Juvenile Justice Agencies

CI130 Basic Cyber Investigations: Cellular Records Analysis

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers; and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of NW3Cs PerpHound tool, which assists in the plotting of call detail record locations.

*Cellular technology. Land-line and cellular networks. Types and generations of cell phones. Cell site design and its implications for law enforcement.
*Analysis of call detail records. Request information from service providers. Convert records into a useful format. *Merge two related spreadsheets. Read and analyze using filters, sorting, and pivot tables. Plot location information.
*Hands-on experience. Hands-on experience with NW3Cs free software tool PerpHound and Microsoft Excel to analyze various types of records that are available from cellular providers.

The Role of Online OSINT in Preparing For and Responding To Critical Incidents

The Role of Online OSINT in Preparing For and Responding To Critical Incidents

Topics covered:

1. Collecting and assessing online threat information while protecting Civil Rights and Civil Liberties
2. Case studies in cyberOSINT during Critical Incident Planning and Response
3. Operational analysis of SCOTUS decision on true threats and free speech in Counterman v. Colorado (decided June 27, 2023)

DF310 Advanced Digital Forensic Analysis: Windows

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

CI101 Basic Cyber Investigations: Digital Footprints

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individuals digital footprint, protecting privacy on social media, and the consequences of oversharing personal information; as well as steps to take after becoming a target of doxing.

*Current landscape. Emerging technology and trends that can aid criminals in the commission of identity theft, credit card theft, child exploitation, and production of counterfeit documents.
*Personally identifiable information (PII). Learn what PII is, why it can threaten individuals safety, and the scams and exploits criminals use to obtain it.
*Minimizing your digital footprint. Learn how and why you should remove PII, and how to find where information may be located. Instructors demonstrate how to secure digital devices and request removal of data from a website.
*Social media. Use security and privacy settings to control the amount of available information on multiple platforms.
*Resources. Identify resources that can help victims of identity theft, doxing, and other related crimes.

CI101 Basic Cyber Investigations: Digital Footprints

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individuals digital footprint, protecting privacy on social media, and the consequences of oversharing personal information; as well as steps to take after becoming a target of doxing.

*Current landscape. Emerging technology and trends that can aid criminals in the commission of identity theft, credit card theft, child exploitation, and production of counterfeit documents.
*Personally identifiable information (PII). Learn what PII is, why it can threaten individuals safety, and the scams and exploits criminals use to obtain it.
*Minimizing your digital footprint. Learn how and why you should remove PII, and how to find where information may be located. Instructors demonstrate how to secure digital devices and request removal of data from a website.
*Social media. Use security and privacy settings to control the amount of available information on multiple platforms.
*Resources. Identify resources that can help victims of identity theft, doxing, and other related crimes.

PT200 Digital Evidence Foundations for Prosecutors

This 2-day course provides the practical legal and technical information prosecutors need to successfully identify, obtain, and use digital evidence in their cases. Legal topics include digital evidence identification, lawful seizure, extraction, discovery, and admission in court. Technical topics include examining the many types of digital evidence commonly encountered during investigations. This evidence is often found during searches of persons, residences, computers, mobile devices, phones, cell towers, and vehicles, together with the vast amounts of data held in cloud storage or by third-party service providers. The course will discuss how to legally obtain and use this evidence to comply with the ever-changing case law and ethical considerations. Unique issues related to investigating and prosecuting cases will also be highlighted.

Cyber Threats to Land Mobile Radio

The Public Safety Threat Alliance Intelligence team will present our observations and assessments on the trends and developments of cyber activity targeting land mobile radio operations in public safety globally.

Presented by:
Tyler Brodbeck, Threat Intelligence Manager, Motorola Solutions
Travis Randall, Senior Threat Intelligence Analyst, Motorola Solutions

Emerging Technology Overview

Participants will learn about the strategic implications of emerging technologies and the rapid pace of technological advancement. This webinar will examine how these technologies can create new avenues for public safety, while also fostering impediments. Some of the topics under examination in the presentation include digital identity, advanced analytics, artificial intelligence, communication networks, internet of everything, and biometric technology and collection. Dr. Matt Lehman will present on his research and observations gathered from a career that has included work as a local law enforcement officer and a supervisory intelligence analyst with the FBI.

Presenter,
Dr. Matt Lehman, Supervisory Intelligence Analyst, FBI Office of Partner Engagement

Don't Gamble with Counterfeit Auto Parts

Some of the most dangerous counterfeits involve explosive elements of automotive airbags, which can literally explode in the victim's face during a low impact car accident. Join the Automotive Anti-Counterfeiting Council (A2C2) and learn how the members of the association can assist law enforcement with intellectual property investigations. Law enforcement has identified a trend of counterfeited automotive parts growing at an alarming rate. The Automotive Anti-Counterfeiting Council members include: Ford, GM, Honda, Hyundai, Kia, Mercedes-Benz, Nissan, Stellantis, Subaru, Toyota, and VW Group of America.

Presented by,
Thomas H. Kipelius, Brand Protection Investigator, Stellantis

IA102 Introduction to Link Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

Pages