The Internet: Investigations and Intelligence Presented By: Chuck Cohen, MBA, CFE, CECFE

The Internet: Investigations and Intelligence Presented By: Chuck Cohen, MBA, CFE, CECFE

The Pennsylvania Governor’s Office of Homeland Security and the National White Collar Crime Center present: The Internet: Investigations and Intelligence Presented by: Chuck Cohen, MBA, CFE, CECFE A two-day Investigative Course designed for LE professionals at any level of familiarity with the Internet and computers. Participants from beginners to advanced, will find this course beneficial. Open Source Intelligence (OSINT) Tools Creating an inexpensive OSINT Toolbox Metadata analysis and investigations Emerging technologies and trends LE interaction with ISPs Data retention and the service of legal process Electronic Communications Privacy Act Online UC operation Proxies, VPNs, Tor, Onion Routers EXIF tags and geolocation of devices Deepnet and Darknet Follow the link or click the QR Code to register: https://www.nw3c.org/webinars/register?id=15215 Note: Course contains graphic content including profanity, and sexual and violent images ONLINE VIRTUAL COURSE Contact for Questions: DATE: May 5th and 6th, 2021 Kristin Daniels, Deputy Director TIME: 8:30 am — 4 :30 pm Eastern PA Office of Homeland Security [email protected]; 717-346-4461 The Internet: Investigations and Intelligence (Two Day Course) INSTRUCTOR: CHARLES COHEN, Vice President NW3C The way people choose to communicate, the technologies that facilitate that communication, and the companies that the control the companies have rapidly evolved. Criminal investigators and analysts need to also evolve. There are over 1,000 English language social networking sites on the Internet. Facebook alone has 2.6 billion monthly active users as of March 31, 2020. While this is the best‐known site in the United States, several others are dominant in other countries and cultures. VK is the most popular in Russia, while QQ and Sina Weibo rule in China. Facebook generates four new petabytes of data, including 350 million new uploaded images, per day. It is the world’s largest holder of images of faces tied to identity. Even as this is true, people worldwide are moving away from Web‐based online social networks in favor of app‐ based online social networks such as WhatsApp, Snapchat, Kik, Whisper, Instagram, TikTok, Periscope, and many others. Encrypted communication platforms, including Wickr, Surespot, Viber, and Telegram are changing the investigative landscape. Too often, investigators and analysts overlook or underutilize these valuable resources. Social networking sites are virtual communities. As in any large community, criminal organizations, fraud, violet crime, and victimization exist. Investigators need to understand these communities along with the tools, tricks, and techniques to prevent, track, and solve crimes. Current trends include social networks based around live streaming video, like OovoO and TinyChat, and mobile social networks like, Snapchat, Yellow, Kik, and LiveMe. These emergent technologies lead to risks and opportunities for law enforcement professionals that never previously existed. Ubiquitous default encryption poses an unprecedented challenge both for open source collection and the service of legal process. Current and future undercover officers must now face a world in which facial recognition and Internet caching make it possible to locate an online image posted years or decades before. The meshing of geolocation, social networking, and mobile devices allow officers to employ new investigative techniques not previously available. This two‐day (16 hour) course is designed for criminal intelligence analysts and investigators. Students with any level of familiarity with the Internet and computers, from beginning to advanced, will find this course beneficial. The program gives students an up‐to‐date understanding of how social networking sites work and how members act and interact. Student will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis. Modules: • OSINT and Criminal Investigations • Metadata Exploitation in Criminal Investigations • Open Source Intelligence (OSINT) Collection Tools: Creating an Inexpensive OSINT Toolbox • EXIF Tags and Geolocation of Devices for Investigations and Operational Security • Online Undercover Operations: Observation and Infiltration • Law Enforcement Interaction with Internet Service Providers: Data Retention and the Service of Legal Process • What Investigators Need to Know about Emerging Technologies Used to Hide on the Internet • Proxies, VPNs, Tor, Onion Routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators By the end of the course, students will: Have a clear understanding how criminals exploit social communities through case studies and live online examples. Learn how to efficiently do automated subject link analysis using social networking data. Be familiar with the operation of the largest sites, to include: Twitter, Facebook, YouTube, Ask.fm, Snapchat, Foursquare, and Tumblr. Learn various ways of concealing the location from which the Internet is accessed when using online social networks. Understand how criminal organizations use online social networks to interact, identify victims, and conceal their identity. Receive extensive information on the two leading trends in online social networks— microblogging and mobilization. o Become acquainted with the latest mobile social networking technology and platforms, including geolocation. Know what information is available from social networking sites through the service of legal process, and how to make that service. o Understand Mutual Legal Assistance Treaty (MLAT) policies and practice along with the implications of the European Union General Data Protection Regulation (GDPR) and other regulations with transnational reach. o Thoroughly explore the implications of 18 USC§2703, the Communications Assistance for Law Enforcement Act (CALEA), and the Electronic Communications Privacy Act (ECPA), and how these federal laws impact in investigative and intelligence operations. • Learn about the risk to law enforcement officers, especially undercover investigators, posed by online social networking, social media, and viral videos. • Practice preserving the publicly viewable portions of a suspect social networking profile and flash video in a forensically sound manner. • Learn how to, and practice, using proxies, bulletproof servers, onion routers, and other means to conceal online identity. • Learn how to obtain free open‐source information on suspects and intelligence targets using the Internet. • Learn how to identify real‐life intelligence targets by participating in the virtual world of social networking. • Understand the unique challenges and opportunities associated with specialty networking sites, like Grou.ps and Gigatribe. • Become acquainted with the latest mobile social networking technology and platforms, including geotagged photographs, Life360, and mobile VoIP. Students receive course material, including legal process contact information, preservation letters, boilerplate compliance documents, and resource guides. NOTICE: Course contains graphic content including profanity, and sexual and violent images. ABOUT THE INSTUCTOR: Chuck Cohen is Vice President at NW3C, The National White Collar Crime Center. He is a Professor of Practice in the Indiana University Bloomington Department of Criminal Justice, where he has taught since 2003. Chuck serves as an Auxiliary Detective with the Indiana University Police Department, providing technical assistance and giving him statewide police authority. Chuck is a retired Indiana State Police Captain, where he served for over 25 years. He was most recently the Commander, Intelligence and Investigative Technologies. In this capacity, Capt. Cohen was responsible for the cybercrime, electronic surveillance, technical services, and Internet crimes against children units along with overseeing the department’s overt and covert criminal intelligence functions. Chuck was the Indiana Intelligence Fusion Center Executive Director and Indiana Internet Crimes Against Children (ICAC) Task Force Commander. Chuck’s formal education includes a Master of Business Administration from Indiana Wesleyan University and an undergraduate degree from Indiana University with a double major in Criminal Justice and Psychology. Chuck is also a Certified Fraud Examiner and Certified Economic Crime Forensic Examiner. He speaks internationally on topics including the implications of online social networks in criminal investigations and criminal intelligence gathering, cybercrime, online fraud, money laundering, corruption investigations, and the investigation of skilled criminal offenders. He has trained investigators and analysts on five continents. Chuck testified to the 114th Congress in 2016 as a subject matter expert on encryption. In 2020, he provided expert testimony related to the Darknet, child exploitation, and human trafficking before the President’s Commission on Law Enforcement and Administration of Justice. Chuck was a member of the Office of the Director of National Intelligence Summer Hard Problem Program in 2008, 2009, and 2010. He sits on the IACP Cyber Crime & Digital Evidence Committee and serves as an Association of State Criminal Investigative Agencies Cyber Crime Committee Subject Matter Expert. Chuck is a charter member of the International Association of Cyber & Economic Crime Professionals. He is a published author, including peer‐reviewed material and a cover article for Police Chief

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us