The theme for this summer’s training institute is, "Passion, Courage, and Endurance: Transforming Community Corrections." The adult and juvenile justice systems are experiencing significant and powerful change driven by justice reform and innovative practices focused on promoting public safety in a more fair, just, and effective manner. America’s ever-changing landscape poses challenges and opportunities to incorporate diversity, equity, and inclusion in justice system program development, culturally competent and trauma-informed service delivery, and organizational change.
In this webinar, presenters will explore the important role of resource parents in supporting the family recovery and reunification process. Presenters will share their experiences in engaging resource parents in critical activities, including facilitating quality and frequent family time, co-parenting with the birth parent, and providing a trauma-informed approach. Additional technical assistance resources, including a pre-recorded video presentation, team discussion guide, and “Take Action” guides will also be provided to enhance learning.
This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.
An underground movement of hackers is taking over victims' telephones and draining their financial accounts! In the past 12 months, a California high-tech task force named REACT has identified more than 800 victims and nearly $50 million in losses of cash and cryptocurrency. Please join Santa Clara County, California Prosecutor Erin West and District Attorney Investigator David Berry as they explain this phenomenon known as sim-swapping and detail how the hackers are able to access phones, hijack social media, and ultimately steal millions of dollars. The presenters will take a look at this new class of criminals and identify ways to protect people against this growing crime wave.
This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.
This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage, and use multiple methods to acquire forensically sound images of Apple Macintosh computers. Topics include how the macOS default file system stores data, what happens when files are sent to the macOS Trash, where operating system and application artifacts are stored, and how they can be analyzed. Forensic artifacts covered include password recovery, recently opened files and applications, encryption handling, Mail, Safari, Messages, FaceTime, Photos, Chrome, and Firefox.
This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and using resources for investigation and community awareness. Detailed examination of a case study, from initial complaint to prosecution, reinforces and illustrates the course content. With a dual focus on financial abuse by trusted persons and common scams aimed at seniors, the course introduces senior-specific investigative skills while facilitating networking and cooperation that can extend out of the classroom and into real cases.
This course provides the fundamental knowledge and skills necessary to preview the most commonly encountered forms of digital evidence. The course covers Windows-based and macOS-based computers, mobile devices, and removable storage media. In a combination of lecture, discussion, and practical exercises, instructors introduce the previewing process, legal considerations, live previewing, and dead-box previewing. Students gain hands-on experience with free and commercial third-party previewing tools that are in current use by practitioners in the field.
This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.
This course provides students with the fundamental knowledge and skills required to acquire images in a forensically sound manner from Windows-based and macOS-based computers, as well as mobile devices. Presentations and hands-on practical exercises cover topics including the digital forensic process, hardware and software write blockers, forensic image formats, live imaging, and multiple forensic acquisition methods. Students gain hands-on experience with free and commercial third-party imaging tools that are currently used by practitioners in the field.