(Certificates of ISS Tech Training Available Upon Request)
Unique Training Seminars (24 class Hours) Led by police force Officers and Ph.D Computer Scientists
Online Social Media and Web Investigations (6 class Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Professionals help Guide to Web Investigations (6 class room Hours) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police
Understanding Cellphone 2G, 3G, 4G and 5G Infrastructure, Intercept and Cryptography (2 class Hours) Presented by: Dr. Jerry Lucas, President, TeleStrategies
Understanding Cryptocurrency 101, DarkNet (TOR and TOR HS) and Defeating Encryption for Technical Investigators (4 class Hours) Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Issues and factors in Financial criminal activity Investigations (5 class Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is just A us federal law enforcement that is former Officer.
Top 20 Open supply Tools (OSINT) Used in Cybercrime Investigations (One Classroom Hour) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police
(Certificates of ISS Tech Training Available Upon Request)
Monday, 28 October 2019
Seminar # 1 09:00-17:15
On line personal Media and Web Investigations (6 class Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
That one time session offers an up-to-date comprehension of just just just how networking that is social work and just how members act and communicate. Attendees will discover just just what info is available on different web web sites and exactly how to incorporate that information into unlawful investigations and criminal cleverness analysis.
Seminar # 2 9:00-17:15
Professionals Guide to Internet Investigations (6 class room Hours) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police, UK Police
The purpose of this one time seminar would be to make the attendees through the essentials of comprehending the online, what are information, right through to the full comprehension of most useful training of a Internet investigator, having understanding and understanding of most of the tools accessible to accomplish this. It really is aimed mainly during the investigator, delivered through the viewpoint of detective, to enable them to really have the most useful methodology and tradecraft to profile and get suspects.
This can be solely police force just, as Practical examples, covert and methodology that is investigative tradecraft would be given through the entire seminar.
Seminar # 3 9:00-10:00
Understanding Cellphone 2G/3G/4G Infrastructure and Law Intercept for Technical Investigators offered by: Dr. Jerry Lucas, President, TeleStrategies
This session presents just just what technical detectives need to find out about 2G/3G/4G technology infrastructure, Including: legal Interception of Voice, Data and Messaging, SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8) and monitoring objectives making use of CDR’s, SS7 Interconnect and IMSI Catchers and more.
Seminar # 4 10:15-11:15
Understanding 5G Infrastructure and legal Intercept alternatives for Technical Investigators offered by: Dr. Jerry Lucas, President, TeleStrategies
This session can be an introduction to 5G and exactly what technical investigators have to know including: Infrastructure distinctions with 4G-LTE and 5G, New broadcast Access Technologies, and Understanding IMSI Encryption influence on LI and SUPI and SUCI replacement
Seminar # 5 11:30-12:30
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators delivered by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
Seminar # 6 13:45-14:45
Cybercurrency 101: Introduction to What Technical Investigators Need to understand about Bitcoin and Altcoin Transactions, black online Commerce and Blockchain Analysis offered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies
This 101 training seminar is an introduction to Bitcoin, the way the system can be used to guide activities which are criminale.g. Black Web) and why technical detectives need to comprehend the basic Bitcoin deal device (Blockchain) to effectively beat 21st century crooks and terrorist actions. Especially, this introduction to Bitcoin for technical detectives details:
- Bitcoin Rules for Technical Detectives
- Understanding Bitcoin Infrastructure, Blockchain and Bitcoin Mining
- Just Exactly How Criminals and Terrorists Usage TOR and Dark Internet
- Bitcoin Cryptography Demystified (For Non-Math Majors)
- Popular Altcoins employed by Criminals and also the brand brand New Challenges Facing Law Enforcement
Seminar # 7 15:00-16:00
Investigation processes for Unmasking TOR Hidden solutions and Other black online Operations delivered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies
TOR networks are notoriously able to hiding the online identification of criminals, terrorists as well as others that are as much as no good. One other part that receives less attention are TOR concealed solutions. These are solutions that leverage TOR’s anonymizing capabilities to mask the identity of criminally-hosted online services – developing the foundation of almost all unlawful gambling web sites, drug areas, kid exploitation product, firearm product product sales, terrorism propaganda, and much more.
- Exactly Just Exactly How hides that are TOR addresses/identity/location
Tuesday, 29 October 2019
Seminar #8 13:00-17:00
Issues and factors in Financial criminal activity Investigations (3 class Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is A us that is former federal Enforcement Officer whom specialized in complex fraudulence and cybercrime investigations and presently provides training to enhance detection and investigations of fraudulence, cash laundering and countertop terror finance.
In this 1-day seminar we will talk about the tools and methods crooks utilize together with police force reaction. Each presentation defines varying elements of monetary criminal activity and company models employed by crooks along with police force techniques and strategies to recognize and disrupt them. We are going to talk about the essentials in unlawful sites, key players, cash laundering, and money laundering that is trade-based. We are going to explain exactly exactly exactly how information can be bought as cash is moved around the globe and how detectives could make most usageful use with this knowledge. This training is aimed mainly during the detective and analyst, but additionally has application to your police force, intelligence, and monetary community that is regulatory.