Prosecutors

Open-Source Investigative Methods for Counter Narcotics and Human Trafficking Investigations

Threat actors are increasing their use of the Internet, social media and apps to conceal and advance their trafficking operations. Open-source information can provide investigators with intelligence and investigative leads related to narcotics and human trafficking operations. This webinar will provide attendees with introductory methods related to open-source information collection as it applies to identifying online profiles and activity related to narcotics and human trafficking. Attendees will learn how to safely navigate social media platforms while adhering to local laws and methods of collection.

Presented by:
Adam Scarisbrick, Senior Instructor, Hetherington Group

Lunch and Learn with Binance, Roblox, and Kodex

Join us for the Learn and Lunch webinar series, where legal experts from Binance, the worlds largest cryptocurrency exchange, and Roblox, a popular gaming platform, come together to provide valuable insights for professionals navigating the intersection of law enforcement and digital platforms.

The presentation will cover two key areas. First, experts from Binance will provide crucial updates on cryptocurrency investigations, including best practices for handling crypto-related legal processes and the latest market changes that could impact your work. As cryptocurrency continues to play a growing role in digital investigations, understanding these evolving legal frameworks is essential for law enforcement and legal professionals. Next, experts from Roblox will guide attendees through the platforms key safety features, explaining how law enforcement can effectively engage with Roblox. The session will also include a walkthrough on submitting information requests to Roblox, focusing on data availability, retention policies, and the primary identifiers needed to locate requested data. This section aims to equip attendees with practical tools to navigate Roblox's legal processes efficiently.

Throughout the webinar, participants will have the opportunity to hear directly from experts, ask questions, and share ideas for improving legal procedures within these dynamic industries. The event will conclude with an interactive Q&A session, allowing attendees to engage in a collaborative dialogue with industry leaders. Do not miss this chance to enhance your understanding of cryptocurrency investigations and digital platform legal processes.

Presented by:
Jarek Jakubcek, Head of LE Training, Binance
AJ Iafrate, Government Relations North America, Kodex Global

Telegram Investigations

This webinar will cover investigations into Telegram app. For many, Telegram has been a frustration as they do not know how the app works, and just what investigative avenues can be pursued. This webinar will cover how Telegram functions, how Telegram channels work, how Telegram Bots work to facilitate sales, and also explore the T.O.N. (The Open Network) crypto currency that is built upon the Telegram network. Case studies will be shown, as well in depth investigative techniques. There has never been a more comprehensive webinar about the end-to-end encryption messaging app than this!

Presented by:
Keven Hendricks, Detective, City of New Brunswick, NJ, Police Department

FC111 Financial Crimes Against Seniors Seminar

This course promotes a multi-agency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and resources for investigation and community awareness. Detailed examination of a case study from initial complaint to prosecution reinforces and illustrates the course content. With a dual focus on financial abuse by trusted persons and common scams aimed at seniors, the course introduces senior-specific investigative skills while facilitating networking and cooperation that can extend out of the classroom and into real cases.

IA200 Intermediate Analytic Techniques

This course addresses key objectives focused on training intelligence analysts working at or towards the intermediate-level (practitioner and/or experienced analyst). This course expands upon core analytic fundamentals covered in NW3C's FIAT, ISIA, and IWAB offerings. The course begins with an in-depth case study to illustrate the complexities and challenges of a major case scenario for intelligence analysts. The course then examines key concepts related to analytic thinking, cognitive biases, structured analytic techniques, and effective time and project management. Finally, the course concludes with a section on addressing analytic uncertainty in intelligence writing. With guidance from experienced experts, students gain hands-on experience in the course with a complex practical case scenario that will challenge students on both days of the course.

Key concepts covered in this course include:
*Identifying cognitive biases
*Structured analytic techniques
*Project and time management
*Conveying uncertainty in intelligence writing

FC122 Intellectual Property Theft Training

This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific folder that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

This course is presented in collaboration with the National Association of Attorneys General (NAAG).
Awareness. Types of IP crimes. The criminals who commit these crimes. Impacts and dangers.
Investigation. Online and traditional techniques. Working with brand experts and the private sector. Large amounts of evidence. Resources.
Statutes. Prosecutorial theories. State-specific discussion.
Hands-on experience. Work with real counterfeit products. Identify fakes with expert guidance.

DF320 Advanced Digital Forensic Analysis: macOS

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes, but is not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

FC200 Intermediate Level Spreadsheeting Skills: Assessing and Organizing Data

This intermediate spreadsheeting course uses Microsoft Excel to assess and organize data in an electronic format. The class is designed for learners who have experience using Excel and who want to increase their spreadsheeting knowledge and skills. Topics include text functions, absolute referencing, date and time functions, flash fill, handling formula errors, VLOOKUP, dynamic arrays, and data validation. The course combines live demonstrations, instructor-led exercises, and independent student exercises.

DF310 Advanced Digital Forensic Analysis: Windows

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

IA101 Foundations of Intelligence Analysis Training

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included NW3C, Law Enforcement Intelligence Units (LEIU), the International Association of Law Enforcement Intelligence Analysis (IALEIA), and the Regional Information Sharing System (RISS).

*Analysis basics. History and purpose of intelligence analysis. Legal issues and ethics. Sources of information. The intelligence cycle.
*Types of analysis. Crime patterns. Associations. Flow. Communications. Financial analysis.
*Creative and critical thinking. Brainstorming. Mind mapping. Steps to critical thinking.
*Deterring crime. Strategic analysis as a tool for law enforcement personnel.
*Hands-on experience. Work as part of a team to analyze information pertaining to several hypothetical cases.

Pages