LEIU/IALEIA 2017 Annual Training Event

A "printer friendly" option of the class presentation is available at the bottom right of this page. 

Below you will find a one page agenda with the full schedule of events such as breaks, lunch breaks, hospitality, etc is in PDF format and is available for download and/or printing. 

>2017LEIU-IALEIAAnnualTrainingEventAgenda<


Our event app will host a full agenda, presentation summaries, instructor bios, maps and so much more.  For those who have registered look out for an email invitation to download the app on April 3, 2017. After that date, new registrants will receive an automated invitation.

Agenda

  • Closed  Closed
  • Optional  Optional
  • Sunday, April 30, 2017
  •  
    8:00 AM  -  5:00 PM
    A Complete (and FREE) Online Investigations System
    ***Due to the sensitive nature of Michael's work and presentations, please refrain from photography or video recording at this event.*** The idea of using virtual operating systems during investigations is nothing new. It was partially discussed at the previous conference. This usually requires working knowledge of the Linux operating system and Python programming language. This is no longer the case. Michael Bazzell's new operating system, titled OSINTux, will be released in time for this one-day class. This very full day will demonstrate downloading, installing, and operating this new system. No technical knowledge is needed. Each application will be fully explained with live examples. The system is not prone to viruses, isolates every investigation, and is completely free. The system resources required are minimal. The utilities included are "point and click" and ready to identify relevant information about the target of your next investigation. Attendees will each receive the following: Lifetime access to the OSINTux operating system and updates A pre-configured web browser with dozens of customized extensions Multiple pre-configured applications ready to automate search queries Pre-compiled license keys installed for immediate use
    Speakers:
     Optional  Closed 
  • Monday, May 1, 2017
  •  
    9:00 AM  -  12:00 PM
    LEIU National Gambling Intelligence Sharing Group
    For LEIU Members or Invited Guests Only
     Optional  Closed 
    9:00 AM  -  11:00 AM
    N-DEx: A Tool for Criminal Justice Investigative Analysis
    During this workshop, criminal justice analysts will be provided an introduction to N-DEx, the powerful investigative tool for sharing incident and case reports; arrest, incarceration, and booking data; and probation and parole data. This free-to-access criminal justice information sharing system, operated by the FBI’s CJIS Division, provides its users with unique features for sifting through volumes of data from disparate databases. The presentation will include a demonstration of system functionalities that are most valuable for realizing linkages between seemingly unrelated data. Emphasis will be placed on the benefits of discovering non-obvious relationships hidden within the data and their impact on making informed decisions, avoiding risks, and gaining investigative advantages. Following the presentation, attendees will have opportunity to log on and explore the system. Due to accessing criminal justice information, THIS WORKSHOP WILL BE RESTRICTED TO LAW ENFORCEMENT PERSONNEL ONLY.
    Speakers:
     Optional  Closed 
    1:00 PM  -  2:00 PM
    Opening Ceremonies
    -Presentation of Colors -International Flag Processional -Welcoming Addresses by local VIPs
     Optional  Closed 
    2:00 PM  -  2:30 PM
    Keynote Address
    Speaker TBA
     Optional  Closed 
    3:00 PM  -  4:30 PM
    Blood Ivory: Combating Transnational Wildlife Crime with Intelligence, Big Data and Analytics (P
    The massive and accelerating slaughter of one of the world’s iconic species, the African elephant, now threatens the very existence of these magnificent animals. Every year, an estimated 35,000 to 50,000 elephants are killed by poachers – often under the direction of sophisticated transnational organized crime networks - for their ivory tusks to feed the growing global market for luxury goods, including ivory carvings and other objects seen as affirmations of personal wealth. The key enablers that foster continued escalation in elephant poaching and ivory trafficking include: the growing involvement of transnational organized crime groups and networks; high levels of corruption across political, judicial and law enforcement sectors; weak governance and poverty across elephant range states; limited and poor quality wildlife, habitat, natural resource management, and law enforcement. To prevent the wholesale slaughter into extinction of the Africa elephant within the next decade mandates that a networked intelligence-led law enforcement strategy at the transnational, regional and national levels be implemented in order to ensure this iconic animal does not disappear from the planet. The three panelists will speak to the growing threat level to the African elephant and other endangered species posed by global criminal networks within the multi-billion dollar illicit wildlife trade and the urgent requirement for effective crime control strategies focusing on intelligence-led enforcement, including responses from The Wildcat Foundation (TWF) funded INTERPOL Project Wisdom; INTERPOL’s Wildlife Crime Working Group (IWCWG) and the International Consortium on Combating Wildlife Crime (ICCWC) comprising CITES, INTERPOL, World Customs Organization, United Nations Office on Drugs and Crime, and The World Bank.
     Optional  Closed 
    4:30 PM  -  5:00 PM
    National Domestic Communications Assistance Center (NDCAC)
    Overview of National Domestic Communications Assistance Center
    Speakers:
     Optional  Closed 
  • Tuesday, May 2, 2017
  •  
    8:00 AM  -  9:30 AM
    Intelligence-led Corrections and Corrections Information as a Tool for Intelligence-led Policing
    Intelligence-led policing is becoming common practice; however, the Intelligence Process is new grounds to the field of Corrections. The Pennsylvania Department of Corrections’ (PA DOC) mission is to “reduce criminal behavior by providing individualized treatment and education to offenders resulting in successful community reintegration through accountability and positive change” (PA DOC). Part of this mission involves ensuring the safety of both employees and inmates within the institutions. The Department proactively maintains safety through violence reduction methods. The PA DOC can strategically reduce violence through intelligence led corrections. This presentation will cover how intelligence-led corrections incorporates traditional corrections work by focusing on criminal intelligence in an effort to direct activity and strategic operations to prevent violence. It will also explain how intelligence-led corrections provides the ability to: • Proactively manage prison populations and address challenges created by the violent gang networks within the prisons. • Monitor and control threats at each institution. • Pursue cases against inmates breaking policies and laws. • Collect, manage, and analyze intelligence. • Disseminate intelligence that is crucial to the safe operations of each prison. This presentation will also examine how corrections agencies can play a key role in intelligence-led policing. Correctional system records, including those in probation and parole, can provide a wealth of information; however, intelligence-led practices are limited in corrections and many times go unnoticed by law enforcement. Corrections agencies can play an integral role in gang-related intelligence and also be used as an investigative tool. Corrections agencies have information which could be valuable in thwarting attacks or solving and preventing crime. By building a partnership, law enforcement and corrections agencies can work together to ensure public safety by reducing crime. While partnering with law enforcement, they provide key information on inmates involved in gang activities. This partnership between corrections and law enforcement is paramount since rivalries, acts of retaliation, and the potential for violence are not limited to only the prison or street setting.
    Speakers:
     Optional  Closed 
    10:00 AM  -  11:30 AM
    Intelligence from the FBI Perspective
    The threats we face today look drastically different from the threats we faced five years ago. National security threats and criminal enterprises that once required organized networks to thrive now exist in disparate forms through online networks. Predicting what the threat picture will look like five years from now is a challenge. That is why it is so critical to constantly improve how we do business to keep pace. We must have a nimble Intelligence Program that can evolve quickly to address threats. As our adversaries become more sophisticated in the ever-changing threat picture, the FBI’s Intelligence Program has increasingly focused on two main areas to deliver additional agility and improve how we address threats: 1) technology and 2) collaboration.
    Speakers:
     Optional  Closed 
    1:00 PM  -  2:30 PM
    Paris Attacks
    On November 13, 2015, Paris, France experienced what they refer to as their 9/11. ISIS terrorists divided into 3 teams of 3 terrorists each to attack 7 venues throughout Paris with suicide vests and gunfire. 130 were killed. 368 were wounded. The week of April 4 to 10, 2016, the Los Angeles Homeland Security Advisory Council funded and coordinated a multi-agency delegation of Los Angeles law enforcement to visit Paris, France for a comprehensive overview of these multiple simultaneous terrorist attacks. The delegation met with key members of Parisian law enforcement and intelligence communities to identify best practices and lessons learned through policy overview and tactical debriefs. The presentation that resulted from this research provides an overview of the timeline and geography for these terror attacks, the background of the terrorists and their mission planning, a discussion of the hostage rescue at the Bataclan, Hostage Rescue assets of France, and Take-Aways / Considerations for U.S. law enforcement. A white-paper was drafted to document the delegation’s findings, as well. The white paper can be viewed on the Homeland Security Advisory Council Los Angeles webpage (www.hsacouncil.org/). It addresses six key aspects: Intelligence, Community Engagement, Investigation, Incident Command, Crisis Communication, Training/Equipment.
     Optional  Closed 
    3:00 PM  -  4:00 PM
    ArcGIS for Intelligence Analysis-- Esri Sponsor Training
    This presentation will discuss how GIS is essential to identifying threats and assessing vulnerabilities to develop mitigation and protection procedures for at risk facilities and at risk communities. At the same time, the presenters will show how GIS is essential for creating a spatial data infrastructure and provide the analytics supporting global security mission objectives – intelligence collection/analysis, incident response, crisis management, and national security. Workflows involving Operations Dashboards, Web App Builder, Story Maps, InSights and Drone2Map will be highlighted.
    Speakers:
     Optional  Closed 
    4:00 PM  -  5:00 PM
    Analytic Support to Intelligence-led Policing: Problem-focused Perspectives (Panel)
    This panel will discuss varied aspects of the forthcoming IALEIA book, Applications in Intelligence-led Policing: Where Theory Meets Reality. The book details varied analytic methods, techniques and tools and how they are used in more than a dozen criminal applications in support of intelligence-led policing. The panelists, Dr. Jonathan Larkin (A View From the United Kingdom), Dr. Gregory Thomas (ILP and Privacy Issues), Andrew Wright (Organized Crime), and editor Marilyn Peterson (White Collar Crime) will provide an overview of the book and give insights into their particular chapters.
     Optional  Closed 
  • Wednesday, May 3, 2017
  •  
    8:00 AM  -  9:30 AM
    ***Beyond the Red Flags The Business Process of Illicit Networks
    In training intelligence, military, law enforcement, even regulatory authorities, all are tasked with the responsibility to identify and react to the presence of illicit activity (not limited to organized crime, terrorism, gangs, smuggling, investigative criminal intelligence, and human trafficking). Much time is spent on identifying the “Red Flags” and mark that activity for analysis and investigation but what we may not spend much time understanding is that many in the underworld know these “Red Flags” as well, and will therefore expend efforts to build illicit networks that will not contain the “Red Flag.” Beyond The Red Flags: The Process of Illicit Networks will present an approach to analysis that employs elements of critical thinking and considerations about the process of business for an investigator or analyst to start look not just for the “Red Flag” but the manner in which the suspect transact business that could indicate illicit network activity. Illicit businesses need to appear legitimate to be successful. The presentation will introduce the concepts of critical thinking to educate students in a planning and execution process to collect the information needed to make informed conclusions and self‑identify the information/evidence gaps necessary to reach supported investigations. The presenter will offer case work from his own experiences as a criminal investigator as well as the lesson learned as an instructor to the intelligence and federal law enforcement, and civilian regulatory government community. He will also present case studies he has made as current examples. *** INDICATES THE TWO WORKSHOPS THAT MUST BE COMPLETED TO RECEIVE THE "ADVANCED ANALYTICAL SKILLS TRAINING" CERTIFICATE, AWARDED JOINTLY BY LEIU & IALEIA. A THIRD WORKSHOP IS ALSO REQUIRED FROM ANY OF THE REMAINING ELECTIVE COURSES.
    Speakers:
     Optional  Closed 
    8:00 AM  -  9:30 AM
    Countering Violent Extremism (CVE) – Trends and Best Practices
    RESTRICTED TO LAW ENFORCEMENT, NATIONAL INTELLIGENCE, & MILITARY PERSONNEL ONLY. Law enforcement is one of the many important partners in CVE in the US. Between 30-40% of disrupted violent extremist plots have been disrupted because a community member informed the police of something suspicious. Building an atmosphere of trust between community members and law enforcement is an important component of CVE. In addition, it’s good to know that community-based CVE efforts could be an important partner for you – for example, community-based CVE efforts to intervene with individuals who are exhibiting signs of violent extremism could apply to a situation where law enforcement action is not appropriate.
    Speakers:
     Optional  Closed 
    8:00 AM  -  9:30 AM
    PowerPoint for Public Safety
    The presentation is designed to help the development, management and presentation of intelligence driven data (briefings, and classroom and online instruction) through a more efficient and proficient application of PowerPoint. Any personnel active in collecting, handling, presenting, or disseminating intelligence related materials (including analysts, support staff, military, LEO's and TLOs ) are welcome to attend the course.
    Speakers:
     Optional  Closed 
    8:00 AM  -  9:30 AM
    The Game Has Changed: 21st Century Regional and National Data Sharing (LexisNexis Sponsor Training)
    Data sharing platforms such as Coplink, NDEX and Linx have been effective tools for analysts to use to see data outside of their jurisdictions for many years. What has been lacking in these tools is the ability to see data outside of Analysts’ immediate area or state and put that information into context. With one search, Accurint® Virtual Crime Center returns public records linked to your agency’s data and law enforcement data nationwide. Connections come together in seconds with automated link analysis making connections that you may miss through manual investigations alone. Accurint® Virtual Crime Center shows the big picture with analytics on nationwide, detailed RMS and other law enforcement data, linked to public records, to help you identify patterns across jurisdictions.
    Speakers:
     Optional  Closed 
    8:00 AM  -  9:30 AM
    The Role of Analytics Within Walmart
    This course will explore how crime and intelligence analysis is being used effectively within the private sector, specifically within the world’s largest retailer. Attendees will get a look into Walmart Global Investigations and learn how this branch is proactively identifying and preventing fraud worldwide through their use of advanced analytics. • The structure and nature of Walmart’s Investigative Analytics and Intelligence program • The Worldwide reach of our analytical mandate • Analytical tools and techniques to which analysts have access • New cutting edge tools and programs we are developing • How Walmart’s analysts support Walmart’s Global Investigators • What do Global Investigators investigate? (Crimes against the Business, Investigative Analytics & Intelligence, Social Media, Insider Threat, Cyber, ecommerce, heath & wellness (drug diversions) • The geographic distribution of our Global Investigators and how agencies can best partner with them. • Available resources for law enforcement and other private sector entities • Success stories of tying in Walmart analytics to high profile cases (kidnappings, homicides, and terror acts)
    Speakers:
     Optional  Closed 
    10:00 AM  -  11:30 AM
    **Real Time Social Media Gathering and Analysis
    This is a 90-minute look at proven methods and tools for real-time social media gathering and analysis. The course is designed to show participants how to support law enforcement missions during planned events and crisis incidents by locating and extracting critical information from open internet sources. The methods and tools in this course can be used within minutes of leaving the classroom. The class will 1. Intro to “Real-Time” Methodology 2. Overview of geolocation based tools 3. Real-Time Twitter Tool Box All links shared during the course will be provided to the class participants as will a version of the Power Point Presentation. ** INDICATES THE TWO WORKSHOPS THAT MUST BE COMPLETED TO RECEIVE THE "FUNDAMENTALS IN CRIMINAL INTELLIGENCE" CERTIFICATE, AWARDED JOINTLY BY LEIU AND IALEIA. A THIRD WORKSHOP IS ALSO REQUIRED FROM ANY OF THE REMAINING ELECTIVE COURSES.
    Speakers:
     Optional  Closed 
    10:00 AM  -  11:30 AM
    Command Center Automation & Lead Management of High Profile Criminal Incidents (ACISS Training)
    Is your agency prepared to handle the hundreds of leads that could be generated daily by a single high profile criminal incident? Examples include child kidnappings, homicides, terrorism events, etc. Leonard W. Leedy III, retired detective, now working with ACISS Systems, will discuss the procedures involved in managing and disseminating incoming information--from receipt of the initial tip, through distribution, analysis, assignment, response, and case management. High profile criminal incidents are those loathsome crimes that generate citizen outrage, fear, and apprehension, and a sense of community vulnerability. These crimes usually receive widespread media attention by their nature or celebrity status. These type of incidents place a high expectation and demand that law enforcement authorities solve these crimes quickly with arrest and prosecution. Typically, law enforcement authorities seek assistance through the media and citizens for information that can generate a tremendous volume of tips. This information needs to be managed and will task agency resources. Attendees will receive a draft of a "Information Management of High Profile Criminal Incidents Action Plan" that could be tailored into an SOP for their agency. The ACISS Tips & Tasks module is the core of the ACISS Counter Terrorism Toolkit which allows agencies to collect Suspicious Activity Reports (SARS). ACISS provides integration with several data sharing initiatives, including a 2-way GJXDM compliant interface with the RISS DES system, support for the National Virtual Pointer System (NVPS), and NIEM and LEXS compliant integration with the Nationwide SAR Initiative (NSI) Shared Space for fully automated electronic SAR submission.
     Optional  Closed 
    10:00 AM  -  11:30 AM
    Counterterrorism for Casinos and the Commercial Sector
    Target-rich venues, such as casinos and malls, continue to be prime targets of terrorism. The threat of such attacks can make civilians and private sector feel powerless. In an effort to combat this, our nation must proactively "Equip, Engage, Edify, and Empower" our communities to “Do Something” when confronted with acts of terror. In order to achieve this, all facets of the private sector and law enforcement must be wholly committed to embracing an intelligence-led policing model and be prepared to play an active role before, during, and after an act of terrorism. Private and public stakeholders will continue to play integral roles in preparing, identifying, and responding to these ongoing threats. What we do collectively today, will define our level of success tomorrow.
     Optional  Closed 
    10:00 AM  -  11:30 AM
    Solving Crime Trends Using Electronic Stakeouts
    For the last five years, the Redlands Police Department (RPD) has been using specialized GPS trackers to solve crime trends and apprehend criminals. RPD’s GPS tracking program is now responsible for 254 arrests ranging for crimes including armed robbery, vehicle burglary, commercial burglary, laptop theft, bike theft, metal theft, wire theft, UPS package theft, credit card skimming, vending machine theft, cell phone tower battery theft, and fire hydrant theft. Basically, whatever crime trend pops up in the community or if there is a need for surveillance, RPD will first evaluate if the high tech ESO GPS tracker can be utilized to apprehend the criminals or provide a 24/7 electronic stakeout. The trackers have proven to be a low cost solution to the high costs associated with surveillance teams. When a GPS device is activated upon motion, the GPS tracker immediately sends alerts to the RPD Dispatch Center which can then track the device on a map over the Internet. The tracking device also sends text alerts to select officer’s cell phones. It takes approximately 20 seconds for Dispatch to receive the first alert. Dispatchers can then tell officers in the field the approximate location of the bicycle, its direction of travel, and speed of travel. It is accurate to within a few feet. The GPS tracker updates its location every 6 to 8 seconds. The devices emit a radio frequency beacon allowing officers to exactly pinpoint the location of the device if it ends up in a residence, hotel room, or a parking garage. The key to RPD’s success is the collaboration between officers and detectives in the field, crime analysts and intelligence officers, and of course the residents and business owners in the community. I recently presented at the LEIU 20/20 conference in Laguna Beach and received positive feedback from attendees and organizers. I propose a 90-120 minute advanced presentation that will include the role intelligence officers and crime analysts play in operating a GPS tracking program. Attendees will be supplied with a Powerpoint and several documents to assist in the creation of their own program. This training session promises to be an exciting, informative learning domain that will enhance the content of training provided by the LEIU and is meant to provide attendees with an immediate and affordable solution to the everyday crime problems police departments across the nation are experiencing.
    Speakers:
     Optional  Closed 
    10:00 AM  -  11:30 AM
    Violent Extremism & Radicalization in the U.S.
    RESTRICTED TO LAW ENFORCEMENT, NATIONAL INTELLIGENCE, & MILITARY PERSONNEL ONLY. This presentation will provide a general overview of what violent extremism is and how violent extremists recruit, use the internet, and exploit vulnerabilities. It will review the similarities between domestic violent extremism movements and international terrorism, as well as explain the differences in treatment and prosecution of both. Lastly, the presentation will explain the process of radicalization to violence and how different individuals become recruited and why by highlighting recent case studies.
    Speakers:
     Optional  Closed 
    1:00 PM  -  2:30 PM
    *Advancing Intelligence and Early Warning Capabilities Within Law Enforcement
    Advancing Intelligence and Early Warning Capabilities within law enforcement requires the use of a proven system of processes for processing intelligence data as well as sharing and receiving intelligence information that can be acted on routinely and quickly. The attacks of 9/11 fundamentally changed the way in which “information and intelligence” needed to be collected and shared across law enforcement and intelligence agencies in order to protect the nation from future terrorist attacks. These attacks necessitated cultural and organizational changes to the very psychology of law enforcement processes for gathering and sharing information and made policing duty counterintuitive because now it required investigating and preempting a national security crime vs a traditional crime. A terrorist attack is a national security crime and this now meant that law enforcement would have to collect and analyze intelligence information before a crime even took place in order to prevent other 9/11 attacks. To advance “Intelligence and Early Warning Capabilities within Law Enforcement” today also requires more than just multi-level interagency partnerships. It requires strong ties between federal, state, and local law enforcement and intelligence agencies deep at the community level, in an effort to build the type of trust that would foster routine and quick exchange of "intelligence" between the community and law enforcement. Taking inventory of challenges and barriers that still exist today, then addressing those that impede progress is perhaps an important first step towards advancing capabilities. The process of intelligence production and its contribution to informing and shaping operations at all phases (pre-incident; trans-incident; and post-incident) is not generally trained or understood. Additionally, there are simple strategies for overcoming inter and intra agency relationship and trust barriers at any level (US or International) that once removed, would advance capabilities across a wide population to produce intelligence and early warning mechanisms for threats - ISIS inspired or directed attacks, cyber-attacks, and state sponsored -that increasingly threaten Western Civilizations. * INDICATES THE TWO WORKSHOPS THAT MUST BE COMPLETED TO RECEIVE THE "FUNDAMENTALS IN CRIMINAL INTELLIGENCE UNIT SUPERVISION/MANAGEMENT" CERTIFICATE, AWARDED JOINTLY BY LEIU & IALEIA. A THIRD WORKSHOP IS ALSO REQUIRED FROM ANY OF THE REMAINING ELECTIVE COURSES.
    Speakers:
     Optional  Closed 
    1:00 PM  -  2:30 PM
    Bitcoin Brief
    This brief will cover bitcoin through first defining bitcoin, addresses, and wallets. The instructor will provide a brief history of bitcoin and how the pseudonymity of both the creator and the users of it add to its popularity and its resiliency. Next the mechanics of how bitcoin works will be described, as well as the creation of the blocks, the accuracy and public nature of the blockchain, and the role of the miners. After establishing a ground level understanding of the bitcoin crypto-currency it is necessary to describe how the Silk Road use of bitcoin permanently impacted the market and perception of it. This marriage is why law enforcement needs to have an understanding of how to analyze and recognize bitcoin. A parallel topic to law enforcement's focus on bitcoin is how FinCEN looked at it and how they were able bring parts of the network into existing regulations. The briefing will also cover signs of recognizing bitcoin in your cases and the initial steps to begin gathering data on the addresses found and some methods of analysis. Following this, the brief will cover how the criticisms of the blockchain protocols for bitcoin drove the development of alternate versions of the original bitcoin blockchain--frequently called altcoins. The conclusion of the briefing will focus on the blockchain as a technological advance and its current impacts as well as its potential. Lastly the potential impact of the blockchain technology to impact global governance based on what Honduras and Estonia have done and global finance based on what SWIFT and Microsoft are working on as well as most of the major banks in the world.
    Speakers:
     Optional  Closed 
    1:00 PM  -  2:30 PM
    International Terrorism from a Minnesota Perspective
    This case study provides an in-depth look into international terrorism and Minnesota. There is a heavy focus on how international terrorism recruitment works in Minnesota, to include propaganda videos specifically targeting Minnesota. Various types of terrorism will also be covered. Finally, there will be a discussion regarding indicators and security recommendations for potentially targeted facilities.
    Speakers:
     Optional  Closed 
    1:00 PM  -  2:30 PM
    Law Enforcement’s Contributions in Geospatial Analysis
    Law enforcement analysis promotes effective policing in areas such as conducting investigations and intelligence operations, planning and managing resources, and deterring criminal activity. Geospatial intelligence leverages geographic information science and technology with intelligence tradecraft to develop intelligence products that support law enforcement and policing. From the beginning of an investigation to its conclusion, geospatial intelligence can aid in determining what is needed in an investigation and where it can be collected. Analytical charts, maps, and reports help guide the operation. Analysis can identify crime trends and provide strategic assessments that assist policy makers in resource allocation and long-term planning. Geospatial intelligence analysis supports the deterrence and prevention of crime through identifying patterns of criminal incidents, forecasting threats to the community, assisting in the effective deployment of patrol resources, and supporting community policing efforts. This presentation challenges students to be more than technicians. Students will appreciate that while geospatial technologies are useful in revealing "what, who, where, and to some extent how" events are taking place, it is less useful in explaining "why" events occur, or what response is most appropriate. While technological advances have led to a flood of geospatially referenced data, to recognize and understand this data still requires human analytical thought.
    Speakers:
     Optional  Closed 
    1:00 PM  -  2:30 PM
    PowerPoint for Public Safety
    The presentation is designed to help the development, management and presentation of intelligence driven data (briefings, and classroom and online instruction) through a more efficient and proficient application of PowerPoint. Any personnel active in collecting, handling, presenting, or disseminating intelligence related materials (including analysts, support staff, military, LEO's and TLOs ) are welcome to attend the course.
    Speakers:
     Optional  Closed 
    3:00 PM  -  5:00 PM
    *** Structured Analytic Techniques
    *** INDICATES THE TWO WORKSHOPS THAT MUST BE COMPLETED TO RECEIVE THE "ADVANCED ANALYTICAL SKILLS TRAINING" CERTIFICATE, AWARDED JOINTLY BY LEIU & IALEIA. A THIRD WORKSHOP IS ALSO REQUIRED FROM ANY OF THE REMAINING ELECTIVE COURSES.
    Speakers:
     Optional  Closed 
    3:00 PM  -  5:00 PM
    *Criminal Intelligence Unit Officer-In-Charge
    This breakout session will involve discussions on the problems and effective solutions in operating an intelligence unit and is focused on the "new" intelligence supervisor. Discussions will include issues relating to establishing a successful intelligence unit. This workshop will utilize attendees’ concerns as a basis for the course content. Its topics range from unit evaluations to file management. This workshop is restricted to unit managers and supervisors only. * INDICATES THE TWO WORKSHOPS THAT MUST BE COMPLETED TO RECEIVE THE "FUNDAMENTALS IN CRIMINAL INTELLIGENCE UNIT SUPERVISION/MANAGEMENT" CERTIFICATE, AWARDED JOINTLY BY LEIU & IALEIA. A THIRD WORKSHOP IS ALSO REQUIRED FROM ANY OF THE REMAINING ELECTIVE COURSES.
     Optional  Closed 
    3:00 PM  -  5:00 PM
    Defining the Continued Increase in US Currency Traveling from U.S. Airports
    Since January 1, 2016, over $79 million has been couriered through Minneapolis-St. Paul International Airport (MSP) destined for Dubai, United Arab Emirates (UAE). This amount is over four times the entire amount that was couriered in 2015. The currency is legally declared through customs and no seizures have occurred. However, current tracking mechanisms are unable to identify the source of the funds or the end destination. The majority of the money being couriered is legally obtained; however, fund sourcing, in part, derives from various forms of fraud. Additionally, past reporting indicates money has benefited terrorist organizations. This presentation will outline how Hawalas function, the current regulation of Hawalas, the current state of Hawala money transfer businesses, banking regulations that impact Hawalas, regional and international impacts to the Hawala industry, and resources for investigating the Hawala industry. All participants will be provided a copy of the presentation with bibliography and regional, national, and international investigative resource.
    Speakers:
     Optional  Closed 
    3:00 PM  -  5:00 PM
    Forensic Analysis of Contact vs Non-contact Child Sex Offender Chats
    According to the FBI, 750,000 adults seek sex with youths daily via the internet (Rodas, 2014), but police arrested only 60,000 internet sex offenders in 2015. Internet crimes against children are a serious problem that is further complicated by the substantial differences among online child sex offenders. Some are contact-driven; they want to meet with the minor in the physical world. Others are online solicitors who are fantasy-driven, uninterested in meeting the minor in the physical world. The problem is that law enforcement is swamped with cases involving solicitations of minors, and there is no cost-effective way of determining whether an offender is a contact sex offender (CSO) vs. noncontact sex offender (non-CSO). To assist law enforcement, the aim was to create a digital forensics tool to automatically analyze online chats for different conversation tactics that distinguish CSOs vs. non-CSOs. Unlike non-CSOs, CSOs need to minors to trust them enough to meet with them offline, and might use suitable conversation tactics to do so (Medaris & Girouard, 2002). The instructors used a linguistics database (Pennebaker, Francis, & Booth, 2001), computer algorithms and statistical discourse analyses (Chiu & Lehmann-Willenbrock, 2016) to examine online chats between minors and arrested CSOs and non-CSOs. In parternship with Ventura County Sheriff’s Department (VCSD, California), they obtained 3,287 anonymized chat messages within 67 chat sessions with youths by three CSOs and two non-CSOs. Their presentation will discuss the results of this exploratory study. Using results like these, they can build a digital forensics tool that extracts chats from suspects’ computer devices, codes each message, and linguistically analyzes sequences of messages to estimate the likelihood that a potential sex offender is a CSO. This tool can potentially help overwhelmed law enforcement by prioritizing cases in which the offender is more likely to be a CSO rather than a non-CSO – enabling them to allocate their limited resources efficiently to tackle sex offenders who are more dangerous. Ultimately, analyzing chats offers the promise of identifying CSOs before the hands-on child sex offense occurs.
     Optional  Closed 
    3:00 PM  -  5:00 PM
    The TEVUS Portal: A Practical Tool to Examine Terrorism and Extremist Violence in the United States
    The Terrorism and Extremist Violence in the United States (TEVUS) Portal is a free, public-facing online interface and visualization tool that compiles behavioral, geographic, and temporal characteristics of extremist violence in the United States dating back to 1970. Through the portal, users have access to the underlying TEVUS Database, an open-source database that holds a wealth of information on terrorism and extremist crime. Users are able to build customized search queries that allow exploration of data locally, regionally or nationally and over time. When used properly, the TEVUS Portal is a powerful tool that helps practitioners make informed, data-driven decisions while providing valuable historical context that aids in terrorism threat assessment. This 90-minute session will introduce participants to the National Consortium for the Study of Terrorism and Responses to Terrorism (START), the TEVUS database, and the TEVUS Portal. Practical instruction on how to navigate the portal and build search queries will be provided. Participants will take part in a guided discussion on the everyday uses of TEVUS within their own contexts. At the conclusion of the training event, participants will be able to identify how to access the TEVUS Portal, navigate the four panels, and build customized search queries.
    Speakers:
     Optional  Closed 
  • Thursday, May 4, 2017
  •  
    8:00 AM  -  9:30 AM
    ***Beyond the Red Flags The Business Process of Illicit Networks
    In training intelligence, military, law enforcement, even regulatory authorities, all are tasked with the responsibility to identify and react to the presence of illicit activity (not limited to organized crime, terrorism, gangs, smuggling, investigative criminal intelligence, and human trafficking). Much time is spent on identifying the “Red Flags” and mark that activity for analysis and investigation but what we may not spend much time understanding is that many in the underworld know these “Red Flags” as well, and will therefore expend efforts to build illicit networks that will not contain the “Red Flag.” Beyond The Red Flags: The Process of Illicit Networks will present an approach to analysis that employs elements of critical thinking and considerations about the process of business for an investigator or analyst to start look not just for the “Red Flag” but the manner in which the suspect transact business that could indicate illicit network activity. Illicit businesses need to appear legitimate to be successful. The presentation will introduce the concepts of critical thinking to educate students in a planning and execution process to collect the information needed to make informed conclusions and self‑identify the information/evidence gaps necessary to reach supported investigations. The presenter will offer case work from his own experiences as a criminal investigator as well as the lesson learned as an instructor to the intelligence and federal law enforcement, and civilian regulatory government community. He will also present case studies he has made as current examples. *** INDICATES THE TWO WORKSHOPS THAT MUST BE COMPLETED TO RECEIVE THE "ADVANCED ANALYTICAL SKILLS TRAINING" CERTIFICATE, AWARDED JOINTLY BY LEIU & IALEIA. A THIRD WORKSHOP IS ALSO REQUIRED FROM ANY OF THE REMAINING ELECTIVE COURSES.
    Speakers:
     Optional  Closed 
    8:00 AM  -  9:30 AM
    **Excel for Law Enforcement
    Excel is one of the most powerful analytical tools available to law enforcement and it is usually sitting right on your computers' desktop. In this class Leonard Leedy will cover basic spreadsheet functions, Pivot Tables, Auto Filters, and numerous "tricks" acquired from his 20+ years of training people how to use this powerful tool. Learn how to break down 10 or 20 thousand records in just 5 mouse clicks and provide meaningful analytical reports to your agency. Are you a more experienced user doing the same thing over and over in Microsoft Excel? Would you like to learn how to automate those repetitive tasks? Mr. Leedy will also cover how to create Macros that automate those tasks, modifying the 'Quick Access Bar' in Excel 2007 & 2010, and creating Custom Menus in Excel 2003 & 2010 (unavailable in 2007 version). ** INDICATES THE TWO WORKSHOPS THAT MUST BE COMPLETED TO RECEIVE THE "FUNDAMENTALS IN CRIMINAL INTELLIGENCE" CERTIFICATE, AWARDED JOINTLY BY LEIU AND IALEIA. A THIRD WORKSHOP IS ALSO REQUIRED FROM ANY OF THE REMAINING ELECTIVE COURSES.
    Speakers:
     Optional  Closed 
    8:00 AM  -  9:30 AM
    Countering Violent Extremism (CVE) – Trends and Best Practices
    RESTRICTED TO LAW ENFORCEMENT, NATIONAL INTELLIGENCE, & MILITARY PERSONNEL ONLY. Law enforcement is one of the many important partners in CVE in the U.S. Between 30-40% of disrupted violent extremist plots have been disrupted because a community member informed the police of something suspicious. Building an atmosphere of trust between community members and law enforcement is an important component of CVE. In addition, it’s good to know that community-based CVE efforts could be an important partner for you – for example, community-based CVE efforts to intervene with individuals who are exhibiting signs of violent extremism could apply to a situation where law enforcement action is not appropriate.
     Optional  Closed 
    8:00 AM  -  9:30 AM
    The Role of Analytics Within Walmart
    This course will explore how crime and intelligence analysis is being used effectively within the private sector, specifically within the world’s largest retailer. Attendees will get a look into Walmart Global Investigations and learn how this branch is proactively identifying and preventing fraud worldwide through their use of advanced analytics. • The structure and nature of Walmart’s Investigative Analytics and Intelligence program • The Worldwide reach of our analytical mandate • Analytical tools and techniques to which analysts have access • New cutting edge tools and programs we are developing • How Walmart’s analysts support Walmart’s Global Investigators • What do Global Investigators investigate? (crimes against the business, investigative analytics & intelligence, social media, insider threat, cyber, e-commerce, and heath & wellness (drug diversions) • The geographic distribution of our Global Investigators and how agencies can best partner with them. • Available resources for law enforcement and other private sector entities • Success stories of tying in Walmart analytics to high profile cases (kidnappings, homicides, and terror acts)
    Speakers:
     Optional  Closed 
    8:00 AM  -  9:30 AM
    Understanding the First Responder Role in Counterterrorism
    This presentation examines the critical and leading role that state, local, tribal and territorial first responders now play in the US counterterrorism mission. This presentation explains how this role has evolved due to the nature of the CT threat currently facing our country and how SLYY first responders are now relied upon more than ever to be the front line in defending the Homeland from terrorist attacks. Historical case studies will be examined which highlight SLTT partners detecting and mitigating attempted terrorist attacks and information on the recongnition and reporting of suspicious activity and ways to access and share CT-related information will be discussed. Ultimately the goal of this presentation is to impart on our SLTT partners the extremely important role they currently fill in the US CT mission and why, and also to provide information to assist our partners in carrying out this mission going forward.
    Speakers:
     Optional  Closed 
    10:00 AM  -  11:30 AM
    **Real Time Social Media Gathering and Analysis
    This is a 90-minute look at proven methods and tools for real-time social media gathering and analysis. The course is designed to show participants how to support law enforcement missions during planned events and crisis incidents by locating and extracting critical information from open internet sources. The methods and tools in this course can be used within minutes of leaving the classroom. The class will 1. Intro to “Real-Time” Methodology 2. Overview of geolocation based tools 3. Real-Time Twitter Tool Box All links shared during the course will be provided to the class participants as will a version of the Power Point Presentation. ** INDICATES THE TWO WORKSHOPS THAT MUST BE COMPLETED TO RECEIVE THE "FUNDAMENTALS IN CRIMINAL INTELLIGENCE" CERTIFICATE, AWARDED JOINTLY BY LEIU AND IALEIA. A THIRD WORKSHOP IS ALSO REQUIRED FROM ANY OF THE REMAINING ELECTIVE COURSES.
    Speakers:
     Optional  Closed 
    10:00 AM  -  11:30 AM
    Beyond Analyst's Notebook-- IBM Sponsor Training
    Ever wonder what's beyond Analyst's Notebook? IBM i2 Enterprise Insight Analysis (EIA) will help you work more intelligently, identify targets faster, and collaborate in ways that were not previously possible.
    Speakers:
     Optional  Closed 
    10:00 AM  -  11:30 AM
    Counterterrorism for Casinos and the Commercial Sector
    Target-rich venues, such as casinos and malls, continue to be prime targets of terrorism. The threat of such attacks can make civilians and private sector feel powerless. In an effort to combat this, our nation must proactively "Equip, Engage, Edify, and Empower" our communities to “Do Something” when confronted with acts of terror. In order to achieve this, all facets of the private sector and law enforcement must be wholly committed to embracing an intelligence-led policing model and be prepared to play an active role before, during, and after an act of terrorism. Private and public stakeholders will continue to play integral roles in preparing, identifying, and responding to these ongoing threats. What we do collectively today, will define our level of success tomorrow.
     Optional  Closed 
    10:00 AM  -  11:30 AM
    Solving Crime Trends Using Electronic Stakeouts
    For the last five years, the Redlands Police Department (RPD) has been using specialized GPS trackers to solve crime trends and apprehend criminals. RPD’s GPS tracking program is now responsible for 254 arrests ranging for crimes including armed robbery, vehicle burglary, commercial burglary, laptop theft, bike theft, metal theft, wire theft, UPS package theft, credit card skimming, vending machine theft, cell phone tower battery theft, and fire hydrant theft. Basically, whatever crime trend pops up in the community or if there is a need for surveillance, RPD will first evaluate if the high tech ESO GPS tracker can be utilized to apprehend the criminals or provide a 24/7 electronic stakeout. The trackers have proven to be a low cost solution to the high costs associated with surveillance teams. When a GPS device is activated upon motion, the GPS tracker immediately sends alerts to the RPD Dispatch Center which can then track the device on a map over the Internet. The tracking device also sends text alerts to select officer’s cell phones. It takes approximately 20 seconds for Dispatch to receive the first alert. Dispatchers can then tell officers in the field the approximate location of the bicycle, its direction of travel, and speed of travel. It is accurate to within a few feet. The GPS tracker updates its location every 6 to 8 seconds. The devices emit a radio frequency beacon allowing officers to exactly pinpoint the location of the device if it ends up in a residence, hotel room, or a parking garage. The key to RPD’s success is the collaboration between officers and detectives in the field, crime analysts and intelligence officers, and of course the residents and business owners in the community. The presentation will include the role intelligence officers and crime analysts play in operating a GPS tracking program. Attendees will be supplied with a PowerPoint and several documents to assist in the creation of their own program. This training session promises to be an exciting, informative learning domain that will enhance the content of training provided by the LEIU and IALEIA and is meant to provide attendees with an immediate and affordable solution to the everyday crime problems police departments across the nation are experiencing.
    Speakers:
     Optional  Closed 
    10:00 AM  -  11:30 AM
    Violent Extremism & Radicalization in the U.S.
    RESTRICTED TO LAW ENFORCEMENT, NATIONAL INTELLIGENCE, & MILITARY PERSONNEL ONLY. This presentation will provide a general overview of what violent extremism is and how violent extremists recruit, use the internet, and exploit vulnerabilities. It will review the similarities between domestic violent extremism movements and international terrorism, as well as explain the differences in treatment and prosecution of both. Lastly, the presentation will explain the process of radicalization to violence and how different individuals become recruited and why by highlighting recent case studies.
    Speakers:
     Optional  Closed 
    1:00 PM  -  2:30 PM
    **Excel for Law Enforcement
    Excel is one of the most powerful analytical tools available to law enforcement and it is usually sitting right on your computers' desktop. In this class Leonard Leedy will cover basic spreadsheet functions, Pivot Tables, Auto Filters, and numerous "tricks" acquired from his 20+ years of training people how to use this powerful tool. Learn how to break down 10 or 20 thousand records in just 5 mouse clicks and provide meaningful analytical reports to your agency. Are you a more experienced user doing the same thing over and over in Microsoft Excel? Would you like to learn how to automate those repetitive tasks? Mr. Leedy will also cover how to create Macros that automate those tasks, modifying the 'Quick Access Bar' in Excel 2007 & 2010, and creating Custom Menus in Excel 2003 & 2010 (unavailable in 2007 version). ** INDICATES THE TWO WORKSHOPS THAT MUST BE COMPLETED TO RECEIVE THE "FUNDAMENTALS IN CRIMINAL INTELLIGENCE" CERTIFICATE, AWARDED JOINTLY BY LEIU AND IALEIA. A THIRD WORKSHOP IS ALSO REQUIRED FROM ANY OF THE REMAINING ELECTIVE COURSES.
    Speakers:
     Optional  Closed 
    1:00 PM  -  2:30 PM
    *Advancing Intelligence and Early Warning Capabilities Within Law Enforcement
    Advancing Intelligence and Early Warning Capabilities within law enforcement requires the use of a proven system of processes for processing intelligence data as well as sharing and receiving intelligence information that can be acted on routinely and quickly. The attacks of 9/11 fundamentally changed the way in which “information and intelligence” needed to be collected and shared across law enforcement and intelligence agencies in order to protect the nation from future terrorist attacks. These attacks necessitated cultural and organizational changes to the very psychology of law enforcement processes for gathering and sharing information and made policing duty counterintuitive because now it required investigating and preempting a national security crime vs a traditional crime. A terrorist attack is a national security crime and this now meant that law enforcement would have to collect and analyze intelligence information before a crime even took place in order to prevent other 9/11 attacks. To advance “Intelligence and Early Warning Capabilities within Law Enforcement” today also requires more than just multi-level interagency partnerships. It requires strong ties between federal, state, and local law enforcement and intelligence agencies deep at the community level, in an effort to build the type of trust that would foster routine and quick exchange of "intelligence" between the community and law enforcement. Taking inventory of challenges and barriers that still exist today, then addressing those that impede progress is perhaps an important first step towards advancing capabilities. The process of intelligence production and its contribution to informing and shaping operations at all phases (pre-incident; trans-incident; and post-incident) is not generally trained or understood. Additionally, there are simple strategies for overcoming inter and intra agency relationship and trust barriers at any level (US or International) that once removed, would advance capabilities across a wide population to produce intelligence and early warning mechanisms for threats - ISIS inspired or directed attacks, cyber-attacks, and state sponsored -that increasingly threaten Western Civilizations. * INDICATES THE TWO WORKSHOPS THAT MUST BE COMPLETED TO RECEIVE THE "FUNDAMENTALS IN CRIMINAL INTELLIGENCE UNIT SUPERVISION/MANAGEMENT" CERTIFICATE, AWARDED JOINTLY BY LEIU & IALEIA. A THIRD WORKSHOP IS ALSO REQUIRED FROM ANY OF THE REMAINING ELECTIVE COURSES.
    Speakers:
     Optional  Closed 
    1:00 PM  -  2:30 PM
    Bitcoin Brief
    This brief will cover bitcoin through first defining bitcoin, addresses, and wallets. The instructor will provide a brief history of bitcoin and how the pseudonymity of both the creator and the users of it add to its popularity and its resiliency. Next the mechanics of how bitcoin works will be described, as well as the creation of the blocks, the accuracy and public nature of the blockchain, and the role of the miners. After establishing a ground level understanding of the bitcoin crypto-currency it is necessary to describe how the Silk Road use of bitcoin permanently impacted the market and perception of it. This marriage is why law enforcement needs to have an understanding of how to analyze and recognize bitcoin. A parallel topic to law enforcement's focus on bitcoin is how FinCEN looked at it and how they were able bring parts of the network into existing regulations. The briefing will also cover signs of recognizing bitcoin in your cases and the initial steps to begin gathering data on the addresses found and some methods of analysis. Following this, the brief will cover how the criticisms of the blockchain protocols for bitcoin drove the development of alternate versions of the original bitcoin blockchain--frequently called altcoins. The conclusion of the briefing will focus on the blockchain as a technological advance and its current impacts as well as its potential. Lastly the potential impact of the blockchain technology to impact global governance based on what Honduras and Estonia have done and global finance based on what SWIFT and Microsoft are working on as well as most of the major banks in the world.
    Speakers:
     Optional  Closed 
    1:00 PM  -  2:30 PM
    International Terrorism from a Minnesota Perspective
    This case study provides an in-depth look into international terrorism and Minnesota. There is a heavy focus on how international terrorism recruitment works in Minnesota, to include propaganda videos specifically targeting Minnesota. Various types of terrorism will also be covered. Finally, there will be a discussion regarding indicators and security recommendations for potentially targeted facilities.
    Speakers:
     Optional  Closed 
    1:00 PM  -  2:30 PM
    Law Enforcement’s Contributions in Geospatial Analysis
    Law enforcement analysis promotes effective policing in areas such as conducting investigations and intelligence operations, planning and managing resources, and deterring criminal activity. Geospatial intelligence leverages geographic information science and technology with intelligence tradecraft to develop intelligence products that support law enforcement and policing. From the beginning of an investigation to its conclusion, geospatial intelligence can aid in determining what is needed in an investigation and where it can be collected. Analytical charts, maps, and reports help guide the operation. Analysis can identify crime trends and provide strategic assessments that assist policy makers in resource allocation and long-term planning. Geospatial intelligence analysis supports the deterrence and prevention of crime through identifying patterns of criminal incidents, forecasting threats to the community, assisting in the effective deployment of patrol resources, and supporting community policing efforts. This presentation challenges students to be more than technicians. Students will appreciate that while geospatial technologies are useful in revealing "what, who, where, and to some extent how" events are taking place, it is less useful in explaining "why" events occur, or what response is most appropriate. While technological advances have led to a flood of geospatially referenced data, to recognize and understand this data still requires human analytical thought.
    Speakers:
     Optional  Closed 
    3:00 PM  -  5:00 PM
    *** Structured Analytic Techniques
    *** INDICATES THE TWO WORKSHOPS THAT MUST BE COMPLETED TO RECEIVE THE "ADVANCED ANALYTICAL SKILLS TRAINING" CERTIFICATE, AWARDED JOINTLY BY LEIU & IALEIA. A THIRD WORKSHOP IS ALSO REQUIRED FROM ANY OF THE REMAINING ELECTIVE COURSES.
    Speakers:
     Optional  Closed 
    3:00 PM  -  5:00 PM
    *Criminal Intelligence Unit Officer-In-Charge
    This breakout session will involve discussions on the problems and effective solutions in operating an intelligence unit and is focused on the "new" intelligence supervisor. Discussions will include issues relating to establishing a successful intelligence unit. This workshop will utilize attendees’ concerns as a basis for the course content. Its topics range from unit evaluations to file management. This workshop is restricted to unit managers and supervisors only. * INDICATES THE TWO WORKSHOPS THAT MUST BE COMPLETED TO RECEIVE THE "FUNDAMENTALS IN CRIMINAL INTELLIGENCE UNIT SUPERVISION/MANAGEMENT" CERTIFICATE, AWARDED JOINTLY BY LEIU & IALEIA. A THIRD WORKSHOP IS ALSO REQUIRED FROM ANY OF THE REMAINING ELECTIVE COURSES.
     Optional  Closed 
    3:00 PM  -  5:00 PM
    Defining the Continued Increase in US Currency Traveling from U.S. Airports
    Since January 1, 2016, over $79 million has been couriered through Minneapolis-St. Paul International Airport (MSP) destined for Dubai, United Arab Emirates (UAE). This amount is over four times the entire amount that was couriered in 2015. The currency is legally declared through customs and no seizures have occurred. However, current tracking mechanisms are unable to identify the source of the funds or the end destination. The majority of the money being couriered is legally obtained; however, fund sourcing, in part, derives from various forms of fraud. Additionally, past reporting indicates money has benefited terrorist organizations. This presentation will outline how Hawalas function, the current regulation of Hawalas, the current state of Hawala money transfer businesses, banking regulations that impact Hawalas, regional and international impacts to the Hawala industry, and resources for investigating the Hawala industry. All participants will be provided a copy of the presentation with bibliography and regional, national, and international investigative resource.
    Speakers:
     Optional  Closed 
    3:00 PM  -  5:00 PM
    Forensic Analysis of Contact vs Non-contact Child Sex Offender Chats
    According to the FBI, 750,000 adults seek sex with youths daily via the internet (Rodas, 2014), but police arrested only 60,000 internet sex offenders in 2015. Internet crimes against children are a serious problem that is further complicated by the substantial differences among online child sex offenders. Some are contact-driven; they want to meet with the minor in the physical world. Others are online solicitors who are fantasy-driven, uninterested in meeting the minor in the physical world. The problem is that law enforcement is swamped with cases involving solicitations of minors, and there is no cost-effective way of determining whether an offender is a contact sex offender (CSO) vs. noncontact sex offender (non-CSO). To assist law enforcement, the aim was to create a digital forensics tool to automatically analyze online chats for different conversation tactics that distinguish CSOs vs. non-CSOs. Unlike non-CSOs, CSOs need to minors to trust them enough to meet with them offline, and might use suitable conversation tactics to do so (Medaris & Girouard, 2002). The instructors used a linguistics database (Pennebaker, Francis, & Booth, 2001), computer algorithms and statistical discourse analyses (Chiu & Lehmann-Willenbrock, 2016) to examine online chats between minors and arrested CSOs and non-CSOs. In parternship with Ventura County Sheriff’s Department (VCSD, California), they obtained 3,287 anonymized chat messages within 67 chat sessions with youths by three CSOs and two non-CSOs. Their presentation will discuss the results of this exploratory study. Using results like these, they can build a digital forensics tool that extracts chats from suspects’ computer devices, codes each message, and linguistically analyzes sequences of messages to estimate the likelihood that a potential sex offender is a CSO. This tool can potentially help overwhelmed law enforcement by prioritizing cases in which the offender is more likely to be a CSO rather than a non-CSO – enabling them to allocate their limited resources efficiently to tackle sex offenders who are more dangerous. Ultimately, analyzing chats offers the promise of identifying CSOs before the hands-on child sex offense occurs.
     Optional  Closed 
    3:00 PM  -  5:00 PM
    The TEVUS Portal: A Practical Tool to Examine Terrorism and Extremist Violence in the United States
    The Terrorism and Extremist Violence in the United States (TEVUS) Portal is a free, public-facing online interface and visualization tool that compiles behavioral, geographic, and temporal characteristics of extremist violence in the United States dating back to 1970. Through the portal, users have access to the underlying TEVUS Database, an open-source database that holds a wealth of information on terrorism and extremist crime. Users are able to build customized search queries that allow exploration of data locally, regionally or nationally and over time. When used properly, the TEVUS Portal is a powerful tool that helps practitioners make informed, data-driven decisions while providing valuable historical context that aids in terrorism threat assessment. This 90-minute session will introduce participants to the National Consortium for the Study of Terrorism and Responses to Terrorism (START), the TEVUS database, and the TEVUS Portal. Practical instruction on how to navigate the portal and build search queries will be provided. Participants will take part in a guided discussion on the everyday uses of TEVUS within their own contexts. At the conclusion of the training event, participants will be able to identify how to access the TEVUS Portal, navigate the four panels, and build customized search queries.
    Speakers:
     Optional  Closed 
  • Friday, May 5, 2017
  •  
    8:00 AM  -  9:30 AM
    Information Sharing Leads to Officer Safety
    This session will provide an overview of NLETS. During the overview the instructor will discuss in basic terms the structure of NLETS and how it is governed. It is especially important to clear up any myths about NLETS and the FBI’s NCIC system. The majority of the session will focus on discussing various transactions that are designed to give law enforcement authorities access to critical criminal justice information provided by ICE, INTERPOL, and the states themselves. It is important that personnel understand what information is actually available to them. The instructor will also cover big-picture initiatives and how they affect the criminal justice community as a whole. For example, CHIEF – Criminal History Information Exchange Format, which is the standardization of criminal history rap sheets; NCIEN – Nationwide Corrections Images and Information Exchange Over Nlets, which is the sharing of correctional photos with law enforcement; and, TIPS – Targeted Interstate Sharing of Photos, which is an initiative that allows for law enforcement entities to attach photos to alerts (i.e., AMBER, BOLO). The session will end with an overview of some basic resources made available to the membership of NLETS.
    Speakers:
     Optional  Closed 
    8:00 AM  -  9:30 AM
    Understanding the First Responder Role in Counterterrorism
    This presentation examines the critical and leading role that state, local, tribal and territorial first responders now play in the US counterterrorism mission. This presentation explains how this role has evolved due to the nature of the CT threat currently facing our country and how SLYY first responders are now relied upon more than ever to be the front line in defending the Homeland from terrorist attacks. Historical case studies will be examined which highlight SLTT partners detecting and mitigating attempted terrorist attacks and information on the recongnition and reporting of suspicious activity and ways to access and share CT-related information will be discussed. Ultimately the goal of this presentation is to impart on our SLTT partners the extremely important role they currently fill in the US CT mission and why, and also to provide information to assist our partners in carrying out this mission going forward.
    Speakers:
     Optional  Closed 
    10:00 AM  -  11:30 AM
    The Felony Lane Gang: Leveraging Facebook and Social Media to Fight Crime
    In 2015, Jeff Hammer presented before your organization on the creation of the Felony Lane Gang Intelligence Task Force. In 2016, Gerard Devine presented on how to close the gap in Cell Phone Data. Now it is time to present how the Felony Lane Gang Task Force Facebook Page (FLGTFFP). https://www.facebook.com/FelonyLaneGang/?fref=ts has leveraged the power of Facebook and Social Media to help the Task Force and Law Enforcement uncover tips, leads and identify individuals that would have taken them months to obtain; with our help, they have identified them within hours or days. The FLGTFFP has also helped the Task Force connect the dots to other criminal activities and cases across the country. Who is The Felony Lane Gang and why is it important to track their activities? The Felony Lane Gang (FLG) is a nationwide organized criminal group based in Fort Lauderdale, Florida (Broward County), with a network of thousands of associates working throughout the country to steal the identity of millions of innocent citizens - their target is always white women. The FLG travels throughout the United States and targets a variety of locations to attack these women: fitness centers, day-care centers, rest stops, ballparks, local and national parks, funeral homes, and recreational facilities. Their method of operation is to either break the window or punch out the lock of a vehicle where a woman has left her purse that contains driver's licenses, military or work identification, checkbook, social security cards, credit and debit cards. As the Administrator for the FLGTFFP, I would like to present to your group how they can set up, utilize and garner the capability of the internet and social media to assist (law enforcement) in their investigations. I would like to present the history of how the Facebook page came about (started by a victim to combat this organized crime organization), who runs it, and what we have accomplished in the last two years. (Recently recognized for our work in the National Sheriff's Association Magazine July 2016 issue). Discuss how we handle the tips and information sent to us, safeguarding and protecting informants while working with law enforcement, and passing on the information to appropriate law enforcement agencies. How we handle and leverage the media to assist in community awareness and help local law enforcement obtain more information in their investigation. In addition, we would like to discuss how we encourage victims to regai
     Optional  Closed 
Top