Judges

IA101 Foundations of Intelligence Analysis Training (Jun 2019, Florida)

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. This introductory course covers the history and purpose of intelligence analysis, the intelligence cycle, analytical thinking skills, and the importance of strategic analysis. The course was developed by a consortium that included the National White Collar Crime Center, Law Enforcement Intelligence Unit, the International Association of Law Enforcement Intelligence Analysis, and the Regional Information Sharing System.

DF102 Basic Digital Forensic Analysis: Previewing (Jun 2019, Connecticut)

This course provides the fundamental knowledge and skills necessary to preview the most commonly encountered forms of digital evidence. The course covers Windows-based and macOS-based computers, mobile devices, and removable storage media. In a combination of lecture, discussion, and practical exercises, instructors introduce the previewing process, legal considerations, live previewing, and dead-box previewing. Students gain hands-on experience with free and commercial third-party previewing tools that are in current use by practitioners in the field.

CI240 Intermediate Cyber Investigations: Virtual Currency (Jun 3 2019, Pennsylvania)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

CI240 Intermediate Cyber Investigations: Virtual Currency (Jun 5 2019, Pennsylvania)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

PT201 Digital Evidence Basics & the CLOUD Act (May 2019, Massachusetts)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

DF320 Advanced Digital Forensic Analysis: macOS (Jun 2019, Arkansas)

This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage, and use multiple methods to acquire forensically sound images of Apple Macintosh computers. Topics include how the macOS default file system stores data, what happens when files are sent to the macOS Trash, where operating system and application artifacts are stored, and how they can be analyzed. Forensic artifacts covered include password recovery, recently opened files and applications, encryption handling, Mail, Safari, Messages, FaceTime, Photos, Chrome, and Firefox.

Treatment Alternatives for Safe Communities (TASC)

TASC, Inc. (Treatment Alternatives for Safe Communities), is a not-for-profit organization that provides health recovery management services for individuals with substance use and mental health disorders. Since 1976, the organization has provided and/or facilitated access to community-based treatment and recovery support services for individuals who are involved in public systems such as criminal and juvenile justice, corrections, child welfare, public aid, and public housing.

Active BJA Funded Project(s):

  • BJA Second Chance Act Training and Technical Assistance Program - Corrections & Community Engagement
  • CHJ First Responder Partnerships (CHJ-FRP) TTA Initiative
  • CHJ First Responder Partnerships TTA Initiative (CHJ-FRP)

Internet Intelligence Training: Social Media Exploitation (June 2019)

This course offers a comprehensive program for internet investigations and open-source intelligence gathering. Students learn how to enhance their search skills to effectively use internet resources for locating information online.

Cognitive Interviewing, Communication & Influence (Jul 2019)

This course introduces the art of cognitive interviewing using neuro-linguistic programming techniques. Students learn how to interview suspects, witnesses, and victims more effectively, as well as to observe brain-based deception behavior in both face-to-face and virtual communications. Topics include influence and persuasion with difficult witnesses and suspects, interpretation of body language for deceit and truthfulness, and best practices for testimony and reframing cross-examination.

Cognitive Interviewing, Communication & Influence (Apr 2019)

This course introduces the art of cognitive interviewing using neuro-linguistic programming techniques. Students learn how to interview suspects, witnesses, and victims more effectively, as well as to observe brain-based deception behavior in both face-to-face and virtual communications. Topics include influence and persuasion with difficult witnesses and suspects, interpretation of body language for deceit and truthfulness, and best practices for testimony and reframing cross-examination.

Pages