website and learn about the many valuable resources that can be utilized.

The Law Enforcement Cyber Center is a collaborative project between the National White Collar Crime Center (NW3C), the International Association of Chiefs of Police (IACP), the Police Executive Research Forum (PERF), and is funded through the Bureau of Justice Assistance.

Presented by: Jeff Lybarger & Josh Santy, NW3C

Webinar Fee: $0.00 per attendee




Introduction to FinCEN
Duration: 90 minutes

Recorded November 15, 2018

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar is intended as a Financial Crimes Enforcement Network (FinCEN) overview. It will include information on products and services, Bank Secrecy Act records and information, and how FinCEN is used in investigations.

Presented by: James Emery, FinCEN

Webinar Fee: $0.00 per attendee




Aerial Data: Introduction to Drone Investigations
Duration: 90 minutes

Recorded November 18, 2018

With applications from aerial photography to racing to delivery services, drones are becoming more and more popular in both commercial and recreational spaces. Criminal use of drones is also increasing, and drone forensics is quickly becoming an important subfield of digital forensics. This presentation introduces the history of drones and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones. Topics include gathering evidence both internal and external to the drone, as well as methods for manually processing flight logs and displaying data in Google Earth.

Presented by: Jerry Jones, NW3C

Webinar Fee: $0.00 per attendee




Bio Hacking: Brain-Based Interviewing, Communication, & Leadership
Duration: 90 minutes

Recorded June 12, 2018

This webinar will provide attendees with a basic knowledge of Neuro Linguistic Programming and other cognitive techniques to aid in interviewing suspects, witnesses, and victims. This webinar will help individuals be a more effective communicator and leader, giving the attendees greater insights and understanding on how to get people to do what they need.

Presented by: John Pizzuro, CEO, John Pizzuro Speaking & Consulting

Webinar Fee: $39.00 per attendee