Tribal Justice Agencies

Webinar: Disrupting the Shadow Economy Using Motive-Oriented Crime Suppression

The initial webinar, Shadow Economy 101, examined the critical importance of upholding the rule of law and illustrated how the business of crime does intolerable damage to our communities' economic infrastructure, disenfranchising our most economically vulnerable citizens. In part two of the series, 30-year Phoenix Police Veteran, Detective Sergeant David Lake (ret.) presents the revolutionary investigative methods he leveraged to combat shadow economic crimes in the fifth-largest city in the nation. His "motive-oriented crime suppression" technique was used to reduce crime (caseload) in less time and with fewer resources than traditional, method-centric approaches. Most importantly, it fundamentally disrupted and dismantled the systems that were propagating criminal offenses without aggravating social conditions by relying on police saturation or mass incarceration. Through internal research and case studies, attendees will be exposed to:

  • Alternative case management concepts
  • Techniques for proactive and precision investigations
  • New applications of police intelligence and crime analysis
  • Alternative case management concepts
  • Techniques for proactive and precision investigations
  • New applications of police intelligence and crime analysis

Webinar: Leveraging Technology for Your Fraud and Financial Investigations

In the advent of pandemic, natural disasters, and the increasing number of technology-driven fraud and financial investigations occurring, investigators need to rely on technology more than ever to solve these investigations and become more efficient investigating them. The sheer volume of investigations is allowing thousands of cases to go uninvestigated. Whether it would be stock manipulation, such as GameStop, cryptocurrency, or various applications that track and document expenditures, deposits, and transfers, it is clear we need to leverage technology to be more efficient in conducting these investigations. This webinar will go over techniques that fraudsters use, as well as the implementation of a tool that can help find the evidence you are looking for to leverage technology for your investigations.

DF101 Basic Digital Forensic Analysis: Windows Acquisition (May 3–5, 2021, Virtual)

This course provides the fundamental knowledge and skills required to acquire forensic backup images from Windows-based computers and removable storage media in a forensically sound manner.

Presentations and hands-on practical exercises cover the following topics:

  • Storage media and how data is stored.
  • The forensic acquisition process.
  • Tool validation.
  • Hardware and software write blockers.
  • Forensic backup image formats.
  • Multiple forensic acquisition methods. 

Students will use free and commercial third-party tools that are currently used by practitioners in the field.

DF320 Advanced Digital Forensic Analysis: macOS (Jun. 14–17, 2021, Virtual)

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers. Students will also learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using them to analyze operating system artifacts that include, but are not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

 

CI101 Basic Cyber Investigations: Digital Footprints (Jun. 30, 2021, Virtual)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

CI130 Basic Cyber Investigations: Cellular Records Analysis (Jun. 28–29, 2021, Virtual)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (Jun. 7–9, 2021, Virtual)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

CI101 Basic Cyber Investigations: Digital Footprints (May 11, 2021, Virtual)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

CI130 Basic Cyber Investigations: Cellular Records Analysis (May 12–13, 2021, Virtual)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

CI130 Basic Cyber Investigations: Cellular Records Analysis (May 25–26, 2021, Virtual)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

Pages