11 Jul I’d like to inform about ISS World Latin America Agenda

I’d like to inform about ISS World Latin America Agenda

(Certificates of ISS Tech Training Available Upon Request)

Special Training Seminars (24 class room Hours) Led by police force Officers and Ph.D Computer Scientists

On the web personal Media and Web Investigations (6 class Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Practitioners Guide to Web Investigations (6 class Hours) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police

Understanding Cellphone 2G, 3G, 4G and infrastructure that is 5G Intercept and Cryptography (2 class room Hours) Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding Cryptocurrency 101, DarkNet (TOR and TOR HS) and Defeating Encryption for Technical Investigators (4 class room Hours) Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Issues and factors in Financial criminal activity Investigations (5 class room Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is a previous us federal police force Officer.

Top 20 Open supply Tools (OSINT) Used in Cybercrime Investigations (One class Hour) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police, UK Police

(Certificates of ISS Tech Training Available Upon Request)

Monday, 28 October 2019

Seminar # 1 09:00-17:15

On line personal Media and Web Investigations (6 class room Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

That one day session offers an up-to-date knowledge of just just how networking that is social work and just how members act and communicate. Attendees will discover just just what info is available on different web web sites and just how to incorporate that information into unlawful investigations and intelligence analysis that is criminal.

Seminar #2 9:00-17:15

Professionals Guide to Web Investigations (6 class Hours) Presented by: Mark Bentley, Communications information Expert, National Cyber Crime police force, UK Police

The purpose of that one time seminar is always to simply take the attendees through the essentials of comprehending the online, how to locate information, right through to the full knowledge of practice that is best of a Internet investigator, having understanding and familiarity with most of the tools open to accomplish this. Its aimed mainly during the detective, delivered through the viewpoint of detective, to enable them to truly have the methodology that is best and tradecraft to profile and get suspects.

This can be solely police force just, as Practical examples, covert and methodology that is investigative tradecraft will likely to be offered through the entire seminar.

Seminar # 3 9:00-10:00

Understanding Mobile 2G/3G/4G Infrastructure and Law Intercept for Technical Investigators delivered by: Dr. Jerry Lucas, President, TeleStrategies

This session presents exactly just just what technical detectives have to know about 2G/3G/4G technology infrastructure, Including: Lawful Interception of Voice, Data and Messaging, SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8) and monitoring goals making use of CDR’s, SS7 Interconnect and IMSI Catchers and more.

Seminar # 4 10:15-11:15

Understanding infrastructure that is 5G legal Intercept alternatives for Technical Investigators offered by: Dr. Jerry Lucas, President, TeleStrategies

This session is definitely an introduction to 5G and exactly just exactly what technical detectives have to know including: Infrastructure distinctions with 4G-LTE and 5G, New broadcast Access Technologies, and IMSI that is understanding Encryption on LI and SUPI and SUCI replacement

Seminar # 5 11:30-12:30

Understanding NFV that is 5G Slicing and Edge Computing for Law Enforcement Investigators delivered by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Seminar # 6 13:45-14:45

Cybercurrency 101: Introduction to What Technical Investigators Need to understand about Bitcoin and Altcoin Transactions, black online Commerce and Blockchain Analysis delivered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies

This 101 training seminar is definitely an introduction to Bitcoin, the way the system can be used to aid activitiages which can be criminale.g. Black Web) and why technical investigators need to comprehend the bitcoin that is basic apparatus (Blockchain) to effectively defeat twenty-first century crooks and terrorist actions. Particularly, this introduction to Bitcoin for technical detectives details:

  • Bitcoin Fundamentals for Technical Investigators
  • Understanding Bitcoin Infrastructure, Blockchain and Bitcoin Mining
  • Just How Criminals and Terrorists Usage TOR and Black Online
  • Bitcoin Cryptography Demystified (For Non-Math Majors)
  • Popular Altcoins employed by crooks together with brand New Challenges Facing Law Enforcement

Seminar # 7 15:00-16:00

Research processes for Unmasking TOR Hidden solutions and Other black online Operations delivered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies

TOR https://hookupdate.net/nl/heatedaffairs-recenzja/ networks are notoriously effective at hiding the online identification of crooks, terrorists as well as others who will be as much as no good. One other part that gets less attention are TOR concealed solutions. They are services that leverage TOR’s anonymizing capabilities to mask the identification of criminally-hosted online solutions – developing the cornerstone of just about all gambling that is illegal, medication areas, son or daughter exploitation product, firearm product product sales, terrorism propaganda, and more.

    Just Exactly How TOR hides internet protocol address addresses/identity/location

  • TOR hosting, what exactly is .ONION and analysis that is content
  • Tuesday, 29 October 2019

    Seminar #8 13:00-17:00

    Issues and Considerations in Financial Crime Investigations (3 class Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is just A us that is former federal Enforcement Officer who specialized in complex fraudulence and cybercrime investigations and presently provides training to enhance detection and investigations of fraudulence, money laundering and countertop terror finance.

    In this 1-day seminar we will talk about the tools and methods crooks utilize additionally the police reaction. Each presentation defines varying elements of economic business and crime models utilized by crooks in addition to police force practices and techniques to spot and disrupt them. We are going to talk about the basics in unlawful systems, key players, cash laundering, and money laundering that is trade-based. We’re going to explain exactly exactly how information can be obtained as cash is relocated around the globe and just how detectives will make most readily useful usage for this knowledge. This training is aimed mainly in the detective and analyst, but in addition has application to your police, cleverness, and economic community that is regulatory.