Justice Information Sharing

This month, the Vera Institute of Justice (Vera) released its annual report celebrating their 60-year anniversary and library of work to transform justice systems, end overcriminalization, and reduce mass incarceration of people of color, immigrants, and people experiencing poverty. Supported by the U.S.

The Bureau of Justice Assistance released a "Prison Industry Enhancement Certification Program (PIECP) Compliance Guide" this month to offer support to PIECP certification holders. First instituted in 1979, the PIECP encourages state and local governments to create work opportunities in prisons that aim to place justice-involved individuals in real-world environments that encourage meaningful employment opportunities upon release.

In October, the Council of State Governments Justice Center released “Action Points: Four Steps to Expand Access to Housing for People in the Justice System with Behavioral Health Needs.” According to the National Low Income Housing Coalition, affordable housing is scarce nationwide and especially among people who have been involved in the justice system or disproportionately face additional societal or systemic barriers including Black and Latinx communities.

This past November, the Council of State Governments Justice Center in collaboration with the National Police Foundation published “Creating Buy-In: Best Practices for Collaborating with Referral Sources for Crisis Stabilization Units.” Crisis stabilization units (CSU) provide law enforcement officers and mobile crisis teams a safe space to bring individuals during a behavioral health crisis. Buy-in from referral sources, particularly law enforcement agencies, is crucial to ensuring that people are suitably connected to the appropriate CSU.

Last month, the National Institute of Justice released a knowledge-sharing brief by the Forensic Technology Center of Excellence on the use of rapid toxicology screening tools in lieu of comprehensive, confirmatory investigations. According to the U.S. Drug Administration, the average turnaround time for traditional toxicology testing can last up to 31 days. However, contingent on case complexities, systemic issues, rising caseloads, and other unforeseen circumstances, delays often occur.

In September, the Office of Juvenile Justice and Delinquency Prevention released an analysis conducted by the National Center for Missing and Exploited Children’s (NCMEC) Infant Abductions Program. Often, the most challenging task at hand upon the receipt of a missing child report is identifying the key factors surrounding the case. This crucial assessment of the initial facts will determine what actions the responding law enforcement agency will perform.

This month, the National Institute of Justice released a study conducted by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) using the first-ever national sample of bias crime perpetrators collected from the Bias Incidents and Actors Study (BIAS) database.

DF100 Basic Digital Forensic Analysis: Seizure

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

*Prepare. Prepare to respond to an incident or crime scene where digital evidence may be present.
*Identify. Learn tow to identify relevant sources of digital evidence in an ever-evolving landscape.
*Collect. Learn the proper methods of digital evidence collection.
*Preserve. Build upon the three previous principles to ensure valid and legal preservation of digital evidence can occur.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open-source and commercially-available investigative tools for social engineering, information gathering, and artifacts related to social media; as well as automated utilities to capture information and crawl websites.

*Internet basics. IP address assignment; resolving domains and IP addresses; networking overview.
*Popular sites. Facebook, Twitter, KiK Messenger, Snapchat, Instagram, tumblr, and more.
*The dark web. Surface, deep, and dark web; how data flows through the internet. Who uses the dark web and how?
*Tor. How to access Tor; how Tor traffic works; how a Tor Hidden Service works; installing and configuring the Tor Browser Bundle.

DF320 Advanced Digital Forensic Analysis: macOS

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes, but is not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

Pages