Suspiciously Connected: How Technology is Being Used by Transnational Organized Crime Syndicates and Other Groups
Featured Speakers :
Complimentary webinar, presented by ACFCS
We leave digital footprints in everyday life activities – even in remote jungles, desert dune treks, and ocean voyages. See how to leverage leading edge technologies and open-source information pools to detect suspicious activity and risky behavior. Smart phones, cryptocurrency transactions, vessel transponders, IP history, and geo-fence searches all play a role in this cyber landscape. When combined with the mind of an investigator, you have powerful tools to use.
- Identify high-risk behavior among terrorist cells and criminal organizations
- Discover how threat networks are leveraging technology to achieve their political ends
- The importance of IP addresses and how to distinguish between true addresses and VPNs
- Case Studies of how tech has disrupted these organizations, and more