Office 365 Forensics and Business Email Compromises

This webinar will discuss the types of evidence that should be collected in a response to a business email compromise/ Office 365 email investigation. Methods of email compromise (phishing, malware, brute force attacks, external compromise/credential stuffing),Types of data at risk and commonly seen schemes. Evidence Collection and Analysis •Review of the Office 365/ Azure Admin … Continue reading Office 365 Forensics and Business Email Compromises

Free

Dark Web and Open Source Information Primer

A primer on the dark web and information available on the internet from free sources that can help investigators as they work to solve almost all types of cases. Presented by: Casey Bohn, High-Tech Crime Specialist, NW3C

Free

What’s New in DF330- Advanced Android and iOS Forensic Analysis

This webinar will highlight the changes to the DF330 course and will focus on the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically-sound methods and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially … Continue reading What’s New in DF330- Advanced Android and iOS Forensic Analysis

Free

The Functionality of Private Coins

We will be hearing from Coin Center, Chainalysis, and Ciphertrace on the functionality of, and challenges presented by, privacy coins. Presented by: Jerry Brito, Coin Center Dave Jevans, Ciphertrace Jonathan Levin, Chainalysis Jason Weinstein, Steptoe Alan Cohn, Steptoe

Free

Gas Pump Skimming

The webinar will discuss the anatomy of gas pump skimming from the manufacturing of the skimmers to laundering of the proceeds. The instructor will discuss the various types of skimmers, how the card numbers are harvested as well as the various methods of cashing out. Presented by: Jasen Wells

Free

Counterfeit Goods: Money Laundering in Plain Sight

The sale of counterfeit goods may be thought of as a relatively harmless crime, when in reality production, sale, and distribution of counterfeit goods represents money laundering, corruption, fraud, human trafficking, sanctions evasion, and terrorist finance. Much like the sale of illegal narcotics, the production, distribution, and sale of counterfeit goods can yield hundreds of … Continue reading Counterfeit Goods: Money Laundering in Plain Sight

Free

The Neurological and Psychological Elements of Victims, Witnesses and Suspects

This Webinar will focus on how the advent of technology and neuroscience has impacted victims and made them more vulnerable to the criminal element. We will go over the psychological aspects of criminal mindset as well as the investigators mindset in order to set them up for success. This Webinar will focus on the understanding … Continue reading The Neurological and Psychological Elements of Victims, Witnesses and Suspects

Free

Of Eggplants and Umbrellas: The Legal and Investigative Implications of Emojis

This webinar, presented by cyber crime attorneys and a former prosecutor, discusses investigative uses of emojis, particularly in the context of child exploitation, and the legal context of this growing medium, including current case law and implications for practice. Presented by: Matthew Osteen, NW3C, Robert Peters, Zero Abuse Project, Alicia Loy, NW3C

Free

Coronavirus: Fighting Scams and Fraud During a Global Pandemic

This webinar is intended to inform law enforcement and criminal justice professionals to some scams and acts of fraud that are likely to be perpetrated during a pandemic. In response to the rapid spread of the coronavirus, NW3C recognizes the need for law enforcement training related to scams and fraud that are being used to … Continue reading Coronavirus: Fighting Scams and Fraud During a Global Pandemic

Free

Using OSINT to Track Suspicious Crypto Currency Activity

Investigators face a great challenge in finding cryptocurrency wallets’ footprints across the web and understanding who may be behind it. The webinar will focus on tracking those digital footprints on all levels of the internet, using advanced OSINT technologies, tying malicious activities to networks of harmful individuals. By utilizing processes that involve Artificial Intelligence, including … Continue reading Using OSINT to Track Suspicious Crypto Currency Activity

Free