Prosecutors

DF330 Advanced Digital Forensic Analysis: iOS & Android (June 21–24, 2021, Virtual)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

DF330 Advanced Digital Forensic Analysis: iOS & Android (July 12–15, 2021, Virtual)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

CI130 Basic Cyber Investigations: Cellular Records Analysis (July 20–21, 2021, Virtual)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

Webinar: A Tiger is Not a Pet – Exotics and the Law

Join the Association for Prosecuting Attorneys for their webinar “A Tiger is Not a Pet: Exotics and the Law” on Thursday, May 20, 2021 at 3:00–4:00 p.m. ET. This webinar will discuss exotic animal laws and other topics relevant to prosecuting exotic animal cases.  

Presenters: Tammy Thies, Founder & Executive Director of the Wildcat Sanctuary in Sandstone, Minnesota (wildcatsanctuary.org) and Pine County Attorney Reese Frederickson

Body-Worn Camera Footage: What do we do with all of that evidence? (Part II)

The US Department of Justice (DOJ) Office of Justice Programs (OJP) Bureau of Justice Assistance (BJA) launched the Body-Worn Camera (BWC) Policy and Implementation Program (PIP) in FY 2015 to assist law enforcement agencies in enhancing or implementing BWC programs. PIP’s primary goals are to improve public safety, reduce crime, and improve trust between police and the citizens they serve.

Webinar: Springtime SQLite Survival Series Part 1: SQLite Statements and Structures

SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Join Maggie Gaffney (Teel Tech) and Chris Atha (National White Collar Crime Center) for part one in their three-part Springtime SQLite Survival Series. Part I SQLite Statements and Structures will focus on an explanation of SQLite and how it functions. Furthering this knowledge, a crash course explaining the usage of the SQL language to enhance your SQLite-based investigations will finish the presentation. Applicable attendees will receive a four-month license for Sandersons Forensics SQLite Explorer. Stay tuned for an interactive question and answer session and information about Part II.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (Apr. 26–29, 2021)

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

FC110 Financial Crimes Against Seniors (Virtual, May 5–6, 2021)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Bringing together law enforcement personnel and adult protective services investigators, the course enhances students' investigative skills and interviewing techniques while facilitating networking and cooperation that can extend out of the classroom and into real cases. Topics include recognizing elder abuse, working with victims, and identifying perpetrators, as well as resources for investigation and community awareness. Students work together to conduct a mock investigation into a hypothetical case.

FC110 Financial Crimes Against Seniors (Virtual, May 25–26, 2021)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Bringing together law enforcement personnel and adult protective services investigators, the course enhances students' investigative skills and interviewing techniques while facilitating networking and cooperation that can extend out of the classroom and into real cases. Topics include recognizing elder abuse, working with victims, and identifying perpetrators, as well as resources for investigation and community awareness. Students work together to conduct a mock investigation into a hypothetical case.

Pages