Identify, Investigate, Recover Digital Cash, and Prosecute Money Laundering Crimes

ERAD Group

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Today’s law enforcement agencies are facing a financial crimes epidemic. Millions of consumers are victims of credit card fraud and ID theft each year resulting in the loss of billions. Human traffickers, fuel thieves, and drug dealers are laundering money using prepaid cards, cash applications, and other digital currencies. The magnitude of the problem is overwhelming and when coupled with the effort involved to work those cases,

 » Read more

Conducting Secure Online Investigations in 2022

Cobwebs Webinar

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Remaining anonymous and protected online is key to any web intelligence investigation. With social media platforms becoming more efficient at finding and closing fictitious accounts, creating and operating avatars for online investigations is becoming more difficult. This presentation will give you new tactics to stay safe while conducting these investigations in 2022.

During this webinar, we will discuss how to conduct online investigations while masking your identity and proper methodologies for avatar management.

 » Read more

Overview of IoT for Investigators and Examiners

IoT for Investigators

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Join us to explore IoT through the optics of the investigator and the examiner. Let’s examine the most popular IoT technology, essential planning in any case, how to identify and search for relevant technologies at search or crime scenes, what digital evidence is available locally versus remotely, what tools are available to assist in collection and analysis, what should you know about IoT related legal process,

 » Read more

What Investigators Need to Know about Hiding on the Internet: Proxies and VPNs


Criminal investigators and analysts need to understand how it is possible for people to conceal and obfuscate their identity and location on the Internet.  Two primary methods are through the use of proxies and virtual private networks (VPNs). This ability to hide one’s identity and location on the Internet can be both a challenge and an opportunity. Various methods of concealing identity and location, while engaged in activities on the Internet, provide an opportunity for investigators to engage in covert online research while also providing a means for criminals to engage in surreptitious communication in furtherance of nefarious activities. 

 » Read more

Understanding the Dark Web


The dark web has the star quality and luster of a Hollywood movie, but in reality, it’s a den of inequity operated by the technically sophisticated. The more “Googleized” we’ve become as investigators and researchers, the less we understand what’s going on behind the scenes and how to operate in this nefarious world.

This webinar will examine the dark web, the channels used to institute private sales and exchanges, and criminal behavior. Participants will gain a thorough understanding of the dark web—criminality,

 » Read more

Uber Resources for Law Enforcement

Male Hands Holding Car Steering Wheel. Hands On Steering Wheel O

This webinar will demonstrate what Uber is and the various lines of business, the information each trip or delivery generates, how investigators can obtain that data, how that data can be useful in a criminal investigation, and trends Uber has observed. The objective is that law enforcement officers, analysts, and prosecutors in attendance are able to serve legal process, execute an emergency request, or make an inquiry through Uber’s law enforcement portal.

Presented by:
Danielle McDonald,

 » Read more

Intelligence Analysis: Asked and Answered


Join a team of experts from NW3C as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. Click here to submit questions regarding intelligence analysis skills, information collection, or general comments of analytic tradecraft and a panel of NW3C experts will provide answers during this live session.

Presented by:
Randy Stickley, Intelligence Specialist, NW3C
Dave Abruzzino, Instructional Designer, The Intelligence and Security Academy, LLC
Justin Parker,

 » Read more

Being the Pro in Proactive Investigations

Business Auditor Using Magnifying Glass For Paperwork Fraud Inve

Investigators can often be reactive and have a hard time seeing targets and evidence that is out of view. This presentation will focus on the art of proactive investigations. We will focus on what an investigator’s mindset should be, how to understand their targets, devise and execute a plan to gain evidence, resulting in successful investigations and the prosecution. Examples will be provided from organized crime, narcotics, fraud, homicides, corruption, and child exploitation on how to effectively engage targets to gain evidence.

 » Read more

Using GrayKey Passcode History File


GrayKey collections contain more than just the file system of an iOS device and this additional data is often overlooked. A notable example of this is the GrayKey passcode history file. Learn from Grayshift subject matter experts as they provide an overview of GrayKey passcode history file and how it can be used to maximize your investigations.

Presented by: Stevie Coates, Digital Forensics Specialist, Grayshift

This webinar is sponsored by Grayshift.

 » Read more

Advancements in Handwriting Recognition for Financial Investigators


Collecting actionable insights from handwritten documents takes time, resources, and a skilled eye. In many cases, check images, deposit slips, and other handwritten forms come by the thousands.   The ScanWriter team will demonstrate the latest hyperautomation technology that captures and converts handwriting from any document into Excel or Business Intelligence analytics with accuracy.

Join this webinar to review real cases and effective techniques for processing large data sets that include documents with handwriting.

 » Read more

IACP Conference