Judges

FC101 Financial Investigations Practical Skills (May 25–27, 2021, Virtual)

This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues.

FC105 Financial Records Examination and Analysis (May 18–20, 2021, Virtual)

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

Webinar: NDCAC Resources for Law Enforcement in the Digital Age

The National Domestic Communications Assistance Center (NDCAC) is a national center established under the U.S. Department of Justice designed to help facilitate technical knowledge management and to foster the sharing of solutions and know-how among law enforcement agencies. Their mission is to strengthen law enforcement's relationships with the communications industry, leverage/share the collective technical knowledge and resources of the law enforcement community, and address challenges posed to law enforcement by advanced communications services and technologies. This one-hour webinar will introduce you to the many resources available through NDCAC, which include technical solutions, training, tools, and analytics.

Webinar: Finding the Unfindable: Advanced Cyber Investigative Techniques

This webinar will cover the skills necessary to perform cyber investigations using legal and open source data. Attendees will learn how to uncover criminal networks through intelligence collection. Attendees will look at a range of techniques for finding the "who done it?" from obtaining more evidence, to looking through the eyes of the criminal and discovering how they chose and researched their victim. The webinar will provide a roadmap on how to complete these tasks in an efficient and cost-effective manner, all while protecting the civil rights of those law enforcement are committed to protect. The National Child Protection Task Force provides ongoing consultation, assistance, and guidance as needed to implement this training. The webinar is designed for everyone from senior cyber and homicide investigators to new investigators, prosecutors, analysts, supervisors, and everyone in between.

Webinar: Disrupting the Shadow Economy Using Motive-Oriented Crime Suppression

The initial webinar, Shadow Economy 101, examined the critical importance of upholding the rule of law and illustrated how the business of crime does intolerable damage to our communities' economic infrastructure, disenfranchising our most economically vulnerable citizens. In part two of the series, 30-year Phoenix Police Veteran, Detective Sergeant David Lake (ret.) presents the revolutionary investigative methods he leveraged to combat shadow economic crimes in the fifth-largest city in the nation. His "motive-oriented crime suppression" technique was used to reduce crime (caseload) in less time and with fewer resources than traditional, method-centric approaches. Most importantly, it fundamentally disrupted and dismantled the systems that were propagating criminal offenses without aggravating social conditions by relying on police saturation or mass incarceration. Through internal research and case studies, attendees will be exposed to:

  • Alternative case management concepts
  • Techniques for proactive and precision investigations
  • New applications of police intelligence and crime analysis
  • Alternative case management concepts
  • Techniques for proactive and precision investigations
  • New applications of police intelligence and crime analysis

Webinar: Leveraging Technology for Your Fraud and Financial Investigations

In the advent of pandemic, natural disasters, and the increasing number of technology-driven fraud and financial investigations occurring, investigators need to rely on technology more than ever to solve these investigations and become more efficient investigating them. The sheer volume of investigations is allowing thousands of cases to go uninvestigated. Whether it would be stock manipulation, such as GameStop, cryptocurrency, or various applications that track and document expenditures, deposits, and transfers, it is clear we need to leverage technology to be more efficient in conducting these investigations. This webinar will go over techniques that fraudsters use, as well as the implementation of a tool that can help find the evidence you are looking for to leverage technology for your investigations.

DF320 Advanced Digital Forensic Analysis: macOS (Jun. 14–17, 2021, Virtual)

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers. Students will also learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using them to analyze operating system artifacts that include, but are not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

 

DF101 Basic Digital Forensic Analysis: Windows Acquisition (May 3–5, 2021, Virtual)

This course provides the fundamental knowledge and skills required to acquire forensic backup images from Windows-based computers and removable storage media in a forensically sound manner.

Presentations and hands-on practical exercises cover the following topics:

  • Storage media and how data is stored.
  • The forensic acquisition process.
  • Tool validation.
  • Hardware and software write blockers.
  • Forensic backup image formats.
  • Multiple forensic acquisition methods. 

Students will use free and commercial third-party tools that are currently used by practitioners in the field.

CI101 Basic Cyber Investigations: Digital Footprints (Jun. 30, 2021, Virtual)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

CI130 Basic Cyber Investigations: Cellular Records Analysis (Jun. 28–29, 2021, Virtual)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

Pages