Judges

CI240 Intermediate Cyber Investigations: Virtual Currency (Jun 5 2019, Pennsylvania)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

PT201 Digital Evidence Basics & the CLOUD Act (May 2019, Massachusetts)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

DF320 Advanced Digital Forensic Analysis: macOS (Jun 2019, Arkansas)

This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage, and use multiple methods to acquire forensically sound images of Apple Macintosh computers. Topics include how the macOS default file system stores data, what happens when files are sent to the macOS Trash, where operating system and application artifacts are stored, and how they can be analyzed. Forensic artifacts covered include password recovery, recently opened files and applications, encryption handling, Mail, Safari, Messages, FaceTime, Photos, Chrome, and Firefox.

Treatment Alternatives for Safe Communities (TASC)

TASC, Inc. (Treatment Alternatives for Safe Communities), is a not-for-profit organization that provides health recovery management services for individuals with substance use and mental health disorders. Since 1976, the organization has provided and/or facilitated access to community-based treatment and recovery support services for individuals who are involved in public systems such as criminal and juvenile justice, corrections, child welfare, public aid, and public housing.

Active BJA Funded Project(s):

  • BJA Second Chance Act Training and Technical Assistance Program - Corrections & Community Engagement
  • CHJ First Responder Partnerships (CHJ-FRP) TTA Initiative
  • CHJ First Responder Partnerships TTA Initiative (CHJ-FRP)

Internet Intelligence Training: Social Media Exploitation (June 2019)

This course offers a comprehensive program for internet investigations and open-source intelligence gathering. Students learn how to enhance their search skills to effectively use internet resources for locating information online.

Cognitive Interviewing, Communication & Influence (Jul 2019)

This course introduces the art of cognitive interviewing using neuro-linguistic programming techniques. Students learn how to interview suspects, witnesses, and victims more effectively, as well as to observe brain-based deception behavior in both face-to-face and virtual communications. Topics include influence and persuasion with difficult witnesses and suspects, interpretation of body language for deceit and truthfulness, and best practices for testimony and reframing cross-examination.

Cognitive Interviewing, Communication & Influence (Apr 2019)

This course introduces the art of cognitive interviewing using neuro-linguistic programming techniques. Students learn how to interview suspects, witnesses, and victims more effectively, as well as to observe brain-based deception behavior in both face-to-face and virtual communications. Topics include influence and persuasion with difficult witnesses and suspects, interpretation of body language for deceit and truthfulness, and best practices for testimony and reframing cross-examination.

Blockchain Tracing: Cryptocurrency Anti-Money Laundering and Financial Investigation Workshop

This webinar on CipherTrace cryptocurrency anti-money laundering and financial investigation provides hands-on instruction on blockchain and blockchain tracing. Attendees will learn a risk-based approach to tracing sources of blockchain funds and de-anonymizing cryptocurrency transactions with cryptocurrency forensic tools. They will develop and hone digital forensic investigation techniques. The course will equip participants with an understanding of cryptocurrency fundamentals and the specific understanding of tracing cryptocurrency transactions. The webinar is designed to improve the efficiency and effectiveness of blockchain forensic investigations by explaining how to best leverage tools and resources to reduce investigation time and improve information yield. CipherTrace provides the infrastructure to enable secure, verifiable, and legal commerce for cryptocurrency markets.

Removing Your Personal Identifying Information

Everyone is at risk for identity theft, online and physical stalking, and harassment. Beyond social media, your public records are for sale, so your home address and assets are easily located through simple online searches. This course provides a thorough description of how and where your data is stored and how to remove it.

Leveraging Partnerships and Avoiding Multiagency Pitfalls

Have you ever wished that everyone was in the same boat as you, and more importantly, rowing in the same direction? Today people live in a global society that consists of various teams and departments working with and against each other. People face individual and institutional challenges that sometimes inhibit their ability to succeed. Investigations today comprise public and private entities, investigators from different departments, attorneys, and others that can impact your investigation or goals. This webinar will teach students the art of leverage and how to maintain, develop, and execute partnerships that will provide long-term success. True success comes when you are able to maintain partnerships and rely on each other for that success. This webinar will provide students with strategies used by some of the most successful Fortune 500 companies. Students will be able to implement these strategies directly to their teams and their investigations. This webinar will give them insight on how to develop relationships and leverage people in order to be more efficient and provide them with lasting success.

Pages