Tribal Justice Agencies

IA 101 - Foundations of Intelligence Analysis Training (Aug 20 2018)

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. This introductory course covers the history and purpose of intelligence analysis, the intelligence cycle, analytical thinking skills, and the importance of strategic analysis. The course was developed by a consortium that included the National White Collar Crime Center, Law Enforcement Intelligence Unit, the International Association of Law Enforcement Intelligence Analysis, and the Regional Information Sharing System.

FC 130 - Targeting Investment Fraud

This course provides investigators and prosecutors with the knowledge and tools they need to respond to the growing problem of investment fraud. Topics include what constitutes a security, using the Howey Test to determine if a particular offering is a security, identifying investment fraud schemes, and investigative strategies for working with victims and perpetrators. The course also covers fraud prevention strategies, and students are provided with additional resources for both prevention and investigation.

CC 315 - Windows Artifacts (July 2018)

This course covers the identification and extraction of artifacts associated with the current versions of Microsoft Windows operating systems (Vista through Windows 10) and the NT file system. Topics include the change journal, BitLocker, and a detailed examination of the various artifacts found in each of the registry hive files. Students examine event logs, volume shadow copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

CC 315 - Windows Artifacts (July 2018)

This course covers the identification and extraction of artifacts associated with the current versions of Microsoft Windows operating systems (Vista through Windows 10) and the NT file system. Topics include the change journal, BitLocker, and a detailed examination of the various artifacts found in each of the registry hive files. Students examine event logs, volume shadow copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

FC 111 - Financial Crimes Against Seniors Seminar (Apr 2018)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and using resources for investigation and community awareness. Detailed examination of a case study, from initial complaint to prosecution, reinforces and illustrates the course content. With a dual focus on financial abuse by trusted persons and common scams aimed at seniors, the course introduces senior-specific investigative skills while facilitating networking and cooperation that can extend out from the classroom and into real cases.

FC 111 - Financial Crimes Against Seniors Seminar (May 2018)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and using resources for investigation and community awareness. Detailed examination of a case study, from initial complaint to prosecution, reinforces and illustrates the course content. With a dual focus on financial abuse by trusted persons and common scams aimed at seniors, the course introduces senior-specific investigative skills while facilitating networking and cooperation that can extend out from the classroom and into real cases.

Cybercop 201 Digital Evidence Examination & Processing

The "Cybercop (CC) 201 - Digital Evidence Examination and Processing" course builds on the concepts introduced in "CC 101 - Basic Digital Forensic Imaging." It covers the architecture and functionality of the Windows NT File System, the FAT and the ExFAT File System, and related directory entry information for locating files on electronic devices. Topical areas include file headers and file hashing, recovery of deleted files and long file names, and techniques for discovering potential evidence that might otherwise be overlooked.

Webinar: Implementing Evidence Based Practices and Services with Fidelity

Although crime control policy and program development processes are increasingly being informed by scientific evidence, identifying and adopting what works is only part of what’s needed to realize positive outcomes. Evidence-based programs and practices (EBPs) still have to be implemented with fidelity and integrity in order to be successful. Unfortunately, implementation is not an easy task. Implementation science, however, can help practitioners tackle implementation challenges so the promise of EBPs can be more fully realized.

Pages