|Upcoming Live Webinar Topics||Date & Time|
|Previous Webinar Topics|
|Off the grid: How to remain anonymous in today’s connected world
What kinds of artifacts do you leave when you browse a website? Is there a ‘digital shadow’ left by your online habits? What is it and how extensive is it? This month’s webinar will focus on the tools and techniques needed to maintain anonymity online. Moreover, we will cover ways to reduce your digital footprint and mitigate the risks associated with living an online life. Read More
|Hacking People: Social Engineering and Insider Threats
Earlier this month, a story broke related to the social engineering of LinkedIn users who hold security clearances. Echoing the Robin Sage experiment, this most recent event highlights the ease by which people are susceptible to information collection in the 21st century. This presentation will focus on the tactics, techniques, and procedures used by social engineers to identify, develop, and compromise people through social applications and platforms.
|All the world’s a game; how are you a player?
“Games aren’t for your kids anymore.” I’m sure you’ve heard it before, but do you truly embrace the idea? This presentation explains how game mechanics exist within your everyday life. We dive into what gaming looks like in 2013, glance at the scholars and entrepreneurs who have extracted principles from these games, and review how these principles can revolutionize education, the corporate world, and your everyday life.
|The Power of Crowdsourcing and Its Surge in Society
Could social media really have discovered the Boston bomber suspects? Ever since Boston, the idea of crowdsourcing has surged to mainstream levels. This presentation presents the positives and negatives of crowdsourcing using Boston as an example. We will look at other popular crowdsourcing use cases, such as the Defense Advanced Research Projects Agency’s (DARPA) Red Balloon Challenge and Alternate Reality Games (ARGs). We will also uncover the most masterful creators and participants of crowdsourced ideas.
|Social and Background Investigations – Myths and Realities
This presentation explores how the use of social media to evaluate potential applicants for employment is a burgeoning industry. Many private companies and some government organizations have implemented processes to view and use data derived from applicants’ social media accounts to determine suitability for employment. This presentation speaks to the types of use cases and associated pitfalls where social media is a factor in employment decisions.
|Virtual Identities – Gateway to Fraudulent Activities
So often complicated fraud schemes are underscored with simply identity fraud. Twenty years ago – identity was based on physical, paper-based documentation to validate someone’s identity. As technology advances and digital currencies & profiles enter into the mainstream economy, validating digital or virtual identity becomes paramount to preventing and investigating fraud. Once a believable virtual identity enters into the system, fraudulent activity can occur without tying the crime to a physical location. In this webinar, understand how virtual identities are created, purchased and sold and where to go to begin investigations of online identities. In this presentation, attendees will learn what defines a virtual identity, how virtual identities are created, purchased and sold, how virtual identities can be used for fraud, and what tools are available to investigate identity fraud – both physical and virtual.
|The Weaponization of Mobile Technology
This presentation focuses on how mobile technology can cause physical harm (and in some cases death) from the electronic manipulation of personal medical devices to the modification of electronic road signs. We review the technologies and capabilities needed to harm others. Lastly, we offer ways to mitigate the challenge that mobile devices bring to traditional physical crimes like murder.
This presentation highlights the current trend of temporary, disposable online media and its potential for illicit use. “Burning Media” will focus on Snapchat – a mobile chat application that shortly deletes pictures after they are sent – as well as other disposable media, such as the upcoming Facebook Poke and disposable phone number applications. Additionally, we will go over potential uses for these new mediums and understand how truly “disposable” some of these mediums are.
|For the Lulz: Understanding a Generation of Desensitized Internet Culture
This presentation will help participants understand the desensitized internet culture’s affect on cyber crime. Attendees will discover the paradox between information dispersion and lack of original content, eventually leading to incessant scavenging for new ideas – legal or otherwise. Ultimately, participants will gain an understanding of why the internet is accepting of criminal activity, and how it reached that point.
|Money Laundering in the 21st Century
Virtual currency? Money laundering? Sounds like something out of science fiction, doesn’t it? How can virtual dollars be used to launder real, physical cash? Is it something anyone can do or do you need a degree in computer science to figure it out?In this presentation, we will demonstrate how virtual currencies are reshaping the way consumers do business. Moreover, we will highlight how those currencies have a connection to the real world in very real ways. We will speak to how virtual currencies and the markets they create are opening up opportunities for criminal behavior.
|TOR and the Anonymous Web: Drugs, Weapons, and Contract Killings
Most people have heard of TOR and its capability to allow Internet users to anonymously browse the web. What you may not know is that TOR provides savvy users with an ability to transact business anonymously through “hidden” markets. These markets facilitate the buying and selling of illicit material. The most famous hidden market is Silk Road. Countless others exist.This non-technical presentation aims to expose the inner workings of hidden TOR markets. Through specific case studies and a live demonstration of how to access TOR hidden markets, attendees will gain an awareness of the types of threats this technology poses. Moreover, attendees will learn ways to combat and mitigate the risks associated with hidden TOR markets.
|The Next Intelligence and Crime Problem: Thank You Know What it Is?
We’ve all heard of Facebook, LinkedIn and Twitter. But do you know how they and other technologies can impact your role as a law enforcement or intelligence official? It is clear that a series of fundamental shifts in the illicit use of technology has the potential to seriously hamper law enforcement and intelligence efforts. From a general lack of awareness to methods of investigating and prosecuting these crimes, current and future trends in the use of computers for illicit activity are problematic for intelligence and law enforcement professionals. This presentation aims to expose the illicit use and danger of a variety of Internet technologies, including emerging technologies, hidden TOR, social networking, alternative reality gaming, and others. Through specific case studies, attendees will gain an awareness of the types of threats these technologies pose. Moreover, attendees will learn ways to combat and mitigate the risks associated with new technologies.