×

Training Programmes

Cryptocurrency and Online Child Sexual Abuse and Exploitation

Instructors: OSCE, CoE, SEPCA; WB3C

Protecting children from online crimes

As technology continues to advance, the online exploitation of children has become one of the most pressing and deeply concerning challenges confronting law enforcement across the world.  This four-day training for law enforcement professionals and cybersecurity experts from the South East Europe Police Chiefs Association (SEPCA) member countries, focused on cryptocurrency and online child sexual abuse and exploitation. The programme is delivered in partnership with the Council of Europe (COE), OSCE, Austrian Cybercrime Competence Centre (C4) and the Ministry of Interior of Serbia.

 The training is addressing three critical areas:

1.      Cryptocurrency Investigations:  

  • The use of cryptocurrencies in criminal activities, particularly in cases involving child exploitation.  
  • Blockchain tracing techniques and methodologies for seizing virtual assets through both theory and practical exercises.
  • Sessions include best practices for evaluating wallets, understanding derivation paths, and using specialized tools to track illicit transactions.

 2.      Child Sexual Abuse and Exploitation Online:  

  • Comprehensive training on identifying and disrupting child exploitation networks, with a focus on international cooperation.
  • Psychological impact on investigators working in this sensitive area, offering support and tools to help them manage the emotional toll of these investigations.
  • In-depth discussions on undercover operations, the use of digital platforms used for child sexual exploitation and effective methods for collecting electronic evidence.

3.      Cross-Border Collaboration:

  •  Facilitating collaboration among law enforcement agencies from across the region, Europe and key international partners. The goal is to share knowledge and foster greater coordination in tackling these global challenges.
  • Presentation of updates on regional and international efforts to combat cybercrime. 

This collaborative training activity marks a significant step forward in our shared mission to protect children from exploitation and hold those who use emerging technologies for illicit purposes accountable. International collaboration is key for strengthening the tools and techniques needed to safeguard vulnerable communities and dismantle criminal networks.


Cybercrime for Law Enforcement

Training for police investigators, prosecutors and judges

In the digital age, cybercrime has emerged as a significant global challenge, particularly pronounced in regions like the Western Balkans, where rapid technological advances outpace the development of corresponding legal and security frameworks. As cyber threats evolve in complexity and scale, law enforcement agencies must adapt swiftly to safeguard national security, economic interests, and public trust. The "Cybercrime for Law Enforcement" course, designed by the Western Balkans Cyber Capacity Centre (WB3C), aims to fortify the region's defenses by enhancing the capabilities of police investigators, prosecutors, and judges in handling cybercrime.

Context and Need for Specialized Training The digital environment presents a fertile ground for various cybercriminal activities, ranging from financial fraud and data breaches to cyberterrorism and espionage. These crimes not only disrupt individual lives but also threaten the stability and security of states. In the Western Balkans, where digital transformation is accelerating, there is a pressing need for comprehensive cybercrime legislation and skilled law enforcement personnel adept at navigating the complexities of the cyber space.

Course Overview This intensive two-week course is split into two phases:

1. Week 1: Theoretical Foundations

  • Internet and Digital Environment Basics: (Protocols-Domains Names-IP) Understanding the foundational elements of the internet and digital communications.
  • OSINT and Cyber Infiltration: Delving into the technical protocols that govern data transmission and how to utilize open-source intelligence for investigations.
  • Surface Web/Deep Web/Dark Web: Exploring the hidden layers of the internet that serve as hubs for illegal activities. CEO frauds, Falses documents, cyberstalking, cyberbullying, hate online and all online trafficking(weapons, drugs, people trafficking).
  • Cryptocurrency: Studying the use of digital currencies in cybercrime, focusing on tracking and tracing transactions (blockchain, money laundering)

2. Week 2: Practical Skills and Real-World Application

  • Table Top Exercises: Engaging in scenario-based training to simulate cybercrime investigations, emphasizing real-time decision-making and interagency cooperation.
  • Collaborative Training: Facilitating joint training sessions for investigators and prosecutors to foster seamless cooperation and understanding of each role in dealing with the offences they face.

Importance of the Training This training is critical in building a resilient cybersecurity posture within the Western Balkans. By equipping law enforcement professionals with the necessary skills and knowledge, the course aims to enhance the effectiveness of the region's response to cyber incidents. The collaborative aspect of the training reflects the real-world necessity for cross-disciplinary coordination among various law enforcement branches, ensuring that cybercrime is addressed swiftly and efficiently.

Ultimately, the "Cybercrime for Law Enforcement" not only raises the standard of professional expertise in handling cyber incidents but also plays a pivotal role in the broader context of national and regional security strategies. It is a key component in the Western Balkans' ongoing efforts to build a robust framework capable of combating the evolving landscape of cyber threats.

Crime Typology, Digital Evidence and Cryptocurrencies

Understanding and combating cyber financial crimes

In the digital age, the development of communication networks and the widespread use of the internet have significantly transformed business operations. This digital integration, while beneficial, has also escalated the vulnerability of organisations to cyber threats. With the rise of cryptocurrencies—a blend of innovative technologies and financial services—there is an increasing opportunity for their malicious use. Cryptocurrencies, characterized by their pseudo-anonymity and decentralization, have become attractive tools for money laundering and other illicit online activities across parallel web networks.

Course Overview

This training programme is designed to empower WB6 administrations to keep pace with the rapid advancements in technology and the evolving landscape of digital crimes by developing the knowledge and skills needed to effectively combat and adapt to the multifaceted nature of cyber offenses related to crime typology and the misuse of cryptocurrencies.

Training Modules

Foundations of Crime Typology and Cyber Offenses

  • Understanding the basics of crime typology specific to digital platforms
  • Identifying patterns and classifications of cybercrimes affecting companies today

Collection and Management of Digital Evidence

  •  Techniques for identifying, collecting, and preserving digital evidence.
  • Legal considerations and compliance issues in handling digital data.
  • Utilizing digital forensics tools and methodologies to extract critical information.

Cryptocurrencies and Cyber Financial Crimes

  •  Exploring the technology behind cryptocurrencies and their role in financial systems.
  • Investigating the use of cryptocurrencies in money laundering, fraud, and other financial crimes.
  • Strategies for tracing and analyzing crypto transactions on decentralized networks.

Adapting to Technological Innovations

  •  Staying ahead of technological trends and their implications on security practices.
  • Developing adaptive strategies to mitigate risks associated with new digital currencies and platforms.

Case Studies and Real-World Applications

  •  Analyzing recent cases of digital crimes involving cryptocurrencies.
  • Hands-on simulations to apply concepts and techniques learned in a controlled, test-driven environment.

Learning Outcomes

Upon completion of this program, participants will be able to:

  •  Clearly classify types of digital crimes and identify relevant digital evidence.
  • Utilize advanced tools and techniques for digital forensics investigations.
  • Understand the mechanics of cryptocurrencies and identify potential misuse in financial transactions.
  • Develop proactive strategies to prevent and respond to cybercrimes in an ever-evolving digital landscape.

Who Should Attend

This training is aimed at law enforcement personnel, cybersecurity experts, financial service professionals and otehr professionals involved in digital security and regulatory roles.

Cyber Hygiene for Civil Servants

Training of trainers for senior officials in WB6 Public administrations

Cyber Hygiene for Civil Servants programme is an initiative delivered jointly by WB3C and Regional School of Public Administration (ReSPA). This training programme is designed to empower senior-level public officials with the knowledge and skills required to educate their peers about cyber hygiene within their respective public administrations and by cascading knowledge, to enhance the overall cyber resilience of the region.

Course Overview:

The training spans three days and is structured to blend theoretical knowledge with practical exercises:

Day 1: Educational Skills Modules

Focus on outcome-based education, teaching preparation and teaching methods and techniques. This foundational day equips participants with the educational principles necessary to effectively transfer knowledge.

Day 2: Cyber Hygiene for Users

Dives into the objectives and stakes of information security, covering basics of ISO/IEC standards and cybersecurity threat awareness. Participants will explore security policy frameworks and the architecture of information security systems.

Day 3: Practical Application

Participants engage in practical exercises that reinforce their learning and develop hands-on skills in incident management procedures and actions to be taken in response to cyber incidents. This session simulates real-world scenarios to enhance problem-solving skills.

Educational Highlights

Participants will gain insights into educational principles, communication techniques and teaching methodologies.

 

The programme covers crucial topics in cyber hygiene such as security policies, threat awareness, preventive measures, and incident management procedures. Engaging practical exercises simulate real-world scenarios to enhance participants’ problem-solving skills and application of knowledge in real-life settings.


Copyright © WB3C

Disclaimer: Translations of the original content written in English into other languages are AI generated by Weglot.