On June 22, 2018 from 2:00 to 3:00 p.m. ET, the Office of Juvenile Justice and Delinquency Prevention (OJJDP) will present on the fiscal year (FY) 2018 Opioid Affected Youth Initiative. This webinar will provide a general overview of the solicitation, deliverables, and the program goals and objectives. The OJJDP FY 2018 Opioid Affected Youth Initiative will fund sites to develop a data-driven, coordinated response to identify and address challenges resulting from opioid abuse that are impacting youth and community safety.
The Bureau of Justice Assistance leadership, in collaboration with the Comprehensive Opioid Abuse Program team, invites you to this no-cost webinar on June 28, 2018 at 2:00 p.m. ET, to learn how using Digital Health Technologies can help individuals enter, navigate, and stay engaged in the recovery process and reduce the likelihood of relapse.
About the Topic
On June 20, 2018 at 2:00 p.m. ET, the Office for Victims of Crime Training and Technical Assistance Center will present an online Expert Q&A discussion with Erica L. Olsen on “Technology, Social Media, and Victim Safety.”
Social media and technology can be powerful tools to connect with and assist crime victims, but they can also be tools used against victims and survivors. Learn ways to manage social media and technology successfully when working with victims and strategies victims can use to help increase their online safety and privacy.
This course covers the fundamentals of computer operations, hardware function, configuration, and best practices for the protection, preservation, and imaging of digital evidence. Presentations and hands-on exercises cover topics such as partitioning, data storage, hardware and software write blockers, the boot-up and shutdown processes, live imaging, encryption detection, and duplicate imaging. This course incorporates computer forensic applications that experienced practitioners are currently using in the field.
This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.
This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues.
This course covers the usage and configuration of two tools (Paladin/Autopsy and osTriage) designed to preview a non-mobile digital device and export files of evidentiary value. Day One is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered on. Day Two is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered off.
The "Financial Crime (FC) 201 - Financial Records Investigative Skills" course builds on the concepts introduced in "FC 101 - Financial Investigations Practical Skills" and "FC 105 - Financial Records Examination and Analysis," introducing investigators and prosecutors to emerging issues in financial crime. Topics include understanding money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises.
This course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, available imaging options, accessing locked devices, and the default folder structure. The forensic artifacts covered include device information, call history, voicemail, messages, web browser history, contacts, and photos.
This course builds on the concepts introduced in "Cybercop 101 - Basic Digital Forensic Imaging." It covers the architecture and functionality of the Windows NT File System, the FAT and the ExFAT File System, and related directory entry information for locating files on electronic devices. Topical areas include file headers and file hashing, recovery of deleted files and long file names, and techniques for discovering potential evidence that might otherwise be overlooked. This course incorporates an investigative scenario, providing hands-on experience with examination of hard drive images.