Skip to main content

Training Delivery - Live Video (VTC)

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20241122-162306-21

Submitted by Phillip Hernandez on

A staff attorney at the Iowa Coalition Against Sexual Assault is working with an advocate who is trying to assist an inmate with PREA-related issues. IowaCASA has requested four (4) coaching sessions to help their legal team and others who support member agencies with advocacy of incarcerated survivors. More specifically, the coaching will focus on requests made by incarcerated survivors and appropriate advocacy services.

20241106-73425-59

Submitted by Mrs. Sarah LeN… on

On September 19, 2024, members of the SLATT Program team and two SMEs provided another virtual delivery of the DISRUPT training course lesson titled, “Homegrown Violent Extremist–Threat to Law Enforcement, The Jesse Hartnett Ambush Story.” The delivery followed the same format as the September 9, 2024, delivery, and was hosted by the Regional Organized Crime Information Center (ROCIC), RISS Center.

20241106-72828-05

Submitted by Mrs. Sarah LeN… on

On September 9, 2024, members of the State and Local Anti-Terrorism Training (SLATT) Program team and two subject-matter experts (SMEs) delivered a virtual training titled, “Homegrown Violent Extremist–Threat to Law Enforcement, The Jesse Hartnett Ambush Story.” The 180-minute presentation consisted of a lesson from the “Detect & Interdict: Specialized Roles in Uncovering and Preventing Terrorism” (DISRUPT) training course curriculum and was hosted by the New England State Police Information Network (NESPIN), Regional Information Sharing Systems (RISS) Center.

20241101-80449-16

Submitted by Bryan Lee Dail on
This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues. Emerging issues. Current trends in various types of financial crimes.

FC101 Financial Investigations Practical Skills

This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues.

Emerging issues. Current trends in various types of financial crimes. Recent cases and their implications.
Financial records. Learn to obtain and manage bank records, including basic spreadsheeting skills.
Working with data. Extract leads and draw conclusions from bank records and other financial data.
Hands-on experience. Work a mock financial case as part of an investigative team.

20241001-95806-57

Submitted by Bryan Lee Dail on

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence.

IA101 Foundations of Intelligence Analysis Training

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included NW3C, Law Enforcement Intelligence Units (LEIU), the International Association of Law Enforcement Intelligence Analysis (IALEIA), and the Regional Information Sharing System (RISS).

*Analysis basics. History and purpose of intelligence analysis. Legal issues and ethics. Sources of information. The intelligence cycle.
*Types of analysis. Crime patterns. Associations. Flow. Communications. Financial analysis.
*Creative and critical thinking. Brainstorming. Mind mapping. Steps to critical thinking.
*Deterring crime. Strategic analysis as a tool for law enforcement personnel.
*Hands-on experience. Work as part of a team to analyze information pertaining to several hypothetical cases.

20241001-95800-41

Submitted by Bryan Lee Dail on

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

DF310 Advanced Digital Forensic Analysis: Windows

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

20241001-95755-77

Submitted by Bryan Lee Dail on

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes, but is not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

Subscribe to Training Delivery - Live Video (VTC)