Juvenile Justice Agencies

DF330 Advanced Digital Forensic Analysis: iOS & Android (Jan 2019)

This course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, using available imaging options, accessing locked devices, and understanding the default folder structure. The forensic artifacts covered include device information, call history, voicemail, messages, web browser history, contacts, and photos.

FC 201 - Financial Records Investigative Skills (Jan 2019)

This course builds on the concepts introduced in "Financial Crime (FC) 101 - Financial Investigations Practical Skills" and "FC 105 - Financial Records Examination and Analysis," introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises. Students conduct a mock investigation that includes interviews, data analysis, and the construction of an electronic case file.

CI130 - Basic Cyber Investigations: Cellular Records Analysis (Jan 2019)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

CI102 Basic Cyber Investigations: Open Source Intelligence (Jan 2019)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites. 

FC 110 - Financial Crimes Against Seniors (Jan 2019, Virginia)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Bringing together law enforcement personnel and adult protective services investigators, the course enhances students' investigative skills and interviewing techniques while facilitating networking and cooperation that can extend out of the classroom and into real cases. Topics include recognizing elder abuse, working with victims, and identifying perpetrators, as well as resources for investigation and community awareness. Students work together to conduct a mock investigation into a hypothetical case. 

Aerial Data: Introduction to Drone Investigations (Webinar)

With applications from aerial photography to racing to delivery services, drones are becoming more and more popular in both commercial and recreational spaces. Criminal use of drones is also increasing, and drone forensics is quickly becoming an important subfield of digital forensics. This presentation introduces the history of drones and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones.

Law Enforcement Cyber Center: A Valuable Resource for Investigators

The Law Enforcement Cyber Center (LECC) was developed to enhance the awareness, expand the education, and build the capacity of justice and public safety agencies to prevent, investigate, prosecute, and respond to cyber threats and cyber crimes. It is intended to be a national resource for law enforcement and related justice and public safety entities. During the webinar, participants will review the website and learn about the many valuable resources that can be utilized.

Aerial Data: Introduction to Drone Investigations

With applications from aerial photography to racing to delivery services, drones are becoming more and more popular in both commercial and recreational spaces. Criminal use of drones is also increasing, and drone forensics is quickly becoming an important subfield of digital forensics. This presentation introduces the history of drones and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones. Topics include gathering evidence both internal and external to the drone, as well as methods for manually processing flight logs and displaying data in Google Earth.

Presented by: Jerry Jones, NW3C

FC 102 - Financial Investigations Triage (Oct 2018)

This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, interviewing witnesses and suspects, and using investigative strategies for different types of financial crimes.

PT 201 - Digital Evidence Basics & the CLOUD Act

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction, to admissibility, to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, issues specific to mobile phones, digital evidence stored remotely ("in the cloud"), and the processes investigators use to obtain this evidence, such as the interrogation of digital devices.

Pages