Juvenile Justice Agencies

FC122 Intellectual Property Theft Training

This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific folder that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

This course is presented in collaboration with the National Association of Attorneys General (NAAG).
Awareness. Types of IP crimes. The criminals who commit these crimes. Impacts and dangers.
Investigation. Online and traditional techniques. Working with brand experts and the private sector. Large amounts of evidence. Resources.
Statutes. Prosecutorial theories. State-specific discussion.
Hands-on experience. Work with real counterfeit products. Identify fakes with expert guidance.

Stress Management

Increasingly busy and ever-changing lives cause a lot of stress. Stress is mental tension caused by demanding, taxing, or burdensome circumstances. Stress doesnt just affect mental states and mood; it affects physical health as well. That is why it is so important to practice stress management to keep minds and bodies healthy. Stress management consists of making changes if often experiencing stressful situations, preventing stress by practicing self-care and relaxation, and managing responses to stressful situations when they do occur.

Intelligence Analysis: Asked and Answered

Join a team of experts from NW3C as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. Submit questions regarding intelligence analysis skills, information collection, or general comments of analytic tradecraft and a panel of NW3C experts will provide answers during this live session.

CI130 Basic Cyber Investigations: Cellular Records Analysis

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers; and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended.

FC111 Financial Crimes Against Seniors Seminar

This course promotes a multi-agency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and resources for investigation and community awareness. Detailed examination of a case study from initial complaint to prosecution reinforces and illustrates the course content.

FC099 Basic Level Spreadsheeting Skills

This one-day course provides foundational spreadsheeting knowledge and skills to enhance workplace productivity. The course covers basic navigation of Microsoft Excel by combining live demonstrations and hands-on exercises. Work with multiple worksheets within a workbook Hide, unhide, and protect worksheets Adjust rows and columns Use copy and paste options Find, select, and sort data

FC203 Financial Investigations: Beyond the Basics

This three-day course covers the fundamentals of financial investigations and incorporates some of the more advanced processes that elevate an investigation. During this course, students will learn about investigative processes, practical tools, and sources of information necessary to plan and conduct financial investigations. The course begins with a description of the basic composition of elements within illicit financial networks and how they work to compromise legitimate business and financial sectors. Course material will describe government, regulatory, and investigative actions within the United States, and by international partners to detect and investigate illicit actors and networks. The course also includes considerations for investigation planning and promotion of creative thinking.

FC105 Financial Records Examination and Analysis

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

Financial Crime Investigations: Asked and Answered

Join a team of experts from NW3C as they provide thoughtful and detailed answers to financial investigation questions you submit. Click here to submit questions regarding financial crimes, financial analysis and What else? a panel of NW3C experts will provide answers during this live session.

Understanding the Dark Web

The dark web has the star quality and luster of a Hollywood movie, but in reality, it's a den of inequity operated by the technically sophisticated. The more "Googleized" we've become as investigators and researchers, the less we understand what's going on behind the scenes and how to operate in this nefarious world.

This webinar will examine the dark web, the channels used to institute private sales and exchanges, and criminal behavior. Participants will gain a thorough understanding of the dark web--criminality, anonymity, counterfeit products, child pornography, and human trafficking; learn the directory structures of the dark web; and learn dark web languages like Tor and Tails and the lingo of this underworld. Training will include exploring dark web channels for content and finding the resources and specialized search engines for searching against dark web content. Field investigators will understand how to use Tor safely and effectively, while learning the vulnerabilities, and be able to conduct undercover online investigations on the dark web.

Pages