Tribal Justice Agencies

Traumatic Cases and Events: How to Become Resilient and Move Forward

This webinar is meant for individuals who are looking to build resiliency to combat the effects of trauma. Traumatic events can set your life on one course or another. These events occur frequently in the course of investigations and working with child exploitation cases. Rather than allowing these events to define us or take us over, learn how to recognize different types of trauma through warning signs and become aware of the impact it has in not only your life but those around you. Throughout this webinar, you will also learn how trauma is encoded within your body and how through simple techniques, you limit the impact trauma has on our lives. You will also learn how to reframe any situation for your benefit. You will learn tools on how to shift your mind to not only overcome and situation, but also thrive. Take charge of your feelings, life, and outcome!

Sandcastles in a Storm: Application Vulnerabilities and How They Weaken our Organizations

In this presentation, Kevin Johnson of Secure Ideas will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things. The presentation will explore the vulnerabilities, how they are attacked, and what it means to all of us.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (July 2019, Maryland)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites. 

IA101 Foundations of Intelligence Analysis Training (Mar 2019, Texas)

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. This introductory course covers the history and purpose of intelligence analysis, the intelligence cycle, analytical thinking skills, and the importance of strategic analysis. The course was developed by a consortium that included the National White Collar Crime Center, Law Enforcement Intelligence Unit, the International Association of Law Enforcement Intelligence Analysis, and the Regional Information Sharing System.

FC122 Intellectual Property Theft Training (Apr 2019, Kentucky)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

CI 100 - Identifying and Seizing Electronic Evidence (Mar 2019)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve electronic evidence at a crime scene. Topics include recognizing potential sources of electronic evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

PT201 Digital Evidence Basics & the CLOUD Act (Jun 25 2019, North Carolina)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

PT201 Digital Evidence Basics & the CLOUD Act (Jun 27 2019, North Carolina)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

Collecting Advertiser ID Evidence in Criminal Investigations (Mar 19 2019, 2:30 p.m.)

Many mobile phone users choose to share Advertiser ID information with app developers and social media companies. This includes precision handset geolocation information. Advertiser ID handset geolocation information is separate and distinct from handset geolocation information collected by cellular carriers, by Google for Android OS devices, or on iOS handsets in Significant Locations. Commercially available Advertiser ID information can be used during criminal investigations to determine if a handset was at multiple crime scenes near the times of those crimes and to determine specific locations where a handset was previously located. This webinar will discuss Advertiser IDs, show where Advertiser ID controls are located on iOS and Android OS handsets, outline investigative use and considerations, and detail specific instances when evidence collected from commercially available Advertiser ID information was used during the investigations of serious crimes.

Pages