Tribal Justice Agencies

Cognitive Interviewing & Courtroom Testimony (Webinar)

Have you ever wanted to communicate more effectively? Relate better to the jury while testifying? Be more successful and obtain more information while interviewing? This webinar will give participants techniques and insight on how to employ cognitive interviewing skills to interview suspects, witnesses, and victims. Participants will gain a better understanding of human behavior as it relates to neuroscience and become more effective in obtaining information and having suspects, witnesses, and victims cooperate.

Emerging Legal Issues in Tech: From the Cloud Act to Hacking Back

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar will discuss the following topics:

  • The Cloud Act,
  • Border Searches of Technology,
  • Right to be Forgotten,
  • Revisions to Federal Rules of Evidence,
  • Hacking Back and the Law, and
  • Compelled Decryption.

Presented by:

The Benefits of Triage: How to Quick Start Your Digital Investigation

Learn the art of digital forensic triage - how to conduct an initial investigation quickly based on the scope of the investigation you are about to conduct. If 90 percent of cases can be solved with 10 percent of the data, let's get to that point early and make decisions on the need for further deep dive, due diligence, or peace of mind examination of devices based off facts.

FY 2018 Justice Reinvestment Initiative: Funding Opportunities for State, Local, and Tribal Agencies and TTA Providers

This webinar will introduce the fiscal year 2018 funding opportunities offered through two solicitations, including a new grant program that provides direct assistance for state, local, and tribal justice agencies and jurisdictions to develop, implement, and test data-driven and evidence-based responses to high-cost drivers of crime and other compelling public safety challenges. The presenters will also discuss the related funding opportunity available to training and technical assistance providers.

To the Cloud! Get the Evidence You Need to Move Cases Forward

Some of the most important sources of evidence in a criminal investigation are also the hardest to get. An encrypted, password-protected mobile device can be useless if you have no way to get the password. Social media providers are infamous for their red tape, delaying your returns for weeks or even months. And, if you’re in a country other than where the provider is located, mutual legal assistance treaties can take years to process. Fortunately, there is a solution: obtain the evidence directly from cloud-based user accounts.

Law Enforcement Cyber Center: A Valuable Resource for Investigators (Webinar)

The Law Enforcement Cyber Center (LECC) was developed to enhance the awareness, expand the education, and build the capacity of justice and public safety agencies to prevent, investigate, prosecute, and respond to cyber threats and cyber crimes. It is intended to be a national resource for law enforcement and related justice and public safety entities. During the webinar, participants will review the website and learn about the many valuable resources that can be utilized.

Introduction to FinCEN (Webinar)

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

This webinar is intended as a Financial Crimes Enforcement Network (FinCEN) overview. It will include information on products and services, Bank Secrecy Act records and information, and how FinCEN is used in investigations.

Presented by: James Emery, FinCEN.

CI102 Basic Cyber Investigations: Open Source Intelligence (Feb 2019, Georgia)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites. 

Pages