The Truth About the Dark Web Fraud Trade

Terbium Labs

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. What is the dark web fraud economy? What drives it? What can we do about it?

Presented by: Emily Wilson, VP of Research Terbium Labs

 » Read more

Zip File Forensics

4C Webinars

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

We will review the effects that various Zip programs have on date time stamps, understand the cause of that effect and dive deep into the internal structure of a Zip archive. Attendees will learn how to manually carve zip file elements, edit the structure as necessary to combine the carvings into a single viable zip file.

 » Read more

NW3C’s Utility Suite

NW3C Utility Suite

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

During this webinar we will be discussing the tools included within the NW3C Utility Suite. What they do, how they work, and how they can help in your investigations. The tools that will be discussed include: Quick Hashing Utility, Batch Hashing Utility, Hex Viewer,

 » Read more

Opioid Investigations: Extracting critical data

Cobwebs Webinar

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Facing social media barriers and the ability to mitigate their ever-changing platforms is something an investigator or analyst does not have time to do. The growing use of social media platforms, mobile apps, and dark web sources contribute to the significant rise of illegal activities on the internet.

 » Read more

Busting Bitcoin Bandits

Santa Clara DA Webinars

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

An underground movement of hackers is taking over victim telephones and draining their financial accounts!  In the past 12 months, a California high tech task force named REACT has identified more than 800 victims and nearly $50 million in losses of cash and cryptocurrency. 

 » Read more

Phishing to Laundering: From Clicks to Cash-Out

NCFTA

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

During this webinar, a panel of NCFTA experts will explain how phishing campaigns are conducted; from developing a “phish kit”, to weaponizing a botnet for delivery, using any stolen credentials for financial gain, then laundering millions of dollars all over the world to fund their lavish lifestyles at your expense,

 » Read more

Being Mickey in a Goofy World: Understanding User Attacks

Secure Ideas

Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation he will walk through the various attacks, including email, social media, and in person, Using various war stories, he will explain how the attacker views the user and what they do to increase the success rate of these attacks.

Presented by: Kevin Johnson, Secure Ideas

 » Read more

Law Enforcement Investigations on the Darknet: Case studies from the co-founder of the Tor Project

Dark Owl

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

In this webinar, Andrew Lewman will share and explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. Using these real-world, darknet-based examples that have been selected for a law-enforcement based audience, Andrew will walk-through examples of different methodologies law enforcement can use to de-anonymize threat actors,

 » Read more

Seven Samurai: Understanding Attacks to Drive Defenses

Secure Ideas

This presentation uses war stories from decades of working in IT and security to explore the attacks we see today.  Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today.  These stories will explain how the attack was performed and why an attacker would take that direction.

Presented by: Kevin Johnson, Secure Ideas

 » Read more

IACP Conference

Tags