Live Webinars


COVID-19 Considerations for Collecting and Handling Digital Evidence
Thu, Apr 09, 2020 1:00 PM Eastern
Duration: 75 mins

The ongoing efforts to mitigate the spread of COVID-19 have resulted in social distancing of the general population while law enforcement professionals are still on the job. Key to rule of law is proper investigation of crime and collection of relevant evidence to support prosecution. This new law enforcement operational reality, safeguards for minimizing human interaction while conducting patrol and investigative operations, and processing of crime scenes and collection of evidence are complicated by possible contamination of subjects, environments, and evidence. This presents a range of both physical and legal considerations in balancing human safety in the face of a highly contagious biohazard with sustained operational efficacy. This webinar will examine these topics and provide information as to addressing these challenges.

Presented by:
Jim Emerson, NW3C
Robert Peters, Zero Abuse Project
Brandon Epstein, Middlesex County, NJ Prosecutors Office

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.


 

Webinar Fee: $0.00 per attendee




Financial Crimes Against Seniors - Part 1
Mon, Apr 13, 2020 1:00 PM Eastern
Duration: 90 Minutes

A collaborative project of NW3C and the Elder Justice Initiative, this webinar is the first in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

•Overview of Elder Abuse and Financial Exploitation
•Types of Abusers
•Scams Targeting Seniors

Presented by: Leann D. Pritt, CFE, NW3C


 


Webinar Fee: $0.00 per attendee




Cyber Threat Intelligence for Investigators
Wed, Apr 15, 2020 1:00 PM Eastern
Duration: 75 Minutes

The ongoing efforts to respond to the array of COVID 19 Internet threats have resulted in aggressive and focused work by the cybersecurity community in concert with Law Enforcement. Collaboration and human information sharing is many times less than adequate in keeping pace with this cyber threat landscape.  Cyber Threat Intelligence requires automation, application of large data, and machine speed information sharing.  While much of this intends to result in mitigation and cybersecurity solutions, a look under the hood immediately depicts many opportunities to support and enhance a range of cybercrime as well as cyber enabled crime investigations. This webinar will examine these topics and provide information as to benefit from these Cyber Intelligence Efforts to support your investigations.

Presented by:
Stacy Wright Director of Partnerships,Multi-State Information Sharing and Analysis Center
Jim Emerson Vice President, NW3C

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




What Investigators Need to Know about Hiding on the Internet: Proxies and VPNs
Thu, Apr 16, 2020 1:00 PM Eastern
Duration: 90 Minutes

Criminal investigators and analysts need to understand how it is possible for people to conceal and obfuscate their identity and location on the Internet.  Two primary methods are through the use of proxies and virtual private networks (VPNs).  This ability to hide one’s identity and location on the Internet can be both a challenge and an opportunity.  Various methods of concealing identity and location, while engaged in activates on the Internet, provides an opportunity for investigators to engage in covert online research while also providing a means for criminals to engage in surreptitious communication in furtherance of nefarious activities.  As technologies, such as digital device fingerprinting, emerge as ways to attribute identity this becomes a topic about which every investigator and analyst must become familiar.

This Webinar will include an overview of how the Web was designed and functions.  A basic overview of IP fingerprinting, browser/software fingerprinting, and device fingerprinting will set the stage for a deeper dive into proxies and VPNs—two of the most common methods used both by criminals and criminal investigators to conceal their identities and locations while engaging in online social networking and online communication. 

Presented by: Chuck Cohen, NW3C

Webinar Fee: $0.00 per attendee




Financial Crimes Against Seniors Part 2- Investigations and Resources
Mon, Apr 20, 2020 1:00 PM Eastern
Duration: 90 Minutes

A collaborative project of NW3C and the Elder Justice Initiative, this webinar is the second in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Investigating the crimes
• Resources for investigators
• Creating an investigative plan

Presented by: Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee




Building Your Capture The Flag Tool Kit
Thu, Apr 23, 2020 1:00 PM Eastern
Duration: 75 Minutes

NW3C offers daily Capture The Flag (CTF) Challenges at https://nw3.ctfd.io/ .  Challenges are designed to help forensic examiners hone, refine, and practice their skills.  The CTF scoreboard encourages friendly competition. Solution videos are  available following the challenge conclusions. 
 
This webinar will provide information on developing a forensic toolkit not only to help solve CTF challenges, but also to help with real-word challenges.  Webinar attendees will receive a manifest of software shown in the video, and a special webinar viewer only challenge, on which they can test their new toolkit.  

Presented by: Chris Atha, NW3C


 

Webinar Fee: $0.00 per attendee




Financial Crimes Against Seniors Part 3 - Response, Prosecution, and Prevention
Mon, Apr 27, 2020 1:00 PM Eastern
Duration: 90 Minutes

A collaborative project of NW3C and the Elder Justice Initiative, this webinar is the third in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

• Responding to a senior call
• Prosecuting elder exploitation
• Promoting awareness and prevention

Presented by: Leann D. Pritt, CFE, NW3C

Webinar Fee: $0.00 per attendee




Follow the Money: FinCrime Investigation Case Studies
Tue, Apr 28, 2020 1:00 PM Eastern
Duration: 90 Minutes

Money laundering is a global, trillion-dollar crime that extends into all areas of commerce. The reality is that money laundering isn’t just a standalone crime, it is also a symptom of additional crimes which generate illicit proceeds. Whether due to lone wolf criminals, or as the result of transnational organized crime, or international corruption, money laundering can be challenging to prove as both a factual matter and as part of a criminal prosecution.

This learning session will outline not only the essential elements of a criminal case of money laundering, but also examine how additional charges can be brought to flush out the elements of that charge. Learners will get a better understanding of the prosecutor’s approach to money laundering (and its related crimes), as well as tools to follow the transactions that can substantiate such a charge. By moving from the academic to applied subject matter, learners will get deep insight into how to both trace illicit assets, as well as how to prepare their findings for criminal cases. The webinar will rely on real-world examples of financial crime, and explain how cases like those can be further built out by investigators, analysts, and compliance officers.

Presented by Michael Schidlow, Scienter Group

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Why’d it have to be snakes?: Python Programming for Law Enforcement Part 1
Wed, Apr 29, 2020 2:00 PM Eastern
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Part 1 of a 4 Part Series

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst’s repertoire. Python for Law Enforcement is a four-part webinar series that is geared for law enforcement. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day-to-day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

Session 1
• Intro • Problem Statement (Example: Data format different)• Programming Language
• Analyzing data• Automating processes• What is Python• Law enforcement software that uses Python• IDE• Versions• Resources• Python Docs• W3 Schools• Forums• Questions

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Presented by: Jasen Wells, FDLE

Webinar Fee: $0.00 per attendee




Why’d it have to be snakes?: Python Programming for Law Enforcement Part 2
Wed, May 06, 2020 2:00 PM Eastern
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Part 2 of a 4 Part Series

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst’s repertoire. Python for Law Enforcement is a four-part webinar series that is geared for law enforcement. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day-to-day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

Session 2
• Psuedo-code• Syntax• Comments• Variables• Global variables• Data types/type casting• Logic/Boolean• Operators• Lists• If/else• Switch• Coding Example• Questions

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Presented by: Jasen Wells, FDLE

Webinar Fee: $0.00 per attendee




The Art of Social Engineering: How to understand and use it as a tool for proactive investigations
Thu, May 07, 2020 1:00 PM Eastern
Duration: 90 Minutes

Our online world and the use of electronic devices have led to most of our interactions in the online world. Technology contributes to people’s perception of things being real when they are not.This has enabled people to be manipulated through the Art of Social Engineering.

This webinar will delve into the science of Social Engineering and explain how people get manipulated. We will also talk about how Social Engineering in proactive investigations to engage suspects and have them unwittingly provide you information and more importantly evidence that can be used for your investigations.

Presented by: John Pizzuro


NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Why’d it have to be snakes?: Python Programming for Law Enforcement Part 3
Wed, May 13, 2020 2:00 PM Eastern
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Part 3 of a 4 Part Series

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst’s repertoire. Python for Law Enforcement is a four-part webinar series that is geared for law enforcement. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day-to-day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

Session 3
• While loop• For loop• Break/continue• Coding Example• Functions• Inheritance
• Modules• Coding Example• Print• Userinput• Conditional statements• Coding Example • Questions

Presented by: Jasen Wells, FDLE

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

 

Webinar Fee: $0.00 per attendee




Collecting Advertiser ID Evidence in Criminal Investigations
Tue, May 19, 2020 1:00 PM Eastern
Duration: 60 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Many mobile phone users choose to share Advertiser ID information with app developers and social media companies. This includes precision handset geolocation information. Advertiser ID handset geolocation information is separate and distinct from handset geolocation information collected by cellular carriers, by Google for Android OS devices, or on iOS handsets in Significant Locations. Commercially available Advertiser ID information can be used during criminal investigations to determine if a handset was at multiple crime scenes near the times of those crimes and to determine specific locations where a handset was previously located. This Webinar will discuss Advertiser IDs, show where Advertiser ID controls are located on iOS and Android OS handsets, outline investigative use and considerations, and detail specific instances when evidence collected from commercially available Advertiser ID information was used during the investigations of serious crimes.

Presented by: Chuck Cohen, NW3C & Mark Massop, Fog Data Science

This Webinar will NOT be available On-Demand.


NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

 


 

Webinar Fee: $0.00 per attendee




Why’d it have to be snakes?: Python Programming for Law Enforcement Part 4
Wed, May 20, 2020 2:00 PM Eastern
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Part 4 of a 4 Part Series

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst’s repertoire. Python for Law Enforcement is a four-part webinar series that is geared for law enforcement. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day-to-day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

Session 4
• Classes/objects• I/O• Reading file• Writing file• Append• Closing file• Coding Example• imports libraries• CSV library• CSV Example• Coding Example• Random name• RegEx• Coding Example• MySQL Connector• Built-In Functions• Questions

Presented by: Jasen Wells, FDLE

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

 

Webinar Fee: $0.00 per attendee


On-Demand Webinars


Surviving and Thriving in the Court Room
Duration: 90 Minutes

The essence of any good investigation, is the conviction of the person's responsible for committing those crimes. This Webinar will focus on testifying in court and the post arrest process in preparing for trial. This webinar will also focus on what to incorporate or not incorporate in your reports. We will discuss how to negate arguments made by defense counsel, how to testify, how to be more credible, how to prepare and ultimately set yourself up for success in any trial. Different types of court proceedings and strategies will also be discussed.

Presented by: John Pizzuro

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.


 

Webinar Fee: $0.00 per attendee




Investigators, Examiners, and Analysts Working Remotely: Police and Prosecutor COVID-19 Challenges and Opportunities
Duration: 75 Minutes

The ongoing efforts to mitigate the spread of COVID-19 have resulted in social distancing and even isolation of both the general population and public safety professionals.  This new remote workspace and workflow reality, safeguards for minimizing human interaction while accessing agency critical facilities, combined with cancellation of face to face training events has led to a range of challenges as well as presented a number of opportunities to identify new efficiencies and modalities for both operations and training both during this ongoing scenario and possibly beyond. This webinar will examine these topics and provide information as to addressing the challenges and benefiting from the opportunities.  

Presented by:
Christopher W. Kelly Director, Digital Evidence Laboratory, Commonwealth of Massachusetts, Office of the Attorney General. 

Richard Frawley Forensic Specialist, Certified Trainer, Certified Forensic Computer Examiner, ADF Solutions

Lt. Colonel James J. Emerson, USMC (Ret.), Vice President, National White Collar Crime Center 

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration


 

Webinar Fee: $0.00 per attendee




Coronavirus: Fighting Scams and Fraud During a Global Pandemic
Duration: 75 Minutes

This webinar is intended to inform law enforcement and criminal justice professionals about some scams and acts of fraud that are likely to be perpetrated during a pandemic.
In response to the rapid spread of the coronavirus, NW3C and the Regional Information Sharing Systems (RISS) recognizes the need for law enforcement training related to scams and fraud that are being used to exploit a pandemic.

The highly contagious COVID-19 has impacted our way of life as we know it. As international, federal, state, county, local, private organizations, and individuals work together in response to the coronavirus, there are scammers and fraudsters attempting to capitalize given the opportunity. These scammers and fraudsters are preying on the fear of the public and the unknown factors of the coronavirus while using tactics such as phishing attacks, malware, sale of counterfeit goods, investment fraud, and more.

This webinar will bring current information on identifying and responding to scams and frauds amidst a pandemic. Information from the U.S. Center for Disease Control (CDC) and World Health Organization (WHO) will be referenced throughout this webinar.

NW3C and the RISS Centers strive to provide law enforcement with information that can be used to identify, report, investigate, and prosecute high-tech and economic crimes. NW3C and RISS also recognize that the ability of law enforcement to share accurate information and resources with the public is critical for the prevention of scams and fraud. Therefore, in this webinar, relevant resources and websites will be shared to present accurate information that will help identify, respond, and prevent the scams and fraud that have surfaced during this pandemic.

Presented by: NW3C Staff

Webinar Fee: $0.00 per attendee




Using OSINT to Track Suspicious Cryptocurrency Activity
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Investigators face a great challenge in finding cryptocurrency wallets’ footprints across the web and understanding who may be behind it. The webinar will focus on tracking those digital footprints on all levels of the internet, using advanced OSINT technologies, tying malicious activities to networks of harmful individuals. By utilizing processes that involve Artificial Intelligence, including NLP (Natural Language Processing) and OCR (Optical Character Recognition), mentions of crypto wallets, be it in posts, images, or more, used for criminal and terrorist activities can be identified and flagged. The use of a proprietary deep crypto-wallet analysis can also visualize the values, growth, and interactions of these wallets across time. We will demonstrate the use of OSINT solutions as we conduct quick and comprehensive searches, deep analyses, and assess real-time threats to track the wallet’s presence and identity across the open, deep and dark web.

Presented by:
Johnmichael O'Hare
Arieh Ben-Am

This Webinar is sponsored by Cobwebs Technologies NW3C is providing the webinar so that attendees can have more information with which to evaluate how this capability might add value to them and the organizations they serve. NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




Of Eggplants and Umbrellas: The Legal and Investigative Implications of Emojis
Duration:

This webinar, presented by cyber crime attorneys and a former prosecutor, discusses investigative uses of emojis, particularly in the context of child exploitation, and the legal context of this growing medium, including current case law and implications for practice.

Presented by: Matthew Osteen, NW3C, Robert Peters, Zero Abuse Project,
Alicia Loy, NW3C

NW3C does not share Webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.

Webinar Fee: $0.00 per attendee




The Neurological and Psychological Elements of Victims, Witnesses and Suspects
Duration: 90 MInutes

This Webinar will focus on how the advent of technology and neuroscience has impacted victims and made them more vulnerable to the criminal element. We will go over the psychological aspects of criminal mindset as well as the investigators mindset in order to set them up for success. This Webinar will focus on the understanding of Human Behavior, what to look for how to understand people and influence your outcome.

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee




Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
Duration: 90 Minutes

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each other. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And, they increasingly choose to use platforms that make this communication openly available for others to view. This means that evidence associated with not just metadata, but also content of communications can often be collected through open sources long after the communication is completed.

While evidence of criminality and victimization can be recovered through open source investigative techniques, many of the commercial tools marketed to criminal investigators and analysts are expensive. This sometimes places them outside the reach of police departments. And, social media companies are increasingly blocking API connections for commercial tools that allow the tools to be used for, “surveillance”. For these reasons, it is increasingly important for criminal investigators and analysts to build an inexpensive cyber-OSINT toolbox.

This Webinar will discuss the rapidly evolving ecosystem of online social media and how people are changing how they choose to communicate. It will then detail and demonstrate free and inexpensive cyber-OSINT tools that criminal investigators and analysts can use to start build a cyber-OSINT toolbox.

Presented by: Chuck Cohen, NW3C

Webinar Fee: $0.00 per attendee




Checkm8 & CheckRa1n: New Tools for iOS Extractions
Duration: 75 Minutes

If anything about mobile forensics could be considered buzzworthy in the past year, it would be the release of the Checkm8 Boot ROM exploit created by axi0mX in October. Allowing critical access to 11 generations of iPhones and iDevices, checkm8 is a new opportunity to access data previously locked behind a secure wall. But beyond the hype, what data can you actually access using this newfound exploit, and what do you do once you’ve extracted data using Checkm8?

In this webinar, we will discuss the benefits, challenges and the utility of Checkm8 and Checkra1n to mobile forensic examiners and investigators. We will also explore how examiners can use Checkra1n to gain access to devices and what that access means in practical terms for your investigations.

Presented by:
Chris Atha, NW3C
Greg Masterson, MSAB

Webinar Fee: $0.00 per attendee




What Might Your Forensic Acquisitions Be Hiding?
Duration: 60 Minutes

The process of acquiring forensic images is well understood, and the industry has never been better equipped for the analysis. However common practices are set to fail, and analysis may be missing malware and indicators of compromise. This webinar will highlight short comings in commons methods and provide a framework for an improved approach; to allow for more efficient and thorough investigations.

Presented by Chris Atha, High Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Counterfeit Goods: Money Laundering in Plain Sight
Duration: 90 Minutes

The sale of counterfeit goods may be thought of as a relatively harmless crime, when in reality production, sale, and distribution of counterfeit goods represents money laundering, corruption, fraud, human trafficking, sanctions evasion, and terrorist finance. Much like the sale of illegal narcotics, the production, distribution, and sale of counterfeit goods can yield hundreds of billions of dollars every year. As a result, transnational and localized organized crime groups are involved at every step of the operation. This session will highlight the risks involved with the sale of counterfeit goods, as well as the illicit actors involved, and how these goods make their way into the stream of commerce. This session will explain the nexus between organized criminal activity and the sale of counterfeit goods, while drawing sharp correlations to traditional anti-money laundering controls. Attendees will learn the risk indicators of the sale of counterfeit goods, as well as how to use open source databases to enhance due diligence searches for potential vendors linked to the sale of counterfeit goods. The session will provide recommendations on how to leverage analytics and gap analysis to further detect potentially high-risk customers, products, and transactions.

Presented by: Michael Schidlow, Scienter Group

Webinar Fee: $0.00 per attendee




Overview of NW3C
Duration:

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will provide an overview of NW3C to all of the Law Enforcement Coordinators throughout the United States.

Presented by:
Jeff Lybarger, Director of Training & Curriculum Development, NW3C
Tyler Wotring, Director of High-Tech Initiatives, NW3C

Webinar Fee: $0.00 per attendee




Gas Pump Skimming
Duration: 75 Minutes

The webinar will discuss the anatomy of gas pump skimming from the manufacturing of the skimmers to laundering of the proceeds. The instructor will discuss the various types of skimmers, how the card numbers are harvested as well as the various methods of cashing out.

Presented by: Jasen Wells

Webinar Fee: $0.00 per attendee




What some BODY is saying, through their body language
Duration: 75 Minutes

Have you ever wondered what people are saying through their body language? This Webinar will focus on nonverbal behavior and one's ability to "read" people. This Webinar will enhance your ability to decode emotions and behaviors and look for deceptive behaviors. You will also learn how your body language can influence what others around you think.

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee




Dark Web and Open Source Information Primer
Duration: 90 Minutes

A primer on the dark web and information available on the internet from free sources that can help investigators as they work to solve almost all types of cases.

Presented by: Casey Bohn, High-Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Office 365 Forensics and Business Email Compromises
Duration: 60 Minutes

This webinar will discuss the types of evidence that should be collected in a response to a business email compromise/ Office 365 email investigation. Methods of email compromise (phishing, malware, brute force attacks, external compromise/credential stuffing),Types of data at risk and commonly seen schemes.

Evidence Collection and Analysis
•Review of the Office 365/ Azure Admin Centers
•Collecting evidence from Office 365 (logs, rule/forwarding/ Sharepoint/Onedrive data)
•Extracting mailboxes with the Office 365 eDiscovery tool.
•Analyzing and interpreting the types of log data available in Office 365
•Steps to secure the Office 365 environment during an incident

Presented by: Adam Hart, Associate Principal-Forensic Services, Charles River Associates

Webinar Fee: $0.00 per attendee




Cloud Combat: Debating Law Enforcement Access to Overseas Data
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Two attorneys clash in this heated exchange on whether, and how, law enforcement can obtain evidence stored electronically overseas. A former prosecutor and a high-tech crime attorney square off in several rounds of debate. Each round involves a hypothetical that incorporates relevant, cutting-edge evidentiary questions including overseas servers, CLOUD Act considerations, space-based data storage, and pertinent international law.

Presented by: Robert Peters, Senior Cyber and Economic Crime Attorney, NW3C & Matt Osteen, Cyber and Economic Crime Attorney, NW3C

Webinar Fee: $0.00 per attendee




Case Study: Methods to Detect Forged Documents
Duration: 60 Minutes

Digital evidence has become an essential part of every legal matter, whether it be a criminal, civil or internal investigation. Using a case study, this session will demonstrate the methods used to determine that an email submitted as evidence in federal court had been forged. The methods demonstrated in this case study may be reliably referenced when reviewing any questionable digital documents, without the need for specialized software. This presentation will demonstrate the probative value of digital forensics in fraud investigations.

You Will Learn How To:

• Recognize the value of digital forensics in fraud cases.
• Identify methods to examine digital files and metadata.
• Determine how to make and report on evidence-based
  conclusions.
• Recall a practical example of how these methods were applied.

Presented by: Matt Danner

Webinar Fee: $0.00 per attendee




The Tables Have Turned: Igniting the Power of Survivors in Abuse Investigation and Prosecution
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

A former Prosecutor and an abuse survivor who wore a wire and recorded the perpetrator’s confession share their investigative tips, best practices for interacting with survivors, and trial strategies to dismantle the power dynamics of perpetrator and victim. Learn approaches to maximize case outcome and strength of survivors throughout the entire investigative process.

Presented by: Robert Peters, Senior Cyber and Economic Crime Attorney, NW3C &
Amber Higgins, Educational Initiatives Liaison, SHIELD Task Force

Webinar Fee: $0.00 per attendee




Through the Looking Glass: Protecting Yourself While Conducting Internet-Based Investigations
Duration: 75 MInutes

“Through the looking glass” is a metaphorical expression meaning: on the strange side, in the twilight zone, or in a strange, parallel world. While the internet can be considered a strange, parallel world, it can also be an informative, interesting, yet scary place when conducting different types of investigations. There are various technologies and methods that you can use to protect your identity and information while conducting internet-based investigations. This session will illustrate these technologies and methods to keep you safe when investigating online.
 
You Will Learn How To:
 
• Identify the methods criminals use to find your data.
• Compare various technologies and software tools to protect your identity while  investigating online.
• Examine various methods to employ to hide your own tracks.

Presented by: Ryan Duquette, Partner, Security and Privacy Risk Consulting

Webinar Fee: $0.00 per attendee




The Truth About the Dark Web Fraud Trade
Duration: 60 Minutes

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. What is the dark web fraud economy? What drives it? What can we do about it?

Presented by: Emily Wilson, VP of Research Terbium Labs

Webinar Fee: $0.00 per attendee




Mindhunters: Exploiting Offender Psychology in Proactive Operations and Abuse Investigations
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Learn psychological insights and practical strategies to exploit Internet sex offender dynamics. Discover how to apply the behavioral profiles of solicitation and child pornography offenders in a variety of settings, including while conducting proactive operations or pretext phone calls, crafting undercover personas and interviewing perpetrators. This webinar will also address how to attack sex offender risk assessments, with perspectives from prosecution and forensic psychology.

Presented by:
Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C
Joseph Remy, Assistant Prosecutor, Burlington County Prosecutor’s Office
Dr. Timothy Saar, Owner/Psychologist, Saar Psychological Group, PLLC

Joseph Remy, Assistant Prosecutor, Burlington County Prosecutor’s Office

Webinar Fee: $0.00 per attendee




How to Convict a Child Pornographer
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.


The investigation and prosecution of child pornography has exponentially increased nationwide in recent years, while tactics utilized by online sexual offenders continue to evolve and adapt with emerging technology. This webinar will focus on several key aspects of obtaining convictions, including practical investigative considerations, establishing perpetrator identity, utilizing prior bad acts evidence, countering common defense strategies, and communicating the severity of these egregious offenses to judges and juries.


Presented by Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C and Chief Craig Corkrean, Granville Police Department

Webinar Fee: $0.00 per attendee




Zip File Forensics
Duration: 60 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

We will review the effects that various Zip programs have on date time stamps, understand the cause of that effect and dive deep into the internal structure of a Zip archive. Attendees will learn how to manually carve zip file elements, edit the structure as necessary to combine the carvings into a single viable zip file.

Presented by: Blazer Catzen

Webinar Fee: $0.00 per attendee




NW3C’s Utility Suite: What is it, and how can it help in your investigations
Duration: 60 MInutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

During this webinar we will be discussing the tools included within the NW3C Utility Suite. What they do, how they work, and how they can help in your investigations. The tools that will be discussed include: Quick Hashing Utility, Batch Hashing Utility, Hex Viewer, Date/Time Utility, Recycle Bin Parser, SQLite Extraction Utility, and USN Journal Converter. These tools are available to Law Enforcement as a free download from NW3C’s website.

Presented by: Justin Wykes,High-Tech Crime Specialist, NW3C

Webinar Fee: $0.00 per attendee




Traumatic Cases and Events: How to Become Resilient and Move Forward
Duration: 90 Minutes

This webinar is meant for individuals who are looking to build resiliency to combat the effects of trauma. Traumatic events can set your life on one course or another. These events occur frequently in the course of investigations and working with child exploitation cases. Rather than allow these events to define us or take us over, learn how to recognize different types of trauma through warning signs and become aware of the impact it has in not only your life but those around you. Throughout this webinar you will also learn how trauma is encoded within your body and how through simple techniques you limit the impact trauma has on our lives. You will also learn how to reframe any situation for your benefit. You will learn tools on how to shift your mind to not only overcome and situation but also thrive. Take charge of your feelings, life and outcome!

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee




Busting Bitcoin Bandits
Duration: 60 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

An underground movement of hackers is taking over victim telephones and draining their financial accounts!  In the past 12 months, a California high tech task force named REACT has identified more than 800 victims and nearly $50 million in losses of cash and cryptocurrency.  Please join Santa Clara County Prosecutor Erin West and DA Investigator David Berry as they explain this phenomenon known as “sim-swapping” and detail how the hackers are able to access phones, hijack social media, and ultimately steal millions of dollars.  We will take a look at this new class of criminals and identify ways to protect ourselves against this growing crime wave.

Presented by:
Erin West, Prosecutor, Santa Clara Prosecutors Office
Caleb Tuttle, Detective, Santa Clara Sheriff's Office 

Webinar Fee: $0.00 per attendee




Phishing to Laundering: From Clicks to Cash-Out
Duration: 75 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

It is widely acknowledged that Phishing is responsible for >90% of breaches occurring today. Basic phishing primarily exploits human behavior to entice a victim to ‘click the link’ or ‘open the attachment’ thus often handing over to the criminal the golden nugget – valid access credentials. While we are all taught not to click or open the attachment, the scheme is still highly successful and profitable. In fact, recent reporting indicates that regardless of the amount of training provided, organizations will likely see at least 4% of their workforce click on a link thus resulting in some sort of compromise.

During this webinar, a panel of NCFTA experts will explain how phishing campaigns are conducted; from developing a “phish kit”, to weaponizing a botnet for delivery, using any stolen credentials for financial gain, then laundering millions of dollars all over the world to fund their lavish lifestyles at your expense, etc.

Presented by:
Kyle Hettinger, Training Coordinator and Senior Intelligence Analyst, NCFTA
Taylor Transue, Cyber Intelligence Analyst, NCFTA
Owen Nearhoof, Cyber Intelligence Analyst, NCFTA

Webinar Fee: $0.00 per attendee




Being Mickey in a Goofy World: Understanding User Attacks
Duration: 60 Minutes

Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation he will walk through the various attacks, including email, social media, and in person. Using various war stories, he will explain how the attacker views the user and what they do to increase the success rate of these attacks.

Presented by: Kevin Johnson, Secure Ideas

Webinar Fee: $0.00 per attendee




ScanWriter: Dynamic Data Analytic Skills With Intuitive Data Presentations
Duration: 100 Minutes

This second session of Personable’s ScanWriter will demonstrate the newest features and capabilities of the program’s data capture and data analytics functions, to include:

• Automated integration of various data elements captured from bank records, check  images, deposit   slips, credit card statements, phone records, etc.

• Automated categorization, transformation, and exporting of financial records into meaningful business models for lead generation, investigative guidance, and analysis.

• Introduction to ScanWriter’s data analytics tools for modeling including flow of funds, all transactions, Benford’s Law, Beneish’s M-score, phone records analysis, and financial ratios model.

Presented by: Michelle Dulog, Personable Inc.

If you missed the first event ScanWriter: Smart, Clean and Actionable Data in an Instant, simply click here to register and watch it prior to this next event.

Webinar Fee: $0.00 per attendee




Law Enforcement Investigations on the Darknet: Case studies from the co-founder of the Tor Project
Duration: 75 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

In this webinar, Andrew Lewman will share and explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. Using these real-world, darknet-based examples that have been selected for a law-enforcement based audience, Andrew will walk-through examples of different methodologies law enforcement can use to de-anonymize threat actors, the different tools and approaches one can take to conducting these types of investigations, best practices, lessons learned, and more.

Webinar Fee: $0.00 per attendee




Leveraging Partnerships and Avoiding Multi-Agency Pitfalls
Duration: 90 Minutes

Have you ever wished that everyone was in the same boat as you, and more importantly rowing in the same direction? Today we live in a global society which consists of various teams and departments working with and against each other.  We face individual and institutional challenges that sometimes inhibit our ability to succeed. Investigations today, comprise public, and private entities, investigators from different departments, attorneys, and others that can impact your investigation or goals. This webinar will teach students the art of leverage and how to maintain, develop and execute partnerships that will provide long term success. True success comes when you are able to maintain partnerships and rely on each other for that success. This webinar will provide students with strategies used by some of the most successful fortune 500 companies. Students will be able to implement these strategies directly to their teams and their investigations. This webinar will give them insight on how to develop relationships and leverage people in order to be more efficient and provide them with lasting success.

Presented by: John Pizzuro

Webinar Fee: $0.00 per attendee




Seven Samurai: Understanding Attacks to Drive Defenses
Duration: 60 Minutes

This presentation uses war stories from decades of working in IT and security to explore the attacks we see today.  Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today.  These stories will explain how the attack was performed and why an attacker would take that direction.

Presented by: Kevin Johnson, Secure Ideas 

Webinar Fee: $0.00 per attendee




Removing Your Personal Identifying Information
Duration: 90 Minutes

Everyone is at risk for identity theft, online and physical stalking, and harassment. Beyond social media, your public records are for sale, so your home address and assets are easily located through simple online searches. This course provides a through description of how and where your data is stored and how to remove it.

In this introductory hands-on class, participants will review a case study detailing how a fraudulent and nefarious actor obtains personal identifying information and how it can be used against you. You will learn “Opt Out” procedures for public service and security personnel and explore the tools and methodologies used to operate discreetly on the Internet. Upon completion of the class, field investigators will be able to identify how private lives and public information are available through websites, social networks, and “Invisible Web” sources; and will have the ability to protect their privacy by implementing basic security practices online, at home, and on social media.

Presented by: Cynthia Hetherington, Hetherington Group

Webinar Fee: $0.00 per attendee




Investigating Terrorist Financing with Chainalysis Reactor
Duration: 60 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Terrorist organizations are using cryptocurrencies as a new way to raise funds and facilitate operations. This poses a challenge to both public and private sector organizations, but also creates a new opportunity for lead development centered on blockchain data. This webinar will review an analysis of recent cases of terrorist organizations using Bitcoin, provide an overview of Chainalysis data and the Reactor software solution and speak to the future of terrorist financing through cryptocurrency and how to stop them.

Presented by: Collin Almquist, Chainalysis

Webinar Fee: $0.00 per attendee




Cybercrime Basics: Investigation and Prosecution of Credit Card Fraud
Duration: 90 Minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will cover credit card fraud and identity theft from initial investigative steps to arrest and prosecution. The presenters will discuss how to identify points of compromise including low hanging fruit, skimmers and indicators of malware. Specifics regarding point of infection, log analysis, and signature analysis will be covered as well as charges, pleas, grand jury and trial considerations along with post-conviction steps.

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Robert J. Peters, Senior Cyber and Economic Crime Attorney, NW3C

Webinar Fee: $0.00 per attendee




Blockchain Tracing: Cryptocurrency Anti-Money Laundering and Financial Investigation Workshop
Duration: 90 minutes

CipherTrace’s cryptocurrency anti-money laundering and financial investigation Webinar provides hands-on instruction on blockchain and blockchain tracing. Attendees will learn a risk-based approach to tracing source of blockchain funds and de-anonymizing cryptocurrency transactions with cryptocurrency forensic tools. They will develop and hone digital forensic investigation techniques. The course will equip participants with an understanding of cryptocurrency fundamentals and the specific understanding of tracing cryptocurrency transactions. Improve the efficiency and effectiveness of blockchain forensic investigations by learning how to best leverage tools and resources to reduce investigation time and improve information yield. CipherTrace provides the infrastructure to enable secure, verifiable and legal commerce for cryptocurrency markets.

Presented By:
Pamela Garner, Director of Forensics and Training, CipherTrace
Paul Reyff, Vice President of Sales, CipherTrace

Webinar Fee: $0.00 per attendee




Cognitive Interviewing & Courtroom Testimony
Duration: 90 minutes

Have you ever wanted to communicate more effectively? Relate better to the jury while testifying? Be more successful and obtain more information while interviewing? This webinar will give participants techniques and insight on how to employ cognitive interviewing skills to interview suspects, witnesses, and victims.  Participants will gain a better understanding of human behavior as it relates to neuroscience and become more effective in obtaining information and having suspects, witnesses and victims cooperate. Participants will be able to understand linguistics and language, interpret body language, and how to gain rapport with a jury and handle cross-examinations more effectively while testifying.

Webinar Fee: $0.00 per attendee




Cybercrime Basics for Prosecutors: From the Cloud to Seizing the Device
Duration: 90 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will define what cybercrime is and its sources of evidence. The Electronic Communications Privacy Act (ECPA) will be covered to include preservation letters, content versus non-content, when process gets rejected, precluding versus delayed notice, and the Cloud Act. California’s new General Data Protection Regulation (GDPR) law passed earlier this year will be discussed. The presenters will explore using traditional investigative methods and when to seize a device and when to search a device. Lastly, what are the cybercrime defenses one can expect to be argued?

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Thomas Huynh, Deputy Attorney General, NJ Office of the Attorney General

Webinar Fee: $0.00 per attendee




Mobile Extractions + Power Analytics: Using XRY and PLX Together to Solve Your Investigations
Duration: 60 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

In most investigations today mobile phone data is one of the most critical sources of evidence. The reasons are clear, given the volume and variety of data in today’s smart phones and the depth with which our mobile devices capture our activities. This presentation will focus on what types of data can be recovered from mobile devices using XRY and how to then export that data into PLX. You will learn how PLX can then help you swiftly organize, analyze, and dissect the many different sources of information you have, including mobile device data, in one easy to use platform.

Presented by:
Kaitlyn Ziola, PenLink
Jacob Hulsey, Director of Customer Success, MSAB

Webinar Fee: $0.00 per attendee




Understanding Cellular Intercept
Duration: 60 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

TrustComm provides cellular intercept capabilities to the field. This webinar will be an introduction to this type of technology, how it works and how it supports law enforcement, military and first responders in meeting the mission.

Presented by: Ian Canning COO, TrustComm

Webinar Fee: $0.00 per attendee




Emerging Legal Issues in Tech: From the Cloud Act to Hacking Back
Duration: 90 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will discuss the following topics:

• The Cloud Act
• Border Searches of Technology
• Right to be Forgotten
• Revisions to Federal Rules of Evidence
• Hacking Back and the Law
• Compelled Decryption

Presented by:
Joseph Remy, Deputy Attorney General, NJ Office of the Attorney General
Thomas Huynh, Deputy Attorney General, NJ Office of the Attorney General

Webinar Fee: $0.00 per attendee




ScanWriter: Smart, Clean and Actionable Data in an Instant
Duration: 100 minutes

This webinar will demonstrate the features and capabilities of the latest version of Personable’s ScanWriter tool as well as integration with Microsoft’s Power BI. ScanWriter automates manual data entry from any electronic document which improves productivity and efficiency.

Webinar Fee: $0.00 per attendee




The Benefits of Triage: How to Quick Start Your Digital Investigation
Duration: 90 minutes

Learn the art of digital forensic triage- how to conduct an initial investigation quickly based on the scope of the investigation you are about to conduct. If 90% of cases can be solved with 10% of the data, let's get to that point early and make decisions on the need for further deep dive, due diligence, or peace of mind examination of devices based off facts. Join ADF Digital Forensic Specialist and Trainer, Rich Frawley, as he leads participants through a typical investigation to demonstrate the speed, accuracy, and best practices for using triage in the field or in the lab.

Webinar Fee: $0.00 per attendee




Law Enforcement Cyber Center: A Valuable Resource for Investigators
Duration: 60 minutes

The Law Enforcement Cyber Center (LECC) was developed to enhance the awareness, expand the education, and build the capacity of justice and public safety agencies to prevent, investigate, prosecute, and respond to cyber threats and cyber crimes. It is intended to be a national resource for law enforcement and related justice and public safety entities. During the webinar, participants will review the website and learn about the many valuable resources that can be utilized.

The Law Enforcement Cyber Center is a collaborative project between the National White Collar Crime Center (NW3C), the International Association of Chiefs of Police (IACP), the Police Executive Research Forum (PERF), and is funded through the Bureau of Justice Assistance.

Presented by: Jeff Lybarger & Josh Santy, NW3C

Webinar Fee: $0.00 per attendee




Introduction to FinCEN
Duration: 90 minutes

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar is intended as a Financial Crimes Enforcement Network (FinCEN) overview. It will include information on products and services, Bank Secrecy Act records and information, and how FinCEN is used in investigations.

Presented by: James Emery, FinCEN

Webinar Fee: $0.00 per attendee




Aerial Data: Introduction to Drone Investigations
Duration: 90 minutes

With applications from aerial photography to racing to delivery services, drones are becoming more and more popular in both commercial and recreational spaces. Criminal use of drones is also increasing, and drone forensics is quickly becoming an important subfield of digital forensics. This presentation introduces the history of drones and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones. Topics include gathering evidence both internal and external to the drone, as well as methods for manually processing flight logs and displaying data in Google Earth.

Presented by: Jerry Jones, NW3C

Webinar Fee: $0.00 per attendee




Bio Hacking: Brain-Based Interviewing, Communication, & Leadership
Duration: 90 minutes
This webinar will provide attendees with a basic knowledge of Neuro Linguistic Programming and other cognitive techniques to aid in interviewing suspects, witnesses, and victims. This webinar will help individuals be a more effective communicator and leader, giving the attendees greater insights and understanding on how to get people to do what they need.

Presented by: John Pizzuro, CEO, John Pizzuro Speaking & Consulting

Webinar Fee: $39.00 per attendee