Tribal Justice Agencies

Webinar - Shadow Economy 101

Communities are under siege by crimes for profit. When criminals make money (regardless of method: fraud, human trafficking, drugs, counterfeit or stolen goods, cargo, identity theft, or organized retail theft), they create a shadow economy. This illicit activity competes with and erodes the economic stability of our communities. Unique research into the economic impact of the shadow economy reveals the critical need to support skilled, targeted investigations and effective prosecution. Unfortunately, there are ever-increasing efforts to decriminalize non-violent crimes. These policies are fueling the unprecedented growth of the shadow economy. In order to defend communities from this threat, investigators will require a counter-narrative to illustrate how these policies are generating more crime, propagating violence, and ultimately leading to urban decay.

Webinar - Cryptocurrency, Compliance, and Financial Crimes

This webinar will discuss cryptocurrency general information for detailed discussion regarding legitimate use versus illegitimate use, common financial crimes, and avoidance of compliance requirements. Further, the webinar will delve into exchanges, transactions, opportunities for data collection and analysis, the value to criminal or compliance investigations, and a review of current case studies.

Webinar - Of Ponzis and Pyramids: Effective Use of a Forensic Auditor in Investment Fraud Investigations

Investment frauds result in the theft of millions of dollars from investors on a yearly basis, many times without the victims knowing that they have been defrauded. Fraudsters may target those of modest means or those with small fortunes, yet their methods are almost always the same. Learning how to identify common types of investment frauds, the effective methods for investigating such schemes, and how to successfully prosecute these crimes is key to protecting unsuspecting investors from these scams. This course will focus on common types of investment frauds, including Ponzi and Pyramid schemes, the effective use of forensic auditors throughout such investigations, and what steps need to be taken by the prosecution team to successfully hold these fraudsters accountable.

IA102 Introduction to Link Analysis (Nov. 5, 2020, Virtual)

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

    IA102 Introduction to Link Analysis (Nov. 20, 2020, Virtual)

    This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis. 

    IA102 Introduction to Link Analysis (Dec. 15, 2020, Virtual)

    This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis. 

      CI130 Basic Cyber Investigations: Cellular Records Analysis (Dec. 21, 2020, Virtual)

      This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

      DF205 Intermediate Digital Forensic Analysis: SQLite Primer (Dec. 22, 2020, Virtual)

      Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. Devices are becoming more secure, with an increase in security; the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data, we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

      Pages