Bitcoin & Cryptocurrency Investigations: Beyond the Basics

guerrillabuzz-crypto-pr-T9rKvI3N0NM-unsplash@200x150

Building upon the previous cryptocurrency webinar, “Bitcoin 101: What Are Cryptocurrency and Blockchain All About?” presented by Cobwebs, this webinar will introduce investigative techniques to show how open-source information can be leveraged to attribute identities to wallets and addresses. This webinar will also briefly demonstrate the OSINT and cryptocurrency analysis capabilities of Cobwebs.

Presented by:
Stephen Lerner, Senior Web Intelligence Analyst, Cobwebs Technologies

This webinar is sponsored by Cobwebs Technologies.

 » Read more

Parallel Investigation Techniques

pitq@200x150

This webinar will show how parallel investigation techniques commence with a review of tactics and strategies that can be introduced in related fraud enquires. The importance protecting the tradecraft deployed and the use of open and closed source research will be discussed to include comparable techniques used in covert sensitive investigations. Money laundering utilizing virtual, or cryptocurrency will be featured to examine current tradecraft. Additionally, this presentation will include discussion of the impact on not-for-profits as well as a look at mortgage fraud.

 » Read more

Data Validation of Digital Forensic Evidence

dvdf@200x150

Is information from mobile extractions, Cloud Source and Google Timeline a solid piece of evidence? In this webinar, we will see how to make your digital evidence become a strong basis for courtroom testimony when validated with phone records, cell coverage, and other sources. Prove your data and set a solid foundation for justice.

Presented by:
Nicola Chermello, CEO and Co-Founder of SecurCube

 » Read more

Leveraging Open Source Intelligence to Investigate Fraud Rings

OSINT search@200x150

Fraudsters, whether acting alone or as part of an organized, global crime ring, are using every means available to perpetrate and orchestrate large scale schemes against corporations and governments. Open source intelligence (OSINT) can be used to identify assets and information to piece together the traditionally opaque network of people involved in fraud schemes. OSINT sources such as leaked databases, corporate registries, social media, and geolocation are all crucial components in tying together the convoluted web of disparate data points that make up fraud.

 » Read more

AirTags and Tracking Technology: Investigative and Legal Perspectives

phone with location pin@200x150

This webinar will examine the investigative and legal considerations related to tracking technology, and the impact of ultra-wideband location networks such as Apple AirTags and other similar emerging technologies. We will use case analysis to illustrate key questions and considerations for both investigators and prosecutors given the increasing criminal use of this technology and proactive use during investigations.

Presented by:
Justin Fitzsimmons, Associate Vice President, NW3C
Jim Emerson, Vice President, NW3C

 » Read more

Wrangling Routers and Corralling Devices

wrcd

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Registrations will close 24 hours before webinar start time.

With wireless devices being everywhere and easy to conceal, sometimes you have to do a good Ol’ Round-up. Looking at routers can help corral those pesky, missing, or unknown devices. While we look at routers, we will talk about the basic functions and operations to better understand how data is transmitted within the network.

 » Read more

Hiding in Plain Sight

hpsi

With caseloads increasing and data storage sizes exploding, computer forensic examiners are feeling the pressure to clear data and close cases quicker. With the ease of access to pirated material and the lack of legal recourse for such media, many examiners quickly clear the material to ensure there is no illegal material and move on. This can lead to missed evidence. We have discovered a way to conceal a video file within a video as a secondary layer.

 » Read more

Advanced Video Forensics: Gain a Deeper Understanding of Digital Video Files

MEDEX Webinar

This webinar is live only and will not be available on-demand.

Video evidence is ubiquitous in modern society, yet investigators may not be taking advantage of all the information available to them in digital video. This webinar will highlight approaches to properly understand video metadata and identify metadata fields often missed by many tools. Attendees will also gain insight into identifying the source device make/model of unknown video files, even those transmitted between devices or through social media.

 » Read more

Linux Forensics and Why it’s Important

Champlain Webinar

Why do we need to learn Linux forensics? Well, nowadays when you look at the number of tools available on different penetration testing systems running Linux, you should stop and ask yourself a basic question “are these tools and systems always going to be used for ethical purposes?” The answer is definitely, NO! Another reason to consider learning Linux forensics is that not everyone uses Windows. You may arrive at a crime scene only to find that your suspect’s computer is a Linux operating system!

 » Read more

Spotlight: Your Forensic Goldmine in iOS & macOS

Champlain Webinar

Spotlight is the default indexing engine on iOS™ and macOS®. It is ON by default and stores information about almost every file and folder on the file system. This information includes hundreds of different types of metadata from file-paths and MAC timestamps to document titles, authors, dates viewed and image/video exif tag information. It is not limited to files; emails, notes, text messages, and internet history are all found here. We will explore how to exploit this information with freeware tools we developed and explain how best to interact with and interpret this data.

 » Read more

IACP Conference