Prosecutors

IA101 Foundations of Intelligence Analysis Training (Mar 2019, Texas)

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. This introductory course covers the history and purpose of intelligence analysis, the intelligence cycle, analytical thinking skills, and the importance of strategic analysis. The course was developed by a consortium that included the National White Collar Crime Center, Law Enforcement Intelligence Unit, the International Association of Law Enforcement Intelligence Analysis, and the Regional Information Sharing System.

FC122 Intellectual Property Theft Training (Apr 2019, Kentucky)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

CI 100 - Identifying and Seizing Electronic Evidence (Mar 2019)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve electronic evidence at a crime scene. Topics include recognizing potential sources of electronic evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

PT201 Digital Evidence Basics & the CLOUD Act (Jun 25 2019, North Carolina)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

PT201 Digital Evidence Basics & the CLOUD Act (Jun 27 2019, North Carolina)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

Being Mickey in a Goofy World: Understanding User Attacks

Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation, he will walk through the various attacks, including email, social media, and in-person. Using various war stories, he will explain how the attacker views the user and what they do to increase the success rate of these attacks.

Seven Samurai: Understanding Attacks to Drive Defenses

This presentation uses war stories from decades of working in information technology and security to explore the attacks we see today. Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today. These stories will explain how the attack was performed and why an attacker would take that direction.

Investigating Terrorist Financing with Chainalysis Reactor

Terrorist organizations are using cryptocurrencies as a new way to raise funds and facilitate operations. This poses a challenge to both public and private sector organizations, but also creates a new opportunity for lead development centered on blockchain data. This webinar will review an analysis of recent cases of terrorist organizations using Bitcoin, provide an overview of Chainalysis data and the Reactor software solution, and speak to the future of terrorist financing through cryptocurrency and how to stop them.

Collecting Advertiser ID Evidence in Criminal Investigations (Mar 19 2019, 2:30 p.m.)

Many mobile phone users choose to share Advertiser ID information with app developers and social media companies. This includes precision handset geolocation information. Advertiser ID handset geolocation information is separate and distinct from handset geolocation information collected by cellular carriers, by Google for Android OS devices, or on iOS handsets in Significant Locations. Commercially available Advertiser ID information can be used during criminal investigations to determine if a handset was at multiple crime scenes near the times of those crimes and to determine specific locations where a handset was previously located. This webinar will discuss Advertiser IDs, show where Advertiser ID controls are located on iOS and Android OS handsets, outline investigative use and considerations, and detail specific instances when evidence collected from commercially available Advertiser ID information was used during the investigations of serious crimes.

Collecting Advertiser ID Evidence in Criminal Investigations (Mar 19 2019, 1:00 p.m.)

Many mobile phone users choose to share Advertiser ID information with app developers and social media companies. This includes precision handset geolocation information. Advertiser ID handset geolocation information is separate and distinct from handset geolocation information collected by cellular carriers, by Google for Android OS devices, or on iOS handsets in Significant Locations. Commercially available Advertiser ID information can be used during criminal investigations to determine if a handset was at multiple crime scenes near the times of those crimes and to determine specific locations where a handset was previously located. This webinar will discuss Advertiser IDs, show where Advertiser ID controls are located on iOS and Android OS handsets, outline investigative use and considerations, and detail specific instances when evidence collected from commercially available Advertiser ID information was used during the investigations of serious crimes.

Pages