Juvenile Justice Agencies

Webinar - Of Eggplants and Umbrellas: The Legal and Investigative Implications of Emojis

This webinar, presented by cyber crime attorneys and a former prosecutor, discusses investigative uses of emojis, particularly in the context of child exploitation, and the legal context of this growing medium, including current case law and implications for practice.

Webinar – Youth Homelessness and Juvenile Justice: Supporting Youth Across Systems

Nationally, an estimated 78 percent of young people who have experienced homelessness report that they have also had at least one interaction with law enforcement, while 44 percent have spent time in a jail or detention facility. Participants will learn about ways that communities can better support young people who find themselves at the intersections of youth homelessness and juvenile justice to ensure that youth do not have unnecessary contact with the juvenile justice system and that if they do come in contact with the justice system, that they exit to safe, stable, and secure housing.

Webinar - Checkm8 & CheckRa1n: New Tools for iOS Extractions

If anything about mobile forensics could be considered buzzworthy in the past year, it would be the release of the Checkm8 Boot ROM exploit created by axi0mX in October. Allowing critical access to 11 generations of iPhones and iDevices, Checkm8 is a new opportunity to access data previously locked behind a secure wall. But beyond the hype, what data can you actually access using this newfound exploit, and what do you do once you've extracted data using Checkm8? In this webinar, we will discuss the benefits, challenges, and usefulness of Checkm8 and Checkra1n to mobile forensic examiners and investigators. We will also explore how examiners can use Checkra1n to gain access to devices and what that access means in practical terms for investigations.

FC122 Intellectual Property Theft Training (Jan. 2020, Florida)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

This course is presented in collaboration with the National Association of Attorneys General.

Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each other. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And they increasingly choose to use platforms that make this communication openly available for others to view. This means that evidence associated with not just metadata but also content of communications can often be collected through open sources long after the communication is completed. While evidence of criminality and victimization can be recovered through open source investigative techniques, many of the commercial tools marketed to criminal investigators and analysts are expensive. This sometimes places them outside the reach of police departments, and social media companies are increasingly blocking API connections for commercial tools that allow the tools to be used for "surveillance." Therefore, it is increasingly important for criminal investigators and analysts to build an inexpensive cyber-OSINT toolbox. This webinar will discuss the rapidly evolving ecosystem of online social media and how people are changing how they choose to communicate. It will then detail and demonstrate free and inexpensive cyber-OSINT tools that criminal investigators and analysts can use to start building a cyber-OSINT toolbox.

STOP School Violence 2019 BJA Solicitation Webinar

Join the Bureau of Justice Assistance (BJA) and the National Center for School Safety on Wednesday, January 29 at 1 p.m. ET for a webinar on the Fiscal Year (FY) 2019 Student, Teachers, and Officers Preventing (STOP) School Violence Program funding opportunity. The FY 2019 STOP School Violence Grant Program seeks to improve school security by equipping students and teachers with the tools they need to recognize, respond to, and help prevent acts of violence.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (March 2020, Texas)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

CI130 Basic Cyber Investigations: Cellular Records Analysis (March 2020, Texas)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

FC110 Financial Crimes Against Seniors (May 2020, Tennessee)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Bringing together law enforcement personnel and adult protective services investigators, the course enhances students' investigative skills and interviewing techniques while facilitating networking and cooperation that can extend out of the classroom and into real cases. Topics include recognizing elder abuse, working with victims, and identifying perpetrators, as well as resources for investigation and community awareness. Students work together to conduct a mock investigation into a hypothetical case.

What Might Your Forensic Acquisitions Be Hiding?

The process of acquiring forensic images is well understood, and the industry has never been better equipped for the analysis. However, common practices are set to fail, and analysis may be missing malware and indicators of compromise. This webinar will highlight shortcomings in common methods and provide a framework for an improved approach to allow for more efficient and thorough investigations.

Pages