Suspiciously Connected: How Technology is Being Used by Transnational Organized Crime Syndicates and Other Groups

Featured Speakers :
WHEN : 08/17/2022 11:00 am ET

Complimentary webinar, presented by ACFCS

We leave digital footprints in everyday life activities – even in remote jungles, desert dune treks, and ocean voyages.  See how to leverage leading edge technologies and open-source information pools to detect suspicious activity and risky behavior.  Smart phones, cryptocurrency transactions, vessel transponders, IP history, and geo-fence searches all play a role in this cyber landscape.  When combined with the mind of an investigator, you have powerful tools to use.


  •  Identify high-risk behavior among terrorist cells and criminal organizations
  • Discover how threat networks are leveraging technology to achieve their political ends
  • The importance of IP addresses and how to distinguish between true addresses and VPNs
  • Case Studies of how tech has disrupted these organizations, and more