I would ike to inform about ISS World Latin America Agenda

(Certificates of ISS Tech Training Available Upon Request)

Special Training Seminars (24 class Hours) Led by police Officers and Ph.D Computer Scientists

On line personal Media and Web Investigations (6 class Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Professionals help Guide to Web Investigations (6 class Hours) Presented by: Mark Bentley, Communications information Expert, nationwide Cyber Crime police force, UK Police

Understanding Cellphone 2G, 3G, 4G and infrastructure that is 5G Intercept and Cryptography (2 class Hours) Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding Cryptocurrency 101, DarkNet (TOR and TOR HS) and Defeating Encryption for Technical Investigators (4 class room Hours) Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Issues and factors in Financial criminal activity Investigations (5 class room Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is just A us federal law enforcement that is former Officer.

Top 20 Open supply Tools (OSINT) Used in Cybercrime Investigations (One class Hour) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police

(Certificates of ISS Tech Training Available Upon Request)

Monday, 28 October 2019

Seminar # 1 09:00-17:15

On the web personal Media and Internet Investigations (6 class room Hours) Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

This 1 time session has an up-to-date knowledge of just just just how networking that is social work and how members act and communicate. Attendees will discover just exactly what info is available on different internet web sites and just how to incorporate that information into unlawful investigations and unlawful cleverness analysis.

Seminar # 2 9:00-17:15

Professionals help Guide to Web Investigations (6 class Hours) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police, UK Police

The goal of that one time seminar is use the attendees through the rules of comprehending the Web, how to locate information, right through to a complete knowledge of practice that is best of an Internet investigator, having understanding and understanding of all of the tools accessible to accomplish that. It really is aimed mainly during the detective, delivered through the viewpoint of detective, to enable them to truly have the methodology that is best and tradecraft to profile and get suspects.

This is certainly solely police just, as Practical examples, covert and methodology that is investigative tradecraft is supposed to be provided through the seminar.

Seminar # 3 9:00-10:00

Understanding Cellphone 2G/3G/4G Infrastructure and Law Intercept for Technical Investigators offered by: Dr. Jerry Lucas, President, TeleStrategies

This session presents exactly exactly exactly what technical investigators have to know about 2G/3G/4G technology infrastructure, Including: legal Interception of Voice, Data and Messaging, SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8) and monitoring objectives utilizing CDR’s, SS7 Interconnect and IMSI Catchers and more.

Seminar # 4 10:15-11:15

Understanding 5G Infrastructure and legal Intercept alternatives for Technical Investigators delivered by: Dr. Jerry Lucas, President, TeleStrategies

This session is definitely an introduction to 5G and just just exactly what technical detectives must know including: Infrastructure distinctions with 4G-LTE and 5G, New broadcast Access Technologies, and IMSI that is understanding Encryption on LI and SUPI and SUCI replacement

Seminar # 5 11:30-12:30

Understanding NFV that is 5G Slicing and Edge Computing for Law Enforcement Investigators delivered by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Seminar # 6 13:45-14:45

Cybercurrency 101: Introduction to interracialcupid What Technical Investigators Need to understand about Bitcoin and Altcoin Transactions, black online Commerce and Blockchain Analysis offered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies

This 101 training seminar is an introduction to Bitcoin, how a system is employed to guide activitiages which can be criminale.g. Black Web) and why technical detectives have to understand the bitcoin that is basic apparatus (Blockchain) to effectively beat twenty-first century crooks and terrorist actions. Particularly, this introduction to Bitcoin for technical investigators details:

Seminar # 7 15:00-16:00

Research processes for Unmasking TOR Hidden solutions and Other black online Operations offered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies

TOR networks are notoriously good at hiding the identity that is online of, terrorists as well as others who will be up to no good. One other part that gets less attention are TOR concealed solutions. They are solutions that leverage TOR’s anonymizing capabilities to mask the identification of criminally-hosted online solutions – developing the cornerstone of almost all unlawful gambling web sites, medication areas, kid exploitation product, firearm product sales, terrorism propaganda, and much more.

  • TOR hosting, what exactly is .ONION and content analysis
  • Tuesday, 29 October 2019

    Seminar #8 13:00-17:00

    Concerns and factors in Financial Crime Investigations (3 class Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is really A us that is former federal Enforcement Officer whom specialized in complex fraudulence and cybercrime investigations and presently provides training to enhance detection and investigations of fraudulence, cash laundering and countertop terror finance.

    In this seminar that is 1-day will talk about the tools and methods crooks utilize while the police force reaction. Each presentation defines different facets of monetary crime and company models employed by crooks along with police techniques and techniques to recognize and disrupt them. We’re going to talk about the basics in unlawful sites, key players, cash laundering, and money laundering that is trade-based. We shall explain exactly exactly just how information can be located as cash is moved around the globe and how detectives could make most usageful use with this knowledge. This training is aimed mainly during the detective and analyst, but additionally has application into the police, cleverness, and economic community that is regulatory.

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    Abrir Whatsapp
    Equador
    Olá, seja bem-vindo.
    Em quê podemos ajudar?