Skip to main content

Prosecutors

Questions?

Understanding Facebook Search Warrant Returns

Data of evidentiary value in criminal cases is generated both on the suspect device and the services it utilizes. While recovery of data from the suspect device is regularly performed, user account data stored off-device from these services often remains overlooked. This overlooked data is increasingly becoming crucial evidence in cases. In this webinar, we will manually review a Facebook search warrant return examining the different artifacts that can be provided within a return. Once manual examination is complete, a review of the same return with an automated tool will be conducted so the two methods of examination can be compared.

Encryption, Encoding, Inaccessible Data and Devices

Hash, encryption, full disk, file based, and the list goes on! Words used correctly and incorrectly when examiners discuss or even report on evidence. This webinar is intended to lay the framework for a factual understanding of how encryption and hashing are used in our digital investigations. Real world applications of hashing, and encryption will be shown, with an emphasis on how they impact investigations in 2020. Questions such as: "Does the application encrypt data?", "How is it encrypted?", and "Why can't I decrypt it?" will be discussed.

Autopsy: Open Source Digital Forensics Basics Part 1

Autopsy is a free and open source digital forensics platform with many features comparable to those found in the leading commercial tools. It can be installed on Windows, macOS, and Linux operating systems. In part 1 in a two-part series, this webinar will start by walking through setting up a new case and exploring effective tool usage. Attendees will then learn digital forensics best practices and methods for quickly locating items of evidentiary value.

FC099 Basic Level Spreadsheeting Skills

This one-day course provides foundational spreadsheeting knowledge and skills to enhance workplace productivity. The course covers basic navigation of Microsoft Excel by combining live demonstrations and hands-on exercises. Users will learn how to:

  • Work with multiple worksheets within a workbook.
  • Hide, unhide, and protect worksheets.
  • Adjust rows and columns.
  • Use copy and paste options. 
  • Find, select, and sort data.

DF205 Intermediate Digital Forensic Analysis - SQLite Primer (May 29, 2020, Virtual)

Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. With an increase in device security, the need for detailed analysis is also increasing. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data, analysts can arm themselves with the skills and techniques needed to conquer the analysis of nearly any application.

    DF100 Basic Digital Forensic Analysis: Seizure (May 14, 2020, Virtual)

    This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

    CI240 Intermediate Cyber Investigations: Virtual Currency (May 7-8, 2020, Virtual)

    This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

    IA101 Foundations of Intelligence Analysis Training (May 26, 2020, Virtual)

    This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included the National White Collar Crime Center, Law Enforcement Intelligence Unit, the International Association of Law Enforcement Intelligence Analysis, and the Regional Information Sharing System.

    FC122 Intellectual Property Theft Training (May 21, 2020, Virtual)

    This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

    Subscribe to Prosecutors