Attention
The TTA Reporting Portal is under construction. Please send questions or comments to bjanttac@usdoj.gov.
AirTags and Tracking Technology: Investigative and Legal Perspectives
This webinar will examine the investigative and legal considerations related to tracking technology, and the impact of ultra-wideband location networks such as Apple AirTags and other similar emerging technologies. We will use case analysis to illustrate key questions and considerations for both investigators and prosecutors given the increasing criminal use of this technology and proactive use during investigations.
Presented by:
Justin Fitzsimmons, Associate Vice President, NW3C
Jim Emerson, Vice President, NW3C
Metaverse, Web3, and Blockchain - Security Observations
The Metaverse, while still a concept at the moment, will become a reality in the not-too-distant future. It consists of the opportunities created by combining the advances and affordances of augmented reality such as AR and VR and virtual (gaming) worlds with the decentralized nature and composability of Web3, crypto assets, DeFi, and the underlying blockchain technology. Cybercriminals see this market as a hot spot as they can make quick profits here and this webinar will explore some of the opportunities and risks.
Presented by:
Anna Collard, SVP of Content Strategy and Evangelist for KnowBe4Africa
NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.
The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.
How Do I Get My Fraud Investigated?
This webinar will examine the evolving complexity of investigation of fraud, money laundering, and terrorist financing by a team of UK detectives fighting financial crime both within the UK and globally for over 30 years. The webinar will use notable cases to study investigative approaches, placement, integration with other enforcement, investigative techniques, and critical "toolkit". These UK pioneers of advance fee fraud (aka 419 scams) investigations who worked with U.S. counterparts will use historical lessons and bring the audience up to date on these crimes as they relate to money laundering, the roles of informal banking, and exploitation of not-for-profits, and use of virtual currency. This webinar will also examine lessons related to gaps in legislation, the health of financial intelligence in vulnerable nation states, and offer discussion and debate regarding successful global investigative strategies for U.S. investigators.
Data Validation of Digital Forensic Evidence
Is information from mobile extractions, Cloud Source and Google Timeline a solid piece of evidence? In this webinar, we will see how to make your digital evidence become a strong basis for courtroom testimony when validated with phone records, cell coverage, and other sources. Prove your data and set a solid foundation for justice.
Presented by:
Nicola Chermello, CEO and Co-Founder of SecurCube
NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.
The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C.
Mental Health-Related Communication in Law Enforcement: Improving Perceptions of Support Seeking
Dr. Craw will discuss how departments can take a more proactive approach to mental health, focusing on the role of effective, authentic communication.
FC122 Intellectual Property Theft Training
This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific folder that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.
This course is presented in collaboration with the National Association of Attorneys General (NAAG).
Awareness. Types of IP crimes. The criminals who commit these crimes. Impacts and dangers.
Investigation. Online and traditional techniques. Working with brand experts and the private sector. Large amounts of evidence. Resources.
Statutes. Prosecutorial theories. State-specific discussion.
Hands-on experience. Work with real counterfeit products. Identify fakes with expert guidance.
DF320 Advanced Digital Forensic Analysis: macOS
This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes, but is not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.
IA105 Intelligence Writing and Briefing
This course covers basic intelligence writing and briefing principles as well as methods for effective and clear intelligence sharing. Topics covered include creative and critical thinking, critical reading skills, source evaluation, privacy and civil rights, intelligence writing style and structure, and generating and presenting intelligence briefings. With guidance from experienced experts, students gain hands-on experience by working through data sets based on real cases to produce intelligence products. Instructors and peers provide feedback on briefings and reports produced and presented in class.
*Foundational skills. Creative thinking. Critical thinking. Critical reading.
*Information sources. Identify sources of intelligence information. Evaluate sources for validity and reliability.
*Analytical reports. Develop a structured and actionable analytical report based on a data set given in class.
*Privacy considerations. Ensure protection of privacy and civil rights while producing intelligence products.
*Briefings. Construct and deliver an intelligence briefing based on a data set given in class.