Juvenile Justice Agencies

CI101 Basic Cyber Investigations: Digital Footprints

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individuals digital footprint, protecting privacy on social media, and the consequences of oversharing personal information; as well as steps to take after becoming a target of doxing.

*Current landscape. Emerging technology and trends that can aid criminals in the commission of identity theft, credit card theft, child exploitation, and production of counterfeit documents.
*Personally identifiable information (PII). Learn what PII is, why it can threaten individuals safety, and the scams and exploits criminals use to obtain it.
*Minimizing your digital footprint. Learn how and why you should remove PII, and how to find where information may be located. Instructors demonstrate how to secure digital devices and request removal of data from a website.
*Social media. Use security and privacy settings to control the amount of available information on multiple platforms.
*Resources. Identify resources that can help victims of identity theft, doxing, and other related crimes.

FC200 Intermediate Level Spreadsheeting Skills: Assessing and Organizing Data

This intermediate spreadsheeting course uses Microsoft Excel to assess and organize data in an electronic format. The class is designed for learners who have experience using Excel and who want to increase their spreadsheeting knowledge and skills. Topics include text functions, absolute referencing, date and time functions, flash fill, handling formula errors, VLOOKUP, dynamic arrays, and data validation. The course combines live demonstrations, instructor-led exercises, and independent student exercises.

FC203 Financial Investigations: Beyond the Basics

This three-day course covers the fundamentals of financial investigations and incorporates some of the more advanced processes that elevate an investigation. During this course, students will learn about investigative processes, practical tools, and sources of information necessary to plan and conduct financial investigations. The course begins with a description of the basic composition of elements within illicit financial networks and how they work to compromise legitimate business and financial sectors. Course material will describe government, regulatory, and investigative actions within the United States, and by international partners to detect and investigate illicit actors and networks. The course also includes considerations for investigation planning and promotion of creative thinking.

IA103 Introduction to Strategic Intelligence Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

Ghost Guns: Past, Present, and Future

The NYPDs Major Case Field Intelligence Team is responsible for investigations related to Ghost Guns in New York City. The team has been conducting these investigations for nearly four years and have developed several proactive investigative models in conjunction with their partners in the Manhattan District Attorneys Office. During this presentation, attendees will be taught the basics on ghost guns and the various ways that they can be manufactured. That first portion of the presentation will lead into a discussion on what would be involved in starting up a proactive Ghost Gun investigative program. Finally, Manhattan Ghost Gun prosecutor ADA Bonnie Seok from the Manhattan District Attorneys Office will discuss the general topic from a prosecutors point of view and speak about some of the success stories her office has had working with the Major Case Team.

Presented by:

Bonnie Seok, Assistant District Attorney

John Uske, Detective, New York Police Department
Michael Billotto, Detective, New York Police Department

Investigating Crypto Investment Fraud: Pig Butchering

Departments nationwide are being inundated with reports of cryptocurrency facilitate crimes, specifically investment fraud. This webinar would cover the fundamentals of investigating fake cryptocurrency exchanges and "pig butchering". Attendees will understand the various ways these fraudulent services, such as DeFi "wallet drains". From taking the initial report and furthering the investigation, this webinar covers best practices. Blockchain analytic tools will be utilized in real world scenarios, as well as other OSINT investigative techniques for the various ways these criminals defraud their victims.

Presented by:
Keven Hendricks, Detective, City of New Brunswick Police Department

Falling Behind: The Digital Evidence Surge

Join us for an essential conversation with two veteran law enforcement leaders as we explore the evolving challenges faced by law enforcement related to the ever-increasing amount, and complexity of digital evidence available in a typical investigation.

Hear how agencies can adapt to keep pace with the constant digital expansion within law enforcement investigations. Do not miss the opportunity to participate in this important discussion.

Presented by:
Ashan M. Benedict, Executive Assistant Chief of Police, Metropolitan Police Department and Christian Quinn, Major (Ret.) Fairfax County (VA) Police Department

Moderated by:
Lt. Colonel James J. Emerson, USMC (Ret.) Vice President, NW3C.

Handling Sensitive Investigations in Rural Communities: Sexual Assault and Intimate Partner Violence Cases Webinar

On Thursday, August 17, at 2:00pm ET, the Department of Justice, Bureau of Justice Assistance’s (BJA’s) Rural Violent Crime Reduction Initiative (RVCRI) is hosting a webinar addressing strategies for handling sensitive investigations, such as sexual assault and intimate partner violence, in rural communities, best practices, and lessons learned.

Attendees will hear from Brian Eads, Investigator at the Gering, NE Police Department and Michael Tunink, Senior Criminal Attorney at the Coconino County, AZ County Attorney’s Office. During the event, attendees will:

Developments and Trends of 2023 Cyber Attacks to Public Safety

The Public Safety Threat Alliance Intelligence team will present our observations and assessments on the trends and developments of cyber activity targeting public safety. We will breakdown the specific tradecraft mapped to the MITRE ATT&CK matrix, and detail how threat actors have been adapting to continue to be successful in 2023.

Presented by:
Tyler Brodbeck, Threat Intelligence Manager, Motorola Solutions
Travis Randall, Senior Threat Intelligence Analyst, Motorola Solutions

IA102 Introduction to Link Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

Pages