Skip to main content

Prosecutors

Attention

The TTA Reporting Portal is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

DF320 Advanced Digital Forensic Analysis: macOS

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes, but is not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

12 Whys of Wellness

As we enter into the season of giving, it is equally as important to give back to YOU. This webinar will highlight reasons to ensure you remember why it is important to take care of your personal wellness for yourself, your family/friends, and your work.

FC101 Financial Investigations Practical Skills

This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues.

*Emerging issues. Current trends in various types of financial crimes. Recent cases and their implications.
*Financial records. Learn to obtain and manage bank records, including basic spreadsheeting skills.
*Working with data. Extract leads and draw conclusions from bank records and other financial data.
*Hands-on experience. Work a mock financial case as part of an investigative team.

Social Media and Online Investigations: Identifying Unknown Individuals

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Your team, your tools, or your client may locate a social media user of interest or concern. Your analysis of the profile may become challenging if the user does not reveal their real identify. The presenter will discuss how to harness the Internet to identify the person or group behind a username. The presentation will include real case examples to demonstrate successful workflows. Learning objectives outline useful steps for identifying who is behind a username, explore case examples to retain those steps, and Introduce future challenges.

Presented by:
Megan Munoz, Director of Education and Knowledge Management, Hetherington Group

Bitcoin & Cryptocurrency Investigations: Beyond the Basics

Building upon the previous cryptocurrency webinar, "Bitcoin 101: What Are Cryptocurrency and Blockchain All About?" presented by Cobwebs, this webinar will introduce investigative techniques to show how open-source information can be leveraged to attribute identities to wallets and addresses. This webinar will also briefly demonstrate the OSINT and cryptocurrency analysis capabilities of Cobwebs.

ICAC UC Chat Techniques Tips and Tricks

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Undercover chat investigations are used to help intercept child predators from victimizing children in our communities. In this webinar, we will provide an overview of the chat techniques used in child exploitation cases. We will cover different apps that were used and how they assisted in identifying the targets and discuss some of the interview techniques that helped lead to confessions.

*This webinar is not a replacement for the ICAC UC Chat Investigations Course.

Presented by:
Moe McClanahan, High-Tech Crime Specialist, NW3C
Robert Leazenby, High-Tech Crimes Specialist Supervisor, NW3C
Brent Metcalfe, High-Tech Crime Specialist, NW3C

Subscribe to Prosecutors