Law Enforcement

2018 National Forum on Criminal Justice

Sponsored by the National Criminal Justice Association (NCJA) and the IJIS Institute (IJIS), the National Forum on Criminal Justice showcases programs, research, and technologies that help justice practitioners and decisionmakers in states, local communities, and tribal nations address pressing public safety issues. It is the only criminal justice conference that brings together leaders from federal, state, local, and tribal government and the public and private sector to share real world strategies and solutions from around the country.

The Bureau of Justice Assistance (BJA) is seeking resumes from qualified experts to serve as peer reviewers to assess grant applications. Selected reviewers may evaluate grant applications remotely and will not be required to attend any in-person meetings. Before the review period begins, reviewers will participate in an Orientation Call that will define the background and purpose of the grant under review, as well as the roles and responsibilities for reviewers.

The Bureau of Justice Assistance (BJA) National Training and Technical Assistance Center (NTTAC) released a request for proposal (RFP) on December 11, 2017. BJA NTTAC is seeking a technical assistance provider to work with the Newark, New Jersey Police Division (PD) to develop a training curriculum for their recently updated use of force policy. The selected provider will:

Cyber Security 235 Basic Network Intrusion Investigations (Mar 2018)

This course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises. Additional topics include key cybersecurity concepts and issues, as well as the various classifications and types of network attacks.

Cybercop 325 - Macintosh Forensic Analysis (Mar 2018)

The "Cybercop (CC) 325 - Macintosh Forensic Analysis" (MFA) course provides the fundamental knowledge and skills necessary to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage. Students will use multiple methods to acquire forensically sound images of Apple Macintosh computers and identify unique challenges that this task may present.

Cybercop 101 Basic Digital Forensic Imaging BDFI (Mar 2018)

This course covers the fundamentals of computer operations, hardware function, and configuration, as well as best practices for the protection, preservation, and imaging of digital evidence. Presentations and hands-on exercises cover topics such as partitioning, data storage, hardware and software write blockers, boot-up and shutdown processes, live imaging, encryption detection, and duplicate imaging. This course incorporates computer forensic applications that experienced practitioners are currently using in the field.

Course structure:

Cyber Investigation 101 Secure Techniques for Onsite Preview - STOP (Mar 7 2018)

The "Cyber Investigation (CI) 101 - Secure Techniques for Onsite Preview" course covers the usage and configuration of two tools (Paladin/Autopsy and osTriage) designed to preview a non-mobile digital device and export files of evidentiary value. DAY ONE is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered on. DAY TWO is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered off.

Cyber Investigation 201 - Social Media & Technical Skills - SMTS (Mar 2018)

This course covers the skills investigators need to conduct successful online investigations involving social media. Topics include internet basics, such as IP addresses and domains; an overview of currently popular social media platforms; and best practices for building an online undercover profile. Instructors demonstrate both open-source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

Course structure:

Cyber Investigation 101 Secure Techniques for Onsite Preview - STOP (Mar 5 2018)

The "Cyber Investigation (CI) 101 - Secure Techniques for Onsite Preview" course covers the usage and configuration of two tools (Paladin/Autopsy and osTriage) designed to preview a non-mobile digital device and export files of evidentiary value. DAY ONE is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered on. DAY TWO is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered off.

Cyber Investigation 150 Introduction to Cellular Investigations ICI (Feb 2018)

This course covers the acquisition and analysis of the various types of call detail records obtained from cellular providers. It focuses on data analysis using Microsoft Excel, as well as techniques for presenting findings in case reports or in court. Students receive a copy of PerpHound, the National White Collar Crime Center's (NW3C) free software tool for the analysis of call detail records. This course also covers best practices for seizing, preserving, and acquiring evidence internal to a cellular phone.

Pages