Skip to main content

Justice Information Sharing

Questions?

Webinar: Handling Informants

There are various ways to gain evidence for investigations whether they are proactive or reactive investigations. Informants prove a vital way to obtain evidence and information for your investigations. Handling Informants and their motivations requires a skillset in dealing with them in your investigations. This webinar will go over how to use informants for your investigations, how to document their information, negate defense arguments and be more efficient. We will discuss motivations, history and how to avoid pitfalls and mistakes.

Learn How Emergency First Response Teams Can Better Respond to Community Needs

Supported by the Bureau of Justice Assistance, the Council of State Governments (CSG) Justice Center recently published an article describing the significance of increasing public safety answering point (PSAP) personnel preparedness for crisis team expansions. Crisis teams, such as co-responder teams, homeless outreach teams, mobile crisis units, and opioid response teams, can help jurisdictions better respond to community needs. For PSAP personnel, matching the most appropriate group to the needs of the caller can be critical for the safest outcome.

Webinar: Top Resources for Physical, Financial, and Family Wellness in 2022

Having resources readily available allows you to be successful in wellness! A few of your favorite presenters will give you their top go-to resources on physical, financial, and family wellness. We will round out our discussion by introducing a FREE wellness app that includes all of the resources discussed in the webinar and much, much more. Join us and kick off your 2022 wellness with a bang!

Consider These Five Key Characteristics of Substance Use Intervention Programs

This month, the National Institute of Justice published a report based on a review and rating by CrimeSolutions of multiple meta-analyses. Substance use disorders, which include substance dependence and abuse, have a tremendous impact on individuals, families, and communities. For patients, trauma-informed care offers the opportunity to engage more fully in their health care, develop a trusting relationship with their provider, and improve long-term health outcomes.

Check out this Evaluation of State-Based Human Trafficking Task Forces

This month, the National Institute of Justice issued an evaluation of a limited study on ten state-based task forces using the Enhanced Collaborative Model (ECM) to Combat Human Trafficking launched in 2010. Due to its complex nature, human trafficking crimes are difficult to detect thereby creating significant barriers for disruption. Many jurisdictions also struggle to identify crimes for both sex and labor trafficking because of varied understandings or limited knowledge of the root causes.

Read this Fact Sheet on Programs that Address Hate Crimes

The Bureau of Justice Assistance (BJA) recently developed a comprehensive fact sheet on BJA grant funding resources that address hate crimes, crimes that impact civil rights, and other bias-motivated and hate incidents. The Department of Justice (DOJ) is committed to advancing work that promotes civil rights, increasing access to justice, supporting crime victims, protecting the public from crime and evolving threats, and building trust between law enforcement and the community.

DF101 Basic Digital Forensic Analysis: Windows Acquisition

This course provides the fundamental knowledge and skills required to acquire forensic backup images of commonly encountered forms of digital evidence (Microsoft Windows based computers and external storage devices) in a forensically sound manner. Presentations and hands-on practical exercises cover topics on storage media and how data is stored, the forensic acquisition process, tool validation, hardware and software write blockers, forensic backup image formats, and multiple forensic acquisition methods. Students will use third party tools, both free and commercial, that are currently used by practitioners in the field.

DF330 Advanced Digital Forensic Analysis: iOS & Android

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically-sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, available acquisition options, accessing locked devices, and the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the hunt methodology for analyzing third party applications not supported by commercial forensic tools.

Mobile device hardware fundamentals. How mobile devices work, store data, and interact with a variety of networks.
Device handling. Properly preserving data for imaging and analysis. Identifying potential threats to data integrity.
Device acquisition and security. Acquisition options (physical, logical, device backups). Bypassing passcodes and properly defeating encrypted backups of iOS devices.
Advanced analysis techniques. Mounting images, partitioning scheme and default folder structure, types of artifacts (plists, SQLite databases, etc.).

IA102 Introduction to Link Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

CI240 Intermediate Cyber Investigations: Virtual Currency

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered; and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions; and best practices for seizing and securing cryptocurrency.

*Virtual currency basics. History of money and of virtual currency. Categorizing virtual currency.
*Blockchain. History of the blockchain. Understanding different protocols.
*Cryptocurrencies in detail. Bitcoin, Ethereum, Monero and other privacy coins.
*Investigative techniques. Seizing virtual currency; tracking transactions through the blockchain; documenting investigative results.

Subscribe to Justice Information Sharing