Training

Ask the Expert: What do Victim/Survivor Service Professionals Need to Know about Corrections

Join the National Criminal Justice Training Center of Fox Valley Technical College for their webinar “Ask the Expert Series: What do Victim/Survivor Service Professionals Need to Know about Corrections” on March 16, 2021 at 2:00–3:00 p.m. ET. The presenters will give a brief overview at the start of the 60-minute session and then open it for a question and answer session with subject matter experts, practitioners in the field, and other attendees.

Public Safety and Public Health Partnerships to Address Stimulants

Join the Bureau of Justice Assistance, RTI, and the Police Executive Research Forum for their two-day virtual event “Public Safety and Public Health Partnerships to Address Stimulants” on March 11–12, 2021 at 12:00–4:30 p.m. ET each day. The schedule will include a discussion on “The Scope and Science of an Epidemic,” three panels titled “Police-led Initiatives,” “Policy Efforts,” and “Community Relations,” and moderated Q&A each day.

Second Look=Second Chance: The Case for Reconsidering Lengthy & Other Extreme Sentences

Join the National Association of Criminal Defense Lawyers (NACDL) for their webinar “Second Look=Second Chance: The Case for Reconsidering Lengthy & Other Extreme Sentences” on March 11, 2021, 2:00–3:00 p.m. ET. This webinar will feature a discussion on “Second Look Sentencing,” an emerging legislative trend addressing mass incarceration. It seeks to reduce the number of people serving excessive sentences by reevaluating sentencing after an individual has served for a certain amount of time.

Wellness Program Implementation Series (Part 2): Introduction to your Options and Assessing your Team's Needs

Join the Office of Juvenile Justice and Delinquency Prevention (OJJDP) for their webinar “Wellness Program Implementation Series (Part 2): Introduction to your Options and Assessing your Team’s Needs” on Wednesday, March 10, 2021 at 3:00–4:30 p.m. ET. This webinar is part two of the six-part series focused on how to implement a wellness program at your agency.

Webinar: Mobile Device Vulnerability Discovery and Exploit Development: A Primer

Mobile device forensics often takes center stage during investigations and criminal intelligence operations involving digital devices. The capability of these devices is nearly as impressive as the quantity of them. However, recently the burden on examiners is increasing due to lack of lawful access and the need for examiners to rely more heavily on lesser amounts of data available for analysis. This webinar directly answers two of the underlying questions at the forefront of many discussions:

  1. Why are we unable to gain lawful access to locked devices as we once were?
  2. Why do our tools seem to support fewer devices, yet cost more?

Mobile device forensics often takes center stage during investigations and criminal intelligence operations involving digital devices. The capability of these devices is nearly as impressive as the quantity of them. However, recently the burden on examiners is increasing due to lack of lawful access and the need for examiners to rely more heavily on lesser amounts of data available for analysis. This webinar directly answers two of the underlying questions at the forefront of many discussions:

  1. Why are we unable to gain lawful access to locked devices as we once were?
  2. Why do our tools seem to support fewer devices, yet cost more?

This webinar will focus on the process of mobile device vulnerability discovery and research with special attention given to threat modeling and the specific use of lawful access in a global market. Presenters will highlight examples of publicly disclosed mobile device vulnerabilities and provide them to participants for further reading. Vulnerability discovery, however, is only half of the equation. An exploit needs to be developed to leverage the discovered vulnerability. Presenters will explain a holistic approach to mobile device exploit development and will show participants examples of public exploits for mobile devices and connections to capabilities they may already be familiar with.

Webinar: A Money Laundering Primer

Money laundering is an integral part of many, if not most, of crime and terror finance. From local crime and tax avoidance to transnational networks, the source of money will be masked to conceal the source and at the same time serve to make the money usable in the legitimate worlds of business and finance. This requires the professionals involved to exercise expertise, business acumen, and power influence. This webinar will walk through the basic elements of the money laundering process, describe the phases of money laundering, define money laundering, describe the element of a money laundering network, outline areas particularly vulnerable to money laundering, discuss case studies of different types of money laundering, and discuss possible detection/identification of money laundering activities.

FC201 Financial Records Investigative Skills (May 5–7, 2021, Virtual)

This course builds on the concepts introduced in "Financial Crime (FC) 101 - Financial Investigations Practical Skills" and "FC 105 - Financial Records Examination and Analysis," introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering, analyzing large financial datasets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises. Students conduct a mock investigation that includes interviews, data analysis, and the examination of various documents.

FC122 Intellectual Property Theft Training (May 21, 2021, Virtual)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

Pages