Training

CenTF Multijurisdictional Task Force Commanders Training (April 2019)

The Bureau of Justice Assistance’s Center for Task Force Training (CenTF) Program offers the classroom-based “Task Force Commanders Training” through a two-day onsite training. This training covers a variety of topics designed to assist task force commanders and other law enforcement leaders in making appropriate decisions regarding task force administration and operations planning and management.

CenTF Multijurisdictional Task Force Commanders Training (March 2019)

The Bureau of Justice Assistance’s Center for Task Force Training (CenTF) Program offers the classroom-based “Task Force Commanders Training” through a two-day onsite training. This training covers a variety of topics designed to assist task force commanders and other law enforcement leaders in making appropriate decisions regarding task force administration and operations planning and management.

Being Mickey in a Goofy World: Understanding User Attacks

Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation, he will walk through the various attacks, including email, social media, and in-person. Using various war stories, he will explain how the attacker views the user and what they do to increase the success rate of these attacks.

Seven Samurai: Understanding Attacks to Drive Defenses

This presentation uses war stories from decades of working in information technology and security to explore the attacks we see today. Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today. These stories will explain how the attack was performed and why an attacker would take that direction.

Investigating Terrorist Financing with Chainalysis Reactor

Terrorist organizations are using cryptocurrencies as a new way to raise funds and facilitate operations. This poses a challenge to both public and private sector organizations, but also creates a new opportunity for lead development centered on blockchain data. This webinar will review an analysis of recent cases of terrorist organizations using Bitcoin, provide an overview of Chainalysis data and the Reactor software solution, and speak to the future of terrorist financing through cryptocurrency and how to stop them.

Collecting Advertiser ID Evidence in Criminal Investigations (Mar 19 2019, 2:30 p.m.)

Many mobile phone users choose to share Advertiser ID information with app developers and social media companies. This includes precision handset geolocation information. Advertiser ID handset geolocation information is separate and distinct from handset geolocation information collected by cellular carriers, by Google for Android OS devices, or on iOS handsets in Significant Locations. Commercially available Advertiser ID information can be used during criminal investigations to determine if a handset was at multiple crime scenes near the times of those crimes and to determine specific locations where a handset was previously located. This webinar will discuss Advertiser IDs, show where Advertiser ID controls are located on iOS and Android OS handsets, outline investigative use and considerations, and detail specific instances when evidence collected from commercially available Advertiser ID information was used during the investigations of serious crimes.

Collecting Advertiser ID Evidence in Criminal Investigations (Mar 19 2019, 1:00 p.m.)

Many mobile phone users choose to share Advertiser ID information with app developers and social media companies. This includes precision handset geolocation information. Advertiser ID handset geolocation information is separate and distinct from handset geolocation information collected by cellular carriers, by Google for Android OS devices, or on iOS handsets in Significant Locations. Commercially available Advertiser ID information can be used during criminal investigations to determine if a handset was at multiple crime scenes near the times of those crimes and to determine specific locations where a handset was previously located. This webinar will discuss Advertiser IDs, show where Advertiser ID controls are located on iOS and Android OS handsets, outline investigative use and considerations, and detail specific instances when evidence collected from commercially available Advertiser ID information was used during the investigations of serious crimes.

FC110 Financial Crimes Against Seniors (Jun 2019, Wyoming)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Bringing together law enforcement personnel and adult protective services investigators, the course enhances students' investigative skills and interviewing techniques while facilitating networking and cooperation that can extend out of the classroom and into real cases. Topics include recognizing elder abuse, working with victims, and identifying perpetrators, as well as resources for investigation and community awareness. Students work together to conduct a mock investigation into a hypothetical case. 

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (Jun 2019, Georgia)

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation. 

DF330 Advanced Digital Forensic Analysis: iOS & Android (Jun 2019, Florida)

This course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, using available imaging options, accessing locked devices, and understanding the default folder structure. The forensic artifacts covered include device information, call history, voicemail, messages, web browser history, contacts, and photos.

Pages