Loading...
HomeMy WebLinkAbout20171772RESOLUTION RE: APPROVE 2017 APPLICATION FOR INTERNET CRIMES AGAINST CHILDREN (ICAC) TASK FORCE GRANT AND AUTHORIZE CHAIR TO SIGN - CITY OF COLORADO SPRINGS POLICE DEPARTMENT WHEREAS, the Board of County Commissioners of Weld County, Colorado, pursuant to Colorado statute and the Weld County Home Rule Charter, is vested with the authority of administering the affairs of Weld County, Colorado, and WHEREAS, the Board has been presented with the 2017 Application for the Internet Crimes Against Children (ICAC) Task Force Grant from the County of Weld, State of Colorado, by and through the Board of County Commissioners of Weld County, on behalf of the Weld County Sheriffs Office, and the Northern Colorado Regional Forensic Laboratory, to the City of Colorado Springs Police Department commencing upon full execution, with further terms and conditions being as stated in said application, and WHEREAS, after review, the Board deems it advisable to approve said application, a copy of which is attached hereto and incorporated herein by reference. NOW, THEREFORE, BE IT RESOLVED by the Board of County Commissioners of Weld County, Colorado, that the 2017 Application for the Internet Crimes Against Children (ICAC) Task Force Grant from the County of Weld, State of Colorado, by and through the Board of County Commissioners of Weld County, on behalf of the Weld County Sheriffs Office, and the Northern Colorado Regional Forensic Laboratory, to the City of Colorado Springs Police Department, be and hereby is, approved. BE IT FURTHER RESOLVED by the Board that the Chair Pro -Tern be, and hereby is, authorized to sign said application. The above and foregoing Resolution was, on motion duly made and seconded, adopted by the following vote on the 12th day of June, A.D., 2017. BOARD OF COUNTY COMMISSIONERS WELD COUNTY, COLORADO ATTEST:Y. C� EXCUSED Julie A. Cozad, Chair Weld County Clerk to the Board EXCUSED BY APP Steve Moreno, Pro -Tern can P. Conway unty Attorney _ �`'�,:f% f ' ! r % LA — Date of signature: C.0,35,1 I arbara Kirkmeyer,JActing Chair/Pro-Tem ect SO CO -C)( ROL.) ok•C T C bC) .7/(I/1 7 2017-1772 SO0038 BOARD OF COUNTY COMMISSIONERS. PASS -AROUND REVIEW/ WORK SESSION REQUEST RE: FY 17 ICAC grant DEPARTMENT: Sheriff's Office: Crime Lab PERSON REQUESTING: Ronald Arndt, Crime Lab Director DATE: 5/31/2017 Brief description of the problem/issue: Weld County Sheriff's office has been provided the opportunity to apply for funds that would allow for training for Daren Ford in the area of Internet Crimes Against Children. Most specifically we are looking for training that will allow us to more effectively examine cell phones for data related to crimes against children. Technology changes are so rapid and by offering training we are able to stay with the perpetrators in their use of mobile devices to exploit children. Daren recently returned from a class and with the training received proceed to examine and obtain data that we had previously not been able to obtain. Training: There is no future cost impact for the training and there is no supplanting of funds with this request. The significance of the training will be in providing a skill set to meet a need within the lab. The lab recent has had several submissions in which we were not able to pull the data from the device because it was damaged. Had we had the tool and training we may have assisted the investigator in obtaining the needed data to help their case investigation. What options exist for the Board? (Include consequences, impacts, costs, etc. of options) Authorize the Weld County Sheriffs Office to submit the grant to Colorado Springs Police Department as the grant manager for ICAC. This request will add no additional cost to the lab, but does offer training to expand our capacity to serve. Not approve the request. This will affect our ability to provide data from phones used in internet crimes against children. Recommendation: Recommend authorization to submit the grant. The submission of the request to Colorado Springs is due June 9th. Sean P. Conway Julie A. Cozad, Chair Mike Freeman Barbara Kirkmeyer Steve Moreno, Pro -Tern Approve Recommendation ctv st: I Schedule Work Session Other/Comments: 2017-1772 RESPONSIBLE PARTIES I HEREBY CERTIFY THAT THE INFORMATION CONTAINED HEREIN IS TRUE AND CORRECT TO THE BEST OF MY KNOWLEDGE AND BELIEF. Ronald Arndt Barbara Kirkmeyer, Acting Chair Pro—Tem Board of Weld County Commissioners ICAC POINT OF CONTACT COMMAND LEVEL APPROVAL (PLEASE PRINT) SIGNATURE Barbara Connolly. Controller FINANCIAL OFFICER (PLEASE PRINT) SIGNATURE (PLEASE PRINT) ICAC Point of Contact: The person who has direct responsibility for the implementation of the project. This person should combine knowledge and experience in the project area with ability to administer the project. He/She shares responsibility with the Financial Officer for seeing that all expenditures are within the approved budget. Command Level: A command level officer in the organization with decision making authority to obligate the organization to follow the requirements of federal funding. Financial Officer: The person who is responsible for all financial matters related to the program and who has responsibility for the accounting, management of funds, verification of expenditures, audit information and financial reports. cap/7 777o - PROJECT ABSTRACT A large portion of the sexual exploitative casework we see in the lab involves locked cell phones. These cell phones are critical to the cases we process. Many of these devices can be successfully accessed through advanced methods like Chip Off. This course teaches how to remove the memory chips from the PCB board of a cell phone. There are a couple of methods to successfully complete the process. This course provides training for both methods and a certification at the completion of the process. This course provides training on how to extract data from server based systems. We continue to see a rise in home built networks during search warrant executions on child sexual exploitation cases. This course provides training on how to extract data from servers or more complex networks. Our purpose during search warrants is to collect data in a manner that is acceptable by the court system and this course teaches methods which are forensically sound. With this training I will be able to triage home/business networks for sexually exploitative material and collect the necessary data in an effective manner. STATEMENT OF THE PROBLEM The Weld County Sheriffs Office through staffing the Northern Colorado Regional Forensic Laboratory has, from inception, provided service in the forensic examination of computers, cell phones and other electronic devices. The lab currently has 3 International Association of Computer Investigator specialist (IACIS) certified examiners. Daren Ford is one of those three individuals and he also serves as the Technical Lead in the lab. There is a fourth member of the lab, and all four individuals assigned to the lab are actively involved in working ICAC cases for their agencies and others within the laboratory. The Weld County Sheriff's Office proactively searches for ICAC related cases on the internet. This is done via the undercover internet connection provided at the NCRFL facility. Several cases have been worked and individuals have been investigated for various sexual exploitative offenses. As part of the regional crime lab the Sheriff's Office provides forensic support for cases related to ICAC as well as scene triage for agencies requesting our services. The Sheriff's Office also provides training to our own deputies and individuals attending the Aims Police Officers Academy. The lab's DME analysts have also been trained to do more exhaustive procedures to help extract data from phones: JTAG and chip -off. These technological advances require more extensive training and tools to achieve the desired results and each year there seems to be one more tool that further enhances the capacity of the lab to extract data. The lab has found that these tools, not in use several years ago, have been critical in extracting the necessary data for agencies looking to further their investigation or curtail following an unnecessary lead. The Digital Multimedia Evidence (DME) section has also found that there are tools and training still missing Page 2 of 6 Capacity Enhancement — LIMS and Software Upgrades that would further enhance the capacity of the lab to meet a need within the agencies. Current approaches have been limited because the tools are not in the lab to extract data from damaged electronic devices. Whether intentional or not the lab has found that it is often this data that is crucial to the investigation. Recently the technical leader of the DME section in the lab was made aware of additional tools and techniques that could be applied to help in the removal of the memory chips from the PCB board of a cell phone. We are seeking the training to allow Daren to be effective in using the tools and techniques necessary to remove the memory chips from cell phones. As cell phone technologies expand it is vital that we keep our examiner updated on the best tools and methods to assist in the recovery of essential data. We have for many years also been available to assist local agencies in the execution of search warrants on possible CP perpetrators. Over this time frame the examiners have observed a rise in the use of home built networks. In order to optimize the recovery of critical data at the time of the execution of the search warrant we are seeking the training that will be useful in helping Daren in those specific instances. PROGRAM DESIGN AND IMPLEMENTATION We continue to improve our effectiveness in investigating cases involving ICAC content. This is done through training which has allowed for processing of items which may not have been processed without the training provided by ICAC. A large percentage of the ICAC cases submitted to the Lab for processing involve cell phones. Keeping up with the rapid change in technology has been difficult. We have identified a course which will expand our current capabilities in data extraction from cell phones. Page 3 of 6 Capacity Enhancement — LIMS and Software Upgrades The course we have identified to assist in optimizing or data extraction process is the TEEL Tech Chip -off 2.0. This course will provide the hands on techniques that can be applied in removing memory chips from the cell phone thus allowing for the DME analyst to examine the chip for data and if found to extract that in the process of building a case for the investigator. We have also identified a need to develop the process and procedures to extract data from the home built server networks that we are observing. We have found that this method of triage has expanded the number of individuals we can contact who may be distributing CP and being able to go into their home built systems effectively and efficiently on site will increase the chance of finding the data we are seeking. IACIS has a course we have found that will allow for Daren to step in and expand our capacity to search networks on scene for the presence of CP. CAPABILITIES/COMPETENCIES This funding is part of an overall process to expand and enhance the ICAC related services through this forensic laboratory. The Digital Multimedia Evidence section of the regional lab is now IEC: ISO 17025 accredited and the lab will continue to maintain this high level of quality work. This training will not only assist in providing best practices for the ICAC cases submitted but will also serve to maintain the quality of excellence we seek for Daren and other in the lab. In addition, the Weld County's accounting department has been actively involved in the process of implementing, processing and paying out grants as well as tracking the funds. The department has set up a system of account coding that will assure that the funds used in the grant are tracked. IMPACT/OUTCOMES Increase the technical assistance provided to the Colorado ICAC task force Page 4 of 6 Capacity Enhancement — LIMS and Software Upgrades As noted above the technologies related to the use of electronic media continues to expand as we seek to adapt with an ever expanding growth of and changes by those using electronic devices. These two classes are part of our efforts to provide the necessary tools and skill sets so that we can provide the needed technical support. When requested by an agency to assist in the extraction of data/images the lab desires to be able to provide the tools and knowledge to complete those requests. Also being able to better search home based networks for data that has been carefully buried in designed file structures will allow the lab to better assist those agencies calling on us to locate and identify child pornography. We believe these two classes with expand our capacity to serve the state of Colorado. Increase the ability of conduct proactive investigations In an ancillary fashion the lab will be able to use the knowledge gained to conduct proactive searches. The sooner we provide information back to our investigators carrying out an investigation the more effective they are in working through leads. By helping them focus the attention of their investigations, they can more quickly indentify the perpetrators of a crime and remove them from doing further injury and abuse to children. Again we believe this training will allow us to be more effective in our data extraction, providing the necessary information to those carrying out an investigating. GOALS, OBJECTIVES, AND PERFORMANCE MEASURES — The goal of this project is to improve the effectiveness of our service to its clients. We believe, by applying the training gained from these two classes we can be more effective in identifying sources where the exploitation of children is occurring. The objectives to meet this goal will be Page 5 of 6 Capacity Enhancement — LIMS and Software Upgrades to obtain the necessary training for Daren Ford to make him more effective in his service to Weld County, northern Colorado and the state of Colorado. Objective One: Register Daren Ford for the classes, send him to the classes, have him complete the training and then apply knowledge gained in processing evidence. Page 6 of 6 Capacity Enhancement — LIMS and Software Upgrades BUDGET REQUEST WORKSHEET Purpose: The Budget Request Worksheet may be used as a guide to assist you in the preparation of the budget and narrative. All required information (including the requested narrative) must be provided. A. Travel - Itemize travel expenses of project personnel by purpose (e.g., staff to training). Show the basis of computation (e.g., two people to 3 -day training at $x airfare, $x Lodging, $x subsistence). In training projects, travel and meals for trainees should be listed separately. Show the number of trainees and the unit costs involved. Identify the location of travel, if known. Indicate source of Travel Policies applied, Applicant or Federal Travel Regulations. Purpose of Travel Location Item Computation Cost Attending TEEL Technologies Chip -off 2.0 Forensics training, offered several times in 2017 through out the USA. Rancho Cordova, CA (used for funding calculations) or Largo, FL or Cincinnati, OH Airfare . Airfare ($350) and Baggage Fees ($25 x 2 = $50) = $400/flight x 1 trip _ $400 $ 400.00 Lodging Lodging = 5 nights x $91/night = $595 x 1 trip = $595 $ 595.00 Per Diem Per Diem = $64/ full day. 4 full days x $64 = $256 + 2 travel days at $48 =96.00; $352 per trip x 1 trip = $352 $ 352.00 Ground Transportation Includes such as taxi, shuttles, airport/hotel parking fees, etc $180 per trip xl trip = $180 $ 180.00 Sub -Total $ 1,527.00 Attending IACIS Cyber Incident Forensic Response (CIFR) Training Program, in 2017 (or early 2018 if not offered in 2017). Lake Mary FL Airfare Airfare ($575) and Baggage Fees ($25 x 2 = $50) = $675/flight x 1 trip = $675 $ 675.00 Lodging Lodging = 13 nights x $91/night = $1183 x 1 trip = $1183 $ 1,183.00 Per Diem Per Diem = $51/ full day. 12 full days x $51 = $612 + 2 travel days at $38.25 =74.50; $686.50 per trip x 1 trip = $686.50 $ 686.50 Ground Transportation Includes such as taxi, shuttles, airport/hotel parking fees, etc $280 per trip xl trip = $180 $ 280.00 Sub -Total $ 2,824.50 Travel Sub -Total $ 4,351.50; 2016/17 ICAC Grant Application Colorado ICAC Task Force 1 of 3 B. Equipment: List non -expendable items that are to be purchased. Non -expendable equipment is tangible property having a useful life of more than two years and an acquisition cost of $5,000 or more per unit. Expendable items should be included in the "supplies" category. Explain how the equipment is necessary for the success of the project. Item Computation Cost $ - Equipment Sub -Total $ C. Supplies: List items by type costing less than $5,000, such as books, hand held tape recorders) and show the basis for computation. (Note: Organization's own capitalization policy may be used for items costing less than $5,000). Generally, supplies include any material that are expendable or consumed during the course of the project. Item Computation Cost Supplies Sub -Total $ D. Other Costs: List items (e.g., registrations) Description Computation Cost Attending TEEL Technologies Chip -off 2.0 Forensics training, offered several times in 2017 through out the USA. 1 class X $3950 = $3950 3950 Attending IACIS Cyber Incident Forensic Response (CIFR) Training Program, in 2017 (or early 2018 if not offered in 2017). 1 class X $2795 = 2795 $ 2,795.00 Other Costs Sub -Total $ 6,745.00 Total Request ,096.50' 2016/17 ICAC Grant Application Colorado ICAC Task Force 2 of 3 Budget Summary: When you have completed the budget worksheet, transfer the totals for each category to the spaces below. Budget Category: A. Travel B. Equipment C. Supplies D. Other Amount: $4,351.50 $0.00 $0.00 $6,745.00 TOTAL PROJECT COSTS $11,096.50 2016/17 ICAC Grant Application Colorado ICAC Task Force 3 of 3 Risk Assessment Checklist for CSPD Grant Sub -Recipients GRANT TITLE: Internet Crimes Against Children (ICAC) Task Force GRANT NUMBER: 9109281 AWARD PERIOD: Anticipated dates 7/1/2017 —09/30/2018 AMOUNT OF AWARD: $ 11,096.50 SUB -RECIPIENT'S FISCAL MANAGER: Barbara Connolly, Controller SUB -RECIPIENT'S PROGRAM MANAGER: Ronald Arndt CERTIFICATION OF RESPONSES I hereby certify that the information provided and contained within my responses are true and correct to the best of my knowledge. I further understand that untruthful statements provided or falsified documentation submitted may result in the immediate termination of the above -mentioned grant/contract (Statement of Grant Award) and is punishable by law. Signature of individual ttre responses Barbara Connolly, Controller, Weld County Printed Name and Title of individual certifying the responses Date 6./8/17 Return to: Colorado Springs Police Department ATTN: Tricia Lykes, ICAC Program Coordinator 705 South Nevada Avenue Colorado Springs, CO 80903 lykespa@ci.colospgs.co.us 1 Risk Assessment Checklist for CSPD Grant Sub -Recipients Your agency's responses will be used to determine the level of sub -recipient monitoring CSPD will perform related to your grant award. 1. Does your agency have an EEOP (Equal Employment Opportunity) plan on file? X YES NO 2. Does your agency notify program beneficiaries how to file complaints alleging discrimination with the (federal) Office for Civil Rights? (Notification can be a link on your website, posters, brochures, etc.) Definition of Beneficiaries: All grant funded projects have beneficiaries. For example, if your project was funded for the purchase of equipment, then you need to think about how the equipment benefits your agency personnel and/or the citizens of your local community. X YES NO 3. In the prior two years, has your agency had any findings of discrimination against the grant funded agency issued by a federal or state court, or federal or state administrative agency on the grounds of race, color, religion, national origin, sex, gender identity, or sexual orientation? YES X NO 4. Does your agency have policies that prohibit discrimination against prospective or current employees on the basis of race, color, religion, national origin, sex, gender identity, or sexual orientation? X YES NO 5. Does your agency have a policy that addresses meaningful access to your programs and activities to persons who have limited English proficiency (LEP)? NOTE: For more information go to http://www.ojp.usdoj.gov/about/ocr/lep.htm and www.LEP.gov X YES NO 2 Risk Assessment Checklist for CSPD Grant Sub -Recipients 6. Is your agency presently debarred, suspended, proposed for debarment, declared ineligible, sentenced to a denial of Federal benefits by a State or Federal court, or voluntarily excluded from covered transactions by any Federal department or agency? YES X NO 7. Does your agency use any grant money for lobbying activities? YES X NO 8. Does your agency have written personnel policies and procedures? X YES NO 9. Does your agency abide by the Drug -Free Workplace Act of 1988? X YES NO 10. Does your agency have a written policy that addresses the retention of grant -related records that meets the requirements of funding agencies? X YES NO 11. Will or has your grant funded project use(d) federal funds to reduce state or local funds that are available or have been allocated for the same activity or purpose within your grant funded agency (i.e. will you supplant local funds with these funds)? YES X NO 3 Risk Assessment Checklist for CSPD Grant Sub -Recipients 12. Do you have written Financial Policies and Procedures in place that cover: •Grant accounting to include procedures for Financial Management X YES NO •Cash Management X YES NO • Procurement X YES NO •Travel X YES NO • Inventory Controls X YES NO • Personnel Time and Attendance X YES NO •Separation of Duties X YES NO • Financial Statement Review X YES NO 13. Does your agency have its financial statements audited by an independent audit firm annually? X YES NO If yes, what is the date of the your most recent •A-133 Audit (if required): 12/31/2015 • Financial Audit or Review (please specify): Audit 14. Does your agency have a password -protected financial software system that provides records that can identify the source and application of funds for award -supported activities? X YES NO 15. Does your system allow expenditures to be classified by the broad budget categories listed in the approved budget in your grant? (i.e. Personnel, Supplies and Operating, Travel, Equipment and Professional Services) X YES NO 4 Risk Assessment Checklist for CSPD Grant Sub -Recipients 16. Does your agency reconcile grant information maintained outside your financial system to the agency's financial system at least monthly? X YES NO 17. Does your agency maintain written or digital time sheets, signed or acknowledged by the employee and approved by the supervisor/program director for each employee paid by these grant funds? If written time sheets are not required, please provide description of the time and labor tracking system in place. X YES NO 18. Does your organization track and conduct a biennia physical inventory of grant funded equipment that identifies acquisition date, cost, vendor, property description, source of funding, who holds title, serial It, location, ultimate disposition data, percentage of Federal participation, and use and condition of the property? X YES NO 5 Hello