Judges

CC 350 - Mobile Device Forensic Analysis (Sept 2018)

This course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, available imaging options, accessing locked devices, and the default folder structure. The forensic artifacts covered include device information, call history, voicemail, messages, web browser history, contacts, and photos.

CC 201 - Digital Evidence Examination and Processing (Sept 2018)

This course builds on the concepts introduced in "Cybercop 101 - Basic Digital Forensic Imaging." It covers the architecture and functionality of the Windows NT File System, the FAT and the ExFAT File System, and related directory entry information for locating files on electronic devices. Topical areas include file headers and file hashing, recovery of deleted files and long file names, and techniques for discovering potential evidence that might otherwise be overlooked. This course incorporates an investigative scenario, providing hands-on experience with examination of hard drive images.

CC 350 - Mobile Device Forensic Analysis (Aug 2018)

This course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, available imaging options, accessing locked devices, and the default folder structure. The forensic artifacts covered include device information, call history, voicemail, messages, web browser history, contacts, and photos.

Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each other. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And, they increasingly choose to use platforms that make this communication openly available for others to view.

Financial Crimes Against Seniors Part 2- Investigations and Resources

A collaborative project of the National White Collar Crime Center (NW3C) and the Elder Justice Initiative, this webinar is the second in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

  • Investigating the Crimes,
  • Resources for Investigators, and
  • Creating an Investigative Plan.

Presented by: Leann D. Pritt, CFE, NW3C

The Greying of America and Its Impact on Insurance Investigations

This presentation will address the rise in fraudulent insurance claims being placed by those in the “senior demographic” over the last several decades. The course will cover historical, sociological, and economic reasons for the rise in senior fraudsters. Special considerations for conducting claim investigations with this demographic, strategies for conducting interviews with seniors, and case studies of senior insurance scammers will be reviewed.

Presented by: Christina Fiscella, Investigator, Consultant, & Trainer, FCLS, P.I.  

Online Officer Safety: Protecting Yourself in Cyberspace

Police officers, crime analysts, and other criminal justice professionals are high-value targets for cyber criminals. Too often, they are also soft targets. This webinar will cover the fundamentals of securing wireless networks both at home and when traveling, understanding and controlling social media footprints, and securing digital devices. Many police officers have a personal and family security plan. In 2018, it is important for those plans to extend to the internet, how you connect to the internet, and the devices that are used to make those connections.

“Bio Hacking:” Brain-Based Interviewing, Communication, and Leadership

This webinar will provide attendees with a basic knowledge of Neuro Linguistic Programming and other cognitive techniques to aid in interviewing suspects, witnesses, and victims. This webinar will help individuals become more effective communicators and leaders, giving them greater insights into and understandings of how to get people to do what they need.

This webinar will be presented by John Pizzuro, Chief Executive Officer, John Pizzuro Speaking and Consulting.

Catch Her If You Can: Today’s Pink Collar Criminal

Attend "Catch Her If You Can:Today's Pink Collar Criminal" and learn:

  • What is the difference between white collar crime and pink collar crime? 
  • Why is pink collar crime growing? 
  • Who is the “typical” pink collar criminal? 
  • How to identify “pink flags.” 
  • Tips and tricks for investigating and interviewing a pink collar criminal.

Presented by: Kelly Paxton Principal, K Paxton, LLC.

Pages