Law Enforcement

Intel Collection Part 2: Tips, Tricks and Techniques for Intel Collection

With the vast amount of data available and the calls for stopping law enforcement's access to data, this two-part webinar series will act as a guide through it all. Part two will cover tracking and using international phone numbers, Internet Protocol addresses, social media tools and techniques, tips for legal process to social media companies, and free law enforcement tools. The webinar will also discuss rules for using social media in investigations.

ISIS Tactics: Bombs, Drones and Kids: What Every Cop Needs to Know

The landscape of terrorist attacks has changed, the frequency of attacks has increased, and the targets are anywhere or anyone. Cops play a crucial role, as they are positioned to be the first and last line of defense. This webinar will take a look at ISIS tactics; the people committing acts of terrorism; intelligence collection before, during, and after an event; training; and event preparation. The webinar will look at how ISIS is convincing its followers to take up arms and what that might mean in the immediate future.

Jailbreaking to the Roots: a Forensic Approach to iOS and Android Device Rooting

This webinar will provide a forensics examiner's approach and views on jailbreaking modern iOS devices and rooting Android devices to further investigations and verify artifacts. Attendees will be provided other topics and information to provoke thought and inspire new ideas for forensic examinations. Additionally, this webinar will act as a primer to highlight new topics that will be covered in a new class on the horizon from the National White Collar Crime Center (NW3C).

How Virtual Currency is Changing the Way We Investigate

This webinar will discuss the impact that virtual currency has on investigations. Starting with a brief introduction on what virtual currency is, how to get it, and who is using it and why, the presenters will then discuss some high profile cases, such as Silk Road and the recent Alpha Bay and Hansa takedowns.

Cybercop 315 Windows Artifacts - WinArt (Mar 2018)

The "Cybercop (CC) 315 Windows Artifacts" (WinArt) course covers the identification and extraction of artifacts associated with the current versions of Microsoft Windows operating systems (Vista through Windows 10) and the New Technology file system. Topics include the change journal, BitLocker, and a detailed examination of the various artifacts found in each of the registry hive files. Students examine event logs, volume shadow copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

The National Criminal Justice Association (NCJA) is seeking nominations for its annual Outstanding Criminal Justice Program (OCJP) Awards, which will recognize five programs for effectively addressing crime- and justice-related issues. Specifically, NCJA requests nominations for innovative programs that have used promising practices to produce concrete results in their communities. OCJP Award winners will be honored at the 2018 National Forum on Criminal Justice in Fort Worth, Texas.

Murder Book - A Profile of the Los Angeles Police Department's Homicide Case Management Framework Webinar

In the early 1980s, the Los Angeles, California Police Department (LAPD) developed a homicide investigation case file structure, entitled the Murder Book, to bring organization and standardization to homicide case files. The uniform structure of the Murder Book allows anyone involved in a homicide investigation, including detectives, supervisors, and prosecutors, to review and locate key investigative reports, photos, and other materials in a standardized manner.

Join the Bureau of Justice Assistance’s Center for Task Force Training (CenTF) Program for the webinar “Operations Planning and Confidential Source Management” on Friday, March 2 at 2:00 p.m. ET. The webinar will discuss the importance of assessing and managing risk, as well as confidential source management as it pertains to the development of sound policies and procedures.

Pages