Justice Information Sharing

Webinar - Of Ponzis and Pyramids: Effective Use of a Forensic Auditor in Investment Fraud Investigations

Investment frauds result in the theft of millions of dollars from investors on a yearly basis, many times without the victims knowing that they have been defrauded. Fraudsters may target those of modest means or those with small fortunes, yet their methods are almost always the same. Learning how to identify common types of investment frauds, the effective methods for investigating such schemes, and how to successfully prosecute these crimes is key to protecting unsuspecting investors from these scams. This course will focus on common types of investment frauds, including Ponzi and Pyramid schemes, the effective use of forensic auditors throughout such investigations, and what steps need to be taken by the prosecution team to successfully hold these fraudsters accountable.

Webinar - Cryptocurrency, Compliance, and Financial Crimes

This webinar will discuss cryptocurrency general information for detailed discussion regarding legitimate use versus illegitimate use, common financial crimes, and avoidance of compliance requirements. Further, the webinar will delve into exchanges, transactions, opportunities for data collection and analysis, the value to criminal or compliance investigations, and a review of current case studies.

IA102 Introduction to Link Analysis (Dec. 15, 2020, Virtual)

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis. 

    IA102 Introduction to Link Analysis (Nov. 5, 2020, Virtual)

    This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

      IA102 Introduction to Link Analysis (Nov. 20, 2020, Virtual)

      This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis. 

      DF205 Intermediate Digital Forensic Analysis: SQLite Primer (Dec. 22, 2020, Virtual)

      Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. Devices are becoming more secure, with an increase in security; the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data, we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

      CI130 Basic Cyber Investigations: Cellular Records Analysis (Dec. 21, 2020, Virtual)

      This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

      CI103 Basic Cyber Investigations: Advertising Identifiers (Dec. 22, 2020, Virtual)

      This one-day course, focused on device location information, is for law enforcement investigators and analysts. Class concepts include device identifiers (IDs) in general, advertising IDs in detail, important legal considerations, overall investigative process, and tools available to law enforcement. Students will use commercially available investigative tools for querying databases of Advertising IDs and displaying their recorded broadcast locations.

      DF205 Intermediate Digital Forensic Analysis: SQLite Primer (Dec. 10, 2020, Virtual)

      Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. Devices are becoming more secure, with an increase in security; the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data, we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

      Pages