(Certificates of ISS Tech Training Available Upon Request)
Unique Training Seminars (24 class room Hours) Led by police force Officers and Ph.D Computer Scientists
On line personal Media and Web Investigations (6 class room Hours) Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Professionals help happen Guide to Web Investigations (6 class room Hours) Presented by: Mark Bentley, Communications Data Professional, nationwide Cyber Crime police force, UK Police
Understanding Cellphone 2G, 3G, 4G and infrastructure that is 5G Intercept and Cryptography (2 class Hours) Presented by: Dr. Jerry Lucas, President, TeleStrategies
Understanding Cryptocurrency 101, DarkNet (TOR and TOR HS) and Defeating Encryption for Technical Investigators (4 class room Hours) Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Issues and factors in Financial criminal activity Investigations (5 class Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is really a previous united states federal police force Officer.
Top 20 Open supply Tools (OSINT) Used in Cybercrime Investigations (One class Hour) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police, UK Police
(Certificates of ISS Tech Training Available Upon Request)
Monday, 28 October 2019
Seminar # 1 09:00-17:15
On the web personal Media and Web Investigations (6 Classroom Hours) Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
That one time session offers an up-to-date comprehension of exactly just how social media web sites work and just how members act and communicate. Attendees will discover exactly just just what info is available on different web web web sites and exactly how to incorporate that information into unlawful investigations and unlawful cleverness analysis.
Seminar # 2 9:00-17:15
Professionals help Guide to Web Investigations (6 class room Hours) Presented by: Mark Bentley, Communications information Expert, nationwide Cyber Crime police, UK Police
The purpose of that one time seminar is always to use the attendees through the fundamentals of knowing the Web, where to find information, right through to the full knowledge of practice that is best of an Internet investigator, having awareness and understanding of most of the tools open to accomplish this. Its aimed mainly in the detective, delivered through the viewpoint of detective, to enable them to truly have the most readily useful methodology and tradecraft to profile and get suspects.
It is solely police force just, as Practical examples, covert and methodology that is investigative tradecraft is going to be offered for the seminar.
Seminar # 3 9:00-10:00
Understanding Cellphone 2G/3G/4G Infrastructure and Law Intercept for Technical Investigators offered by: Dr. Jerry Lucas, President, TeleStrategies
This session presents exactly exactly what technical investigators have to know about 2G/3G/4G technology infrastructure, Including: legal Interception of Voice, Data and Messaging, SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8) and monitoring goals utilizing CDR’s, SS7 Interconnect and IMSI Catchers and more.
Seminar #4 10:15-11:15
Understanding infrastructure that is 5G legal Intercept alternatives for Technical Investigators delivered by: Dr. Jerry Lucas, President, TeleStrategies
This session can be an introduction to 5G and exactly what technical detectives need to find out including: Infrastructure distinctions with 4G-LTE and 5G, New Radio Access Technologies, and Understanding IMSI Encryption influence on LI and SUPI and SUCI replacement
Seminar # 5 11:30-12:30
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
Seminar # 6 13:45-14:45
Cybercurrency 101: Introduction to What Technical Investigators Need to understand about Bitcoin and Altcoin Transactions, Dark internet Commerce and Blockchain Analysis offered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies
This 101 training seminar can be an introduction to Bitcoin, the way the system can be used to guide unlawful tasks (e.g. Black Web) and why technical detectives need to comprehend the basic Bitcoin transaction apparatus (Blockchain) to effectively beat twenty-first century crooks and terrorist actions. Particularly, this introduction to Bitcoin for technical detectives details:
- Bitcoin Essentials for Technical Detectives
- Understanding Bitcoin Infrastructure, Blockchain and Bitcoin Mining
- Just Exactly Just How Criminals and Terrorists Usage TOR and Black Online
- Bitcoin Cryptography Demystified (For Non-Math Majors)
- Popular Altcoins employed by crooks plus the brand New Challenges Facing Law Enforcement
Seminar # 7 15:00-16:00
Research processes for Unmasking TOR Hidden solutions and Other black online Operations offered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies
TOR networks are notoriously capable of hiding the identity that is online of, terrorists among others that are up to no good. One other part that gets less attention are TOR concealed solutions. They are solutions that leverage TOR’s anonymizing capabilities to mask the identification of criminally-hosted online solutions – developing the foundation of almost all gambling that is illegal, medication markets, kid exploitation product, firearm product sales, terrorism propaganda, and much more.
- Exactly How TOR hides internet protocol address addresses/identity/location
Tuesday, 29 October 2019
Seminar #8 13:00-17:00
Issues and Considerations in Financial criminal activity Investigations (3 class Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is a previous united states federal law Enforcement Officer who specialized in complex fraudulence and cybercrime investigations and presently provides training to boost detection and investigations of fraudulence, cash laundering and countertop terror finance.
In this seminar that is 1-day will talk about the tools and methods crooks utilize therefore the police force reaction. Each presentation describes varying elements of monetary business and crime models utilized by criminals in addition to police force techniques and techniques to determine and disrupt them. We shall talk about the basics in unlawful sites, key players, cash laundering, and trade-based money laundering. We shall explain just exactly how information is found as cash is relocated around the globe and just how detectives makes use that is best with this knowledge. This training is aimed mainly during the detective and analyst, but additionally has application to your police, cleverness, and economic regulatory community.