(Certificates of ISS Tech Training Available Upon Request)
Unique Training Seminars (24 class Hours) Led by police force Officers and Ph.D Computer Scientists
On line personal Media and Web Investigations (6 class Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Practitioners Guide to Internet Investigations (6 class Hours) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police
Understanding Cellphone 2G, 3G, 4G and infrastructure that is 5G Intercept and Cryptography (2 class Hours) Presented by: Dr. Jerry Lucas, President, TeleStrategies
Understanding Cryptocurrency 101, DarkNet (TOR and TOR HS) and Defeating Encryption for Technical Investigators (4 class room Hours) Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Issues and factors in Financial criminal activity Investigations (5 class room Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is really a previous united states federal police force Officer.
Top 20 Open supply Tools (OSINT) Used in Cybercrime Investigations (One class Hour) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police
(Certificates of ISS Tech Training Available Upon Request)
Monday, 28 October 2019
Seminar # 1 09:00-17:15
On the web personal Media and Web Investigations (6 class room Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
That one time session provides an up-to-date knowledge of exactly how social media web sites work and just how members act and communicate. Attendees will discover exactly just what info is available on different web web sites and exactly how to incorporate that information into unlawful investigations and unlawful cleverness analysis.
Seminar # 2 9:00-17:15
Professionals help Guide to Web Investigations (6 class room Hours) Presented by: Mark Bentley, Communications Data Professional, nationwide Cyber Crime police force, UK Police
The purpose of that one time seminar is make the attendees through the rules of comprehending the Web, what are information, right through to a complete comprehension of most useful training of a Internet investigator, having understanding and familiarity with most of the tools accessible to accomplish that. Its aimed mainly during the detective, delivered through the viewpoint of detective, to enable them to truly have the methodology that is best and tradecraft to profile and get suspects.
This really is solely police force just, as Practical examples, covert and methodology that is investigative tradecraft are going to be provided through the entire seminar.
Seminar #3 9:00-10:00
Understanding Cellphone 2G/3G/4G Infrastructure and Law Intercept for Technical Investigators delivered by: Dr. Jerry Lucas, President, TeleStrategies
This session presents just exactly exactly what technical detectives have to know about 2G/3G/4G technology infrastructure, Including: legal Interception of Voice, Data and Messaging, SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8) and monitoring objectives making use of CDR’s, SS7 Interconnect and IMSI Catchers and more.
Seminar # 4 10:15-11:15
Understanding infrastructure that is 5G Lawful Intercept alternatives for Technical Investigators delivered by: Dr. Jerry Lucas, President, TeleStrategies
This session is definitely an introduction to 5G and exactly just exactly what technical detectives have to know including: Infrastructure distinctions with 4G-LTE and 5G, New broadcast Access Technologies, and IMSI that is understanding Encryption on LI and SUPI and SUCI replacement
Seminar # 5 11:30-12:30
Understanding NFV that is 5G Slicing and Edge Computing for Law Enforcement Investigators delivered by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
Seminar # 6 13:45-14:45
Cybercurrency 101: Introduction to What Technical Investigators Need to understand about Bitcoin and https://hookupdate.net/nl/fling-recenzja/ Altcoin Transactions, Dark online Commerce and Blockchain Analysis offered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies
This 101 training seminar can be an introduction to Bitcoin, the way the system is employed to aid activitiages which can be criminale.g. Black Web) and why technical detectives need to comprehend the bitcoin that is basic apparatus (Blockchain) to effectively beat twenty-first century criminals and terrorist actions. Particularly, this introduction to Bitcoin for technical detectives details:
- Bitcoin Tips for Technical Detectives
- Understanding Bitcoin Infrastructure, Blockchain and Bitcoin Mining
- Just How Criminals and Terrorists Usage TOR and Dark Online
- Bitcoin Cryptography Demystified (For Non-Math Majors)
- Popular Altcoins employed by Criminals together with brand New Challenges Facing Law Enforcement
Seminar #7 15:00-16:00
Research processes for Unmasking TOR Hidden solutions and Other black Web Operations delivered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies
TOR networks are notoriously capable of hiding the identity that is online of, terrorists among others that are as much as no good. One other part that gets less attention are TOR services that are hidden. They are solutions that leverage TOR’s anonymizing capabilities to mask the identification of criminally-hosted online services – forming the cornerstone of almost all illegal gambling internet sites, medication areas, kid exploitation product, firearm product sales, terrorism propaganda, and much more.
- How TOR hides internet protocol address addresses/identity/location
Tuesday, 29 October 2019
Seminar #8 13:00-17:00
Issues and factors in Financial criminal activity Investigations (3 class Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is just A us that is former federal Enforcement Officer who specialized in complex fraudulence and cybercrime investigations and presently provides training to enhance detection and investigations of fraudulence, cash laundering and countertop terror finance.
In this 1-day seminar we will talk about the tools and methods crooks utilize as well as the police force reaction. Each presentation defines varying elements of monetary criminal activity and business models utilized by criminals in addition to police force techniques and strategies to recognize and disrupt them. We shall discuss the basics in unlawful systems, key players, cash laundering, and trade-based money laundering. We’re going to explain exactly exactly how information are obtainable as cash is relocated across the world and exactly how detectives will make most readily useful usage with this knowledge. This training is aimed mainly in the detective and analyst, but in addition has application towards the police force, cleverness, and monetary regulatory community.