Law Enforcement

What Might Your Forensic Acquisitions Be Hiding?

The process of acquiring forensic images is well understood, and the industry has never been better equipped for the analysis. However, common practices are set to fail, and analysis may be missing malware and indicators of compromise. This webinar will highlight shortcomings in common methods and provide a framework for an improved approach to allow for more efficient and thorough investigations.

DF330 Advanced Digital Forensic Analysis: iOS & Android (March 2020, North Carolina)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

DF310 Advanced Digital Forensic Analysis: Windows (March 2020, Oregon)

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

FC105 Financial Records Examination and Analysis (March 2020, California)

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

The upcoming “Victim Counsel Coordination” webinar — hosted by the Bureau of Justice Assistance and the Association of Prosecuting Attorneys — has been rescheduled from this Friday, January 10, 2020 from 3:00–4:00 p.m. ET to Tuesday, January 14, 2020 from 3:00–4:00 p.m. ET.

Telecommunications Best Practices for Missing and Abducted Children

The National Criminal Justice Training Center of Fox Valley Technical College is hosting a classroom training in Mayetta, Kansas on February 26, 2020 to share resources and best practices needed to support quick and critical responses to reports of missing, abducted, and sexually exploited children. This training is primarily for front-line telecommunications personnel, telecommunications supervisors and directors, and front-line law enforcement officers.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (Feb. 2020, Connecticut)

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (Feb. 2020, Alabama)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

DF330 Advanced Digital Forensic Analysis: iOS & Android (Feb. 2020, Georgia)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

Pages