Juvenile Justice Agencies

Sandcastles in a Storm: Application Vulnerabilities and How They Weaken our Organizations

In this presentation, Kevin Johnson of Secure Ideas will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things. The presentation will explore the vulnerabilities, how they are attacked, and what it means to all of us.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (July 2019, Maryland)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites. 

IA101 Foundations of Intelligence Analysis Training (Mar 2019, Texas)

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. This introductory course covers the history and purpose of intelligence analysis, the intelligence cycle, analytical thinking skills, and the importance of strategic analysis. The course was developed by a consortium that included the National White Collar Crime Center, Law Enforcement Intelligence Unit, the International Association of Law Enforcement Intelligence Analysis, and the Regional Information Sharing System.

FC122 Intellectual Property Theft Training (Apr 2019, Kentucky)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

CI 100 - Identifying and Seizing Electronic Evidence (Mar 2019)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve electronic evidence at a crime scene. Topics include recognizing potential sources of electronic evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

PT201 Digital Evidence Basics & the CLOUD Act (Jun 25 2019, North Carolina)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

PT201 Digital Evidence Basics & the CLOUD Act (Jun 27 2019, North Carolina)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

Being Mickey in a Goofy World: Understanding User Attacks

Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation, he will walk through the various attacks, including email, social media, and in-person. Using various war stories, he will explain how the attacker views the user and what they do to increase the success rate of these attacks.

Seven Samurai: Understanding Attacks to Drive Defenses

This presentation uses war stories from decades of working in information technology and security to explore the attacks we see today. Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today. These stories will explain how the attack was performed and why an attacker would take that direction.

Investigating Terrorist Financing with Chainalysis Reactor

Terrorist organizations are using cryptocurrencies as a new way to raise funds and facilitate operations. This poses a challenge to both public and private sector organizations, but also creates a new opportunity for lead development centered on blockchain data. This webinar will review an analysis of recent cases of terrorist organizations using Bitcoin, provide an overview of Chainalysis data and the Reactor software solution, and speak to the future of terrorist financing through cryptocurrency and how to stop them.

Pages