Juvenile Justice Agencies

Navigating PREA Implementation: A Discussion Series for Locally Operated Correctional Facilities- Juvenile Facilities Discussion 3

This series aims to facilitate peer-learning communities and networking opportunities with other
individuals who work in local agencies, which have unique PREA implementation challenges. These
sessions also provide the opportunity for the PRC and the Department of Justice to more deeply
understand the unique challenges and strengths of locally operated facilities to inform responsive
PREA implementation training and support activities.

Navigating PREA Implementation: A Discussion Series for Locally Operated Correctional Facilities- Juvenile Facilities Discussion 4

This series aims to facilitate peer-learning communities and networking opportunities with other
individuals who work in local agencies, which have unique PREA implementation challenges. These
sessions also provide the opportunity for the PRC and the Department of Justice to more deeply
understand the unique challenges and strengths of locally operated facilities to inform responsive
PREA implementation training and support activities.

Field Wide Webinar: FY23 JMHCP and Connect & Protect Orientation Webinar Part 2: Budget, Grant Management, and Performance Measurement

In this orientation webinar, CSG Justice Center and Bureau of Justice Assistance (BJA) staff will provide newly awarded Justice and Mental Health Collaboration Program (JMHCP) and Connect & Protect grantees with an overview of BJA, the CSG Justice Center, the program budget, the JustGrants management system, and the performance measurement tool (PMT). Speakers included: Tammy Lovill, State Policy Advisor, JMHCP, Bureau of Justice Assistance, Office of Justice Programs, U.S.

Field Wide Webinar: Improving Police and Mental Health Partnerships for Youth in Crisis

Law enforcement often respond to youth experiencing behavioral health crises as first responders to provide connections to emergency care. Unfortunately, law enforcement-only responses to youth in crisis can result in higher risk of involvement in the juvenile justice system and traumatization. Though trainings for law enforcement agencies on behavioral health crisis responses and trauma-informed care are increasing, many of them are not properly trained or do not have the resources available to effectively respond to the needs of youth in crisis.

What to Say or Not to Say: Crafting Accurate and Impactful Testimonies

The foundation of success is laid long before the trial begins. Strategic planning, meticulous investigation, and effective communication play pivotal roles in securing favorable outcomes. Join us for an insightful webinar where we will guide you through the essential elements of creating impactful reports and delivering compelling testimony. We will discuss what should and should not be in your investigative reports. Learn the secrets to winning cases and negotiating successful plea deals through articulate and well-crafted documentation.

Presented by:
John Pizzuro

DF310 Advanced Digital Forensic Analysis: Windows

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

DF202 Intermediate Digital Forensic Analysis: Windows File Systems

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed study of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use todays leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

*Digital forensic process. Evidence review; requests for examination; case management.
*Validation. Creation of validation images; validation testing.
*Effective tool usage. Tool interface; hashing; file signature analysis; data carving; searching; metadata; bookmarking.
*Reporting. General report structure; report templates; using tool-generated reports.

DF330 Advanced Digital Forensic Analysis: iOS & Android

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically-sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, available acquisition options, accessing locked devices, and the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the hunt methodology for analyzing third party applications not supported by commercial forensic tools.

Mobile device hardware fundamentals. How mobile devices work, store data, and interact with a variety of networks.
Device handling. Properly preserving data for imaging and analysis. Identifying potential threats to data integrity.
Device acquisition and security. Acquisition options (physical, logical, device backups). Bypassing passcodes and properly defeating encrypted backups of iOS devices.
Advanced analysis techniques. Mounting images, partitioning scheme and default folder structure, types of artifacts (plists, SQLite databases, etc.).

FC101 Financial Investigations Practical Skills

This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues.

*Emerging issues. Current trends in various types of financial crimes. Recent cases and their implications.
*Financial records. Learn to obtain and manage bank records, including basic spreadsheeting skills.
*Working with data. Extract leads and draw conclusions from bank records and other financial data.
*Hands-on experience. Work a mock financial case as part of an investigative team.

IA105 Intelligence Writing and Briefing

This course covers basic intelligence writing and briefing principles as well as methods for effective and clear intelligence sharing. Topics covered include creative and critical thinking, critical reading skills, source evaluation, privacy and civil rights, intelligence writing style and structure, and generating and presenting intelligence briefings. With guidance from experienced experts, students gain hands-on experience by working through data sets based on real cases to produce intelligence products. Instructors and peers provide feedback on briefings and reports produced and presented in class.

*Foundational skills. Creative thinking. Critical thinking. Critical reading.
*Information sources. Identify sources of intelligence information. Evaluate sources for validity and reliability.
*Analytical reports. Develop a structured and actionable analytical report based on a data set given in class.
*Privacy considerations. Ensure protection of privacy and civil rights while producing intelligence products.
*Briefings. Construct and deliver an intelligence briefing based on a data set given in class.

Pages