Prosecutors

Webinar - Checkm8 & CheckRa1n: New Tools for iOS Extractions

If anything about mobile forensics could be considered buzzworthy in the past year, it would be the release of the Checkm8 Boot ROM exploit created by axi0mX in October. Allowing critical access to 11 generations of iPhones and iDevices, Checkm8 is a new opportunity to access data previously locked behind a secure wall. But beyond the hype, what data can you actually access using this newfound exploit, and what do you do once you've extracted data using Checkm8? In this webinar, we will discuss the benefits, challenges, and usefulness of Checkm8 and Checkra1n to mobile forensic examiners and investigators. We will also explore how examiners can use Checkra1n to gain access to devices and what that access means in practical terms for investigations.

Project Safe Neighborhoods (PSN) Webinar on Targeting Offenders and Creating Targeted Offender Lists

A significant number of law enforcement agencies use offender-based approaches as part of their PSN strategy. Researchers and experienced law enforcement will conduct an interactive panel discussion on strategies for identifying prolific violent offenders and maintaining targeted offender lists. The webinar will go beyond the basics of developing and implementing a priority offender list; panelists will discuss questions related to implementation.

National Domestic Violence Prosecution Conference

The conference will focus on the needs of jurisdictions responding to domestic violence cases. Experienced prosecutors and victim advocates will facilitate discussion and train participants on practical strategies and model policies in domestic violence prosecution. Prosecutors and victim advocates with all levels of experience are encouraged to attend.

FC122 Intellectual Property Theft Training (Jan. 2020, Florida)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

This course is presented in collaboration with the National Association of Attorneys General.

Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each other. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And they increasingly choose to use platforms that make this communication openly available for others to view. This means that evidence associated with not just metadata but also content of communications can often be collected through open sources long after the communication is completed. While evidence of criminality and victimization can be recovered through open source investigative techniques, many of the commercial tools marketed to criminal investigators and analysts are expensive. This sometimes places them outside the reach of police departments, and social media companies are increasingly blocking API connections for commercial tools that allow the tools to be used for "surveillance." Therefore, it is increasingly important for criminal investigators and analysts to build an inexpensive cyber-OSINT toolbox. This webinar will discuss the rapidly evolving ecosystem of online social media and how people are changing how they choose to communicate. It will then detail and demonstrate free and inexpensive cyber-OSINT tools that criminal investigators and analysts can use to start building a cyber-OSINT toolbox.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (March 2020, Texas)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

CI130 Basic Cyber Investigations: Cellular Records Analysis (March 2020, Texas)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

FC110 Financial Crimes Against Seniors (May 2020, Tennessee)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Bringing together law enforcement personnel and adult protective services investigators, the course enhances students' investigative skills and interviewing techniques while facilitating networking and cooperation that can extend out of the classroom and into real cases. Topics include recognizing elder abuse, working with victims, and identifying perpetrators, as well as resources for investigation and community awareness. Students work together to conduct a mock investigation into a hypothetical case.

What Might Your Forensic Acquisitions Be Hiding?

The process of acquiring forensic images is well understood, and the industry has never been better equipped for the analysis. However, common practices are set to fail, and analysis may be missing malware and indicators of compromise. This webinar will highlight shortcomings in common methods and provide a framework for an improved approach to allow for more efficient and thorough investigations.

DF330 Advanced Digital Forensic Analysis: iOS & Android (March 2020, North Carolina)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

Pages