Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.
With the development of the internet came a new tool for criminals to conduct illegal activity. With the emergence of the dark web and cryptocurrency, criminals gained anonymity from their illicit transactions, making it more challenging to detect by law enforcement agencies. Social media and gaming platforms have crossed the deep and dark web barrier. This introductory course and workshop will focus on criminal case studies, the different webs and social networking sites, and how they have expanded cyber crimes and created new channels for sharing information. We will review the use of cyber technology looking at cryptocurrency, surface and dark web platforms, and social networking and gaming sites such as Facebook, Instagram, Twitter, Google+, Telegram, Omegle, Twitch, and those that are on the dark web. This course includes over 280 warrant templates for most social media sites and applications, learning about metadata, capturing IP and URL addresses, artificial intelligence, bot intelligence, reviewing a router interrogation, and other digital data.
Investigators will learn how the dark web and cryptocurrency function and are linked. Different case studies will be offered to understand and learn about cryptocurrency and dark web criminal activities and the many different social media sites that are only available on the dark web. This course discusses a lot of OSINTS and will include two free software intelligence licenses, explicitly created for LEO training on investigative software programs, Hunchly and Maltego. The workshops will be hands-on learning, including touring the dark web safely, using OSINT linkage software that will take you to the surface and dark web, and linking investigators to social media accounts and many forms of identifiers.
A laptop is required to participate in the workshops. Please bring a computer that will not be restricted by your IT Department so OSINT can be downloaded, including virtual private networks and the TOR browser, to access the dark web.
Upon Completion, Participants will be able to:
Gain general education on cryptocurrency and the dark web
Centralized and decentralized platforms
Block chain function
Tracing and tracking cryptocurrency
Understand the technological criminal and their victims
Cyber-criminal typologies, victimology, and case studies
IP and URL addresses, metadata, and other digital identifying data
Understand cryptocurrency and technology
Crypto typologies, Bitcoin, Ether, Monero, and more
Understand the different levels and history of the internet
The beginning of online money to current data
Surface, dark web, and web 3
Understand and demonstrate the linkage of policing and investigations of cryptocurrency, dark web, and social media platforms
What to look for amongst how they are connected (linkage)
Access to OSINT with hands-on training
Free trial access to paid-for linkages software programs such as Hunchly and Maltego
Understand innovative technology and digital evidence
Cyber contracts, tracking software, surface web tools for investigations (OSINT)
Artificial intelligence and bots connected to the webs and social media sites
How to conduct a router interrogation
Understand and write search and seizure warrants and subpoenas amongst social media sites and applications
Template examples of over 180 social media sites and applications
Understand hackers, scams, and how organized crime plays a crucial role in the dark web and social media sites
Compare a lot of case studies and examples to other cases
Know cyber criminals’ future and build bridges amongst police, academics, and agencies.