Training

Webinar: The Forest through the Trees: Cutting through Complex Money Laundering Investigations

What do you do when you are confronted with a large-scale financial crime case that has taken place over years? What investigative steps do you take? Where do you begin with the audit?

This webinar looks at complex money laundering audits and investigations to show things you may want to consider in successfully prosecuting these crimes.

Presented by:
John R. Healey, Assistant Attorney General, CECFE
Philip V. Apruzzese, Director, CUFFS Initiative, Assistant Attorney General, CECFE
Meaghan, Scotellaro, Principal Auditor Investigator, NYS Office of the Attorney General
Mark J. Terra, Detective Investigator, NYS Office of the Attorney General

CI130 Basic Cyber Investigations: Cellular Records Analysis

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers; and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of NW3Cs PerpHound tool, which assists in the plotting of call detail record locations.

*Cellular technology. Land-line and cellular networks. Types and generations of cell phones. Cell site design and its implications for law enforcement.
*Analysis of call detail records. Request information from service providers. Convert records into a useful format. *Merge two related spreadsheets. Read and analyze using filters, sorting, and pivot tables. Plot location information.
*Hands-on experience. Hands-on experience with NW3Cs free software tool PerpHound and Microsoft Excel to analyze various types of records that are available from cellular providers.

Webinar: Subpoena Processing at the Big Banks: What You Need to Know

Have you ever wondered what happens when you send a subpoena seeking financial records to one of the large Banks? Do you want to learn how large Banks receive, interpret, fulfill, and deliver subpoena responses? In partnership with the American Bankers Association, this interactive webinar will include panelists from Capital One, Fifth Third Bank, JP Morgan Chase, Key Bank, and US Bank sharing their perspective on third-party subpoena processing as well as industry trends. This is your chance to find out more about the process and learn how these big Banks are implementing technology into the overall subpoena process. Have specific questions? Bring it! After a brief presentation, panelists will hold a Q&A session with the audience.

Webinar: It Will Not Happen to Me: Recognizing the Impacts of Trauma and When to Seek Help

When it is your life, it can be hard to identify that any significant changes are taking place. Other times, you may know things are having an impact on you, but it is unclear when therapy might actually be beneficial. This presentation will cover how traumatic events from the job can have an impact on first responders, how to identify the impacts that the job is having on you, and how to know when it is time to seek help from a professional.

Presented by:
Dr. Rachelle Zemlock, Licensed Clinical Psychologist, First Responder Family Psychology

DF320 Advanced Digital Forensic Analysis: macOS

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes, but is not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

DF330 Advanced Digital Forensic Analysis: iOS & Android

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically-sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, available acquisition options, accessing locked devices, and the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the hunt methodology for analyzing third party applications not supported by commercial forensic tools.

Mobile device hardware fundamentals. How mobile devices work, store data, and interact with a variety of networks.
Device handling. Properly preserving data for imaging and analysis. Identifying potential threats to data integrity.
Device acquisition and security. Acquisition options (physical, logical, device backups). Bypassing passcodes and properly defeating encrypted backups of iOS devices.
Advanced analysis techniques. Mounting images, partitioning scheme and default folder structure, types of artifacts (plists, SQLite databases, etc.).

FC101 Financial Investigations Practical Skills

This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues.

*Emerging issues. Current trends in various types of financial crimes. Recent cases and their implications.
*Financial records. Learn to obtain and manage bank records, including basic spreadsheeting skills.
*Working with data. Extract leads and draw conclusions from bank records and other financial data.
*Hands-on experience. Work a mock financial case as part of an investigative team.

FC105 Financial Records Examination and Analysis

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

*Introduction to analysis. Best practices. Finding patterns. Indicators of fraud. Presenting your findings.
*Financial records. Bank records. Business documents.
*Financial profiling. Methods of profiling. Reasons to create a profile. Creating a profile.
*Hands-on experience. Work a mock financial case as part of an investigative team.

CI103 Basic Cyber Investigations: Advertising Identifiers

This 1 day course is for law enforcement investigators and analysts, where device location information may be of importance. Class concepts include device identifiers IDs in general, advertising IDs in detail, important legal considerations, overall investigative process, and tools available to law enforcement. Students will use commercially available investigative tools for querying databases of Advertising IDs and displaying their recorded broadcast locations.

FC102 Financial Investigations Triage

This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.

Pages