Skip to main content

Justice Information Sharing

Learn How to Stay Compliant as a Prison Industry Enhancement Certification Holder

Dec 21, 2021

The Bureau of Justice Assistance released a "Prison Industry Enhancement Certification Program (PIECP) Compliance Guide" this month to offer support to PIECP certification holders. First instituted in 1979, the PIECP encourages state and local governments to create work opportunities in prisons that aim to place justice-involved individuals in real-world environments that encourage meaningful employment opportunities upon release.

Check out these Best Practices for Law Enforcement Collaboration with Crisis Stabilization Units

Dec 10, 2021

This past November, the Council of State Governments Justice Center in collaboration with the National Police Foundation published “Creating Buy-In: Best Practices for Collaborating with Referral Sources for Crisis Stabilization Units.” Crisis stabilization units (CSU) provide law enforcement officers and mobile crisis teams a safe space to bring individuals during a behavioral health crisis. Buy-in from referral sources, particularly law enforcement agencies, is crucial to ensuring that people are suitably connected to the appropriate CSU.

Learn about the Potential Opportunities and Limitations of Rapid Toxicology Screening Tools

Dec 7, 2021

Last month, the National Institute of Justice released a knowledge-sharing brief by the Forensic Technology Center of Excellence on the use of rapid toxicology screening tools in lieu of comprehensive, confirmatory investigations. According to the U.S. Drug Administration, the average turnaround time for traditional toxicology testing can last up to 31 days. However, contingent on case complexities, systemic issues, rising caseloads, and other unforeseen circumstances, delays often occur.

Check out this Analysis of Infant Abduction Trends by the National Center for Missing and Exploited Children

Dec 2, 2021

In September, the Office of Juvenile Justice and Delinquency Prevention released an analysis conducted by the National Center for Missing and Exploited Children’s (NCMEC) Infant Abductions Program. Often, the most challenging task at hand upon the receipt of a missing child report is identifying the key factors surrounding the case. This crucial assessment of the initial facts will determine what actions the responding law enforcement agency will perform.

IA101 Foundations of Intelligence Analysis Training

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included NW3C, Law Enforcement Intelligence Units (LEIU), the International Association of Law Enforcement Intelligence Analysis (IALEIA), and the Regional Information Sharing System (RISS).

*Analysis basics. History and purpose of intelligence analysis. Legal issues and ethics. Sources of information. The intelligence cycle.
*Types of analysis. Crime patterns. Associations. Flow. Communications. Financial analysis.
*Creative and critical thinking. Brainstorming. Mind mapping. Steps to critical thinking.
*Deterring crime. Strategic analysis as a tool for law enforcement personnel.
*Hands-on experience. Work as part of a team to analyze information pertaining to several hypothetical cases.

FC105 Financial Records Examination and Analysis

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

*Introduction to analysis. Best practices. Finding patterns. Indicators of fraud. Presenting your findings.
*Financial records. Bank records. Business documents.
*Financial profiling. Methods of profiling. Reasons to create a profile. Creating a profile.
*Hands-on experience. Work a mock financial case as part of an investigative team.

DF320 Advanced Digital Forensic Analysis: macOS

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes, but is not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open-source and commercially-available investigative tools for social engineering, information gathering, and artifacts related to social media; as well as automated utilities to capture information and crawl websites.

*Internet basics. IP address assignment; resolving domains and IP addresses; networking overview.
*Popular sites. Facebook, Twitter, KiK Messenger, Snapchat, Instagram, tumblr, and more.
*The dark web. Surface, deep, and dark web; how data flows through the internet. Who uses the dark web and how?
*Tor. How to access Tor; how Tor traffic works; how a Tor Hidden Service works; installing and configuring the Tor Browser Bundle.

DF100 Basic Digital Forensic Analysis: Seizure

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

*Prepare. Prepare to respond to an incident or crime scene where digital evidence may be present.
*Identify. Learn tow to identify relevant sources of digital evidence in an ever-evolving landscape.
*Collect. Learn the proper methods of digital evidence collection.
*Preserve. Build upon the three previous principles to ensure valid and legal preservation of digital evidence can occur.

IA102 Introduction to Link Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

Subscribe to Justice Information Sharing