×

Training Programmes

Responsible State Behavior in Cyberspace

Instructors: DCAF, WB3C

Responsible State Behavior in Cyberspace: International Norms and the Role of the EU in Cyberdiplomacy

This three-day workshop, hosted by the Western Balkans Cyber Capacity Centre (WB3C) in partnership with the Geneva Centre for Security Sector Governance (DCAF) on 12-14 November 2024, focuses on fostering a deeper understanding of international frameworks and best practices in cyberdiplomacy, with a special emphasis on the European Union's role.

Day 1: Understanding the UN Framework on Responsible State Behavior in Cyberspace

The first day is dedicated to exploring the UN Framework on Responsible State Behavior in Cyberspace. Participants will engage in sessions that cover the four key components of the framework:

  • UN Norms
  • International Law
  • Capacity Building
  • Confidence Building Measures

The day will also feature discussions on the operationalization of these principles within the UN’s First Committee and the Open-ended Working Group (OEWG) on ICT security, along with an in-depth look at the draft UN convention on cybercrime. Additionally, the role of international law in cyberspace will be analyzed, focusing on the challenges of attribution and the application of a rules-based framework. The day concludes with a case study on Slovenia's practices in cyberdiplomacy.

Day 2: The EU Cyber Ecosystem and Cooperation with the Western Balkans

Day two offers insights into the structure of the EU’s cyber ecosystem and its collaborative efforts with the Western Balkans. Participants will gain a detailed understanding of:

  • The EU's cyber diplomacy ecosystem and efforts, led by the European External Action Service (EEAS)
  • EU support mechanisms for the Western Balkans through the Directorate-General for Neighbourhood and Enlargement Negotiations (DG NEAR)
  • The introduction of the EU Cyber Solidarity Act and Cyber Reserve
  • The role of the European Union Agency for Cybersecurity (ENISA) and Europol in strengthening regional cybersecurity

The day will also highlight international cooperation in cybersecurity with a special focus on the Western Balkans.

Day 3: Practical Exercises and International Cooperation

The final day features a hands-on tabletop exercise facilitated by experts from the Cyber Policy Institute. This exercise simulates international cooperation and national coordination during a cyber incident, reinforcing the lessons from the previous sessions. Participants will:

  • Explore the legal frameworks and best practices applicable to cyber incident response
  • Work in groups to manage a simulated incident
  • Debrief and present their solutions, emphasizing the importance of coordinated multinational responses

The workshop concludes with a comprehensive review of key takeaways and closing remarks.


Digital Forensics for Police Investigators - 1-year specialist training programme

WB3C Launches a 1-Year Specialist Training in Digital Forensics  

The Western Balkans Cyber Capacity Centre (WB3C), in cooperation with the University of Technology of Troyes (UTT), is launching a one-year specialist training program for law enforcement professionals seeking to specialize in cybercrime investigations and digital forensics. Based on the existing N’Tech Investigator Training curriculum used by the French Gendarmerie, this unique programme equips participants with the advanced skills needed to tackle cyber-enabled crimes and digital threats.

Faced with rapidly evolving cyber threats, law enforcement must continually enhance their scientific, technological, legal and language expertise to effectively investigate crimes such as child exploitation, payment fraud and network intrusions. Therefore, this programme is a strategic investment in cyber capacity building, strengthening the ability of law enforcement in the Western Balkans to investigate and prosecute cybercrime cases effectively. Digital forensics is an increasingly in-demand field, as law enforcement agencies and the judiciary rely on skilled professionals to identify, analyze and preserve digital evidence in cybercrime cases.

Key Learning Areas:

  • Legal frameworks and cybercrime investigations
  • Digital forensic analysis and evidence preservation
  • OSINT and CyberPatrol techniques
  • Programming, networks and data analytics
  • Cybercrime psychology and investigative methodologies
  • Information security and electronic signals

The course will bring together 15 police force officers from across the region who will engage in 1400 hours of intensive training, combining theory and hands-on exercises in cybercrime investigations, digital forensics and advanced investigative techniques led by experts and instructors from UTT and WB3C. Participants will take the final exam and receive a recognized qualification at the end of the course.

 

 

Cryptocurrency and Online Child Sexual Abuse and Exploitation

Protecting children from online crimes

As technology continues to advance, the online exploitation of children has become one of the most pressing and deeply concerning challenges confronting law enforcement across the world.  This four-day training for law enforcement professionals and cybersecurity experts from the South East Europe Police Chiefs Association (SEPCA) member countries, focused on cryptocurrency and online child sexual abuse and exploitation. The programme is delivered in partnership with the Council of Europe (COE), OSCE, Austrian Cybercrime Competence Centre (C4) and the Ministry of Interior of Serbia.

 The training is addressing three critical areas:

1.      Cryptocurrency Investigations:  

  • The use of cryptocurrencies in criminal activities, particularly in cases involving child exploitation.  
  • Blockchain tracing techniques and methodologies for seizing virtual assets through both theory and practical exercises.
  • Sessions include best practices for evaluating wallets, understanding derivation paths, and using specialized tools to track illicit transactions.

 2.      Child Sexual Abuse and Exploitation Online:  

  • Comprehensive training on identifying and disrupting child exploitation networks, with a focus on international cooperation.
  • Psychological impact on investigators working in this sensitive area, offering support and tools to help them manage the emotional toll of these investigations.
  • In-depth discussions on undercover operations, the use of digital platforms used for child sexual exploitation and effective methods for collecting electronic evidence.

3.      Cross-Border Collaboration:

  •  Facilitating collaboration among law enforcement agencies from across the region, Europe and key international partners. The goal is to share knowledge and foster greater coordination in tackling these global challenges.
  • Presentation of updates on regional and international efforts to combat cybercrime. 

This collaborative training activity marks a significant step forward in our shared mission to protect children from exploitation and hold those who use emerging technologies for illicit purposes accountable. International collaboration is key for strengthening the tools and techniques needed to safeguard vulnerable communities and dismantle criminal networks.

Crime Typology, Digital Evidence and Cryptocurrencies

Understanding and combating cyber financial crimes

In the digital age, the development of communication networks and the widespread use of the internet have significantly transformed business operations. This digital integration, while beneficial, has also escalated the vulnerability of organisations to cyber threats. With the rise of cryptocurrencies—a blend of innovative technologies and financial services—there is an increasing opportunity for their malicious use. Cryptocurrencies, characterized by their pseudo-anonymity and decentralization, have become attractive tools for money laundering and other illicit online activities across parallel web networks.

Course Overview

This training programme is designed to empower WB6 administrations to keep pace with the rapid advancements in technology and the evolving landscape of digital crimes by developing the knowledge and skills needed to effectively combat and adapt to the multifaceted nature of cyber offenses related to crime typology and the misuse of cryptocurrencies.

Training Modules

Foundations of Crime Typology and Cyber Offenses

  • Understanding the basics of crime typology specific to digital platforms
  • Identifying patterns and classifications of cybercrimes affecting companies today

Collection and Management of Digital Evidence

  •  Techniques for identifying, collecting, and preserving digital evidence.
  • Legal considerations and compliance issues in handling digital data.
  • Utilizing digital forensics tools and methodologies to extract critical information.

Cryptocurrencies and Cyber Financial Crimes

  •  Exploring the technology behind cryptocurrencies and their role in financial systems.
  • Investigating the use of cryptocurrencies in money laundering, fraud, and other financial crimes.
  • Strategies for tracing and analyzing crypto transactions on decentralized networks.

Adapting to Technological Innovations

  •  Staying ahead of technological trends and their implications on security practices.
  • Developing adaptive strategies to mitigate risks associated with new digital currencies and platforms.

Case Studies and Real-World Applications

  •  Analyzing recent cases of digital crimes involving cryptocurrencies.
  • Hands-on simulations to apply concepts and techniques learned in a controlled, test-driven environment.

Learning Outcomes

Upon completion of this program, participants will be able to:

  •  Clearly classify types of digital crimes and identify relevant digital evidence.
  • Utilize advanced tools and techniques for digital forensics investigations.
  • Understand the mechanics of cryptocurrencies and identify potential misuse in financial transactions.
  • Develop proactive strategies to prevent and respond to cybercrimes in an ever-evolving digital landscape.

Who Should Attend

This training is aimed at law enforcement personnel, cybersecurity experts, financial service professionals and otehr professionals involved in digital security and regulatory roles.


Copyright © WB3C

Disclaimer: Translations of the original content written in English into other languages are AI generated by Weglot.