Law Enforcement

COAP Webinar: Partnerships to Support Data-Driven Responses to Emerging Drug Solicitation Webinar

On behalf of the U.S. Department of Justice, Bureau of Justice Assistance, the Institute for Intergovernmental Research is releasing the Partnerships to Support Data-driven Responses to Emerging Drug Threats Grant solicitation. This is part of a series of demonstration projects funded under the Comprehensive Opioid Abuse Program. These demonstration projects are designed to build capacity, foster cross-sector collaboration, and support innovation. Under this solicitation, up to 6 communities will be selected for grant awards up to $600,000, each for a 24-month period.

COAP Webinar: ODMAP Statewide Expansion and Response Solicitation Webinar

On behalf of the U.S. Department of Justice, Bureau of Justice Assistance (BJA), the Institute for Intergovernmental Research is releasing the Overdose Detection Mapping Application Program (ODMAP) Statewide Expansion and Response Grant solicitation. BJA is sponsoring this initiative in coordination with the Centers for Disease Control and Prevention. This is part of a series of demonstration projects funded under the Comprehensive Opioid Abuse Program. These demonstration projects are designed to build capacity, foster cross-sector collaboration, and support innovation.

COAP Webinar: Overdose Detection Mapping Application Program (ODMAP)

In 2017, the Washington/Baltimore High Intensity Drug Trafficking Area launched a free, user-friendly, mobile-capable tool known as the Overdose Detection Mapping Application Program (ODMAP) to track the location of suspected fatal and nonfatal overdoses and the administration of naloxone by first responders. ODMAP provides near real-time suspected overdose data across jurisdictions to support efforts to mobilize an immediate response to a sudden increase or spike in overdose events.

Busting Bitcoin Bandits

An underground movement of hackers is taking over victims' telephones and draining their financial accounts! In the past 12 months, a California high-tech task force named REACT has identified more than 800 victims and nearly $50 million in losses of cash and cryptocurrency. Please join Santa Clara County, California Prosecutor Erin West and District Attorney Investigator David Berry as they explain this phenomenon known as sim-swapping and detail how the hackers are able to access phones, hijack social media, and ultimately steal millions of dollars. The presenters will take a look at this new class of criminals and identify ways to protect people against this growing crime wave.

FC201 Financial Records Investigative Skills (Sept 18 2019)

This course builds on the concepts introduced in "Financial Crime (FC) 101 - Financial Investigations Practical Skills" and "FC 105 - Financial Records Examination and Analysis," introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises. Students conduct a mock investigation that includes interviews, data analysis, and the construction of an electronic case file.

DF102 Basic Digital Forensic Analysis: Previewing (Sept 2019, California)

This course provides the fundamental knowledge and skills necessary to preview the most commonly encountered forms of digital evidence. The course covers Windows-based and macOS-based computers, mobile devices, and removable storage media. In a combination of lecture, discussion, and practical exercises, instructors introduce the previewing process, legal considerations, live previewing, and dead-box previewing. Students gain hands-on experience with free and commercial third-party previewing tools that are in current use by practitioners in the field.

FC102 Financial Investigations Triage (Sept 2019, Georgia)

This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.

DF103 Basic Digital Forensic Analysis: Acquisition (Sept 2019, California)

This course provides students with the fundamental knowledge and skills required to acquire images in a forensically sound manner from Windows-based and macOS-based computers, as well as mobile devices. Presentations and hands-on practical exercises cover topics including the digital forensic process, hardware and software write blockers, forensic image formats, live imaging, and multiple forensic acquisition methods. Students gain hands-on experience with free and commercial third-party imaging tools that are currently used by practitioners in the field.

FC102 Financial Investigations Triage (Sept 2019, Texas)

This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.

DF320 Advanced Digital Forensic Analysis: macOS (Sept 2019)

This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage, and use multiple methods to acquire forensically sound images of Apple Macintosh computers. Topics include how the macOS default file system stores data, what happens when files are sent to the macOS Trash, where operating system and application artifacts are stored, and how they can be analyzed. Forensic artifacts covered include password recovery, recently opened files and applications, encryption handling, Mail, Safari, Messages, FaceTime, Photos, Chrome, and Firefox.

Pages