Judges

FC102 Financial Investigations Triage (Sept 2019, Georgia)

This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.

DF103 Basic Digital Forensic Analysis: Acquisition (Sept 2019, California)

This course provides students with the fundamental knowledge and skills required to acquire images in a forensically sound manner from Windows-based and macOS-based computers, as well as mobile devices. Presentations and hands-on practical exercises cover topics including the digital forensic process, hardware and software write blockers, forensic image formats, live imaging, and multiple forensic acquisition methods. Students gain hands-on experience with free and commercial third-party imaging tools that are currently used by practitioners in the field.

FC102 Financial Investigations Triage (Sept 2019, Texas)

This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.

DF320 Advanced Digital Forensic Analysis: macOS (Sept 2019)

This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage, and use multiple methods to acquire forensically sound images of Apple Macintosh computers. Topics include how the macOS default file system stores data, what happens when files are sent to the macOS Trash, where operating system and application artifacts are stored, and how they can be analyzed. Forensic artifacts covered include password recovery, recently opened files and applications, encryption handling, Mail, Safari, Messages, FaceTime, Photos, Chrome, and Firefox.

FC111 Financial Crimes Against Seniors Seminar (Sept 2019, Colorado)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and using resources for investigation and community awareness. Detailed examination of a case study, from initial complaint to prosecution, reinforces and illustrates the course content. With a dual focus on financial abuse by trusted persons and common scams aimed at seniors, the course introduces senior-specific investigative skills while facilitating networking and cooperation that can extend out of the classroom and into real cases.

Mindfulness in Domestic Violence Work: Working with Victims (Part I)

Although utilizing trauma-informed principles is a beneficial tool when successfully serving clients who are victims of domestic violence and sexual violence, going a step further by being mindful will get you that much further with this population. This webinar will examine why being self-aware of our own judgments, beliefs and attitudes is so important in our work with victims. More importantly, it is this awareness that could have a profound impact on our work within this field – it could be the difference between life or death for the victims we serve.

Self-Care for Justice Professionals

This webinar will begin by discussing the impact that trauma work has on the brain and body and present interventions that a person can do to mitigate these effects. The presentation will also discuss the personality types that are drawn to trauma work and working with other people’s trauma, and the self-care interventions appropriate for them. The webinar will end with guidance on developing a personalized self-care plan.

FC122 Intellectual Property Theft Training (June 2019)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

FC122 Intellectual Property Theft Training (Jul 2019)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

Phishing to Laundering: From Clicks to Cash-Out

It is widely acknowledged that phishing is responsible for more than 90 percent of breaches occurring today. Basic phishing primarily exploits human behavior to entice a victim to ‘click the link’ or ‘open the attachment,’ thus often handing over to the criminal the golden nugget – valid access credentials. While we are all taught not to click or open the attachment, the scheme is still highly successful and profitable.

Pages