Tribal Justice Agencies

CI130 Basic Cyber Investigations: Cellular Records Analysis

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers; and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of NW3Cs PerpHound tool, which assists in the plotting of call detail record locations.

*Cellular technology. Land-line and cellular networks. Types and generations of cell phones. Cell site design and its implications for law enforcement.
*Analysis of call detail records. Request information from service providers. Convert records into a useful format. *Merge two related spreadsheets. Read and analyze using filters, sorting, and pivot tables. Plot location information.
*Hands-on experience. Hands-on experience with NW3Cs free software tool PerpHound and Microsoft Excel to analyze various types of records that are available from cellular providers.

FC122 Intellectual Property Theft Training

This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific folder that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

This course is presented in collaboration with the National Association of Attorneys General (NAAG).
Awareness. Types of IP crimes. The criminals who commit these crimes. Impacts and dangers.
Investigation. Online and traditional techniques. Working with brand experts and the private sector. Large amounts of evidence. Resources.
Statutes. Prosecutorial theories. State-specific discussion.
Hands-on experience. Work with real counterfeit products. Identify fakes with expert guidance.

DF205 Intermediate Digital Forensic Analysis: SQLite Primer

Mobile devices dominate the intake list, and the desks of most digital forensics analyst globally. Devices are becoming more secure, with an increase in security the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

What is SQLite and how to identify and analyze logically
Recognizing relevant locations of valuable data within SQLite database.
Develop skills needed for crafting custom SQLite queries.
Learn how to recognize and decode a variety of common timestamp formats.
Learn how to perform SQLite analysis with automation.

FC201 Financial Records Investigative Skills

This course builds on the concepts introduced in FC101 (FIPS) and FC105 (FREA), introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises. Students conduct a mock investigation that includes interviews, data analysis, and the examination of various documents.

*Money laundering. Methods of laundering money. Tracing illegal funds. Emerging issues. FinCEN.
*Spreadsheeting skills. Spreadsheet architecture. Formulas and calculations. Pivot tables.
*Working with financial data. Benford's law analysis. Disentangling commingled funds.
*Hands-on experience. Work a mock financial case as part of an investigative team.

IA101 Foundations of Intelligence Analysis Training

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included NW3C, Law Enforcement Intelligence Units (LEIU), the International Association of Law Enforcement Intelligence Analysis (IALEIA), and the Regional Information Sharing System (RISS).

*Analysis basics. History and purpose of intelligence analysis. Legal issues and ethics. Sources of information. The intelligence cycle.
*Types of analysis. Crime patterns. Associations. Flow. Communications. Financial analysis.
*Creative and critical thinking. Brainstorming. Mind mapping. Steps to critical thinking.
*Deterring crime. Strategic analysis as a tool for law enforcement personnel.
*Hands-on experience. Work as part of a team to analyze information pertaining to several hypothetical cases.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed study of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

*Digital forensic process. Evidence review; requests for examination; case management.
*Validation. Creation of validation images; validation testing.
*Effective tool usage. Tool interface; hashing; file signature analysis; data carving; searching; metadata; bookmarking.
*Reporting. General report structure; report templates; using tool-generated reports.

Webinar: Northern and Middle States Rural Law Enforcement Training and Technical Assistance Grant Program

The Bureau of Justice Assistance (BJA) Northern and Middle States Rural Law Enforcement Training and Technical Assistance Grant Program is a new initiative designed to provide resources to small, rural, and tribal law enforcement agencies within the northern and middle region of the U.S. This program will support efforts in addressing precipitous increases of all types of crime unique to this region, including human trafficking, sexual assaults, extortion, gang activity, murder, drug trafficking, and other forms of violent crime. The purposes for the awards under this program are to: Improve the agency's investigative, intelligence, and/or interdiction capabilities. Enhance information sharing, including investigative and intelligence data sharing with other agencies. Assist in projects/initiatives unique to an agency or its region. Improve dedicated communications capabilities. Provide specific technical assistance that could include hardware/software, specialized equipment, and peer assistance. Applicants must meet the following eligibility requirements to be considered for this program: Must be a small, rural, or tribal law enforcement agency located within the northern and middle region of the U.S. to include: Arkansas, Oklahoma, Missouri, Kansas, Iowa, Nebraska, South Dakota, Minnesota, North Dakota, Montana, Wyoming, Colorado, Utah, Idaho, Nevada, Louisiana, Oregon, Washington, Illinois, Indiana, Michigan, Wisconsin, and Alaska and serving a population size of 100,000 or less.

Webinar: Suicide Prevention: How to Implement a Culture of Prevention and Save More Lives

Overwhelming evidence-based data reveals that suicide is a leading cause of death in the United States. Further research into the data and the tragic stories shows more than enough red flags and warning signs existed before most individuals took their life, making these tragedies preventable. Evidence and success stories reveal how changes in efforts to collect, share, and connect can help intervene, prevent, and disrupt more suicides before they occur. Let's make this Suicide Awareness Month the one that makes a difference today and into the future with changes and actions that save lives all year long. This webinar will highlight how law enforcement teams can connect with schools, communities, and organizations, to create a culture of prevention, and harness the power of innovative and disruptive solutions (6 Stages of Preventing and First Preventers strategies) to disrupt status quo processes in order to save more lives. These strategies empower your school, organization, and community teams to collect and connect the dots and eliminate common and costly gaps, silos, and disconnects to more effectively prevent suicides and other and tragedies so you can start saving lives, reputations, and bottom lines every day. Are you ready to learn how a culture of prevention helps community-wide teams to eliminate soaring fears, liabilities, lawsuits, and costly long-term consequences? Join us to take action and make a difference for those in need!

Webinar: What Criminal Justice Practitioners Should Know About Ransomware in 2021

This webinar will focus on the state of ransomware in August 2021 related criminal communities, nuances of extortion, and other information of value to investigators, digital forensic examiners, and prosecutors confronted with the onslaught of this crime. Please join our presenters as they dissect the technical and the criminal justice challenges as this problem continues to evolve.

Pages