This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of...
BJA NTTAC's online TTA Catalog is a feature for BJA TTA providers to market upcoming webinars, training opportunities, and technical assistance to the justice community based on their needs and locations. The BJA NTTAC team also shares conferences, trainings, and events from across the field that may be of interest to the justice community.
The “Training Catalog” tab lists webinars, training opportunities, and conferences, both upcoming and completed within the past year, while the “Event Calendar” displays these webinars, trainings, and conferences in a monthly calendar view. The “Upcoming Events” tab only displays upcoming webinars, training opportunities, and conferences. The “TTA Resources” tab displays technical assistance, defined as specialized guidance on a particular topic, tailored to a requesting agency; programs, defined as larger TTA programs offered by BJA TTA providers that have various offerings on a particular topic; and training. Lastly, the “BJA TTA Grantees” tab displays a list of current BJA TTA grantees.
This course covers basic intelligence writing and briefing principles as well as methods for effective and clear intelligence sharing. Topics covered include creative and critical thinking, critical reading skills, source evaluation, privacy and civil rights, intelligence writing style and...
This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individuals digital footprint, protecting privacy on social media, and the consequences of oversharing personal information...
This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs,...
This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in...
Mobile devices dominate the intake list, and the desks of most digital forensics analyst globally. Devices are becoming more secure, with an increase in security the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly...
This course provides the fundamental knowledge and skills required to acquire forensic backup images of commonly encountered forms of digital evidence (Microsoft Windows based computers and external storage devices) in a forensically sound manner. Presentations and hands-on practical exercises...
This one-day course provides foundational spreadsheeting knowledge and skills to enhance workplace productivity. The course covers basic navigation of Microsoft Excel by combining live demonstrations and hands-on exercises. Work with multiple worksheets within a workbook Hide, unhide, and...
This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of...
This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills,...
This three-day course covers the fundamentals of financial investigations and incorporates some of the more advanced processes that elevate an investigation. During this course, students will learn about investigative processes, practical tools, and sources of information necessary to plan and...
This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating...
In recent years, the digital landscape has provided perpetrators with new tools and avenues to exploit vulnerable individuals for sexual exploitation and human trafficking. Cyber sexual abuse crimes encompass a wide range of activities, including online grooming, non-consensual sharing of...
This course promotes a multi-agency approach to the problem of financial exploitation of senior citizens. Bringing together law enforcement personnel and adult protective services investigators, the course enhances students investigative skills and interviewing techniques while facilitating...
This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations....
This intermediate spreadsheeting course uses Microsoft Excel to assess and organize data in an electronic format. The class is designed for learners who have experience using Excel and who want to increase their spreadsheeting knowledge and skills. Topics include text functions, absolute...
This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed study of the digital...
Often viewed as a nuisance as opposed to a crime, swatting calls have become extremely common over the past decade. Intertwined with the online gaming culture, swatting has become so popular that there are Discord, YouTube, and Telegram channels dedicated to it. Many police departments feel that...
This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of...
This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational...
This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis...
This course builds on the concepts introduced in FC101 (FIPS) and FC105 (FREA), introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of...
This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically-sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover...
During this reporting period, there were three cohort calls for the Targeted Implementation and Planning Support (TIPS) juvenile project sites. Two were hosted by The Center for Children's Law and Policy (CCLP), one in January and one in February. The third was hosted by the PRC itself in June...
Types of support that can be requested include: Accessing a specific course, Agency of facility information correction, Audit information correction, Auditor Field Training Program, Auditor Recertification, Auditor Training, Audits, Completing a specific course, I have a question about...