Law Enforcement

Effective De-Escalation Strategies for School Resource Officers, Security Personnel, and School Staff in a K–12 Environment

Given the variety of behavioral challenges that can occur in a school environment, it is essential for school resource officers, security personnel, and school staff to possess strong de-escalation skills. These abilities are crucial for preventing situations from escalating and for responding effectively to the unique needs of each student. Through effective de-escalation, stakeholders can improve student safety, maintain a positive learning environment, enhance trust between officers and students, and reduce student involvement in the juvenile justice system.

DF203 Intermediate Digital Forensic Analysis: Forensic Video Analysis

This course provides training on digital forensics for video, specifically targeting common file formats rather than proprietary video encodings or delivery methods. It aims to prepare investigators to answer critical questions about the file and ensure key evidence is not overlooked. This training is designed to support investigations by providing the necessary expertise to handle the complexities of video evidence in the digital age, addressing possible pitfalls including deepfakes, manipulated video, and potential overlooked evidence.

Key concepts covered in this course include:
Digital video file creation
Tool and result verification
Metadata and parsing
Image classification
Hash value comparison
Image/video classification and reporting results

Open-Source Investigative Methods for Counter Narcotics and Human Trafficking Investigations

Threat actors are increasing their use of the Internet, social media and apps to conceal and advance their trafficking operations. Open-source information can provide investigators with intelligence and investigative leads related to narcotics and human trafficking operations. This webinar will provide attendees with introductory methods related to open-source information collection as it applies to identifying online profiles and activity related to narcotics and human trafficking. Attendees will learn how to safely navigate social media platforms while adhering to local laws and methods of collection.

Presented by:
Adam Scarisbrick, Senior Instructor, Hetherington Group

Shutting Down America's Largest Illicit Online Gift Card Marketplace

Organized retail crime is on the rise, affecting both the retail and financial industries. In a landmark case titled Operation Bad Bot, Homeland Security Investigations (HSI) unraveled a complex, online gift card fraud scheme, culminating in the shutdown of a marketplace with more than $22 million in stolen gift cards and the arrest and prosecution of the Canadian man behind the scheme. In this webinar, you will take a deep dive into Operation Bad Bot, learn how HSI solved this case, and hear how HSI worked with the U.S. Department of Justice to prosecute the perpetrator.

Presented by:
Dariush Vollenweider, Group Supervisor, U.S. Department of Homeland Security
Alan Stevens, Assistant U.S. Attorney, U.S. Department of Justice

NW3C does not share webinar attendees personally identifiable information with any third party without opt-in consent given during registration.

The content, views, and opinions expressed in this presentation are those of the individual presenters and do not represent official policy, opinions, or view of NW3C.

Telegram Investigations

This webinar will cover investigations into Telegram app. For many, Telegram has been a frustration as they do not know how the app works, and just what investigative avenues can be pursued. This webinar will cover how Telegram functions, how Telegram channels work, how Telegram Bots work to facilitate sales, and also explore the T.O.N. (The Open Network) crypto currency that is built upon the Telegram network. Case studies will be shown, as well in depth investigative techniques. There has never been a more comprehensive webinar about the end-to-end encryption messaging app than this!

Presented by:
Keven Hendricks, Detective, City of New Brunswick, NJ, Police Department

Lunch and Learn with Binance, Roblox, and Kodex

Join us for the Learn and Lunch webinar series, where legal experts from Binance, the worlds largest cryptocurrency exchange, and Roblox, a popular gaming platform, come together to provide valuable insights for professionals navigating the intersection of law enforcement and digital platforms.

The presentation will cover two key areas. First, experts from Binance will provide crucial updates on cryptocurrency investigations, including best practices for handling crypto-related legal processes and the latest market changes that could impact your work. As cryptocurrency continues to play a growing role in digital investigations, understanding these evolving legal frameworks is essential for law enforcement and legal professionals. Next, experts from Roblox will guide attendees through the platforms key safety features, explaining how law enforcement can effectively engage with Roblox. The session will also include a walkthrough on submitting information requests to Roblox, focusing on data availability, retention policies, and the primary identifiers needed to locate requested data. This section aims to equip attendees with practical tools to navigate Roblox's legal processes efficiently.

Throughout the webinar, participants will have the opportunity to hear directly from experts, ask questions, and share ideas for improving legal procedures within these dynamic industries. The event will conclude with an interactive Q&A session, allowing attendees to engage in a collaborative dialogue with industry leaders. Do not miss this chance to enhance your understanding of cryptocurrency investigations and digital platform legal processes.

Presented by:
Jarek Jakubcek, Head of LE Training, Binance
AJ Iafrate, Government Relations North America, Kodex Global

FC105 Financial Records Examination and Analysis

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

*Introduction to analysis. Best practices. Finding patterns. Indicators of fraud. Presenting your findings.
*Financial records. Bank records. Business documents.
*Financial profiling. Methods of profiling. Reasons to create a profile. Creating a profile.
*Hands-on experience. Work a mock financial case as part of an investigative team.

FC099 Basic Level Spreadsheeting Skills

This one-day course provides foundational spreadsheeting knowledge and skills to enhance workplace productivity. The course covers basic navigation of Microsoft Excel by combining live demonstrations and hands-on exercises.

Work with multiple worksheets within a workbook
Hide, unhide, and protect worksheets
Adjust rows and columns
Use copy and paste options
Find, select, and sort data

DF202 Intermediate Digital Forensic Analysis: Windows File Systems

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed study of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use todays leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

*Digital forensic process. Evidence review; requests for examination; case management.
*Validation. Creation of validation images; validation testing.
*Effective tool usage. Tool interface; hashing; file signature analysis; data carving; searching; metadata; bookmarking.
*Reporting. General report structure; report templates; using tool-generated reports.

DF100 Basic Digital Forensic Analysis: Seizure

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

*Prepare. Prepare to respond to an incident or crime scene where digital evidence may be present.
*Identify. Learn tow to identify relevant sources of digital evidence in an ever-evolving landscape.
*Collect. Learn the proper methods of digital evidence collection.
*Preserve. Build upon the three previous principles to ensure valid and legal preservation of digital evidence can occur.

Pages