Law Enforcement

Phishing to Laundering: From Clicks to Cash-Out

It is widely acknowledged that phishing is responsible for more than 90 percent of breaches occurring today. Basic phishing primarily exploits human behavior to entice a victim to ‘click the link’ or ‘open the attachment,’ thus often handing over to the criminal the golden nugget – valid access credentials. While we are all taught not to click or open the attachment, the scheme is still highly successful and profitable.

CGIC 2019 Solicitation Informational Webinar

The Bureau of Justice Assistance and the National Resource and Technical Assistance Center team will provide an overview of the 2019 Crime Gun Intelligence Center (CGIC) Solicitation. This webinar will review eligibility, program essential elements, roles and responsibilities of a CGIC, and much more. The solicitation can be found here: https://www.bja.gov/funding/CGIC19.pdf.

Webinar Date and Time: Thursday, May 16, 1:00 - 2:00 p.m. ET.

IA105 Intelligence Writing and Briefing (May 2019)

This course covers basic intelligence writing and briefing principles, as well as methods to facilitate increased intelligence sharing. Topics include creative/critical thinking and critical reading skills, source evaluation, privacy and civil rights, intelligence product writing structure and style, and creating and presenting intelligence briefings. An instructor and peer feedback process is applied to the reports and briefings produced in class.

FC201 Financial Records Investigative Skills (Aug 2019)

This course builds on the concepts introduced in "Financial Crime (FC) 101 - Financial Investigations Practical Skills" and "FC 105 - Financial Records Examination and Analysis," introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises. Students conduct a mock investigation that includes interviews, data analysis, and the construction of an electronic case file.

DF330 Advanced Digital Forensic Analysis: iOS & Android (Aug 2019, Indiana)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

DF103 Basic Digital Forensic Analysis: Acquisition (Aug 2019)

This course provides students with the fundamental knowledge and skills required to acquire images in a forensically sound manner from Windows-based and macOS-based computers, as well as mobile devices. Presentations and hands-on practical exercises cover topics including the digital forensic process, hardware and software write blockers, forensic image formats, live imaging, and multiple forensic acquisition methods. Students gain hands-on experience with free and commercial third-party imaging tools that are currently used by practitioners in the field.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (Aug 2019, Illinois)

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation. 

FC110 Financial Crimes Against Seniors (Aug 2019)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Bringing together law enforcement personnel and adult protective services investigators, the course enhances students' investigative skills and interviewing techniques while facilitating networking and cooperation that can extend out of the classroom and into real cases. Topics include recognizing elder abuse, working with victims, and identifying perpetrators, as well as resources for investigation and community awareness. Students work together to conduct a mock investigation into a hypothetical case. 

FC105 Financial Records Examination and Analysis (Aug 2019)

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

Pages