(Certificates of ISS Tech Training Available Upon Request)
Unique Training Seminars (24 class Hours) Led by police force Officers and Ph.D Computer Scientists
On line personal Media and Web Investigations (6 class room Hours) Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Professionals Guide to Web Investigations (6 class room Hours) Presented by: Mark Bentley, Communications information Professional, National Cyber Crime police, UK Police
Understanding Cellphone 2G, 3G, 4G and 5G Infrastructure, Intercept and Cryptography (2 class Hours) Presented by: Dr. Jerry Lucas, President, TeleStrategies
Understanding Cryptocurrency 101, DarkNet (TOR and TOR HS) and Defeating Encryption for Technical Investigators (4 Classroom Hours) Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Issues and factors in Financial criminal activity Investigations (5 class room Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is just A us federal law enforcement that is former Officer.
Top 20 Open supply Tools (OSINT) Used in Cybercrime Investigations (One class Hour) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police
(Certificates of ISS Tech Training Available Upon Request)
Monday, 28 October 2019
Seminar # 1 09:00-17:15
On the web personal Media and Web Investigations (6 class Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
This one day session provides an up-to-date comprehension of just just how social media websites work and just how members act and communicate. Attendees will discover exactly what info is available on different web web internet sites and exactly how to incorporate that information into unlawful investigations and unlawful cleverness analysis.
Seminar # 2 9:00-17:15
Professionals Guide to Web Investigations (6 class room Hours) Presented by: Mark Bentley, Communications information Expert, nationwide Cyber Crime police force, UK Police
The goal of that one time seminar is use the attendees through the principles of comprehending the Web, how to locate information, right through to the full knowledge of practice that is best of a Internet investigator, having understanding and understanding of all of the tools offered to accomplish this. It really is aimed https://hookupdate.net/nl/ilove-recenzja/ mainly during the detective, delivered through the viewpoint of detective, to enable them to really have the most useful methodology and tradecraft to profile and get suspects.
That is solely police force just, as Practical examples, covert and methodology that is investigative tradecraft may be provided through the seminar.
Seminar # 3 9:00-10:00
Understanding Cellphone 2G/3G/4G Infrastructure and Law Intercept for Technical Investigators delivered by: Dr. Jerry Lucas, President, TeleStrategies
This session presents exactly exactly what technical detectives must know about 2G/3G/4G technology infrastructure, Including: legal Interception of Voice, Data and Messaging, SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8) and monitoring goals making use of CDR’s, SS7 Interconnect and IMSI Catchers and more.
Seminar # 4 10:15-11:15
Understanding 5G Infrastructure and legal Intercept alternatives for Technical Investigators offered by: Dr. Jerry Lucas, President, TeleStrategies
This session is an introduction to 5G and just exactly what technical detectives need to find out including: Infrastructure distinctions with 4G-LTE and 5G, New broadcast Access Technologies, and Understanding IMSI Encryption influence on LI and SUPI and SUCI replacement
Seminar # 5 11:30-12:30
Understanding NFV that is 5G Slicing and Edge Computing for Law Enforcement Investigators delivered by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
Seminar # 6 13:45-14:45
Cybercurrency 101: Introduction to What Technical Investigators Need to understand about Bitcoin and Altcoin Transactions, Dark internet Commerce and Blockchain Analysis delivered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies
This 101 training seminar is definitely an introduction to Bitcoin, how a system can be used to aid activities which can be criminale.g. Black Web) and why technical detectives need certainly to realize the basic Bitcoin deal apparatus (Blockchain) to effectively beat twenty-first century crooks and terrorist actions. Particularly, this introduction to Bitcoin for technical detectives addresses:
- Bitcoin Essentials for Technical Detectives
- Understanding Bitcoin Infrastructure, Blockchain and Bitcoin Mining
- Just How Criminals and Terrorists Usage TOR and Black Internet
- Bitcoin Cryptography Demystified (For Non-Math Majors)
- Popular Altcoins employed by crooks and also the brand brand New Challenges Facing Law Enforcement
Seminar #7 15:00-16:00
Research processes for Unmasking TOR Hidden solutions and Other Dark online Operations offered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies
TOR networks are notoriously able to hiding the identity that is online of, terrorists as well as others who will be as much as no good. One other part that gets less attention are TOR services that are hidden. They are solutions that leverage TOR’s anonymizing capabilities to mask the identification of criminally-hosted online solutions – forming the cornerstone of almost all gambling that is illegal, medication areas, youngster exploitation product, firearm product sales, terrorism propaganda, and more.
- Exactly Exactly How hides that are TOR addresses/identity/location
Tuesday, 29 October 2019
Seminar #8 13:00-17:00
Issues and factors in Financial criminal activity Investigations (3 class Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is A us that is former federal Enforcement Officer whom specialized in complex fraud and cybercrime investigations and presently provides training to enhance detection and investigations of fraudulence, money laundering and counter terror finance.
In this 1-day seminar we will talk about the tools and methods crooks utilize together with police reaction. Each presentation defines varying elements of monetary business and crime models employed by crooks along with police force practices and strategies to spot and disrupt them. We are going to talk about the basics in unlawful systems, key players, cash laundering, and money laundering that is trade-based. We shall explain exactly exactly just how information are obtainable as cash is relocated all over the world and exactly how investigators make most usageful usage of the knowledge. This training is aimed primarily during the investigator and analyst, but in addition has application to your police force, cleverness, and monetary regulatory community.