Hiding on the Internet – September 17, 2018

Hiding on the Internet: A Deep Dive for Fraud Auditors and Investigators

Presented by Chuck Cohen

Event Details

Date:
Monday, September 17, 2018

Time:
Continental Breakfast and registration 7:15 am to 8:00 am
Training starts promptly at 8:00 am
End Time 4:30 PM

Location:
Red Lion Inn 205 Wolf Rd,
Albany, NY 12205

CPE Credits: 8

Lunch Choices:

  • Chicken Parmesan
  • Baked Scrod
  • Vegetarian

Event Pricing:

Early Bird Pricing:
Member $100 / Non-Member $125
Early Bird pricing until 8/31/18 

Full Pricing:
Member $125 / Non-Member $150

Register Online Now

Registration closes on Wednesday, September 12, 2018 at 5:00 pm. Cancellations must be made by Wednesday, September 12, 2018 at 5:00 pm to receive a refund.

Demystifying Device Fingerprinting, VPNs, the Deepnet and Cryptrocurrencies

This training presentation will include information on IP fingerprinting, browser/software fingerprinting, and device fingerprinting. It will also cover the most common methods used by criminals to conceal their identities, locations, and money while engaging in online communication and financial transactions. It will also cover how fraud auditors and investigators/analysts can use these same techniques to their advantage in their work. The advantages and disadvantages of each method will be explored in detail.

Many fraud auditors, investigators and analysts have heard of VPNs, proxies, and Tor.  But, most would not feel comfortable conducting an audit/ investigation in which one of these tools was deployed.  Similarly, both the Deepnet and Darknet are widely discussed by often not understood.  At the same time, fraud auditors, investigators and analysts increasingly are required to conduct audits/investigations and collect criminal intelligence information in these spaces or when these tools are being used.

Tor is most commonly used to hide one’s identity. But, it can also be used by an insider to breach a firewall or Internet filter, and is a gateway to what is commonly called the Darknet.  While TOR is the most common onion router, it is definitely not the only one.  And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools.

When criminal conceal Proceeds of Unlawful Activity or engage in money laundering activities, it increasingly involves cryptocurrencies.  Fraud auditors, investigators and analysts need a practical and operational understanding of cryptocurrenies.  They must quickly be able to identify forensic evidence and artifacts associated with both cold and hot storage.  And, ultimately both a well-considered and well-crafted seizure policy and procedure are essential.

This training is not intended to make attendees experts, but rather to demystify the topics.  It will give fraud auditors, investigators and analysts the foundation that they need to understand these tools and communities—both how they are exploited by criminal and how they can be used by fraud auditors, investigators and analysts.

Presented by Chuck Cohen

Biography:

Chuck Cohen’s formal education includes a Master of Business Administration from Indiana Wesleyan University and an undergraduate degree from Indiana University with a double major in Criminal Justice and Psychology. Chuck is also a Certified Fraud Examiner.

He is a Captain serving the Indiana State Police, where he has been employed since 1994. He is currently the Commander, Intelligence and Investigative Technologies. In this capacity, Capt. Cohen is responsible for the cybercrime, electronic surveillance, technical services, and Internet crimes against children units along with overseeing the department’s overt and covert criminal intelligence functions. Chuck is the Indiana Intelligence Fusion Center Executive Director and Indiana Internet Crimes Against Children (ICAC) Task Force Commander.

Chuck speaks internationally on topics including the implications of online social networks in criminal investigations and criminal intelligence gathering, cybercrime, online fraud, money laundering, corruption investigations, and the investigation of skilled criminal offenders. He has trained investigators and analysts on five continents. Chuck is an Adjunct Instructor at Indiana University Bloomington, where he teaches Foundations of Criminal Investigation.

Chuck testified to the 114th Congress in 2016 as a subject matter expert on encryption. Chuck was a member of the Office of the Director of National Intelligence Summer Hard Problem Program in 2008, 2009, and 2010. The 2008 study topic was “3D Cyber Space Spillover: Where Virtual Worlds Get Real.” The 2009 topic was “Mixed Reality: When Virtual Plus Real Equals One.” And, in 2010, the topic was “Online Social Media.” He sits on the IACP Cyber Crime & Digital Evidence Committee and serves as an Association of State Criminal Investigative Agencies Cyber Crime Committee Subject Matter Expert. Chuck is a charter member of the International Association of Cyber & Economic Crime Professionals.

He is a published author, including peer‐reviewed material and a cover article for Police Chief Magazine. Chuck was featured on the cover of the National White Collar Crime Center’s Informant magazine and a feature guest on the syndicated radio program “The Badge” on SiriusXM. He was a subject matter expert for a Fox nationally syndicated show regarding criminal activity in online dating sites and for the Canadian Broadcasting Corporation’s national news regarding criminal activity in Virtual Worlds.

Recent Noteworthy Presentations:

  • 2018 International Association of Chiefs of Police—Delhi, India—“Policing Challenges in 2020, How is Cyber Space Shaping Our Approach to Cybercrime & Terrorism; How do we Perform Within it and Take Advantage of it.”
  • 2018 & 2015 Calgary Cyber Summit—Calgary, CA—Keynote Speaker (Audience of over 300)
  • 2017 Police Scotland—Tulliallan, UK—multiple day training at Scottish Police College
  • 2010 – 2018 ISS World Conferences—Washington, D. C.; Kuala Lumpur, MY; Johannesburg, SA; Brasilia, BR; Mexico City, MX; Panama City, PA; and Prague, CZ
  • 2016 International Association of Crime Analysts Annual Conference—Louisville, KY—Keynote plenary speaker
  • 2011 – 2016 International Data Communications Conference—London, UK—Co‐Sponsored by Home Office, Metropolitan Police Service Directorate of Information, and FBI Operational Technology Division
  • 2014 & 2015 National Cyber Crime Conference—Boston, MA—Keynote speaker (audience of over 600)
  • 2010 MAGLOCLEN Annual Conference—Columbus, OH—Keynote presenter
  • 2009 E‐Crime Congress—London, UK—“Real Crimes in Virtual Worlds”
  • Routinely train members of the Intelligence Community along with federal, state, local and private entities