Prosecutors

Cloud Combat: Debating Law Enforcement Access to Overseas Data

A former prosecutor and a high-tech crime attorney will square off in several rounds of debate on whether, and how, law enforcement can obtain evidence stored electronically overseas. Each round will involve a hypothetical case that incorporates relevant, cutting-edge evidentiary questions on various topics including overseas servers, CLOUD Act considerations, space-based data storage, and pertinent international law.

2020 National District Attorneys Association Capital Conference

Coinciding with the start of the second session of the 116th Congress, the National District Attorneys Association’s Capital Conference provides participants with the opportunity to hear directly from Administration, agency, and Capitol Hill speakers. Join them in the nation’s capital, Washington, DC, for an educational and networking event to connect directly and in-person with lawmakers.

The conference includes:

Understanding the Darknet

As the Internet continues to evolve, new layers populate where offenders commit criminal offenses. One such area is the Darknet. Participants will learn about the Darknet, how potential criminal activity is facilitated on the Darknet, and why this knowledge is crucial to investigating and prosecuting child exploitation cases. Additionally, participants will learn how to access other locations on the Darknet.

How Justice Agencies Can Implement and Benefit from Sentinel Event Reviews

The National Institute of Justice’s (NIJ) Sentinel Events Initiative takes a learning approach to error in the criminal justice system. This approach advocates for non-blaming, forward-looking, all-stakeholder event reviews of negative criminal justice outcomes, which might include a death in custody, routine police encounter that escalates to violence, wrongful conviction, or “near miss” in which a negative event is narrowly avoided.

The Tables Have Turned: Igniting the Power of Survivors in Abuse Investigation and Prosecution

In many sexual abuse cases, DNA or other traditional forensic evidence does not exist, and the outcome often depends on the abilities of a multidisciplinary team to maximize the strength of survivors throughout the investigation and at trial. A former prosecutor and an abuse survivor who recorded the perpetrator's confession share investigative tips, best practices for interacting with survivors, and trial strategies to dismantle the power dynamics of perpetrator and victim.

The Truth About the Dark Web Fraud Trade

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. What is the dark web fraud economy? What drives it? What can we do about it?

Office 365 Forensics and Business Email Compromises

This webinar will discuss the types of evidence that should be collected in response to a business email compromise/Office 365 email investigation. It will also discuss methods of email compromise (phishing, malware, brute force attacks, and external compromise/credential stuffing), types of data at risk, and commonly seen schemes.

Case Study: Methods to Detect Forged Documents

Digital evidence has become an essential part of every legal matter, whether it be a criminal, civil, or internal investigation. Using a case study, this session will demonstrate the methods used to determine that an email submitted as evidence in federal court had been forged. The methods demonstrated in this case study may be reliably referenced when reviewing any questionable digital documents without the need for specialized software. This presentation will demonstrate the probative value of digital forensics in fraud investigations.

Pages