The Functionality of Private Coins

Blockchain Alliance

We will be hearing from Coin Center, Chainalysis, and Ciphertrace on the functionality of, and challenges presented by, privacy coins.

Presented by:
Jerry Brito, Coin Center
Dave Jevans, Ciphertrace
Jonathan Levin, Chainalysis
Jason Weinstein, Steptoe
Alan Cohn, Steptoe

 » Read more

What’s New in DF330- Advanced Android and iOS Forensic Analysis

NW3C Webinars

This webinar will highlight the changes to the DF330 course and will focus on the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically-sound methods and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Core skills include analyzing artifacts such as device information, call history, voicemail, messages,

 » Read more

Office 365 Forensics and Business Email Compromises

CRA Webinars

This webinar will discuss the types of evidence that should be collected in a response to a business email compromise/ Office 365 email investigation. Methods of email compromise (phishing, malware, brute force attacks, external compromise/credential stuffing),Types of data at risk and commonly seen schemes.

Evidence Collection and Analysis
•Review of the Office 365/ Azure Admin Centers
•Collecting evidence from Office 365 (logs, rule/forwarding/ Sharepoint/Onedrive data)
•Extracting mailboxes with the Office 365 eDiscovery tool.

 » Read more

Cloud Combat: Law Enforcement Access to Overseas Data

Cloud Combat

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Two attorneys clash in this heated exchange on whether, and how, law enforcement can obtain evidence stored electronically overseas. A former prosecutor and a high-tech crime attorney square off in several rounds of debate. Each round involves a hypothetical that incorporates relevant, cutting-edge evidentiary questions including overseas servers,

 » Read more

The Truth About the Dark Web Fraud Trade

Terbium Labs

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. What is the dark web fraud economy? What drives it? What can we do about it?

Presented by: Emily Wilson, VP of Research Terbium Labs

 » Read more

Zip File Forensics

4C Webinars

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

We will review the effects that various Zip programs have on date time stamps, understand the cause of that effect and dive deep into the internal structure of a Zip archive. Attendees will learn how to manually carve zip file elements, edit the structure as necessary to combine the carvings into a single viable zip file.

 » Read more

NW3C’s Utility Suite

NW3C Utility Suite

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

During this webinar we will be discussing the tools included within the NW3C Utility Suite. What they do, how they work, and how they can help in your investigations. The tools that will be discussed include: Quick Hashing Utility, Batch Hashing Utility, Hex Viewer,

 » Read more

Opioid Investigations: Extracting critical data

Cobwebs Webinar

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

Facing social media barriers and the ability to mitigate their ever-changing platforms is something an investigator or analyst does not have time to do. The growing use of social media platforms, mobile apps, and dark web sources contribute to the significant rise of illegal activities on the internet.

 » Read more

Busting Bitcoin Bandits

Santa Clara DA Webinars

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

An underground movement of hackers is taking over victim telephones and draining their financial accounts!  In the past 12 months, a California high tech task force named REACT has identified more than 800 victims and nearly $50 million in losses of cash and cryptocurrency. 

 » Read more

IACP Conference