Prosecutors

CI130 Basic Cyber Investigations: Cellular Records Analysis (May 12–13, 2021, Virtual)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

CI130 Basic Cyber Investigations: Cellular Records Analysis (May 25–26, 2021, Virtual)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (Jun. 7–9, 2021, Virtual)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

CI130 Basic Cyber Investigations: Cellular Records Analysis (Jun. 28–29, 2021, Virtual)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

CI101 Basic Cyber Investigations: Digital Footprints (Jun. 30, 2021, Virtual)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

Webinar: The Trials and Tribulations of Discovering Brady Violations During a CIU Review

This webinar, hosted by the Association of Prosecuting Attorneys (APA), is part of APA’s Conviction Integrity Webinar Series. Presenter Patricia Cummings from the Philadelphia District Attorney’s Office will discuss the work of Conviction Integrity Units (CIUs) in Dallas and Philadelphia “where CIU prosecutors reviewed files and interviewed witnesses only to discover ‘material’ Brady information that had been suppressed for decades.” Cummings will discuss the challenges that came with pursuing these cases.

The following questions provide context for the webinar:

Webinar - Emmett Till Cold Case Investigations and Training and Technical Assistance Program

Hosted by the Bureau of Justice Assistance (BJA), this webinar will provide details and guidance for potential applicants to BJA’s Emmett Till Cold Case Investigations and Training and Technical Assistance Program solicitation. This program supports efforts of state, local and tribal law enforcement and prosecutors and their partner to investigate, prosecute and resolve and support those impacted by unsolved homicides involving civil rights violations that occurred prior to December 31, 1979. This year, BJA added a category for national training and technical assistance. The presen

DF100 Basic Digital Forensic Analysis: Seizure (Apr. 6, 2021)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

DF310 Advanced Digital Forensic Analysis: Windows (Apr. 6–9, 2021, Virtual)

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

DF330 Advanced Digital Forensic Analysis: iOS & Android (Apr. 19–22, 2021, Virtual)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

Pages