Presented by Chuck Cohen
Monday, September 17, 2018
Continental Breakfast and registration 7:15 am to 8:00 am
Training starts promptly at 8:00 am
End Time 4:30 PM
Red Lion Inn 205 Wolf Rd,
Albany, NY 12205
CPE Credits: 8
Early Bird Pricing:
Member $100 / Non-Member $125
Early Bird pricing until 8/31/18
Member $125 / Non-Member $150
Registration closes on Wednesday, September 12, 2018 at 5:00 pm. Cancellations must be made by Wednesday, September 12, 2018 at 5:00 pm to receive a refund.
This training presentation will include information on IP fingerprinting, browser/software fingerprinting, and device fingerprinting. It will also cover the most common methods used by criminals to conceal their identities, locations, and money while engaging in online communication and financial transactions. It will also cover how fraud auditors and investigators/analysts can use these same techniques to their advantage in their work. The advantages and disadvantages of each method will be explored in detail.
Many fraud auditors, investigators and analysts have heard of VPNs, proxies, and Tor. But, most would not feel comfortable conducting an audit/ investigation in which one of these tools was deployed. Similarly, both the Deepnet and Darknet are widely discussed by often not understood. At the same time, fraud auditors, investigators and analysts increasingly are required to conduct audits/investigations and collect criminal intelligence information in these spaces or when these tools are being used.
Tor is most commonly used to hide one’s identity. But, it can also be used by an insider to breach a firewall or Internet filter, and is a gateway to what is commonly called the Darknet. While TOR is the most common onion router, it is definitely not the only one. And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools.
When criminal conceal Proceeds of Unlawful Activity or engage in money laundering activities, it increasingly involves cryptocurrencies. Fraud auditors, investigators and analysts need a practical and operational understanding of cryptocurrenies. They must quickly be able to identify forensic evidence and artifacts associated with both cold and hot storage. And, ultimately both a well-considered and well-crafted seizure policy and procedure are essential.
This training is not intended to make attendees experts, but rather to demystify the topics. It will give fraud auditors, investigators and analysts the foundation that they need to understand these tools and communities—both how they are exploited by criminal and how they can be used by fraud auditors, investigators and analysts.
Chuck Cohen’s formal education includes a Master of Business Administration from Indiana Wesleyan University and an undergraduate degree from Indiana University with a double major in Criminal Justice and Psychology. Chuck is also a Certified Fraud Examiner.
He is a Captain serving the Indiana State Police, where he has been employed since 1994. He is currently the Commander, Intelligence and Investigative Technologies. In this capacity, Capt. Cohen is responsible for the cybercrime, electronic surveillance, technical services, and Internet crimes against children units along with overseeing the department’s overt and covert criminal intelligence functions. Chuck is the Indiana Intelligence Fusion Center Executive Director and Indiana Internet Crimes Against Children (ICAC) Task Force Commander.
Chuck speaks internationally on topics including the implications of online social networks in criminal investigations and criminal intelligence gathering, cybercrime, online fraud, money laundering, corruption investigations, and the investigation of skilled criminal offenders. He has trained investigators and analysts on five continents. Chuck is an Adjunct Instructor at Indiana University Bloomington, where he teaches Foundations of Criminal Investigation.
Chuck testified to the 114th Congress in 2016 as a subject matter expert on encryption. Chuck was a member of the Office of the Director of National Intelligence Summer Hard Problem Program in 2008, 2009, and 2010. The 2008 study topic was “3D Cyber Space Spillover: Where Virtual Worlds Get Real.” The 2009 topic was “Mixed Reality: When Virtual Plus Real Equals One.” And, in 2010, the topic was “Online Social Media.” He sits on the IACP Cyber Crime & Digital Evidence Committee and serves as an Association of State Criminal Investigative Agencies Cyber Crime Committee Subject Matter Expert. Chuck is a charter member of the International Association of Cyber & Economic Crime Professionals.
He is a published author, including peer‐reviewed material and a cover article for Police Chief Magazine. Chuck was featured on the cover of the National White Collar Crime Center’s Informant magazine and a feature guest on the syndicated radio program “The Badge” on SiriusXM. He was a subject matter expert for a Fox nationally syndicated show regarding criminal activity in online dating sites and for the Canadian Broadcasting Corporation’s national news regarding criminal activity in Virtual Worlds.