Juvenile Justice Agencies

Rural Alaska Community Action Program, Inc

RurAL CAP, founded in 1965, is a private, statewide, nonprofit organization working to improve the quality of life for low-income Alaskans. Governed by a 24-member Board of Directors representing every region of the state, RurAL CAP is one of the largest and most diversified nonprofit organizations in Alaska. In fiscal year 2015, RurAL CAP employed 727 Alaskans in 60 communities statewide and operated on $43 million in conjunction with its for-profit subsidiary, Rural Energy Enterprises.

Vision
Healthy People, Sustainable Communities, Vibrant Cultures

Active BJA Funded Project(s):

  • Alaska Tribal Justice Resource Center
  • Alaska Tribal Justice Training and Technical Assistance Center

Cloud Combat: Debating Law Enforcement Access to Overseas Data

A former prosecutor and a high-tech crime attorney will square off in several rounds of debate on whether, and how, law enforcement can obtain evidence stored electronically overseas. Each round will involve a hypothetical case that incorporates relevant, cutting-edge evidentiary questions on various topics including overseas servers, CLOUD Act considerations, space-based data storage, and pertinent international law.

Understanding the Darknet

As the Internet continues to evolve, new layers populate where offenders commit criminal offenses. One such area is the Darknet. Participants will learn about the Darknet, how potential criminal activity is facilitated on the Darknet, and why this knowledge is crucial to investigating and prosecuting child exploitation cases. Additionally, participants will learn how to access other locations on the Darknet.

Medical Evaluation of Child Sexual Abuse: Why Can’t We Be More Like CSI?

A child abuse pediatrician will present an overview of the medical evaluation for suspected sexual abuse. The presenter will outline examples of the different roles between physician and nurse providers stressing the necessity of specialized training regardless of degree and the importance of participating in ongoing education and case review for quality assurance. The presenter will also discuss salient features of how the exam is performed, how to interpret findings, and when/how the collection of DNA/laboratory specimens are collected.

What's New in DF330 Advanced Android and iOS Forensic Analysis

This webinar will highlight the changes to the DF330 course and will focus on the advanced skills and knowledge required to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices. Students will use forensically sound methods and techniques to analyze potential evidence, employing advanced techniques to uncover evidence that was potentially missed or misrepresented by commercial forensic tools. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Students will learn how to develop the "hunt" methodology for analyzing third party applications that are not supported by commercial forensic tools. In addition to finding data, students will learn how to analyze data by writing custom SQLite queries and will learn to use the terminal as a powerful tool in investigations.

The Tables Have Turned: Igniting the Power of Survivors in Abuse Investigation and Prosecution

In many sexual abuse cases, DNA or other traditional forensic evidence does not exist, and the outcome often depends on the abilities of a multidisciplinary team to maximize the strength of survivors throughout the investigation and at trial. A former prosecutor and an abuse survivor who recorded the perpetrator's confession share investigative tips, best practices for interacting with survivors, and trial strategies to dismantle the power dynamics of perpetrator and victim.

The Truth About the Dark Web Fraud Trade

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. What is the dark web fraud economy? What drives it? What can we do about it?

Office 365 Forensics and Business Email Compromises

This webinar will discuss the types of evidence that should be collected in response to a business email compromise/Office 365 email investigation. It will also discuss methods of email compromise (phishing, malware, brute force attacks, and external compromise/credential stuffing), types of data at risk, and commonly seen schemes.

Case Study: Methods to Detect Forged Documents

Digital evidence has become an essential part of every legal matter, whether it be a criminal, civil, or internal investigation. Using a case study, this session will demonstrate the methods used to determine that an email submitted as evidence in federal court had been forged. The methods demonstrated in this case study may be reliably referenced when reviewing any questionable digital documents without the need for specialized software. This presentation will demonstrate the probative value of digital forensics in fraud investigations.

Pages