This online course covers basic information and concepts that serve as an introduction to virtual currencies and their relationship to other types of currency. The course describes different types of virtual currencies and covers the main differences between decentralized and centralized currencies. Focusing on Bitcoin®, students will learn what Bitcoin is, how it is stored, and what are some investigative tips for law enforcement.
» Read more
Click here for more information
This course provides an overview of the two phases of a cell phone investigation: the preservation, extraction, and analysis of data within the phone; and the acquisition and analysis of data external to the phone (call detail records and other information). Students become familiar with several forensic tools currently in use in the field, as well as NW3C’s PerpHound™, a specialized tool that assists in plotting historical cell site locations. Other topics include cell phone components,
» Read more
Click here for more information
This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, opting out of data aggregator sites, and the consequences of oversharing personal information; as well as steps to take after becoming a target of doxing.
» Read more
Click here for more information
This interactive online module provides an overview of the basic concepts behind secure previewing of digital devices. Students become familiar with both onsite and offsite secure previewing, and learn to identify the two states in which a preview can be conducted (live-box and dead-box previewing). At the completion of the course, students will be able to recognize the recommended collection order of volatile data (the “order of volatility”).
» Read more
Click here for more information
On Demand
Duration: 90 Minutes
Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital “footprints” that can help you during your investigations, no matter your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative ways of seeing a crime scene through different technologies. Remember, even though your suspect’s device did not “connect”
» Read more
Click here for more information
On Demand
Duration: 75 Minutes
Join a team of experts from NW3C as they provide thoughtful and detailed answers to the high-tech crime questions you submit.
» Read more
Click here for more information
On Demand
Duration: 70 Minutes
This webinar provides fundamental knowledge about human trafficking including defining the crime, addressing why it occurs and why it is unique, reviewing the relevant human trafficking criminal laws, and providing information on how to identify human trafficking, start an investigation, and prosecute the case.
» Read more
Click here for more information
When: October 17 – 19, 2024
Where: Boston, MA
The 2024 ASCIA Fall Conference will be held in Boston, MA. The specific dates are October 17-19. Our host agency will be the Massachusetts State Police.
The conference is restricted to members, invited guests, and corporate partners.
Email Executive.Director@ascia.org if you desire additional information
» Read more
Click here for more information
MDE is a 20 day course designed to provide hands-on experience with mobile devices. Investigators will gain experience with a wide array of mobile devices such as cell phones, GPS units, and tablets, forensics analysis tools, legal issues, and report generation for law enforcement. The course combines instructor-led discussions and practical exercises to teach methodologies and techniques used during investigations involving digital evidence of mobile devices with traditional investigative techniques.
After completing this course,
» Read more
Click here for more information
The Wi-Fi Tools for Analysis and GEO-Locating (WTAG) training program is designed to review the capability of hidden devices in structures, peer-to-peer hidden communication through use of common devices such as PSP, Nintendo DS, iPhones and geo-location of those Wi-Fi devices. The program will also review real-world circumstance of Wi-Fi being involved in Child Pornography, Terrorism, and Child Exploitation.
» Read more
Click here for more information