Webinar – Getting Curious in the Face of Conflict: How to Use Targeted Questions to Control Escalation

Join Justice Clearinghouse, the American Society of Evidence-Based Policing, and the National Sheriffs’ Association for their webinar “Getting Curious in the Face of Conflict: How to Use Targeted Questions to Control Escalation” on Tuesday, June 8 at 1:00–2:15 p.m. ET. This webinar will discuss “a framework for understanding conflict decisionmaking; how curiosity can de-escalate tense encounters; and essential questions for handling conflict effectively.”


Webinar – Grief & Loss in Law Enforcement: Helping Officers and Agencies Recover and Heal

Join the International Association of Chiefs of Police (IACP) for their webinar “Grief & Loss in Law Enforcement: Helping Officers and Agencies Recover and Heal” on Tuesday, June 1 at 3:00 p.m. ET. This webinar will address how to help officers access appropriate resources to process the pain from grief and loss and to help them heal. Presenters will focus on both agency and individual best practices. This webinar is intended for officers, command staff, law enforcement employee assistance program personnel, officer safety and wellness staff, and mental health professionals.

DF100 Basic Digital Forensic Analysis: Seizure (Sept. 16, 2021, Virtual)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

FC122 Intellectual Property Theft Training (Sept. 16, 2021, Virtual)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (Virtual, Sept. 20–22, 2021)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (Sept. 21–24, 2021)

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

FC105 Financial Records Examination and Analysis (Sept. 21–23, 2021, Virtual)

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

IA103 Introduction to Strategic Intelligence Analysis (Aug. 31, 2021, Virtual)

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training while building a framework for more advanced methods such as social network analysis.

CI130 Basic Cyber Investigations: Cellular Records Analysis (Sept. 23–24, 2021, Virtual)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

CI101 Basic Cyber Investigations: Digital Footprints (Sep. 1, 2021, Virtual)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.