Law Enforcement

IA 101 - Foundations of Intelligence Analysis Training (Aug 20 2018)

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. This introductory course covers the history and purpose of intelligence analysis, the intelligence cycle, analytical thinking skills, and the importance of strategic analysis. The course was developed by a consortium that included the National White Collar Crime Center, Law Enforcement Intelligence Unit, the International Association of Law Enforcement Intelligence Analysis, and the Regional Information Sharing System.

FC 101 - Financial Investigations Practical Skills (Aug 28 2018)

This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues.

Course structure:

CC 315 - Windows Artifacts (July 2018)

This course covers the identification and extraction of artifacts associated with the current versions of Microsoft Windows operating systems (Vista through Windows 10) and the NT file system. Topics include the change journal, BitLocker, and a detailed examination of the various artifacts found in each of the registry hive files. Students examine event logs, volume shadow copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

CC 315 - Windows Artifacts (July 2018)

This course covers the identification and extraction of artifacts associated with the current versions of Microsoft Windows operating systems (Vista through Windows 10) and the NT file system. Topics include the change journal, BitLocker, and a detailed examination of the various artifacts found in each of the registry hive files. Students examine event logs, volume shadow copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

Child Protector App: An Investigative and Educational Tool

Learn more about Child Protector, a free application designed to improve the investigative, administrative, and judicial handling of child physical abuse cases, as well as child fatalities, in a manner that reduces trauma to the child and family.

FC 111 - Financial Crimes Against Seniors Seminar (Apr 2018)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and using resources for investigation and community awareness. Detailed examination of a case study, from initial complaint to prosecution, reinforces and illustrates the course content. With a dual focus on financial abuse by trusted persons and common scams aimed at seniors, the course introduces senior-specific investigative skills while facilitating networking and cooperation that can extend out from the classroom and into real cases.

FC 111 - Financial Crimes Against Seniors Seminar (May 2018)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and using resources for investigation and community awareness. Detailed examination of a case study, from initial complaint to prosecution, reinforces and illustrates the course content. With a dual focus on financial abuse by trusted persons and common scams aimed at seniors, the course introduces senior-specific investigative skills while facilitating networking and cooperation that can extend out from the classroom and into real cases.

What Law Enforcement Agencies Need to Know to Implement a Successful Body-Worn Camera Program

Early research indicates that the deployment of police body-worn cameras (BWCs) may generate numerous benefits for a law enforcement agency, from enhanced legitimacy and transparency to reductions in violence between citizens and police. However, more recent research has been mixed in terms of impact. One potential reason for the mixed findings involves poor implementation. BWC programs come with a high degree of difficulty, and the potential for implementation failure is significant.

Cybercop 201 Digital Evidence Examination & Processing

The "Cybercop (CC) 201 - Digital Evidence Examination and Processing" course builds on the concepts introduced in "CC 101 - Basic Digital Forensic Imaging." It covers the architecture and functionality of the Windows NT File System, the FAT and the ExFAT File System, and related directory entry information for locating files on electronic devices. Topical areas include file headers and file hashing, recovery of deleted files and long file names, and techniques for discovering potential evidence that might otherwise be overlooked.

Pages