Training

Phishing to Laundering: From Clicks to Cash-Out

It is widely acknowledged that phishing is responsible for more than 90 percent of breaches occurring today. Basic phishing primarily exploits human behavior to entice a victim to ‘click the link’ or ‘open the attachment,’ thus often handing over to the criminal the golden nugget – valid access credentials. While we are all taught not to click or open the attachment, the scheme is still highly successful and profitable.

IA105 Intelligence Writing and Briefing (May 2019)

This course covers basic intelligence writing and briefing principles, as well as methods to facilitate increased intelligence sharing. Topics include creative/critical thinking and critical reading skills, source evaluation, privacy and civil rights, intelligence product writing structure and style, and creating and presenting intelligence briefings. An instructor and peer feedback process is applied to the reports and briefings produced in class.

CI130 Basic Cyber Investigations: Cellular Records Analysis (Aug 2019, California)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

FC111 Financial Crimes Against Seniors Seminar (Jul 2019, North Dakota)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and using resources for investigation and community awareness. Detailed examination of a case study, from initial complaint to prosecution, reinforces and illustrates the course content. With a dual focus on financial abuse by trusted persons and common scams aimed at seniors, the course introduces senior-specific investigative skills while facilitating networking and cooperation that can extend out of the classroom and into real cases.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (July 2019, Maryland)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites. 

DF320 Advanced Digital Forensic Analysis: macOS (Jun 2019, Arkansas)

This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage, and use multiple methods to acquire forensically sound images of Apple Macintosh computers. Topics include how the macOS default file system stores data, what happens when files are sent to the macOS Trash, where operating system and application artifacts are stored, and how they can be analyzed. Forensic artifacts covered include password recovery, recently opened files and applications, encryption handling, Mail, Safari, Messages, FaceTime, Photos, Chrome, and Firefox.

Internet Intelligence Training: Social Media Exploitation (June 2019)

This course offers a comprehensive program for internet investigations and open-source intelligence gathering. Students learn how to enhance their search skills to effectively use internet resources for locating information online.

Cognitive Interviewing, Communication & Influence (Jul 2019)

This course introduces the art of cognitive interviewing using neuro-linguistic programming techniques. Students learn how to interview suspects, witnesses, and victims more effectively, as well as to observe brain-based deception behavior in both face-to-face and virtual communications. Topics include influence and persuasion with difficult witnesses and suspects, interpretation of body language for deceit and truthfulness, and best practices for testimony and reframing cross-examination.

Cognitive Interviewing, Communication & Influence (Apr 2019)

This course introduces the art of cognitive interviewing using neuro-linguistic programming techniques. Students learn how to interview suspects, witnesses, and victims more effectively, as well as to observe brain-based deception behavior in both face-to-face and virtual communications. Topics include influence and persuasion with difficult witnesses and suspects, interpretation of body language for deceit and truthfulness, and best practices for testimony and reframing cross-examination.

Saginaw Chippewa Regional HTWC Refresher Feb. 2019

The Saginaw Chippewa Indian Tribe of Michigan requested a refresher training for their team members regarding the Training Key Components and opioid-related topics such as MAT and substance-exposed newborns. Upon expressions of interest from neighboring tribes, including the Little Traverse Bay Bands of Indians, the Bay Mills Indian Community, the Keweenaw Bay Indian Community, and the Sault Ste. Marie Tribe of Chippewa Indians, the training was expanded to a regional training to serve the northern Michigan-region of tribes.

Pages