(Certificates of ISS Tech Training Available Upon Request)
Unique Training Seminars (24 class room Hours) Led by police force Officers and Ph.D Computer Scientists
On line personal Media and Web Investigations (6 class Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Professionals Guide to Web Investigations (6 class room Hours) Presented by: Mark Bentley, Communications Data Professional, nationwide Cyber Crime police, UK Police
Understanding Cellphone 2G, 3G, 4G and infrastructure that is 5G Intercept and Cryptography (2 class Hours) Presented by: Dr. Jerry Lucas, President, TeleStrategies
Understanding Cryptocurrency 101, DarkNet (TOR and TOR HS) and Defeating Encryption for Technical Investigators (4 class Hours) Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Issues and Considerations in Financial criminal activity Investigations (5 class Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is just A us federal law enforcement that is former Officer.
Top 20 Open supply Tools (OSINT) Used in Cybercrime Investigations (One class Hour) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police
(Certificates of ISS Tech Training Available Upon Request)
Monday, 28 October 2019
Seminar # 1 09:00-17:15
On the web personal Media and Web Investigations (6 class Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
This 1 time session has an up-to-date comprehension of exactly exactly how networking that is social work and just how members act and communicate. Attendees will discover just exactly what info is available on different web internet sites and exactly how to incorporate that information into unlawful investigations and intelligence analysis that is criminal.
Seminar # 2 9:00-17:15
Practitioners Guide to Web Investigations (6 class room Hours) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police
The purpose of that one time seminar would be to just take the attendees through the principles of understanding the Web, where to find information, right through to a complete comprehension of most useful training of a Internet investigator, having understanding and understanding of most of the tools offered to accomplish this. Its aimed primarily in the detective, delivered through the viewpoint of detective, to enable them to really have the most useful methodology and tradecraft to profile and get suspects.
This might be solely police only, as Practical examples, covert and methodology that is investigative tradecraft is going to be provided through the entire seminar.
Seminar # 3 9:00-10:00
Understanding Cellphone 2G/3G/4G Infrastructure and Law Intercept for Technical Investigators delivered by: Dr. Jerry Lucas, President, TeleStrategies
This session presents exactly just exactly what technical detectives need to find out about 2G/3G/4G technology infrastructure, Including: legal Interception of Voice, Data and Messaging, SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8) and monitoring goals utilizing CDR’s, SS7 Interconnect and IMSI Catchers and more.
Seminar # 4 10:15-11:15
Understanding 5G Infrastructure and Lawful Intercept alternatives for Technical Investigators offered by: Dr. Jerry Lucas, President, TeleStrategies
This session is definitely an introduction to 5G and just just exactly what technical detectives have to know including: Infrastructure distinctions with 4G-LTE and 5G, New broadcast Access Technologies, and IMSI that is understanding Encryption on LI and SUPI and SUCI replacement
Seminar # 5 11:30-12:30
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators delivered by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
Seminar # 6 13:45-14:45
Cybercurrency 101: Introduction to What Technical Investigators Need to understand about Bitcoin and Altcoin Transactions, black online Commerce and Blockchain Analysis offered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies
This 101 training seminar is definitely an introduction to Bitcoin, how a system is employed to aid unlawful tasks (e.g. Black Web) and why technical detectives have to comprehend the bitcoin that is basic apparatus (Blockchain) to effectively beat twenty-first century criminals and terrorist actions. Particularly, this introduction to Bitcoin for technical detectives details:
- Bitcoin Principles for Technical Detectives
- Understanding Bitcoin Infrastructure, Blockchain and Bitcoin Mining
- Exactly How Criminals and Terrorists Use TOR and Black Internet
- Bitcoin Cryptography Demystified (For Non-Math Majors)
- Popular Altcoins employed by crooks in addition to brand brand brand New Challenges Facing Law Enforcement
Seminar # 7 15:00-16:00
Investigation processes for Unmasking TOR Hidden solutions and Other black online Operations offered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies
TOR networks are notoriously efficient at hiding the identity that is online of, terrorists as well as others that are as much as no good. One other part that gets less attention are TOR services that are hidden. These are solutions that leverage TOR’s anonymizing capabilities to mask the identification of criminally-hosted online solutions – developing the foundation of almost all gambling that is illegal, medication areas, kid exploitation product, firearm product product sales, terrorism propaganda, and much more.
- Exactly Just Exactly How TOR hides internet protocol address addresses/identity/location
Tuesday, 29 October 2019
Seminar #8 13:00-17:00
Issues and factors in Financial criminal activity Investigations (3 class room Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is really A us that is former federal Enforcement Officer whom specialized in complex fraudulence and cybercrime investigations and presently provides training to boost detection and investigations of fraudulence, money laundering and countertop terror finance.
In this 1-day seminar we will talk about the tools and methods crooks utilize together with police force reaction. Each presentation defines different facets of monetary business and crime models employed by crooks in addition to police techniques and strategies to determine and disrupt them. We’ll talk about the basics in unlawful sites, key players, cash laundering, and money laundering that is trade-based. We are going to explain exactly how information can be seen as cash is relocated throughout the world and exactly how detectives makes most usageful usage for this knowledge. This training is aimed mainly during the detective and analyst, but in addition has application into the law enforcement, cleverness, and monetary regulatory community.