The criminal justice system in the United States produces vast amounts of data daily. However, these data are rarely used by agencies beyond the tracking of individual cases. Measures for Justice (MFJ) has developed a system that leverages the data already collected by local agencies to assess...
BJA NTTAC's online TTA Catalog is a feature for BJA TTA providers to market upcoming webinars, training opportunities, and technical assistance to the justice community based on their needs and locations. The BJA NTTAC team also shares conferences, trainings, and events from across the field that may be of interest to the justice community.
The “Training Catalog” tab lists webinars, training opportunities, and conferences, both upcoming and completed within the past year, while the “Event Calendar” displays these webinars, trainings, and conferences in a monthly calendar view. The “Upcoming Events” tab only displays upcoming webinars, training opportunities, and conferences. The “TTA Resources” tab displays technical assistance, defined as specialized guidance on a particular topic, tailored to a requesting agency; programs, defined as larger TTA programs offered by BJA TTA providers that have various offerings on a particular topic; and training. Lastly, the “BJA TTA Grantees” tab displays a list of current BJA TTA grantees.
COVID-19 Update: Training opportunities and events listed in the BJA NTTAC TTA Catalog may be directly impacted by COVID-19. The BJA NTTAC team will make every effort to regularly update our site if events are cancelled or postponed. However, we encourage you to also check with the event host to confirm event details. If you have any questions, please do not hesitate to contact BJA NTTAC at BJANTTAC@ojp.usdoj.gov or 1-833-872-5174.
Laundering being missed? Law enforcement and government agencies globally have examples of intelligence failures that could have led to offenders being brought to justice earlier if relevant data had been shared between partners. In this webinar, the presenter will discuss whether there are...
This one-day course, focused on device location information, is for law enforcement investigators and analysts. Class concepts include device identifiers (IDs) in general, advertising IDs in detail, important legal considerations, overall investigative process, and tools available to law...
Join AEquitas, in partnership with the Denver District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices....
Effective insider risk mitigation requires the collection, aggregation, and analysis of data from a multitude of data sources within an organization. In this webinar, the presenter will provide an overview of the current state of the practice in technical detection methods for insider risk...
This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations...
This session will discuss strategies for building, implementing, and operating an effective insider risk management program that is integrated into an organization-wide enterprise risk management strategy. Best practices will be discussed addressing prevention, detection, investigation, and...
Starting with a basic overview of cryptocurrencies, this webinar will focus on some of the more technical aspects of the crypto industry. Additionally, this webinar will look at criminals' abilities to use cryptocurrency, the potential future of crypto, and considerations for how to seize...
Join TA2TA on September 21, 2020 for their free law enforcement training on “Police Report Writing in Tribal Domestic and Sexual Violence Cases.” Dr. James D. Diamond, Dean of Academic Affairs at the National Tribal Trial College, will provide practical tips on documenting witness and suspect...
This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational...
This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development...
Join AEquitas, in partnership with the Denver, Colorado District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices...
This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in...
This one-day course, focused on device location information, is for law enforcement investigators and analysts. Class concepts include device identifiers (IDs) in general, advertising IDs in detail, important legal considerations, overall investigative process, and tools available to law...
Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public, and open source data...
Investigators need to understand the dark side of information sharing and the potential risks it brings to victims, witnesses, and investigators. To avoid potentially dangerous individuals, first responders, security professionals, and intelligence officers choose to keep their families and...
This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover...
This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information...
This VALOR workshop inspires mid-level law enforcement leaders to advance officer safety and wellness strategies within their own agencies.
This one-day workshop is a subject expert-facilitated event that:
- Addresses leadership strategies.
- Examines causes of officer...
This course provides basic to intermediate knowledge of the money laundering process and the commingling of funds, as well as an understanding of the ingenuity criminals use to move and hide funds while concealing their identity. The course instruction will use examples of real-life cases to...
This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and...
This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of...
This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of...
Merriam-Webster is our go-to source for thousands of definitions. Digital Forensics and Incident Response (DFIR) use terms that are not typically defined in mainstream dictionaries. A quick review of any common listserve reveals a lexicon of hundreds, if not thousands, of unique terms and words...
This course provides basic to intermediate knowledge of the money laundering process and the commingling of funds, as well as an understanding of the ingenuity criminals use to move and hide funds while concealing their identity. The course instruction will use examples of real-life cases to...