Training

NLERSP Executive Workshop (Virtual) - National

Lead your agency in roadway safety. Attend this 4-hour workshop with other mid-level and executive-level officers where you will discuss policies, training, and technological innovations that can reduce the risk of officer-involved collisions and struck-by incidents. Training delivery provided virtually nationwide.

NLERSP Executive Workshop (In-Person & Virtual) - Arizona POST (In-Person) / National (Virtual)

Lead your agency in roadway safety. Attend this 4-hour workshop with other mid-level and executive-level officers where you will discuss policies, training, and technological innovations that can reduce the risk of officer-involved collisions and struck-by incidents. Training delivery hosted in-person by Arizona POST, as well is virtually.

Social Media and Online Investigations: Identifying Unknown Individuals

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Your team, your tools, or your client may locate a social media user of interest or concern. Your analysis of the profile may become challenging if the user does not reveal their real identify. The presenter will discuss how to harness the Internet to identify the person or group behind a username. The presentation will include real case examples to demonstrate successful workflows. Learning objectives outline useful steps for identifying who is behind a username, explore case examples to retain those steps, and Introduce future challenges.

Presented by:
Megan Munoz, Director of Education and Knowledge Management, Hetherington Group

Nutrition Status Check: Dietary Supplements for the Criminal Justice Professional

In this webinar, you will learn what dietary supplements are, what supplements can be helpful and which ones are risky or just a waste of money, supplements for different life stages and conditions, and where and how to buy quality supplements.

Presented by:
Rana Parker, MPH, RDN Dietitian Nutritionist, Los Angeles Police Department

ICAC UC Chat Techniques Tips and Tricks

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email.

Undercover chat investigations are used to help intercept child predators from victimizing children in our communities. In this webinar, we will provide an overview of the chat techniques used in child exploitation cases. We will cover different apps that were used and how they assisted in identifying the targets and discuss some of the interview techniques that helped lead to confessions.

*This webinar is not a replacement for the ICAC UC Chat Investigations Course.

Presented by:
Moe McClanahan, High-Tech Crime Specialist, NW3C
Robert Leazenby, High-Tech Crimes Specialist Supervisor, NW3C
Brent Metcalfe, High-Tech Crime Specialist, NW3C

Bitcoin & Cryptocurrency Investigations: Beyond the Basics

Building upon the previous cryptocurrency webinar, "Bitcoin 101: What Are Cryptocurrency and Blockchain All About?" presented by Cobwebs, this webinar will introduce investigative techniques to show how open-source information can be leveraged to attribute identities to wallets and addresses. This webinar will also briefly demonstrate the OSINT and cryptocurrency analysis capabilities of Cobwebs.

Parallel Investigation Techniques

This webinar will show how parallel investigation techniques commence with a review of tactics and strategies that can be introduced in related fraud enquires. The importance protecting the tradecraft deployed and the use of open and closed source research will be discussed to include comparable techniques used in covert sensitive investigations. Money laundering utilizing virtual, or cryptocurrency will be featured to examine current tradecraft. Additionally, this presentation will include discussion of the impact on not-for-profits as well as a look at mortgage fraud. Supporting case studies will highlight the merit of covert/sensitive law enforcement investigative techniques. The presentation will emphasize the link between tax avoidance, money laundering, and terrorist funding. Finally, proper legislation and an effective suspicious transaction reporting process will complete the program.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open-source and commercially-available investigative tools for social engineering, information gathering, and artifacts related to social media; as well as automated utilities to capture information and crawl websites.

*Internet basics. IP address assignment; resolving domains and IP addresses; networking overview.
*Popular sites. Facebook, Twitter, KiK Messenger, Snapchat, Instagram, tumblr, and more.
*The dark web. Surface, deep, and dark web; how data flows through the internet. Who uses the dark web and how?
*Tor. How to access Tor; how Tor traffic works; how a Tor Hidden Service works; installing and configuring the Tor Browser Bundle.

Pages