Skip to main content

PSP

Questions?

Unlocking the Power of OSINT: Advanced Searching Techniques for Law Enforcement Investigators and Analysts

Are you a law enforcement professional seeking to sharpen your investigative skills in the digital age? Look no further! Our upcoming webinar will equip you with the tools and strategies needed to excel in online investigations using Google, Bing, and others. During this webinar, you will learn how to master advanced queries, including how to create precise Google and Bing "dorks" (advanced search queries) to uncover specific online mentions. You will also discover techniques to limit searches to specific parameters, such as keywords in titles, URLs, or results from specific domains. Utilizing these techniques, you can cut through the clutter and advertisements, identifying posts mentioning individuals, locations, companies, or specific events with pinpoint accuracy. This webinar will include brand new instruction on how to leverage AI tools like ChatGPT 4, Bing Copilot, and Google Gemini to streamline your efforts.

Presented by:
Megan Munoz, Intelligence Specialist, NW3C

Transnational Gift Card Scam and Money Laundering Investigation

Case synopsis of a Transnational Gift Card Scam laundering $26 million in fraudulently obtained gift cards through major retailers across the United States. Suspects were targeting victims with multiple different scams (Grandparent Scam, Arrest Warrant Scam, Apple Scam, Norton Anti-virus Scam, Publishers Clearing House Scams, and more). Victims were told to purchase Walmart and Target gift cards and provide the card information over the phone to the Scammers. Scammers would electronically transmit the cards to money mules across the U.S. and the cards were redeemed for Apple Products and other gift cards.

Presented by:
Detective Jeff Prater, Colleyville, TX, Police Department Special Investigations Unit, US Secret Service Cyber Crimes Task Force.

NW3C does not share webinar attendees' personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, opinions, or view of NW3C

Using Autopsy to Triage Systems

In this webinar, we will explore the features in Autopsy that can be used to triage a system. We will start with a brief intro to Autopsy then look at the following Triage features: Ingest File Filters/Profiles, Autopsy Live Triage Drive and Autopsy Logical Imager. These features can help with the triage of systems and determine if a deeper dive is warranted. A demonstration of the features will be part of the presentation.

Presented by:
Mark McKinnon, Senior Security Analyst, Sleuthkit Labs

NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, opinions, or view of NW3C.

NDCAC Resources for Law Enforcement in the Digital Age

The NDCAC is a national center established under the Department of Justice designed to help facilitate technical knowledge management, to foster the sharing of solutions and know-how among law enforcement agencies. Their mission is to strengthen law enforcement's relationships with the communications industry, leverage/share the collective technical knowledge and resources of the law enforcement community, and address challenges posed to law enforcement by advanced communications services and technologies. This one-hour webinar will introduce you to the many resources available through the NDCAC to include technical solutions, training, investigative tools (social media search warrant parsers and open-source searches), and analytics.

This webinar is live only and will not be available on-demand

Presented by:
Christopher Tucker, Special Agent, Homeland Security Investigations

Virtual Kidnapping: Unraveling the Tactics of this Scam

In 2024, one of the first cybercrime cases to make the news involved the virtual kidnapping of a Chinese student in the United States. Using this incident as a case study, this webinar critically examines the case and identifies how this new case compares to past virtual kidnapping incidents in the United States. Special attention is paid to the tactics, tools, targets, and modus operandi of virtual kidnappers who target U.S. victims.

Presented by:
Marie-Helen Maras, Full Professor and Director, Center for Cybercrime Studies, John Jay College of Criminal Justice
Jana Arsovska, Associate Professor of Sociology, John Jay College of Criminal Justice, Research Associate, Center for Cybercrime Studies
Major George Perera, Commander Miami-Dade Police Departments Strategic Innovation and High Technology Crimes Bureau

IA105 Intelligence Writing and Briefing

This course covers basic intelligence writing and briefing principles as well as methods for effective and clear intelligence sharing. Topics covered include creative and critical thinking, critical reading skills, source evaluation, privacy and civil rights, intelligence writing style and structure, and generating and presenting intelligence briefings. With guidance from experienced experts, students gain hands-on experience by working through data sets based on real cases to produce intelligence products. Instructors and peers provide feedback on briefings and reports produced and presented in class.

*Foundational skills. Creative thinking. Critical thinking. Critical reading.
*Information sources. Identify sources of intelligence information. Evaluate sources for validity and reliability.
*Analytical reports. Develop a structured and actionable analytical report based on a data set given in class.
*Privacy considerations. Ensure protection of privacy and civil rights while producing intelligence products.
*Briefings. Construct and deliver an intelligence briefing based on a data set given in class.

IA207 Intermediate Analytic Tradecraft and Skills - Academy Version

This course addresses key objectives focused on training intelligence analysts working at or towards the intermediate-level (practitioner and/or experienced analyst). This course expands upon core analytic fundamentals covered in NW3C's FIAT, ISIA, and IWAB offerings. The course begins with an in-depth case study to illustrate the complexities and challenges of a major case scenario for intelligence analysts. The course then examines key concepts related to analytic thinking, cognitive biases, structured analytic techniques, and effective time and project management. Finally, the course concludes with a section on addressing analytic uncertainty in intelligence writing. With guidance from experienced experts, students gain hands-on experience in the course with a complex practical case scenario that will challenge students on both days of the course. NW3C's IATS-Academy Version also includes a 3.5 hour education and training block on critical reading skills.

Key concepts covered in this course include:
*Identifying cognitive biases
*Structured analytic techniques
*Project and time management
*Conveying uncertainty in intelligence writing

Expanding Your Arsenal with Malware Analysis

Expand your DFIR skills by diving into the world of malware analysis. In this webinar, you will learn essential techniques and strategies for incorporating malware analysis into your skillset, enabling you to effectively identify, analyze, and mitigate malicious software threats. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks.

Presented by:
Ali Hadi, Research Director, Champlain College
Marium Khader, Assistant Professor, Champlain College

The Great Corn Caper

In 2011, FBI agents were concluding a routine liaison visit with officials at DuPont Pioneer's offices near Des Moines, Iowa when one of the agents asked if company officials had any unusual activity recently. Specifically, they were looking for anything that may involve targeting the company's intellectual property (IP). The company official subsequently detailed a recent incident where an Asian male had been found digging in one of their grower fields. Grower fields operate like laboratories where companies can test their products. This happenstance piece of information from a routine public/private sector outreach meeting would eventually lead agents on cat-and-mouse surveillance operations across the Midwest. It took them on a deep dive into the biotechnology of proprietary corn breeding. The case was dubbed "Operation Purple Maze," which was a successful Economic Espionage/Theft of Trade Secrets cases involving the theft of bio-engineered corn seed. Omaha FBI SA Militello will discuss the liaison between the FBI and private industry and their techniques and processes related to suspected IP theft investigations.

Presented by:
Special Agent, Byron Militello, Omaha FBI Field Office, Des Moines Resident Agency

Intelligence Analyst Management: Asked and Answered

Join experts from NW3C and the National Network of Fusion Centers as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. In this session, our panel has a wealth of experience with managing intelligence analysts and intelligence projects. This panel will provide perspectives from large and smaller intelligence units at the local and state law enforcement levels. Click here to submit questions regarding intelligence analysis skills, analyst and project management, information collection, or general comments of analytic tradecraft and the NW3C experts will provide answers during this live session.

Presented by:

Heaven Henwood, Law Enforcement Supervisor
Scott Faralli, Director
Devon Rhoads, Assistant Director
Justin Parker, Training Manager

NW3C does not share attendees' personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, opinions, or view of NW3C.

Subscribe to PSP