Justice Information Sharing

Financial Crimes Against Seniors Part 2- Investigations and Resources

A collaborative project of the National White Collar Crime Center (NW3C) and the Elder Justice Initiative, this webinar is the second in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

  • Investigating the Crimes,
  • Resources for Investigators, and
  • Creating an Investigative Plan.

Presented by: Leann D. Pritt, CFE, NW3C

The Greying of America and Its Impact on Insurance Investigations

This presentation will address the rise in fraudulent insurance claims being placed by those in the “senior demographic” over the last several decades. The course will cover historical, sociological, and economic reasons for the rise in senior fraudsters. Special considerations for conducting claim investigations with this demographic, strategies for conducting interviews with seniors, and case studies of senior insurance scammers will be reviewed.

Presented by: Christina Fiscella, Investigator, Consultant, & Trainer, FCLS, P.I.  

Online Officer Safety: Protecting Yourself in Cyberspace

Police officers, crime analysts, and other criminal justice professionals are high-value targets for cyber criminals. Too often, they are also soft targets. This webinar will cover the fundamentals of securing wireless networks both at home and when traveling, understanding and controlling social media footprints, and securing digital devices. Many police officers have a personal and family security plan. In 2018, it is important for those plans to extend to the internet, how you connect to the internet, and the devices that are used to make those connections.

Catch Her If You Can: Today’s Pink Collar Criminal

Attend "Catch Her If You Can:Today's Pink Collar Criminal" and learn:

  • What is the difference between white collar crime and pink collar crime? 
  • Why is pink collar crime growing? 
  • Who is the “typical” pink collar criminal? 
  • How to identify “pink flags.” 
  • Tips and tricks for investigating and interviewing a pink collar criminal.

Presented by: Kelly Paxton Principal, K Paxton, LLC.

Introduction to Cell Phone Call/Communication Detail Records

This presentation will provide an overview of cell phone call/communication detail records (CDRs) and will focus on historical records available from primary cell phone companies, including logs of phone calls, short message service text messages, and Internet activity. The overview will also provide a brief introduction to cell phone-created CDRs, which may be available from non-cell phone sources such as email providers, smart phone application providers, and non-cellular-based Internet service providers.

CC 350 - Mobile Device Forensic Analysis (July 2018)

This course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, available imaging options, accessing locked devices, and the default folder structure. The forensic artifacts covered include device information, call history, voicemail, messages, web browser history, contacts, and photos.

FC 105 - Financial Records Examination and Analysis (July 2018)

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

Course structure:

CS 235 - Basic Network Intrusion Investigations (June 2018)

This course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises. Additional topics include key cybersecurity concepts and issues, as well as the various classifications and types of network attacks.

CI 201 - Social Media & Open Source Intelligence (July 26 2018)

This course covers the skills investigators need to conduct successful online investigations involving social media. Topics include internet basics such as IP addresses and domains, an overview of currently popular social media platforms, and best practices for building an online undercover profile. Instructors demonstrate both open-source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

Course structure:

Pages