Skip to main content

Tribal Justice Agencies

Questions?

CI130 Basic Cyber Investigations: Cellular Records Analysis (Jan. 19, 2021, Virtual)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

CI101 Basic Cyber Investigations: Digital Footprints (Jan. 13, 2021, Virtual)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

DF100 Basic Digital Forensic Analysis: Seizure (Jan. 11, 2021, Virtual)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

DF320 Advanced Digital Forensic Analysis: macOS (Jan. 11, 2021, Virtual)

This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage, and use multiple methods to acquire forensically sound images of Apple Macintosh computers. Topics include how the macOS default file system stores data, what happens when files are sent to the macOS Trash, where operating system and application artifacts are stored, and how they can be analyzed. Forensic artifacts covered include password recovery, recently opened files and applications, encryption handling, Mail, Safari, Messages, FaceTime, Photos, Chrome, and Firefox.

IA102 Introduction to Link Analysis (Jan. 7, 2021, Virtual)

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Webinar - Shadow Economy 101

Communities are under siege by crimes for profit. When criminals make money (regardless of method: fraud, human trafficking, drugs, counterfeit or stolen goods, cargo, identity theft, or organized retail theft), they create a shadow economy. This illicit activity competes with and erodes the economic stability of our communities. Unique research into the economic impact of the shadow economy reveals the critical need to support skilled, targeted investigations and effective prosecution. Unfortunately, there are ever-increasing efforts to decriminalize non-violent crimes. These policies are fueling the unprecedented growth of the shadow economy. In order to defend communities from this threat, investigators will require a counter-narrative to illustrate how these policies are generating more crime, propagating violence, and ultimately leading to urban decay.

Webinar - Of Ponzis and Pyramids: Effective Use of a Forensic Auditor in Investment Fraud Investigations

Investment frauds result in the theft of millions of dollars from investors on a yearly basis, many times without the victims knowing that they have been defrauded. Fraudsters may target those of modest means or those with small fortunes, yet their methods are almost always the same. Learning how to identify common types of investment frauds, the effective methods for investigating such schemes, and how to successfully prosecute these crimes is key to protecting unsuspecting investors from these scams. This course will focus on common types of investment frauds, including Ponzi and Pyramid schemes, the effective use of forensic auditors throughout such investigations, and what steps need to be taken by the prosecution team to successfully hold these fraudsters accountable.

Webinar - Cryptocurrency, Compliance, and Financial Crimes

This webinar will discuss cryptocurrency general information for detailed discussion regarding legitimate use versus illegitimate use, common financial crimes, and avoidance of compliance requirements. Further, the webinar will delve into exchanges, transactions, opportunities for data collection and analysis, the value to criminal or compliance investigations, and a review of current case studies.

Subscribe to Tribal Justice Agencies