Judges

DF320 Advanced Digital Forensic Analysis: macOS (Sept 2019)

This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage, and use multiple methods to acquire forensically sound images of Apple Macintosh computers. Topics include how the macOS default file system stores data, what happens when files are sent to the macOS Trash, where operating system and application artifacts are stored, and how they can be analyzed. Forensic artifacts covered include password recovery, recently opened files and applications, encryption handling, Mail, Safari, Messages, FaceTime, Photos, Chrome, and Firefox.

FC111 Financial Crimes Against Seniors Seminar (Sept 2019, Colorado)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and using resources for investigation and community awareness. Detailed examination of a case study, from initial complaint to prosecution, reinforces and illustrates the course content. With a dual focus on financial abuse by trusted persons and common scams aimed at seniors, the course introduces senior-specific investigative skills while facilitating networking and cooperation that can extend out of the classroom and into real cases.

Mindfulness in Domestic Violence Work: Working with Victims (Part I)

Although utilizing trauma-informed principles is a beneficial tool when successfully serving clients who are victims of domestic violence and sexual violence, going a step further by being mindful will get you that much further with this population. This webinar will examine why being self-aware of our own judgments, beliefs and attitudes is so important in our work with victims. More importantly, it is this awareness that could have a profound impact on our work within this field – it could be the difference between life or death for the victims we serve.

Self-Care for Justice Professionals

This webinar will begin by discussing the impact that trauma work has on the brain and body and present interventions that a person can do to mitigate these effects. The presentation will also discuss the personality types that are drawn to trauma work and working with other people’s trauma, and the self-care interventions appropriate for them. The webinar will end with guidance on developing a personalized self-care plan.

FC122 Intellectual Property Theft Training (June 2019)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

FC122 Intellectual Property Theft Training (Jul 2019)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

Phishing to Laundering: From Clicks to Cash-Out

It is widely acknowledged that phishing is responsible for more than 90 percent of breaches occurring today. Basic phishing primarily exploits human behavior to entice a victim to ‘click the link’ or ‘open the attachment,’ thus often handing over to the criminal the golden nugget – valid access credentials. While we are all taught not to click or open the attachment, the scheme is still highly successful and profitable.

IA105 Intelligence Writing and Briefing (May 2019)

This course covers basic intelligence writing and briefing principles, as well as methods to facilitate increased intelligence sharing. Topics include creative/critical thinking and critical reading skills, source evaluation, privacy and civil rights, intelligence product writing structure and style, and creating and presenting intelligence briefings. An instructor and peer feedback process is applied to the reports and briefings produced in class.

FC105 Financial Records Examination and Analysis (Aug 2019)

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

Pages