Juvenile Justice Agencies

Understanding the Darknet

As the Internet continues to evolve, new layers populate where offenders commit criminal offenses. One such area is the Darknet. Participants will learn about the Darknet, how potential criminal activity is facilitated on the Darknet, and why this knowledge is crucial to investigating and prosecuting child exploitation cases. Additionally, participants will learn how to access other locations on the Darknet.

Medical Evaluation of Child Sexual Abuse: Why Can’t We Be More Like CSI?

A child abuse pediatrician will present an overview of the medical evaluation for suspected sexual abuse. The presenter will outline examples of the different roles between physician and nurse providers stressing the necessity of specialized training regardless of degree and the importance of participating in ongoing education and case review for quality assurance. The presenter will also discuss salient features of how the exam is performed, how to interpret findings, and when/how the collection of DNA/laboratory specimens are collected.

What's New in DF330 Advanced Android and iOS Forensic Analysis

This webinar will highlight the changes to the DF330 course and will focus on the advanced skills and knowledge required to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices. Students will use forensically sound methods and techniques to analyze potential evidence, employing advanced techniques to uncover evidence that was potentially missed or misrepresented by commercial forensic tools. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Students will learn how to develop the "hunt" methodology for analyzing third party applications that are not supported by commercial forensic tools. In addition to finding data, students will learn how to analyze data by writing custom SQLite queries and will learn to use the terminal as a powerful tool in investigations.

The Tables Have Turned: Igniting the Power of Survivors in Abuse Investigation and Prosecution

In many sexual abuse cases, DNA or other traditional forensic evidence does not exist, and the outcome often depends on the abilities of a multidisciplinary team to maximize the strength of survivors throughout the investigation and at trial. A former prosecutor and an abuse survivor who recorded the perpetrator's confession share investigative tips, best practices for interacting with survivors, and trial strategies to dismantle the power dynamics of perpetrator and victim.

The Truth About the Dark Web Fraud Trade

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. What is the dark web fraud economy? What drives it? What can we do about it?

Office 365 Forensics and Business Email Compromises

This webinar will discuss the types of evidence that should be collected in response to a business email compromise/Office 365 email investigation. It will also discuss methods of email compromise (phishing, malware, brute force attacks, and external compromise/credential stuffing), types of data at risk, and commonly seen schemes.

Case Study: Methods to Detect Forged Documents

Digital evidence has become an essential part of every legal matter, whether it be a criminal, civil, or internal investigation. Using a case study, this session will demonstrate the methods used to determine that an email submitted as evidence in federal court had been forged. The methods demonstrated in this case study may be reliably referenced when reviewing any questionable digital documents without the need for specialized software. This presentation will demonstrate the probative value of digital forensics in fraud investigations.

Through the Looking Glass: Protecting Yourself While Conducting Internet-Based Investigations

"Through the looking glass" is a metaphorical expression meaning on the strange side, in the twilight zone, or in a strange, parallel world. While the internet can be considered a strange, parallel world, it can also be an informative, interesting, yet scary place when conducting different types of investigations. There are various technologies and methods that you can use to protect your identity and information while conducting internet-based investigations. This webinar will illustrate these technologies and methods to keep you safe when investigating online.

CI130 Basic Cyber Investigations: Cellular Records Analysis (Oct. 2019, Massachusetts)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

FC111 Financial Crimes Against Seniors Seminar (Oct. 31, 2019, Florida)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and using resources for investigation and community awareness. Detailed examination of a case study, from initial complaint to prosecution, reinforces and illustrates the course content. With a dual focus on financial abuse by trusted persons and common scams aimed at seniors, the course introduces senior-specific investigative skills while facilitating networking and cooperation that can extend out of the classroom and into real cases.

Pages