Tribal Justice Agencies

DF205 Intermediate Digital Forensic Analysis: SQLite Primer

Mobile devices dominate the intake list, and the desks of most digital forensics analyst globally. Devices are becoming more secure, with an increase in security the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

What is SQLite and how to identify and analyze logically
Recognizing relevant locations of valuable data within SQLite database.
Develop skills needed for crafting custom SQLite queries.
Learn how to recognize and decode a variety of common timestamp formats.
Learn how to perform SQLite analysis with automation.

FC201 Financial Records Investigative Skills

This course builds on the concepts introduced in FC101 (FIPS) and FC105 (FREA), introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises. Students conduct a mock investigation that includes interviews, data analysis, and the examination of various documents.

*Money laundering. Methods of laundering money. Tracing illegal funds. Emerging issues. FinCEN.
*Spreadsheeting skills. Spreadsheet architecture. Formulas and calculations. Pivot tables.
*Working with financial data. Benford's law analysis. Disentangling commingled funds.
*Hands-on experience. Work a mock financial case as part of an investigative team.

IA101 Foundations of Intelligence Analysis Training

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included NW3C, Law Enforcement Intelligence Units (LEIU), the International Association of Law Enforcement Intelligence Analysis (IALEIA), and the Regional Information Sharing System (RISS).

*Analysis basics. History and purpose of intelligence analysis. Legal issues and ethics. Sources of information. The intelligence cycle.
*Types of analysis. Crime patterns. Associations. Flow. Communications. Financial analysis.
*Creative and critical thinking. Brainstorming. Mind mapping. Steps to critical thinking.
*Deterring crime. Strategic analysis as a tool for law enforcement personnel.
*Hands-on experience. Work as part of a team to analyze information pertaining to several hypothetical cases.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed study of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

*Digital forensic process. Evidence review; requests for examination; case management.
*Validation. Creation of validation images; validation testing.
*Effective tool usage. Tool interface; hashing; file signature analysis; data carving; searching; metadata; bookmarking.
*Reporting. General report structure; report templates; using tool-generated reports.

Webinar: Northern and Middle States Rural Law Enforcement Training and Technical Assistance Grant Program

The Bureau of Justice Assistance (BJA) Northern and Middle States Rural Law Enforcement Training and Technical Assistance Grant Program is a new initiative designed to provide resources to small, rural, and tribal law enforcement agencies within the northern and middle region of the U.S. This program will support efforts in addressing precipitous increases of all types of crime unique to this region, including human trafficking, sexual assaults, extortion, gang activity, murder, drug trafficking, and other forms of violent crime. The purposes for the awards under this program are to: Improve the agency's investigative, intelligence, and/or interdiction capabilities. Enhance information sharing, including investigative and intelligence data sharing with other agencies. Assist in projects/initiatives unique to an agency or its region. Improve dedicated communications capabilities. Provide specific technical assistance that could include hardware/software, specialized equipment, and peer assistance. Applicants must meet the following eligibility requirements to be considered for this program: Must be a small, rural, or tribal law enforcement agency located within the northern and middle region of the U.S. to include: Arkansas, Oklahoma, Missouri, Kansas, Iowa, Nebraska, South Dakota, Minnesota, North Dakota, Montana, Wyoming, Colorado, Utah, Idaho, Nevada, Louisiana, Oregon, Washington, Illinois, Indiana, Michigan, Wisconsin, and Alaska and serving a population size of 100,000 or less.

Webinar: Suicide Prevention: How to Implement a Culture of Prevention and Save More Lives

Overwhelming evidence-based data reveals that suicide is a leading cause of death in the United States. Further research into the data and the tragic stories shows more than enough red flags and warning signs existed before most individuals took their life, making these tragedies preventable. Evidence and success stories reveal how changes in efforts to collect, share, and connect can help intervene, prevent, and disrupt more suicides before they occur. Let's make this Suicide Awareness Month the one that makes a difference today and into the future with changes and actions that save lives all year long. This webinar will highlight how law enforcement teams can connect with schools, communities, and organizations, to create a culture of prevention, and harness the power of innovative and disruptive solutions (6 Stages of Preventing and First Preventers strategies) to disrupt status quo processes in order to save more lives. These strategies empower your school, organization, and community teams to collect and connect the dots and eliminate common and costly gaps, silos, and disconnects to more effectively prevent suicides and other and tragedies so you can start saving lives, reputations, and bottom lines every day. Are you ready to learn how a culture of prevention helps community-wide teams to eliminate soaring fears, liabilities, lawsuits, and costly long-term consequences? Join us to take action and make a difference for those in need!

Webinar: What Criminal Justice Practitioners Should Know About Ransomware in 2021

This webinar will focus on the state of ransomware in August 2021 related criminal communities, nuances of extortion, and other information of value to investigators, digital forensic examiners, and prosecutors confronted with the onslaught of this crime. Please join our presenters as they dissect the technical and the criminal justice challenges as this problem continues to evolve.

Webinar: Springtime SQLite Survival Series Part III - What the Hex is going on in this SQLite database?

SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Join Maggie Gaffney (Teel Tech) and Chris Atha (National White Collar Crime Center) for part three of a three-part Springtime SQLite Survival Series. Part III will tackle technical concepts such as decoding SQLite databases in hexadecimal and investigating blobs. This session will focus on leveraging Forensic Browser for SQLite to dive deeper into SQLite files.

Webinar: What is Human Trafficking and How Does It Relate to Money Laundering?

This webinar provides an overview of human trafficking and how traffickers exploit adults and children in the United States and around the world for financial gain, among other reasons. Topics include financial and behavioral indicators of labor and sex trafficking, in addition to case studies of the four typologies of money laundering in human trafficking.

Pages