Judges

CC 350 - Mobile Device Forensic Analysis (Aug 2018)

This course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, available imaging options, accessing locked devices, and the default folder structure. The forensic artifacts covered include device information, call history, voicemail, messages, web browser history, contacts, and photos.

Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each other. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And, they increasingly choose to use platforms that make this communication openly available for others to view.

Financial Crimes Against Seniors Part 2- Investigations and Resources

A collaborative project of the National White Collar Crime Center (NW3C) and the Elder Justice Initiative, this webinar is the second in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:

  • Investigating the Crimes,
  • Resources for Investigators, and
  • Creating an Investigative Plan.

Presented by: Leann D. Pritt, CFE, NW3C

The Greying of America and Its Impact on Insurance Investigations

This presentation will address the rise in fraudulent insurance claims being placed by those in the “senior demographic” over the last several decades. The course will cover historical, sociological, and economic reasons for the rise in senior fraudsters. Special considerations for conducting claim investigations with this demographic, strategies for conducting interviews with seniors, and case studies of senior insurance scammers will be reviewed.

Presented by: Christina Fiscella, Investigator, Consultant, & Trainer, FCLS, P.I.  

Online Officer Safety: Protecting Yourself in Cyberspace

Police officers, crime analysts, and other criminal justice professionals are high-value targets for cyber criminals. Too often, they are also soft targets. This webinar will cover the fundamentals of securing wireless networks both at home and when traveling, understanding and controlling social media footprints, and securing digital devices. Many police officers have a personal and family security plan. In 2018, it is important for those plans to extend to the internet, how you connect to the internet, and the devices that are used to make those connections.

“Bio Hacking:” Brain-Based Interviewing, Communication, and Leadership

This webinar will provide attendees with a basic knowledge of Neuro Linguistic Programming and other cognitive techniques to aid in interviewing suspects, witnesses, and victims. This webinar will help individuals become more effective communicators and leaders, giving them greater insights into and understandings of how to get people to do what they need.

This webinar will be presented by John Pizzuro, Chief Executive Officer, John Pizzuro Speaking and Consulting.

Catch Her If You Can: Today’s Pink Collar Criminal

Attend "Catch Her If You Can:Today's Pink Collar Criminal" and learn:

  • What is the difference between white collar crime and pink collar crime? 
  • Why is pink collar crime growing? 
  • Who is the “typical” pink collar criminal? 
  • How to identify “pink flags.” 
  • Tips and tricks for investigating and interviewing a pink collar criminal.

Presented by: Kelly Paxton Principal, K Paxton, LLC.

Introduction to Cell Phone Call/Communication Detail Records

This presentation will provide an overview of cell phone call/communication detail records (CDRs) and will focus on historical records available from primary cell phone companies, including logs of phone calls, short message service text messages, and Internet activity. The overview will also provide a brief introduction to cell phone-created CDRs, which may be available from non-cell phone sources such as email providers, smart phone application providers, and non-cellular-based Internet service providers.

CS 235 - Basic Network Intrusion Investigations (June 2018)

This course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises. Additional topics include key cybersecurity concepts and issues, as well as the various classifications and types of network attacks.

Pages