LE and Security Training in Cyber Crime and Prevention (8 Hours)
Common attacks and case examples
· Phishing / Whaling
· Fraud
· Pre-text Vishing
· Extortion (sex/money/personal details)
· Impersonation
· Man-in-the-middle (banking / account numbers / routing)
· Physical Attacks
· USB Keys – Catch attention with demo of script autorunning and compromising onstage host. (show how it could be done in a police car)
· OMG Cables, etc.
Advanced threat groups / Nation state actors
· OSINT – Examples (photo research, public records, darkweb data)
· Honeypotting (classic approaches to blackmail – sex/porn, money, etc.)
· HiredAHacker (internal threat actors)
· Redirection / embedded attacks
· Skimming with NFC
· Cloning credit cards, access cards, and a deeper dive into physical access
· Human Trafficking (talk about the national
· Access brokers, Kit/platform access, compromise groups, post exploitation - cryptolocked, exploitation/blackmail, bitcoin, reality of these groups (follow up attacks)
Onsite Examples / Case studies:
· Case Study: Long range wifi, cameras used for physical key cloning, listening equipment – laser, acoustic, visual
· Onsite Example: Signal intercept, jamming, pag-ing/emergency services injection/manipulation (talk about the threat to infrastructure)
· Onsite Example: RFID/NFC cloning and replay attacks
· Case Study: What it looks like when you get phished (what the attacker sees)
Enabling you to detect, stop, and recover from these attacks
· Recognizing the threat
· Threat response / Incident Response
· Stop sign example (threat conditioning)
· Cyber Situational Awareness
See something, say something.
Going deeper via your own OSINT
Knowing your enemy (and not stepping on toes)
· Prep, detect & analyze, stop – eradicate – recover, lessons learned
Best practices
· In the field (home / @work)
· Daily computer / phone practices and software
· Increasing your security posture
Resources
(websites, public orgs, Federal resources, In-fraGard, local meet ups)
· Key services and solutions
• Partnering with a 3rd party – We love LE/Mil folks!
Tell story about Sam / my family
• Pentesting
• Social Engineering
• Security Awareness Training
• Incident response planning and testing
• Incident handling/management
Instructor: TBA
Addressing and Preventing Organized Retail Theft Crimes (4 HOURS)
This course examines the current trends and methods leading to the increases in retail theft. Through a multimedia presentation our instructor leads the attendees to understand organized retail crime (ORC) today. We will examine how technology has contributed to the problem as well as how it may be used to thwart its increase.
The course reveals the motivation and methods being employed in ORC, and provides methods being used to prevent and address it in North Carolina and elsewhere.
Armed with this knowledge the law enforcement and loss prevention practitioner will be empowered to address specific commonplace crimes with proven techniques. The participant will also be prepared to apply the prevention techniques learned to trends in the future.
Topics Covered:
· Organized Retail Crime (ORC) Definition
· The Scope and Impact of ORC
· Motivation and Methods of ORC Criminals
· Applicable Laws
· Specific Applicable Prevention Techniques
Who should Attend?
This training is beneficial for any law enforcement, security, or loss prevention staff tasked with providing prevention services to the retail business community. While this is not an investigations class, this information will aid the investigator of retail theft as well.
Instructor: Richard "Rick" Arrington, LE CPTED, CPS, NCPS II
Crime Prevention Center for Training and Services, LLC
Ubiquitous Technical Surveillance (4 Hours)
How to lower your overall digital footprint by recognizing and minimizing your digital signature by identifying the 5 UTS vectors and minimizing your overall footprint
Instructors: Sean Fregoso -Virginia State Police