Blog

I would ike to inform about ISS World Latin America Agenda

(Certificates of ISS Tech Training Available Upon Request)

Special Training Seminars (24 class room Hours) Led by police Officers and Ph.D Computer Scientists

On line personal Media and Web Investigations (6 class room Hours) Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Professionals Guide to Web Investigations (6 class Hours) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police

Understanding Mobile 2G, 3G, 4G and 5G Infrastructure, Intercept and Cryptography (2 class Hours) Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding Cryptocurrency 101, DarkNet (TOR and TOR HS) and Defeating Encryption for Technical Investigators (4 class room Hours) Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Issues and Considerations in Financial criminal activity Investigations (5 class Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is a previous united states federal police force Officer.

Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations (One class Hour) Presented by: Mark Bentley, Communications Data Professional, nationwide Cyber Crime police, UK Police

(Certificates of ISS Tech Training Available Upon Request)

Monday, 28 October 2019

Seminar # 1 09:00-17:15

On line personal Media and Web Investigations (6 class Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

This 1 time session provides an up-to-date comprehension of just exactly how social media websites work and just how members act and communicate. Attendees will discover exactly just what info is available on various web web web sites and exactly how to incorporate that information into unlawful investigations and intelligence analysis that is criminal.

Seminar #2 9:00-17:15

Professionals help Guide to Internet Investigations (6 Classroom Hours) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police

The aim of this one time seminar would be to use the attendees through the rules of knowing the Web, what are data, right through to a complete knowledge of practice that is best of an Internet investigator, having understanding and understanding of most of the tools accessible to accomplish that. It really is aimed mainly in the detective, delivered through the perspective of detective, to enable them to truly have the most readily useful methodology and tradecraft to profile and get suspects.

This is certainly solely police force just, as Practical examples, covert and methodology that is investigative tradecraft would be offered through the entire seminar.

Seminar # 3 9:00-10:00

Understanding Cellphone 2G/3G/4G Infrastructure and Law Intercept for Technical Investigators delivered by: Dr. Jerry Lucas, President, TeleStrategies

This session presents just what technical detectives must know about 2G/3G/4G technology infrastructure, Including: legal Interception of Voice, Data and Messaging, SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8) and monitoring objectives utilizing CDR’s, SS7 Interconnect and IMSI Catchers and more.

Seminar # 4 10:15-11:15

Understanding infrastructure that is 5G legal Intercept Options for Technical Investigators delivered by: Dr. Jerry Lucas, President, TeleStrategies

This session is an introduction to 5G and just just what technical detectives need to find out including: Infrastructure distinctions with 4G-LTE and 5G, New broadcast Access Technologies, and Understanding IMSI Encryption influence on LI and SUPI and SUCI replacement

Seminar # 5 11:30-12:30

Understanding NFV that is 5G Slicing and Edge Computing for Law Enforcement Investigators delivered by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Seminar # 6 13:45-14:45

Cybercurrency 101: Introduction to What Technical Investigators Need to understand about Bitcoin and Altcoin Transactions, black online Commerce and Blockchain Analysis delivered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies

This 101 training seminar is definitely an introduction to Bitcoin, the way the system can be used to aid activities which are criminale.g. Black Web) and why technical detectives need certainly to comprehend the bitcoin that is basic apparatus (Blockchain) to successfully beat twenty-first century crooks and terrorist actions. Especially, this introduction to Bitcoin for technical detectives details:

  • Bitcoin Fundamentals for Technical Investigators
  • Understanding Bitcoin Infrastructure, Blockchain and Bitcoin Mining
  • Exactly How Criminals and Terrorists Usage TOR and Dark Internet
  • Bitcoin Cryptography Demystified (For Non-Math Majors)
  • Popular Altcoins employed by crooks together with brand brand brand New Challenges Facing Law Enforcement

Seminar # 7 15:00-16:00

Research processes for Unmasking TOR Hidden solutions and Other black online Operations delivered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies

TOR networks are notoriously able to hiding the online identification of crooks, terrorists among others who will be as much as no good. One other part that receives less attention are TOR concealed services. They are solutions that leverage TOR’s anonymizing capabilities to mask the identification of criminally-hosted online solutions – developing the foundation of almost all unlawful gambling web sites, medication markets, son or daughter exploitation product, firearm product product product sales, terrorism propaganda, and much more.

    Just Just Just How TOR hides internet protocol address addresses/identity/location

  • TOR hosting, what exactly is .ONION and analysis that is content
  • Tuesday, 29 October 2019

    Seminar #8 13:00-17:00

    Issues and factors in Financial criminal activity Investigations (3 class room Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is a previous united states federal law Enforcement Officer whom specialized in complex fraudulence and cybercrime investigations and presently provides training to enhance detection and investigations of fraudulence, cash laundering and countertop terror finance.

    In this seminar that is 1-day will talk about the tools and methods crooks utilize therefore the police force reaction. Each presentation defines different facets of monetary business and crime models utilized by crooks along with police force techniques and strategies to recognize and disrupt them. We https://hookupdate.net/nl/singleparentmeet-recenzja/ shall talk about the basics in unlawful systems, key players, cash laundering, and trade-based cash laundering. We shall explain just exactly exactly how information can be obtained as cash is relocated across the world and exactly how detectives will make best usage with this knowledge. This training is aimed primarily in the detective and analyst, but in addition has application into the police force, cleverness, and economic community that is regulatory.