![]() ![]() ![]() ![]() NW3C does not share Webinar attendees’ personally identifiable information Information on how to identify human trafficking, start an investigation, and Unique, reviewing the relevant human trafficking criminal laws, and providing Trafficking including defining the crime, addressing why it occurs and why it is This webinar provides fundamental knowledge about human Human Trafficking 101: A Primer for Prosecutors and Investigators The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, position, opinions, or views of NW3C. Jeffrey German, Detective, City of Joliet, Illinois Police Department Students will be provided with a copy of the presentation and search warrant templates for social media records. A case study will be presented that was solved using Internet-based investigations and social media. Students will learn about the different social media companies and how their information can assist in investigations using a court order or using open-source intelligence techniques. Students will learn the skills needed to conduct investigations using social media. Megan Munoz, Director of Education and Knowledge Management, Hetherington Group Learning objectives outline useful steps for identifying who is behind a username, explore case examples to retain those steps, and Introduce future challenges. The presentation will include real case examples to demonstrate successful workflows. The presenter will discuss how to harness the Internet to identify the person or group behind a username. Your analysis of the profile may become challenging if the user does not reveal their real identify. Your team, your tools, or your client may locate a social media user of interest or concern. ![]() Social Media and Online Investigations: Identifying Unknown Individuals Individual presenters and do not represent official policy, position, opinions, NW3C is providing the webinar so that attendees can have more information with which to evaluate how this capability might add value to them and the organizations they serve.Ĭontent, views, and opinions expressed in this presentation are those of the This webinar is sponsored by Cobwebs Technologies. Stephen Lerner, Senior Web Intelligence Analyst, Cobwebs Technologies This webinar will also briefly demonstrate the OSINT and cryptocurrency analysis capabilities of Cobwebs. NW3C does not share webinar attendees’ personally identifiable information with any third party without opt-in consent given during registration.īitcoin & Cryptocurrency Investigations: Beyond the Basicsīuilding upon the previous cryptocurrency webinar, "Bitcoin 101: What Are Cryptocurrency and Blockchain All About?" presented by Cobwebs, this webinar will introduce investigative techniques to show how open-source information can be leveraged to attribute identities to wallets and addresses. Robert Leazenby, High-Tech Crimes Specialist Supervisor, NW3Cīrent Metcalfe, High-Tech Crime Specialist, NW3C Moe McClanahan, High-Tech Crime Specialist, NW3C *This webinar is not a replacement for the ICAC UC Chat Investigations Course. We will cover different apps that were used and how they assisted in identifying the targets and discuss some of the interview techniques that helped lead to confessions. In this webinar, we will provide an overview of the chat techniques used in child exploitation cases. Undercover chat investigations are used to help intercept child predators from victimizing children in our communities. Please register using your agency-issued email. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |