Juvenile Justice Agencies

Webinar - Follow the Money: FinCrime Investigation Case Studies

Money laundering is a global, trillion-dollar crime that extends into all areas of commerce. Money laundering is not just a standalone crime, but is also a symptom of additional crimes that generate illicit proceeds. Whether due to lone wolf criminals, transnational organized crime, or international corruption, it can be challenging to prove money laundering as both a factual matter and as part of a criminal prosecution. 

This webinar will outline not only the essential elements of a criminal case of money laundering, but also examine how additional charges can be brought to flush out the elements of that charge. Learners will get a better understanding of the prosecutor's approach to money laundering (and its related crimes), as well as tools to follow the transactions that can substantiate such a charge. By moving from academic to applied subject matter, learners will gain insight into how to both trace illicit assets and to prepare their findings for criminal cases. The webinar will rely on real-world examples of financial crime and explain how cases like those can be further built out by investigators, analysts, and compliance officers.

IA101 Foundations of Intelligence Analysis Training (March 2020, South Carolina)

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included the National White Collar Crime Center, Law Enforcement Intelligence Unit, the International Association of Law Enforcement Intelligence Analysis, and the Regional Information Sharing System.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (July 2020, California)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

Webinar - Of Eggplants and Umbrellas: The Legal and Investigative Implications of Emojis

This webinar, presented by cyber crime attorneys and a former prosecutor, discusses investigative uses of emojis, particularly in the context of child exploitation, and the legal context of this growing medium, including current case law and implications for practice.

Webinar – Youth Homelessness and Juvenile Justice: Supporting Youth Across Systems

Nationally, an estimated 78 percent of young people who have experienced homelessness report that they have also had at least one interaction with law enforcement, while 44 percent have spent time in a jail or detention facility. Participants will learn about ways that communities can better support young people who find themselves at the intersections of youth homelessness and juvenile justice to ensure that youth do not have unnecessary contact with the juvenile justice system and that if they do come in contact with the justice system, that they exit to safe, stable, and secure housing.

Webinar - Checkm8 & CheckRa1n: New Tools for iOS Extractions

If anything about mobile forensics could be considered buzzworthy in the past year, it would be the release of the Checkm8 Boot ROM exploit created by axi0mX in October. Allowing critical access to 11 generations of iPhones and iDevices, Checkm8 is a new opportunity to access data previously locked behind a secure wall. But beyond the hype, what data can you actually access using this newfound exploit, and what do you do once you've extracted data using Checkm8? In this webinar, we will discuss the benefits, challenges, and usefulness of Checkm8 and Checkra1n to mobile forensic examiners and investigators. We will also explore how examiners can use Checkra1n to gain access to devices and what that access means in practical terms for investigations.

FC122 Intellectual Property Theft Training (Jan. 2020, Florida)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

This course is presented in collaboration with the National Association of Attorneys General.

Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each other. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And they increasingly choose to use platforms that make this communication openly available for others to view. This means that evidence associated with not just metadata but also content of communications can often be collected through open sources long after the communication is completed. While evidence of criminality and victimization can be recovered through open source investigative techniques, many of the commercial tools marketed to criminal investigators and analysts are expensive. This sometimes places them outside the reach of police departments, and social media companies are increasingly blocking API connections for commercial tools that allow the tools to be used for "surveillance." Therefore, it is increasingly important for criminal investigators and analysts to build an inexpensive cyber-OSINT toolbox. This webinar will discuss the rapidly evolving ecosystem of online social media and how people are changing how they choose to communicate. It will then detail and demonstrate free and inexpensive cyber-OSINT tools that criminal investigators and analysts can use to start building a cyber-OSINT toolbox.

STOP School Violence 2019 BJA Solicitation Webinar

Join the Bureau of Justice Assistance (BJA) and the National Center for School Safety on Wednesday, January 29 at 1 p.m. ET for a webinar on the Fiscal Year (FY) 2019 Student, Teachers, and Officers Preventing (STOP) School Violence Program funding opportunity. The FY 2019 STOP School Violence Grant Program seeks to improve school security by equipping students and teachers with the tools they need to recognize, respond to, and help prevent acts of violence.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (March 2020, Texas)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

Pages