Juvenile Justice Agencies

CI130 Basic Cyber Investigations: Cellular Records Analysis

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers; and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of NW3Cs PerpHound tool, which assists in the plotting of call detail record locations.

*Cellular technology. Land-line and cellular networks. Types and generations of cell phones. Cell site design and its implications for law enforcement.
*Analysis of call detail records. Request information from service providers. Convert records into a useful format. *Merge two related spreadsheets. Read and analyze using filters, sorting, and pivot tables. Plot location information.
*Hands-on experience. Hands-on experience with NW3Cs free software tool PerpHound and Microsoft Excel to analyze various types of records that are available from cellular providers.

FC122 Intellectual Property Theft Training

This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific folder that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

This course is presented in collaboration with the National Association of Attorneys General (NAAG).
Awareness. Types of IP crimes. The criminals who commit these crimes. Impacts and dangers.
Investigation. Online and traditional techniques. Working with brand experts and the private sector. Large amounts of evidence. Resources.
Statutes. Prosecutorial theories. State-specific discussion.
Hands-on experience. Work with real counterfeit products. Identify fakes with expert guidance.

FC099 Basic Level Spreadsheeting Skills

This one-day course provides foundational spreadsheeting knowledge and skills to enhance workplace productivity. The course covers basic navigation of Microsoft Excel by combining live demonstrations and hands-on exercises.

Work with multiple worksheets within a workbook
Hide, unhide, and protect worksheets
Adjust rows and columns
Use copy and paste options
Find, select, and sort data

IA300 Advanced Criminal Intelligence: Tradecraft and Analysis

This three-day course is dedicated to studying the fundamentals of quantitative and qualitative data analysis and how to formulate arguments in support of criminal investigations and intelligence. Students will learn about data management techniques and a disciplined process to clean and standardize data in preparation for analysis. The course will also explore several common investigative objectives, including the discovery of associations between people and entities, the correlation between unlawful activity and suspects, behavioral affinities, and predictions. The course will introduce the Enterprise Theory of Crime and how to use network analysis to formulate conclusions about the structure of criminal organizations, their players and roles, the identification of facilitators, charting of financial arrangements, and connections to unlawful activity. The course enables the production of valuable, accurate, and efficient logical inferences produced by collecting data related to unlawful activity.

Digital Evidence Basics for Non-Technical Investigators

This is the replacement class for Securecube.

This course will familiarize Non-Technical Investigators related to the fundamentals of handling digital evidence which may present in the course of their investigations. The course will address the digital evidence source landscape, collection and preservation, examination and authentication, and considerations for managing third party sources. The student will receive a broad and balanced understanding of how digital evidence can enhance their investigations and the fundamentals of handling such evidence.

Presented by:
Jim Emerson, Vice President, High Tech Crimes, NW3C

IA102 Introduction to Link Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

IA103 Introduction to Strategic Intelligence Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

What are the Top Digital Evidence Issues in 2024?

NW3C conducted listening sessions for BJA hosted by the Massachusetts Attorney General at the National Cyber Crime Conference in April 2024. Join us to review the comments of your colleagues from across the US as we posed a range of important questions regarding digital evidence, legal complexities, and emerging technologies such as artificial intelligence.

Presented by:
Jim Emerson, Vice President, NW3C

NW3C does not share attendees personally identifiable information with any third party without opt-in consent given during registration.

Intelligence Analysis: Asked and Answered Cohort 2

Join experts from NW3C and the National Network of Fusion Centers as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. In this session, our panel has a wealth of experience with managing intelligence analysts and intelligence projects. This panel will provide perspectives from large and smaller intelligence units at the local and state law enforcement levels.

Presented by:
Heaven Henwood, Lae Enforcement Analyst Supervisor, Philadelphia Police Dept.
Deepak Kukade, Itelligence Analyst, Minnesota Fusion Center
Randy Stickley, Lead Intelligence -Targeting Analyst, KACE Company
Trevor Knight, Production Managern District of Columbia Fusion Center

Problem-Solving with Peers Discussion Series: Implementing PREA in Locally Operated Adult and Juvenile Confinement Facilities

These discussions are intended to provide opportunities for peer
engagement, idea generation, and discussions of innovative solutions
and practices related to achieving and maintaining compliance with the
PREA Standards.
Further, these sessions provide an important opportunity for the PRC
and the PREA Management Office (PMO), within Bureau of Justice
Assistance at the U.S. Department of Justice to more deeply understand
the unique PREA implementation challenges and strengths of smaller,

Pages