This training is intended for U.S. Criminal Justice
Practitioners. Please register using your agency-issued
email.
Recorded on June 10,
2021
This webinar presented by subject matter experts will cover the skills necessary
to perform advanced cyber investigations using legal, open source,
and closed source data. Attendees will learn the concepts and
possibilities on how to identify those committing the most heinous crimes.
We will look at a range of techniques for finding the "who done it," from
obtaining more evidence to looking through the criminal's eyes and discovering
how they chose and researched their victim. We will look at what can be done for
crimes committed in public and private spaces. We will look at solutions for
finding those selling opioids on the dark web through good, old-fashioned police
work.
We will discuss the interconnections between legal returns,
open source, and closed source information by examining each and then
walking through case studies where the methods were applied. We will discuss
techniques for unmasking people who are using VPNs, TOR, encrypted email
services, sock-puppet accounts, and more, followed by a conversation on the way
of solving an investigation through the eyes and actions of a criminal, from
before and after he/she committed the act.
The webinar will provide a
roadmap on how to complete these tasks efficiently and cost-effectively while
protecting the civil rights of those we are committed to safeguarding. The NCPTF
provides ongoing consultation, assistance, and guidance as needed to implement
this training. The webinar is for executives and investigators from senior cyber
and homicide investigators to new investigators, prosecutors, analysts,
supervisors, and everyone in between.
Presented by:
Kevin Branzetti,
The Manhattan District Attorney’s Office
Kevin Metcalf, The National Child
Protection Task Force
NW3C does not share webinar attendees’ personally
identifiable information with any third party without opt-in consent given
during registration.
The content, views, and opinions expressed in this
presentation are those of the individual presenters and do not represent
official policy, position, opinions, or views of NW3C.