This course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, available imaging options, accessing locked devices, and the default folder structure. The forensic artifacts covered include device information, call history, voicemail, messages, web browser history, contacts, and photos.
This webinar will provide information about the purpose, scope, and requirements of the Office for Victims of Crime/Bureau of Justice Assistance Enhanced Collaborative Model Anti-Human Trafficking Task Force program and will provide information to applicants on how to apply for funding.
Crime and violence are highly socially connected. As criminal justice practitioners continue to learn about the small percent of the population responsible for the majority of violence, they have to use data analysis tools to focus resources (prevention, intervention, and enforcement) on the small world of people at high risk for being involved in violence, either as offenders or victims. This webinar will examine how social network analysis (SNA) can be applied to criminal justice data to better understand the small world of violence.
There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each other. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And, they increasingly choose to use platforms that make this communication openly available for others to view.
A collaborative project of the National White Collar Crime Center (NW3C) and the Elder Justice Initiative, this webinar is the second in a series of three webinars based on the NW3C Financial Crimes Against Seniors class, and will include:
- Investigating the Crimes,
- Resources for Investigators, and
- Creating an Investigative Plan.
Presented by: Leann D. Pritt, CFE, NW3C
This presentation will address the rise in fraudulent insurance claims being placed by those in the “senior demographic” over the last several decades. The course will cover historical, sociological, and economic reasons for the rise in senior fraudsters. Special considerations for conducting claim investigations with this demographic, strategies for conducting interviews with seniors, and case studies of senior insurance scammers will be reviewed.
Presented by: Christina Fiscella, Investigator, Consultant, & Trainer, FCLS, P.I.
Police officers, crime analysts, and other criminal justice professionals are high-value targets for cyber criminals. Too often, they are also soft targets. This webinar will cover the fundamentals of securing wireless networks both at home and when traveling, understanding and controlling social media footprints, and securing digital devices. Many police officers have a personal and family security plan. In 2018, it is important for those plans to extend to the internet, how you connect to the internet, and the devices that are used to make those connections.
This webinar is intended for LAW ENFORCEMENT PERSONNEL to include investigators, prosecutors, and analysts. Please register using your agency-issued email.
This webinar will provide attendees with a basic knowledge of Neuro Linguistic Programming and other cognitive techniques to aid in interviewing suspects, witnesses, and victims. This webinar will help individuals become more effective communicators and leaders, giving them greater insights into and understandings of how to get people to do what they need.
This webinar will be presented by John Pizzuro, Chief Executive Officer, John Pizzuro Speaking and Consulting.
Attend "Catch Her If You Can:Today's Pink Collar Criminal" and learn:
- What is the difference between white collar crime and pink collar crime?
- Why is pink collar crime growing?
- Who is the “typical” pink collar criminal?
- How to identify “pink flags.”
- Tips and tricks for investigating and interviewing a pink collar criminal.
Presented by: Kelly Paxton Principal, K Paxton, LLC.