Military

CP OSNII - Successful Use of Online Social Networking for Investigations and Intelligence (Feb 28, 2018)

This two-day course provides students with an up-to-date understanding of how social networking sites work and how members act and interact. Student will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.The course is designed for criminal intelligence analysts, special agents, and other investigators. Students with any level of familiarity with the Internet and computers, from beginning to advanced, will find this course beneficial.

A Few Key Learning Points:

Counter Terrorism: Contingency Planning for Law Enforcement Agencies

Despite the best efforts of the Joint Terrorism Task Forces and Fusion Centers, organized or lone wolf terrorist attacks can still occur in the United States. When that occurs, it is the local law enforcement that has to respond. As in all police operations, it is better to have a contingency plan before a terrorist event. 

How to Hunt Criminals and Terrorists: The Actionable Intelligence Workshop

This webinar is designed to instruct law enforcement commanders, their police officers assigned to both patrol and investigative functions, and their analysts on how to aggressively collect and use actionable intelligence. The same intelligence techniques can also be used against both criminal and terrorist targets. The intelligence training taught in the webinar is designed to supplement the existing operational professionalism, skills, and experience within the audience.

"How To Hunt" Criminals and Terrorists: The Actionable Intelligence Workshop (Sep 2017)

This one-day workshop is designed to instruct police department commanders, their police officers assigned to both patrol and investigative functions, and their analysts on how to aggressively collect and use actionable intelligence. The same intelligence techniques can also be used against both criminal and terrorist targets. The intelligence training taught in this workshop is designed to supplement the existing operational professionalism, skills, and experience within the audience.

Key Modules:

"How To Hunt" Criminals and Terrorists: The Actionable Intelligence Workshop (June 2017)

This 1-day workshop is designed to instruct police department commanders, their police officers assigned to both patrol and investigative functions, and their analysts on how to aggressively collect and use actionable intelligence. The same intelligence techniques can also be used against both criminal and terrorist targets. The intelligence training taught in this workshop is designed to supplement the existing operational professionalism, skills, and experience within the audience.

"How To Hunt" Criminals and Terrorist: The Actionable Intelligence Workshop

This 1-day workshop is designed to instruct police department commanders, their police officers assigned to both patrol and investigative functions, and their analysts on how to aggressively collect and use actionable intelligence. The same intelligence techniques can also be used against both criminal and terrorist targets. The intelligence training taught in this workshop is designed to supplement the existing operational professionalism, skills, and experience within the audience.

Cybercrime: From Crime to Courtroom (Oct 2017)

The objective of this 2-day course is to focus on how Internet/cyber/computer technology-based criminal cases - as well as criminal cases reliant upon digital evidence - unfold in a courtroom and why it is vital for investigators, prosecutors, and computer forensic technicians to comprehend these elements throughout the entirety of their investigations and prosecutions. The format is interactive.
Key Learning Points:
* Comprehend the ever-changing online environments where crimes occur and the locations of evidential repositories.

Cybercrime: From Crime to Courtroom (Sep 2017)

The objective of this 2-day course is to focus on how Internet/cyber/computer technology-based criminal cases - as well as criminal cases reliant upon digital evidence - unfold in a courtroom and why it is vital for investigators, prosecutors, and computer forensic technicians to comprehend these elements throughout the entirety of their investigations and prosecutions. The format is interactive.
Key Learning Points:
* Comprehend the ever-changing online environments where crimes occur and the locations of evidential repositories.

Cybercrime: From Crime to Courtroom (Aug 2017)

The objective of this 2-day course is to focus on how Internet/cyber/computer technology-based criminal cases - as well as criminal cases reliant upon digital evidence - unfold in a courtroom and why it is vital for investigators, prosecutors, and computer forensic technicians to comprehend these elements throughout the entirety of their investigations and prosecutions. The format is interactive.
Key Learning Points:
* Comprehend the ever-changing online environments where crimes occur and the locations of evidential repositories.

Pages