Justice Information Sharing

This month, the Vera Institute of Justice (Vera) released its annual report celebrating their 60-year anniversary and library of work to transform justice systems, end overcriminalization, and reduce mass incarceration of people of color, immigrants, and people experiencing poverty. Supported by the U.S.

The Bureau of Justice Assistance released a "Prison Industry Enhancement Certification Program (PIECP) Compliance Guide" this month to offer support to PIECP certification holders. First instituted in 1979, the PIECP encourages state and local governments to create work opportunities in prisons that aim to place justice-involved individuals in real-world environments that encourage meaningful employment opportunities upon release.

In October, the Council of State Governments Justice Center released “Action Points: Four Steps to Expand Access to Housing for People in the Justice System with Behavioral Health Needs.” According to the National Low Income Housing Coalition, affordable housing is scarce nationwide and especially among people who have been involved in the justice system or disproportionately face additional societal or systemic barriers including Black and Latinx communities.

This past November, the Council of State Governments Justice Center in collaboration with the National Police Foundation published “Creating Buy-In: Best Practices for Collaborating with Referral Sources for Crisis Stabilization Units.” Crisis stabilization units (CSU) provide law enforcement officers and mobile crisis teams a safe space to bring individuals during a behavioral health crisis. Buy-in from referral sources, particularly law enforcement agencies, is crucial to ensuring that people are suitably connected to the appropriate CSU.

Last month, the National Institute of Justice released a knowledge-sharing brief by the Forensic Technology Center of Excellence on the use of rapid toxicology screening tools in lieu of comprehensive, confirmatory investigations. According to the U.S. Drug Administration, the average turnaround time for traditional toxicology testing can last up to 31 days. However, contingent on case complexities, systemic issues, rising caseloads, and other unforeseen circumstances, delays often occur.

In September, the Office of Juvenile Justice and Delinquency Prevention released an analysis conducted by the National Center for Missing and Exploited Children’s (NCMEC) Infant Abductions Program. Often, the most challenging task at hand upon the receipt of a missing child report is identifying the key factors surrounding the case. This crucial assessment of the initial facts will determine what actions the responding law enforcement agency will perform.

This month, the National Institute of Justice released a study conducted by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) using the first-ever national sample of bias crime perpetrators collected from the Bias Incidents and Actors Study (BIAS) database.

DF330 Advanced Digital Forensic Analysis: iOS & Android

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically-sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, available acquisition options, accessing locked devices, and the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the hunt methodology for analyzing third party applications not supported by commercial forensic tools.

Mobile device hardware fundamentals. How mobile devices work, store data, and interact with a variety of networks.
Device handling. Properly preserving data for imaging and analysis. Identifying potential threats to data integrity.
Device acquisition and security. Acquisition options (physical, logical, device backups). Bypassing passcodes and properly defeating encrypted backups of iOS devices.
Advanced analysis techniques. Mounting images, partitioning scheme and default folder structure, types of artifacts (plists, SQLite databases, etc.).

FC105 Financial Records Examination and Analysis

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

*Introduction to analysis. Best practices. Finding patterns. Indicators of fraud. Presenting your findings.
*Financial records. Bank records. Business documents.
*Financial profiling. Methods of profiling. Reasons to create a profile. Creating a profile.
*Hands-on experience. Work a mock financial case as part of an investigative team.

IA101 Foundations of Intelligence Analysis Training

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included NW3C, Law Enforcement Intelligence Units (LEIU), the International Association of Law Enforcement Intelligence Analysis (IALEIA), and the Regional Information Sharing System (RISS).

*Analysis basics. History and purpose of intelligence analysis. Legal issues and ethics. Sources of information. The intelligence cycle.
*Types of analysis. Crime patterns. Associations. Flow. Communications. Financial analysis.
*Creative and critical thinking. Brainstorming. Mind mapping. Steps to critical thinking.
*Deterring crime. Strategic analysis as a tool for law enforcement personnel.
*Hands-on experience. Work as part of a team to analyze information pertaining to several hypothetical cases.

Pages