Training Delivery - Webinar

Jailbreaking to the Roots: a Forensic Approach to iOS and Android Device Rooting

This webinar will provide a forensics examiner's approach and views on jailbreaking modern iOS devices and rooting Android devices to further investigations and verify artifacts. Attendees will be provided other topics and information to provoke thought and inspire new ideas for forensic examinations. Additionally, this webinar will act as a primer to highlight new topics that will be covered in a new class on the horizon from the National White Collar Crime Center (NW3C).

How Virtual Currency is Changing the Way We Investigate

This webinar will discuss the impact that virtual currency has on investigations. Starting with a brief introduction on what virtual currency is, how to get it, and who is using it and why, the presenters will then discuss some high profile cases, such as Silk Road and the recent Alpha Bay and Hansa takedowns.

Murder Book - A Profile of the Los Angeles Police Department's Homicide Case Management Framework Webinar

In the early 1980s, the Los Angeles, California Police Department (LAPD) developed a homicide investigation case file structure, entitled the Murder Book, to bring organization and standardization to homicide case files. The uniform structure of the Murder Book allows anyone involved in a homicide investigation, including detectives, supervisors, and prosecutors, to review and locate key investigative reports, photos, and other materials in a standardized manner.

Operations Planning and Confidential Source Management (March 2018)

The Bureau of Justice Assistance's Center for Task Force Training Program's "Operations Planning and Confidential Source Management" March 2 webinar will discuss why it is important to assess and manage risk and will explore the unique risks, dynamics, and options involved in field operations. In addition, it will explain how the roles of the task force commander, unit supervisors, and task force members contribute to maintaining the safety and integrity of a successful task force.

Successful Strategies to Reduce Gun Violence Webinar

On February 28, 2018 at 2:00 p.m. ET, the Strategies for Policing Innovation (SPI) program will present a webinar on “Successful Strategies to Reduce Gun Violence.” This webinar will focus on the use of offender-based strategies and crime intelligence to target gun-related violence, highlighting successful SPI sites addressing this issue.

Leveraging Cloud Technology to Address the Opioid Epidemic in your Community: The Opioid Prevention and Intervention Intelligence System

Addressing the opioid epidemic at scale requires the coordination of health and social services professionals, law enforcement, criminal justice, and academic and government policy experts. These coordination efforts will rely on the sharing of precision data to help analyze trends and patterns of local and regional opioid drug abuse. Microsoft has put its Cloud and associated technologies at the ready to support all government jurisdictions as well as health, social services, and law enforcement agencies to combat this health services and social services challenge.

Webinar - Peer Recovery Support Services – Options, Opportunities, and Challenges for Jurisdictions

The Bureau of Justice Assistance (BJA) leadership, in collaboration with the Comprehensive Opioid Abuse Program (COAP) team, invites you to this no-cost webinar on February 27, 2018 at 2:00 p.m. ET to learn how peer recovery support services are helping jurisdictions across the country address the opioid epidemic, bringing help and hope to individuals and families.

Webinar - CTAS FY 2018: Funding Opportunities for Healing to Wellness Courts

This webinar will provide a brief overview of Healing to Wellness Court funding opportunities available within the fiscal year 2018 Coordinated Tribal Assistance Solicitation (CTAS). This webinar focuses primarily on Purpose Areas 3 and 8, which can include funding for adult, family, and juvenile Healing to Wellness Courts. The webinar details the CTAS application process, updates from last year, important considerations for drafting a Wellness Court narrative, general grant writing tips, and available technical assistance.

Cybercrime and Defenses: A 101 Introduction To How It Works (February 2018)

The news seems to be filled with stories of ransomware locking out entire departments from their computers, distributed denial-of-service (DDoS) attacks shutting down websites, and data dumps containing passwords or other sensitive information. Trying to understand these attacks can seem overwhelming, almost like learning a foreign language, but it does not have to.

Pages