Juvenile Justice Agencies

DF330 Advanced Digital Forensic Analysis: iOS & Android (Apr. 19–22, 2021, Virtual)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

CI240 Intermediate Cyber Investigations: Virtual Currency (Apr. 22–23, 2021, Virtual)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

DF205 Intermediate Digital Forensic Analysis: SQLite Primer (Apr. 27, 2021, Virtual)

Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. Devices are becoming more secure, with an increase in security; the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data, we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

CI103 Basic Cyber Investigations: Advertising Identifiers (Apr. 29, 2021)

This one-day course, focused on device location information, is for law enforcement investigators and analysts. Class concepts include device identifiers (IDs) in general, advertising IDs in detail, important legal considerations, overall investigative process, and tools available to law enforcement. Students will use commercially available investigative tools for querying databases of Advertising IDs and displaying their recorded broadcast locations.

DF205 Intermediate Digital Forensic Analysis: SQLite Primer (May 6, 2021, Virtual)

Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. Devices are becoming more secure, with an increase in security; the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data, we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

Webinar - BJA FY 2021 Intellectual Property Enforcement Program

This webinar will provide an overview of the Bureau of Justice Assistance (BJA) Fiscal Year (FY) 2021 Intellectual Property Enforcement Program: Protecting Public Health, Safety, and the Economy from Counterfeit Goods and Product Piracy solicitation. This program assists state, local, and tribal jurisdictions in preventing and reducing intellectual property (IP) theft and related crime. It is designed to improve the capacity of criminal justice systems to address IP enforcement, including prosecution, prevention, and training and technical assistance. The presenter will provide the criteria for this solicitation and what items are approved for funding and what items are not allowed. The presenter will also provide an overview of the peer review process, the required partnerships, and the reporting process. The attendees will be able to ask questions.

Webinar – National Motor Vehicle Title Information System: Law Enforcement Access Tool Training

The National Motor Vehicle Title Information System (NMVTIS) is intended to protect consumers from fraud and deters the selling of unsafe and stolen vehicles. Vehicle information from state motor vehicle titling agencies, vehicle recyclers, junk and salvage yards, insurance carriers, and individuals is compiled into NMVTIS. The Law Enforcement Access Tool (LEAT) is the method for which law enforcement can access NMVTIS information along with other vehicle records and history. This training instructs law enforcement personnel how to maximize use of LEAT by demonstrating features of the tool and providing users with knowledge in searching, retrieving, and using information found. This training will show how to operate all LEAT features, demonstrate how to successfully navigate search capabilities, and provide examples of how LEAT can disseminate information to build a well-rounded understanding of a vehicle's history. This webinar will inform attendees on how this information can be used to expand an investigation and provide subsequent leads to enhance efforts for a successful case. Attendees will learn sources of vehicle history information contained within LEAT to enable them to locate specific facts and supporting evidence dependent upon their needs. This webinar is intended for law enforcement officers, vehicle crime investigators, crime analysts, and administrators of these offices and agencies.

Webinar – The Shifting of 3: Approach, Strategy, and Role/Identity, In Order to Avoid Ruining Your Relationships

Being a first responder can be all-consuming and can start to change individuals' interactions with those important to them. So many of the skills that make people successful as a first responder may actually be damaging over time to their relationships. In this webinar, Dr. Rachelle Zemlok is going to address three things that first responders can focus on shifting, from work to home life, in order to avoid ruining relationships important to them.

Webinar – Living Well: Prioritizing First Responder's Personal Mental Health and Wellness

The presentation will focus on skills an individual can use to work toward improving or maintaining health and wellness. Mindfulness, breathing exercises, nutrition, mental vacations, music, yoga, and other strategies will be discussed. In addition, the benefits of talk therapy and common misconceptions regarding therapy, confidentiality, and payment options will be explored. Finally, the presenters will discuss ways wellness can be introduced to an officers' family and support system, and how increased knowledge surrounding this topic can be beneficial to all.

Webinar – How Money Moves

Criminal, terror, and other types of illicit networks all need revenue streams to survive. This involves control of financial flows from the point of revenue generation through goal accomplishment. To some extent, many of these networks will engage in the international money movement processes maintained by financial institutions around the world in order to move the money in an efficient and secure manner. This presentation will describe the legitimate processes used by illicit networks to move money through financial systems.

Pages