When: January 14 – 16, 2025
Where: Las Vegas, NV
In an era where the Internet of Things (IoT) and connected devices are ever-present, their role in gathering intelligence has become critical, especially in law enforcement. These devices are always watching, listening, sensing, creating logs and data that can be pivotal in criminal investigations. They help place suspects at crime scenes, establish timelines, and corroborate or refute statements made by individuals involved.
» Read more
Get more info
When: October 19 – 22, 2024
Where: Boston, MA
The International Association of Chiefs of Police (IACP) Annual Conference and Exposition is the largest and most impactful law enforcement event of the year – more than 16,000 public safety professionals come to learn new techniques, advance their knowledge and careers, and equip their department for ongoing success.
The three tenets of the conference are training, networking, and exhibit hall education.
» Read more
Register Here
The first module of this course covers fundamentals such as recognizing computer components and their functions, accessing computer firmware, and the startup and shutdown processes. The second module covers how a hard disk drive works, how data is converted into digital information, how to calculate the storage capacity of a device, partitioning and how that is used for storage, and how a solid state hard drive functions.
» Read more
Click here for more information
This course provides an introduction to data encryption, covering the purpose of encryption as well as the process of encrypting data, and clarifying the distinctions between encryption and other operations like password protection and encoding. It explores the confusion, diffusion, and secret key encryption methods. Topics include detecting encryption (including recognition of some of the most popular types of encryption software), as well as proper procedures for law enforcement professionals who detect that encryption may be present on a device.
» Read more
Click here for more information
Trust is an essential component for reducing friction between people, organizations, government, and other entities. When trust is high, people are more willing to cooperate, require less assurances for doing so, and are less skeptical of the outcomes. Unfortunately, today’s climate of manipulated media, deep fakes, conflicting sources of information, and sensationalized news has raised many people’s level of skepticism. This makes building and maintaining trust particularly difficult but also incredibly important. This course will provide an overview of factors that contribute to public trust in law enforcement’s use of current and emerging digital technologies.
» Read more
Click here for more information
This course introduces fundamental concepts and terminology related to computer networks. Topics include the importance of computer networks, types of computer networks, common network components, network topologies and media, the OSI and TCP/IP models of communication, and IP addressing. The course also addresses law enforcement’s role in cybersecurity within the current landscape of digital crime.
» Read more
Click here for more information
This course introduces the history of UAVs and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones. Topics include gathering evidence both internal and external to the drone, as well as methods for manually processing flight logs and displaying data in Google Earth.
» Read more
Click here for more information
This course addresses the legal issues surrounding mobile digital devices including cell phones and GPS devices. Topics include seizing and searching mobile devices, the process of obtaining both historical and current location information from cellular service providers, and legal process needed to install a GPS unit on a suspect’s vehicle.
» Read more
Click here for more information
In contrast to the other courses in this series, which deal primarily with the acquisition of digital evidence, this course addresses legal issues that appear relatively late in the investigative and judicial process. Topics include the Fifth Amendment as it applies to passwords and login credentials, determining the ownership of files on digital devices, and the admissibility of online evidence.
» Read more
Click here for more information
This course provides a legal overview of what investigators are and are not permitted to do while conducting online undercover investigations. Topics include terms of service, entrapment and outrageous government misconduct, and wiretapping law as it relates to the recording and documenting of online activities. This course also covers defense strategies commonly used to counter online undercover investigations.
» Read more
Click here for more information