Justice Information Sharing

FC122 Intellectual Property Theft Training

This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific folder that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

This course is presented in collaboration with the National Association of Attorneys General (NAAG).
Awareness. Types of IP crimes. The criminals who commit these crimes. Impacts and dangers.
Investigation. Online and traditional techniques. Working with brand experts and the private sector. Large amounts of evidence. Resources.
Statutes. Prosecutorial theories. State-specific discussion.
Hands-on experience. Work with real counterfeit products. Identify fakes with expert guidance.

DF205 Intermediate Digital Forensic Analysis: SQLite Primer

Mobile devices dominate the intake list, and the desks of most digital forensics analyst globally. Devices are becoming more secure, with an increase in security the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

What is SQLite and how to identify and analyze logically
Recognizing relevant locations of valuable data within SQLite database.
Develop skills needed for crafting custom SQLite queries.
Learn how to recognize and decode a variety of common timestamp formats.
Learn how to perform SQLite analysis with automation.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed study of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

*Digital forensic process. Evidence review; requests for examination; case management.
*Validation. Creation of validation images; validation testing.
*Effective tool usage. Tool interface; hashing; file signature analysis; data carving; searching; metadata; bookmarking.
*Reporting. General report structure; report templates; using tool-generated reports.

IA101 Foundations of Intelligence Analysis Training

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included NW3C, Law Enforcement Intelligence Units (LEIU), the International Association of Law Enforcement Intelligence Analysis (IALEIA), and the Regional Information Sharing System (RISS).

*Analysis basics. History and purpose of intelligence analysis. Legal issues and ethics. Sources of information. The intelligence cycle.
*Types of analysis. Crime patterns. Associations. Flow. Communications. Financial analysis.
*Creative and critical thinking. Brainstorming. Mind mapping. Steps to critical thinking.
*Deterring crime. Strategic analysis as a tool for law enforcement personnel.
*Hands-on experience. Work as part of a team to analyze information pertaining to several hypothetical cases.

FC201 Financial Records Investigative Skills

This course builds on the concepts introduced in FC101 (FIPS) and FC105 (FREA), introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises. Students conduct a mock investigation that includes interviews, data analysis, and the examination of various documents.

*Money laundering. Methods of laundering money. Tracing illegal funds. Emerging issues. FinCEN.
*Spreadsheeting skills. Spreadsheet architecture. Formulas and calculations. Pivot tables.
*Working with financial data. Benford's law analysis. Disentangling commingled funds.
*Hands-on experience. Work a mock financial case as part of an investigative team.

On August 18, 2021, the Bureau of Justice Assistance, in collaboration with the U.S. Department of Justice, the U.S. Department of Health and Human Services, the U.S. Department of Housing and Urban Development, the U.S. Department of Labor, the U.S. Department of Education, and the White House Domestic Policy Council, hosted the third webinar in the Community Violence Intervention (CVI) Webinar Series. During the webinar, titled “CVI Webinar Series Part 3: CVI in Practice,” leading CVI experts shared their on-the-ground experiences on how to implement CVI strategies within communities.

The International Association of Chiefs of Police, in partnership with the U.S. Department of Justice Community Oriented Policing Services, has published a guide on Evidence-Based Crime Reduction Strategies for Small, Rural, and Tribal Agencies. This guide aims to provide information on evidence-based policing practices in small, rural, and tribal agencies to help tackle the unique challenges these law enforcement agencies face.

The U.S Department of Justice Office of Justice Programs (OJP) has developed a two-page flyer that provides an overview of drug court and other problem solving court program models. Drug courts are specialized court-docket programs that target defendants and offenders (adults and juveniles), as well as parents with pending child welfare cases who have alcohol and other drug dependency problems.

Webinar: Northern and Middle States Rural Law Enforcement Training and Technical Assistance Grant Program

The Bureau of Justice Assistance (BJA) Northern and Middle States Rural Law Enforcement Training and Technical Assistance Grant Program is a new initiative designed to provide resources to small, rural, and tribal law enforcement agencies within the northern and middle region of the U.S. This program will support efforts in addressing precipitous increases of all types of crime unique to this region, including human trafficking, sexual assaults, extortion, gang activity, murder, drug trafficking, and other forms of violent crime. The purposes for the awards under this program are to: Improve the agency's investigative, intelligence, and/or interdiction capabilities. Enhance information sharing, including investigative and intelligence data sharing with other agencies. Assist in projects/initiatives unique to an agency or its region. Improve dedicated communications capabilities. Provide specific technical assistance that could include hardware/software, specialized equipment, and peer assistance. Applicants must meet the following eligibility requirements to be considered for this program: Must be a small, rural, or tribal law enforcement agency located within the northern and middle region of the U.S. to include: Arkansas, Oklahoma, Missouri, Kansas, Iowa, Nebraska, South Dakota, Minnesota, North Dakota, Montana, Wyoming, Colorado, Utah, Idaho, Nevada, Louisiana, Oregon, Washington, Illinois, Indiana, Michigan, Wisconsin, and Alaska and serving a population size of 100,000 or less.

Pages