Join the Bureau of Justice Assistance and the Association of Prosecuting Attorneys for the webinar “Meeting with Victim Families.” This webinar will focus on how to be the best advocate possible for victims of capital crimes and their families, with emphasis on building effective, empathetic relationships with these families and guiding them through the judicial process. This presentation will include resources for prosecutors dealing with such capital litigation cases.
Coinciding with the start of the second session of the 116th Congress, the National District Attorneys Association’s Capital Conference provides participants with the opportunity to hear directly from Administration, agency, and Capitol Hill speakers. Join them in the nation’s capital, Washington, DC, for an educational and networking event to connect directly and in-person with lawmakers.
The conference includes:
This national conference hosted by the National Center for Victims of Crime, National Training Institute, and National Crime Victim Bar Association will take place on December 4 – 6, 2019 in Denver, Colorado.
As the Internet continues to evolve, new layers populate where offenders commit criminal offenses. One such area is the Darknet. Participants will learn about the Darknet, how potential criminal activity is facilitated on the Darknet, and why this knowledge is crucial to investigating and prosecuting child exploitation cases. Additionally, participants will learn how to access other locations on the Darknet.
The National Institute of Justice’s (NIJ) Sentinel Events Initiative takes a learning approach to error in the criminal justice system. This approach advocates for non-blaming, forward-looking, all-stakeholder event reviews of negative criminal justice outcomes, which might include a death in custody, routine police encounter that escalates to violence, wrongful conviction, or “near miss” in which a negative event is narrowly avoided.
This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.
This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.
This course provides the fundamental knowledge and skills required to preview and acquire images from Windows-based and macOS-based computers, mobile devices, and removable storage media in a forensically sound manner.
Presentations and hands-on practical exercises cover the following topics:
- Storage media and how data is stored;
- Firmware interfaces (BIOS, UEFI);
- The previewing process;
- Live and dead-box previewing;
- The forensic acquisition process;
- Tool validation;
- Hardware and software write blockers;
- Forensic image formats; and
- Multiple forensic acquisition methods.
Students will use free and commercial third-party tools that are currently used by practitioners in the field.
This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues.
This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.