Crime Prevention

Join the Justice Clearinghouse for the webinar “Leveraging Cloud Technology to Address the Opioid Epidemic in your Community: The Opioid Prevention and Intervention Intelligence System” on Thursday, February 22 from 3:00 to 4:00 p.m. ET.

Leveraging Cloud Technology to Address the Opioid Epidemic in your Community: The Opioid Prevention and Intervention Intelligence System

Addressing the opioid epidemic at scale requires the coordination of health and social services professionals, law enforcement, criminal justice, and academic and government policy experts. These coordination efforts will rely on the sharing of precision data to help analyze trends and patterns of local and regional opioid drug abuse. Microsoft has put its Cloud and associated technologies at the ready to support all government jurisdictions as well as health, social services, and law enforcement agencies to combat this health services and social services challenge.

Teen dating violence, also known as adolescent relationship abuse, is a serious, widespread issue that has both short- and long-term consequences. Teen dating violence may occur in-person or electronically and consists of physical, psychological, or sexual abuse, as well as stalking.

Cybercrime and Defenses: A 101 Introduction To How It Works (February 2018)

The news seems to be filled with stories of ransomware locking out entire departments from their computers, distributed denial-of-service (DDoS) attacks shutting down websites, and data dumps containing passwords or other sensitive information. Trying to understand these attacks can seem overwhelming, almost like learning a foreign language, but it does not have to.

CP HUNT - "How To Hunt" Criminals and Terrorists: The Actionable Intelligence Workshop

This one-day workshop is designed to instruct police department commanders, their police officers assigned to both patrol and investigative functions, and their analysts on how to aggressively collect and use actionable intelligence. The same intelligence techniques can be used against both criminal and terrorist targets. The intelligence training taught in this workshop is designed to supplement the existing operational professionalism, skills, and experience within the audience.

Key Modules:

CP IIT - Internet Intelligence Training: Social Media EXPLOITATION (Jun 2018)

This two-day course offers a comprehensive program to Internet investigations and open source intelligence gathering. Students will learn how to enhance their search skills to effectively use Internet resources for locating information online.

Key Learning Points:

CP IIT - Internet Intelligence Training: Social Media EXPLOITATION (Mar 2018)

This two-day course offers a comprehensive program to Internet investigations and open source intelligence gathering. Students will learn how to enhance their search skills to effectively use Internet resources for locating information online.

Key Learning Points:

Join the International Association of Crime Analysts (IACA) for the webinar “Networks of Criminals (NOC) Youth Offender Program - IACA Innovations in Crime Analysis Award Winner” on Friday, January 26 from 2:00 to 4:00 p.m. ET. During the webinar, participants will learn about the NOC Youth Offender Program, an innovative offender-based strategy and intelligence process for addressing youth offenders in Milwaukee, Wisconsin.

Webinar: Networks of Criminals (NOC) Youth Offender Program - IACA Innovations in Crime Analysis Award Winner

The Networks of Criminals (NOC) Youth Offender Program is an innovative offender-based strategy and intelligence process that utilizes an algorithmic methodology to identify youth offenders and their social networks currently impacting Milwaukee’s motor vehicle theft and robbery trends. NOC offenders are identified every week using a unique methodology for the comparative analysis of up to 500 emerging or perpetual like-offenders based on their 1) criminal history, 2) threat assessment, and 3) social network analysis.

Pages