This course is only open to U.S. state, local, tribal, and territorial law enforcement agencies, prosecutors, and judges.
Course Description: Chat rooms, discussion forums, and VolP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data. This course introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime. Participants will gain practical knowledge of the ways perpetrators of cyber-enabled fraud can be identified on these platforms, and the tools that can be used to identify the individuals and groups that commit these cybercrimes, the roles, and associations of individuals within groups, and the tools and tactics they use to commit various forms of cyber-enabled fraud.
At the end of the course, participants will be able to:
- Identify different types of cyber-enabled fraud and describe threat actors who commit cyber-enabled fraud
- Identify the platforms used by threat actors in the commission of cyber-enabled fraud
- Explain and differentiate between the methods used by threat actors of cyber-enabled fraud on clearnet and darknet spaces
- Identify investigative tools and techniques used in cyber-enabled fraud and describe their purpose for investigation
- Identify open-source tools used in successful cyber-enabled fraud investigations and describe their outputs
- Describe the types of information derived by investigative techniques that help identity cyber-enabled fraud perpetrators and potential problems that may occur