Training

CI240 Intermediate Cyber Investigations: Virtual Currency (Jun 5 2019, Pennsylvania)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

PT201 Digital Evidence Basics & the CLOUD Act (May 2019, Massachusetts)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

DF320 Advanced Digital Forensic Analysis: macOS (Jun 2019, Arkansas)

This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage, and use multiple methods to acquire forensically sound images of Apple Macintosh computers. Topics include how the macOS default file system stores data, what happens when files are sent to the macOS Trash, where operating system and application artifacts are stored, and how they can be analyzed. Forensic artifacts covered include password recovery, recently opened files and applications, encryption handling, Mail, Safari, Messages, FaceTime, Photos, Chrome, and Firefox.

Virtual Listening Session to Identify Fiscal Year 2019 Tribal Priorities

The Virtual Tribal Listening Session, hosted by the Bureau of Justice Assistance (BJA), will gather the views of tribal stakeholders in order to inform the federal-tribal partnership and grant-making priorities.

Bureau of Justice Assistance Tribal Stakeholder Preparatory Session

The Bureau of Justice Assistance (BJA)'s Tribal Stakeholder Preparatory Session, a teleconference/webcast, will engage tribal stakeholders on the purpose of the listening session and provide information that will help tribal stakeholders prepare for the Virtual Tribal Listening Session, scheduled for Tuesday, March 26. BJA leadership and staff will be available to respond to questions during this session.

Webinar - Community-Based Treatment Capacity to Meet Demand for SUD Services

Communities seeking to connect addicted individuals to substance use disorder treatment services may arrive at the seminal question, "Divert to what?" Further, trouble accessing adequate and appropriate quality treatment poses an enormous barrier to fully implementing diversion processes.

Survive & Thrive Fundamentals: Protecting You and Your Fellow Officers

This VALOR Officer Safety and Wellness Program training, offered as a one-day course, provides officers at all levels with exactly that — the essentials to survive and thrive — by stressing the importance of being physically and mentally prepared, maintaining situational awareness, combating complacency, and remaining vigilant. Participants will hear from law enforcement experts on:

Internet Intelligence Training: Social Media Exploitation (June 2019)

This course offers a comprehensive program for internet investigations and open-source intelligence gathering. Students learn how to enhance their search skills to effectively use internet resources for locating information online.

Cognitive Interviewing, Communication & Influence (Jul 2019)

This course introduces the art of cognitive interviewing using neuro-linguistic programming techniques. Students learn how to interview suspects, witnesses, and victims more effectively, as well as to observe brain-based deception behavior in both face-to-face and virtual communications. Topics include influence and persuasion with difficult witnesses and suspects, interpretation of body language for deceit and truthfulness, and best practices for testimony and reframing cross-examination.

Cognitive Interviewing, Communication & Influence (Apr 2019)

This course introduces the art of cognitive interviewing using neuro-linguistic programming techniques. Students learn how to interview suspects, witnesses, and victims more effectively, as well as to observe brain-based deception behavior in both face-to-face and virtual communications. Topics include influence and persuasion with difficult witnesses and suspects, interpretation of body language for deceit and truthfulness, and best practices for testimony and reframing cross-examination.

Pages