This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.
This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.
Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. With an increase in device security, the need for detailed analysis is also increasing. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data, analysts can arm themselves with the skills and techniques needed to conquer the analysis of nearly any application.
This webinar is designed to provide an overview of technology and ethics, as well as justice professionals’ use of social media websites. We will review the moral concepts of goodness, right, and obligation, and the ways in which they operate in the workplace.
These concepts are further enhanced during the questions posed during the webinar and chatroom discussions. Additionally, this training is designed to provide participants with a review of some ethical dilemmas that can arise in the workplace. During this webinar, we will:
Using several case studies, this webinar will address defenses in child exploitation cases. The webinar will discuss the following:
This VALOR workshop inspires mid-level law enforcement leaders to advance officer safety and wellness strategies within their own agencies.
This one-day workshop is a subject expert-facilitated event that:
- Addresses leadership strategies.
- Examines causes of officer assaults, injuries, and deaths.
- Explores critical officer wellness issues.
- Discusses protocols and best practices.
- Discusses setting a safety precedent and accountability.
- Illustrates actionable opportunities to increase safety and wellness.
On June 17, 2020, at 2:00 p.m. ET, the Office for Victims of Crime Training and Technical Assistance Center will present an online Expert Q&A discussion with Lori A. McGee and Helen Supanich on "The U.S. Department of Justice National Elder Fraud Hotline To Assist Victims of Financial Fraud."
Join BJA's Comprehensive Opioid, Stimulant, and Substance Abuse Program (COSSAP) for their webinar “Engaging Clients in Treatment: Combining MRT with MAT for Opioid Use Disorder.”
This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.