Skip to main content

Law Enforcement

Attention

Due to a federal government shutdown, content updates are temporarily on hold. Content updates and responses to inquiries will resume when normal operations continue.

Questions?

Exploitation and Monitoring of Social Media for Law Enforcement Training Course

This innovative course provides criminal investigators, state and local officers, intel analysts, diversion investigators, and other investigators involved in investigations using open source technology a fast-paced, hands-on look at social media investigative tools geared for beginner to intermediate-level users.

The course includes tools for search efficiency, operations security, and evaluating social media websites and microblogs, as well as tools for handling digital images.

Students will be able to:

Capital Litigation Improvement Project Series: Mass Shootings and Victim Considerations

“Mass Shootings and Victim Considerations” focuses on a topical and complex subject that is likely at the forefront of many prosecutors’ minds. In this presentation, District Attorney George Brauchler, widely known as the prosecutor of James Holmes, the Aurora, Colorado gunman, will home in on the issues district attorneys face while prosecuting mass shootings cases. He will provide anecdotal insights and lessons learned along the way.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (Jan. 2020, California)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

CI130 Basic Cyber Investigations: Cellular Records Analysis (Jan. 2020, California)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

FC105 Financial Records Examination and Analysis (Feb. 2020, Oregon)

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

Stepping Up and Data-Driven Justice: Using Data to Identify and Serve People who Frequently Utilize Health, Human Services, and Justice Systems

Counties across the country have committed to creating data-driven, systems-level plans to reduce the number of people with mental illnesses in their jails. As part of these efforts, many communities are focusing on the small number of people who frequently cycle in and out of emergency rooms, shelters, crisis services, and the justice system, a population that disproportionately contributes to the high utilization of these resources.

Gas Pump Skimming

The webinar will discuss the anatomy of gas pump skimming from the manufacturing of the skimmers to laundering of the proceeds. The presenter will discuss the various types of skimmers, how the card numbers are harvested, as well as the various methods of cashing out.

Subscribe to Law Enforcement