Judges

Searching for the Digital Evidence in Your Physical Crime Scene: Part 2

Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital "footprints" that can help you during your investigations, regardless of your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative ways of seeing a crime scene through different technologies. Remember, even though your suspects device did not "connect" to anything, it likely did leave a trail on the victims device, nearby routers, or may have been collected by tech companies. This webinar is designed for investigators, prosecutors, crime analysts, or those who generally investigate crimes. No high-tech background is needed! Though it is recommended, you do not need to attend part 1 to attend part 2.

Searching for the Digital Evidence in Your Physical Crime Scene: Part 1

Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital "footprints" that can help you during your investigations, regardless of your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative ways of seeing a crime scene through different technologies. Remember, even though your suspects device did not "connect" to anything, it likely did leave a trail on the victims device, nearby routers, or may have been collected by tech companies. This webinar is designed for investigators, prosecutors, crime analysts, or those who generally investigate crimes. No high-tech background is needed! Though it is recommended, you do not need to attend part 1 to attend part 2.

Understanding Different Types of Stressors & Police Officers' Preferences for Support

Join Dr. Erin Craw for a discussion about the different types of stressors police officers experience, the importance of culturally competent support, and the role of communication in addressing the needs of officers. This webinar will also involve conversations about officers' preferences in receiving support from their departments.

The Role of Online Social Media in Predicting and Interdicting Spree Killings: Case Studies and Analysis

Online social media and emerging methods of electronic communication are changing how people communicate and interact with world around them. Increasingly, those contemplating engaging acts of spree violence express themselves in online social media. It is important that investigators, analysts, and those responsible for school, workplace, and public safety understand how this behavior plays a key role in predicting and interdicting the violence. Items of evidentiary value can now often be recovered from online communities. This evidence can provide indicators of planned violence and help to shed light on the thought processes and motivations that led to the tipping point of violence.
The training will explore the interaction between social media and spree violence through a historical examination of case studies ranging in time from 1927 to 2022. Police, prosecutors, probation officers, school and university administrators, and others responsible for workplace and public safety can all benefit from this training.

CI240 Intermediate Cyber Investigations: Virtual Currency

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered; and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions; and best practices for seizing and securing cryptocurrency.

*Virtual currency basics. History of money and of virtual currency. Categorizing virtual currency.
*Blockchain. History of the blockchain. Understanding different protocols.
*Cryptocurrencies in detail. Bitcoin, Ethereum, Monero and other privacy coins.
*Investigative techniques. Seizing virtual currency; tracking transactions through the blockchain; documenting investigative results.

DF330 Advanced Digital Forensic Analysis: iOS & Android

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically-sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, available acquisition options, accessing locked devices, and the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the hunt methodology for analyzing third party applications not supported by commercial forensic tools.

Mobile device hardware fundamentals. How mobile devices work, store data, and interact with a variety of networks.
Device handling. Properly preserving data for imaging and analysis. Identifying potential threats to data integrity.
Device acquisition and security. Acquisition options (physical, logical, device backups). Bypassing passcodes and properly defeating encrypted backups of iOS devices.
Advanced analysis techniques. Mounting images, partitioning scheme and default folder structure, types of artifacts (plists, SQLite databases, etc.).

IA102 Introduction to Link Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

DF101 Basic Digital Forensic Analysis: Windows Acquisition

This course provides the fundamental knowledge and skills required to acquire forensic backup images of commonly encountered forms of digital evidence (Microsoft Windows based computers and external storage devices) in a forensically sound manner. Presentations and hands-on practical exercises cover topics on storage media and how data is stored, the forensic acquisition process, tool validation, hardware and software write blockers, forensic backup image formats, and multiple forensic acquisition methods. Students will use third party tools, both free and commercial, that are currently used by practitioners in the field.

FC119 Asset Forfeiture

This course is designed to provide law enforcement officers, prosecutors, and asset forfeiture administrators with an understanding of asset forfeiture rules and regulations, and the impact state and federal asset forfeiture programs have on crime and criminals. This course gives students a better understanding of asset forfeiture procedures in order to dismantle the criminal organizations in possession of the assets. Students are provided with relevant state statutes, resources, and sample organizational documents. A combination of lecture, discussion, and interactive exercises illustrate the potential dangers and repercussions of asset forfeiture, as well as best practices and techniques for asset forfeiture investigations, prosecutions, and administrative management of each case.

NADCP Conference: Rise 24

Since 1995, NADCP has convened the only national conference for treatment court professionals. Over the past 27 years, our numbers have grown to include a wide array of public health and public safety leaders working to expand treatment for people with substance use and mental health disorders who become involved in the legal system.

What remains constant is the unparalleled education, networking, and fellowship enjoyed by every attendee!

Pages