This one-day course, focused on device location information, is for law enforcement investigators and analysts. Class concepts include device identifiers (IDs) in general, advertising IDs in detail, important legal considerations, overall investigative process, and tools available to law...
BJA NTTAC's online TTA Catalog is a feature for BJA TTA providers to market upcoming webinars, training opportunities, and technical assistance to the justice community based on their needs and locations. The BJA NTTAC team also shares conferences, trainings, and events from across the field that may be of interest to the justice community.
The “Training Catalog” tab lists webinars, training opportunities, and conferences, both upcoming and completed within the past year, while the “Event Calendar” displays these webinars, trainings, and conferences in a monthly calendar view. The “Upcoming Events” tab only displays upcoming webinars, training opportunities, and conferences. The “TTA Resources” tab displays technical assistance, defined as specialized guidance on a particular topic, tailored to a requesting agency; programs, defined as larger TTA programs offered by BJA TTA providers that have various offerings on a particular topic; and training. Lastly, the “BJA TTA Grantees” tab displays a list of current BJA TTA grantees.
COVID-19 Update: Training opportunities and events listed in the BJA NTTAC TTA Catalog may be directly impacted by COVID-19. The BJA NTTAC team will make every effort to regularly update our site if events are cancelled or postponed. However, we encourage you to also check with the event host to confirm event details. If you have any questions, please do not hesitate to contact BJA NTTAC at BJANTTAC@ojp.usdoj.gov or 1-833-872-5174.
This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development...
Money laundering is an integral part of many, if not most, of crime and terror finance. From local crime to tax avoidance to transnational networks, the source of money will be masked to conceal the source and at the same time serve to make the money usable in the legitimate worlds of business...
This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and...
This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of...
This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis...
This one-day course, focused on device location information, is for law enforcement investigators and analysts. Class concepts include device identifiers (IDs) in general, advertising IDs in detail, important legal considerations, overall investigative process, and tools available to law...
This course covers basic intelligence writing and briefing principles, as well as methods to facilitate increased intelligence sharing. Topics include creative/critical thinking and critical reading skills, source evaluation, privacy and civil rights, intelligence writing style and structure,...
This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover...
According to the International Monetary Fund, global corruption costs countries trillions in lost revenue, taxation, and infrastructure damage. These losses have a "trickle down" effect on the citizens of affected countries, causing a detriment to health, education, and quality of life. At the...
This is the second of two webinars that will prepare applicants for Bureau of Justice Assistance funding opportunities. Prior to the release of a solicitation, there are a number of steps that applicants can take. In this webinar, attendees will learn what registrations are necessary to apply,...
2020 brought an onslaught of new challenges in the criminal justice world We are all living in unprecedented times and the importance of wellness cannot afford to be overlooked! This webinar will explore the real-life challenges of living in a virtual time and focus on how intentional wellness...
This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and using resources for investigation and community awareness. Detailed examination of...
This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital...
This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills,...
This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations...
This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations...
This is the first of two webinars that will help prospective applicants find funding opportunities that address their needs. In this webinar, attendees will learn the primary initiatives the Bureau of Justice Assistance plans to fund in 2021, eligibility requirements, and estimated funding...
This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information...
This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis...
The Bureau of Indian Affairs (BIA), Office of Justice Services (OJS) issues Special Law Enforcement Commissions (SLECs) to tribal, federal, state, and local full-time certified law enforcement officers who will serve without compensation from the Federal government. This...
This course builds on the concepts introduced in "Financial Crime (FC) 101 - Financial Investigations Practical Skills" and "FC 105 - Financial Records Examination and Analysis," introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering,...
This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and...
This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development...
This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct...