Prosecutors

To the Cloud! Get the Evidence You Need to Move Cases Forward

Some of the most important sources of evidence in a criminal investigation are also the hardest to get. An encrypted, password-protected mobile device can be useless if you have no way to get the password. Social media providers are infamous for their red tape, delaying your returns for weeks or even months. And, if you’re in a country other than where the provider is located, mutual legal assistance treaties can take years to process. Fortunately, there is a solution: obtain the evidence directly from cloud-based user accounts.

Law Enforcement Cyber Center: A Valuable Resource for Investigators (Webinar)

The Law Enforcement Cyber Center (LECC) was developed to enhance the awareness, expand the education, and build the capacity of justice and public safety agencies to prevent, investigate, prosecute, and respond to cyber threats and cyber crimes. It is intended to be a national resource for law enforcement and related justice and public safety entities. During the webinar, participants will review the website and learn about the many valuable resources that can be utilized.

Introduction to FinCEN (Webinar)

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar is intended as a Financial Crimes Enforcement Network (FinCEN) overview. It will include information on products and services, Bank Secrecy Act records and information, and how FinCEN is used in investigations.

Presented by: James Emery, FinCEN.

DF103 Basic Digital Forensic Analysis: Acquisition (Feb 2019, Georgia)

This course provides students with the fundamental knowledge and skills required to acquire images in a forensically sound manner from Windows-based and macOS-based computers, as well as mobile devices. Presentations and hands-on practical exercises cover topics including the digital forensic process, hardware and software write blockers, forensic image formats, live imaging, and multiple forensic acquisition methods. Students gain hands-on experience with free and commercial third-party imaging tools that are currently used by practitioners in the field.

DF102 Basic Digital Forensic Analysis: Previewing (Feb 2019, Georgia)

This course provides the fundamental knowledge and skills necessary to preview the most commonly encountered forms of digital evidence. The course covers Windows-based and macOS-based computers, mobile devices, and removable storage media. In a combination of lecture, discussion, and practical exercises, instructors introduce the previewing process, legal considerations, live previewing, and dead-box previewing. Students gain hands-on experience with free and commercial third-party previewing tools that are in current use by practitioners in the field.

CI 102 - Basic Cyber Investigations: Open Source Intelligence (Feb 2019, North Carolina)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites. 

CI130 - Basic Cyber Investigations: Cellular Records Analysis (Feb 2019, South Carolina)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

DF 103 - Basic Digital Forensic Analysis: Acquisition (Feb 2019, Washington)

This course provides students with the fundamental knowledge and skills required to acquire images in a forensically sound manner from Windows-based and macOS-based computers, as well as mobile devices. Presentations and hands-on practical exercises cover topics including the digital forensic process, hardware and software write blockers, forensic image formats, live imaging, and multiple forensic acquisition methods. Students gain hands-on experience with free and commercial third-party imaging tools that are currently used by practitioners in the field.

FC 105 - Financial Records Examination and Analysis (Feb 2019)

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

DF 310 - Advanced Digital Forensic Analysis: Windows (Feb 2019)

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

Pages