HomeMy WebLinkAbout20171772RESOLUTION
RE: APPROVE 2017 APPLICATION FOR INTERNET CRIMES AGAINST CHILDREN
(ICAC) TASK FORCE GRANT AND AUTHORIZE CHAIR TO SIGN - CITY OF
COLORADO SPRINGS POLICE DEPARTMENT
WHEREAS, the Board of County Commissioners of Weld County, Colorado, pursuant to
Colorado statute and the Weld County Home Rule Charter, is vested with the authority of
administering the affairs of Weld County, Colorado, and
WHEREAS, the Board has been presented with the 2017 Application for the Internet
Crimes Against Children (ICAC) Task Force Grant from the County of Weld, State of Colorado,
by and through the Board of County Commissioners of Weld County, on behalf of the Weld County
Sheriffs Office, and the Northern Colorado Regional Forensic Laboratory, to the City of Colorado
Springs Police Department commencing upon full execution, with further terms and conditions
being as stated in said application, and
WHEREAS, after review, the Board deems it advisable to approve said application, a copy
of which is attached hereto and incorporated herein by reference.
NOW, THEREFORE, BE IT RESOLVED by the Board of County Commissioners of Weld
County, Colorado, that the 2017 Application for the Internet Crimes Against Children (ICAC) Task
Force Grant from the County of Weld, State of Colorado, by and through the Board of County
Commissioners of Weld County, on behalf of the Weld County Sheriffs Office, and the Northern
Colorado Regional Forensic Laboratory, to the City of Colorado Springs Police Department, be
and hereby is, approved.
BE IT FURTHER RESOLVED by the Board that the Chair Pro -Tern be, and hereby is,
authorized to sign said application.
The above and foregoing Resolution was, on motion duly made and seconded, adopted
by the following vote on the 12th day of June, A.D., 2017.
BOARD OF COUNTY COMMISSIONERS
WELD COUNTY, COLORADO
ATTEST:Y. C� EXCUSED
Julie A. Cozad, Chair
Weld County Clerk to the Board
EXCUSED
BY
APP
Steve Moreno, Pro -Tern
can P. Conway
unty Attorney _ �`'�,:f% f ' ! r % LA —
Date of signature: C.0,35,1 I
arbara Kirkmeyer,JActing Chair/Pro-Tem
ect SO CO -C)( ROL.)
ok•C T C bC)
.7/(I/1 7
2017-1772
SO0038
BOARD OF COUNTY COMMISSIONERS.
PASS -AROUND REVIEW/ WORK SESSION REQUEST
RE: FY 17 ICAC grant
DEPARTMENT: Sheriff's Office: Crime Lab
PERSON REQUESTING: Ronald Arndt, Crime Lab Director
DATE: 5/31/2017
Brief description of the problem/issue:
Weld County Sheriff's office has been provided the opportunity to apply for funds that would allow for training
for Daren Ford in the area of Internet Crimes Against Children. Most specifically we are looking for training
that will allow us to more effectively examine cell phones for data related to crimes against children.
Technology changes are so rapid and by offering training we are able to stay with the perpetrators in their use of
mobile devices to exploit children. Daren recently returned from a class and with the training received proceed
to examine and obtain data that we had previously not been able to obtain.
Training:
There is no future cost impact for the training and there is no supplanting of funds with this request. The
significance of the training will be in providing a skill set to meet a need within the lab. The lab recent has had
several submissions in which we were not able to pull the data from the device because it was damaged. Had we
had the tool and training we may have assisted the investigator in obtaining the needed data to help their case
investigation.
What options exist for the Board? (Include consequences, impacts, costs, etc. of options)
Authorize the Weld County Sheriffs Office to submit the grant to Colorado Springs Police Department as the
grant manager for ICAC. This request will add no additional cost to the lab, but does offer training to expand
our capacity to serve.
Not approve the request. This will affect our ability to provide data from phones used in internet crimes against
children.
Recommendation:
Recommend authorization to submit the grant. The submission of the request to Colorado Springs is due June
9th.
Sean P. Conway
Julie A. Cozad, Chair
Mike Freeman
Barbara Kirkmeyer
Steve Moreno, Pro -Tern
Approve
Recommendation
ctv
st: I
Schedule
Work Session
Other/Comments:
2017-1772
RESPONSIBLE PARTIES
I HEREBY CERTIFY THAT THE INFORMATION CONTAINED HEREIN IS TRUE AND CORRECT TO THE
BEST OF MY KNOWLEDGE AND BELIEF.
Ronald Arndt Barbara Kirkmeyer, Acting Chair Pro—Tem
Board of Weld County Commissioners
ICAC POINT OF CONTACT COMMAND LEVEL APPROVAL
(PLEASE PRINT)
SIGNATURE
Barbara Connolly. Controller
FINANCIAL OFFICER
(PLEASE PRINT)
SIGNATURE
(PLEASE PRINT)
ICAC Point of Contact: The person who has direct responsibility for the implementation of the project. This person
should combine knowledge and experience in the project area with ability to administer the project. He/She shares
responsibility with the Financial Officer for seeing that all expenditures are within the approved budget.
Command Level: A command level officer in the organization with decision making authority to obligate the
organization to follow the requirements of federal funding.
Financial Officer: The person who is responsible for all financial matters related to the program and who has
responsibility for the accounting, management of funds, verification of expenditures, audit information and financial
reports.
cap/7 777o -
PROJECT ABSTRACT
A large portion of the sexual exploitative casework we see in the lab involves locked cell
phones. These cell phones are critical to the cases we process. Many of these devices can be
successfully accessed through advanced methods like Chip Off. This course teaches how to
remove the memory chips from the PCB board of a cell phone. There are a couple of methods to
successfully complete the process. This course provides training for both methods and a
certification at the completion of the process.
This course provides training on how to extract data from server based systems. We continue to
see a rise in home built networks during search warrant executions on child sexual exploitation
cases. This course provides training on how to extract data from servers or more complex
networks. Our purpose during search warrants is to collect data in a manner that is acceptable by
the court system and this course teaches methods which are forensically sound. With this
training I will be able to triage home/business networks for sexually exploitative material and
collect the necessary data in an effective manner.
STATEMENT OF THE PROBLEM
The Weld County Sheriffs Office through staffing the Northern Colorado Regional Forensic
Laboratory has, from inception, provided service in the forensic examination of computers, cell
phones and other electronic devices. The lab currently has 3 International Association of
Computer Investigator specialist (IACIS) certified examiners. Daren Ford is one of those three
individuals and he also serves as the Technical Lead in the lab. There is a fourth member of the
lab, and all four individuals assigned to the lab are actively involved in working ICAC cases for
their agencies and others within the laboratory.
The Weld County Sheriff's Office proactively searches for ICAC related cases on the internet.
This is done via the undercover internet connection provided at the NCRFL facility. Several
cases have been worked and individuals have been investigated for various sexual exploitative
offenses. As part of the regional crime lab the Sheriff's Office provides forensic support for
cases related to ICAC as well as scene triage for agencies requesting our services. The Sheriff's
Office also provides training to our own deputies and individuals attending the Aims Police
Officers Academy.
The lab's DME analysts have also been trained to do more exhaustive procedures to help extract
data from phones: JTAG and chip -off. These technological advances require more extensive
training and tools to achieve the desired results and each year there seems to be one more tool
that further enhances the capacity of the lab to extract data. The lab has found that these tools,
not in use several years ago, have been critical in extracting the necessary data for agencies
looking to further their investigation or curtail following an unnecessary lead. The Digital
Multimedia Evidence (DME) section has also found that there are tools and training still missing
Page 2 of 6 Capacity Enhancement — LIMS and Software Upgrades
that would further enhance the capacity of the lab to meet a need within the agencies. Current
approaches have been limited because the tools are not in the lab to extract data from damaged
electronic devices. Whether intentional or not the lab has found that it is often this data that is
crucial to the investigation.
Recently the technical leader of the DME section in the lab was made aware of additional tools
and techniques that could be applied to help in the removal of the memory chips from the PCB
board of a cell phone. We are seeking the training to allow Daren to be effective in using the
tools and techniques necessary to remove the memory chips from cell phones. As cell phone
technologies expand it is vital that we keep our examiner updated on the best tools and methods
to assist in the recovery of essential data.
We have for many years also been available to assist local agencies in the execution of search
warrants on possible CP perpetrators. Over this time frame the examiners have observed a rise in
the use of home built networks. In order to optimize the recovery of critical data at the time of
the execution of the search warrant we are seeking the training that will be useful in helping
Daren in those specific instances.
PROGRAM DESIGN AND IMPLEMENTATION
We continue to improve our effectiveness in investigating cases involving ICAC content. This is
done through training which has allowed for processing of items which may not have been
processed without the training provided by ICAC. A large percentage of the ICAC cases
submitted to the Lab for processing involve cell phones. Keeping up with the rapid change in
technology has been difficult. We have identified a course which will expand our current
capabilities in data extraction from cell phones.
Page 3 of 6 Capacity Enhancement — LIMS and Software Upgrades
The course we have identified to assist in optimizing or data extraction process is the TEEL
Tech Chip -off 2.0. This course will provide the hands on techniques that can be applied in
removing memory chips from the cell phone thus allowing for the DME analyst to examine the
chip for data and if found to extract that in the process of building a case for the investigator.
We have also identified a need to develop the process and procedures to extract data from the
home built server networks that we are observing. We have found that this method of triage has
expanded the number of individuals we can contact who may be distributing CP and being able
to go into their home built systems effectively and efficiently on site will increase the chance of
finding the data we are seeking. IACIS has a course we have found that will allow for Daren to
step in and expand our capacity to search networks on scene for the presence of CP.
CAPABILITIES/COMPETENCIES
This funding is part of an overall process to expand and enhance the ICAC related services
through this forensic laboratory. The Digital Multimedia Evidence section of the regional lab is
now IEC: ISO 17025 accredited and the lab will continue to maintain this high level of quality
work. This training will not only assist in providing best practices for the ICAC cases submitted
but will also serve to maintain the quality of excellence we seek for Daren and other in the lab.
In addition, the Weld County's accounting department has been actively involved in the process
of implementing, processing and paying out grants as well as tracking the funds. The department
has set up a system of account coding that will assure that the funds used in the grant are tracked.
IMPACT/OUTCOMES
Increase the technical assistance provided to the Colorado ICAC task force
Page 4 of 6 Capacity Enhancement — LIMS and Software Upgrades
As noted above the technologies related to the use of electronic media continues to expand as we
seek to adapt with an ever expanding growth of and changes by those using electronic devices.
These two classes are part of our efforts to provide the necessary tools and skill sets so that we
can provide the needed technical support. When requested by an agency to assist in the
extraction of data/images the lab desires to be able to provide the tools and knowledge to
complete those requests. Also being able to better search home based networks for data that has
been carefully buried in designed file structures will allow the lab to better assist those agencies
calling on us to locate and identify child pornography. We believe these two classes with expand
our capacity to serve the state of Colorado.
Increase the ability of conduct proactive investigations
In an ancillary fashion the lab will be able to use the knowledge gained to conduct proactive
searches. The sooner we provide information back to our investigators carrying out an
investigation the more effective they are in working through leads. By helping them focus the
attention of their investigations, they can more quickly indentify the perpetrators of a crime and
remove them from doing further injury and abuse to children. Again we believe this training will
allow us to be more effective in our data extraction, providing the necessary information to those
carrying out an investigating.
GOALS, OBJECTIVES, AND PERFORMANCE MEASURES —
The goal of this project is to improve the effectiveness of our service to its clients. We believe,
by applying the training gained from these two classes we can be more effective in identifying
sources where the exploitation of children is occurring. The objectives to meet this goal will be
Page 5 of 6 Capacity Enhancement — LIMS and Software Upgrades
to obtain the necessary training for Daren Ford to make him more effective in his service to
Weld County, northern Colorado and the state of Colorado.
Objective One: Register Daren Ford for the classes, send him to the classes, have him complete
the training and then apply knowledge gained in processing evidence.
Page 6 of 6 Capacity Enhancement — LIMS and Software Upgrades
BUDGET REQUEST WORKSHEET
Purpose: The Budget Request Worksheet may be used as a guide to assist you in the preparation of the budget and narrative. All required
information (including the requested narrative) must be provided.
A. Travel - Itemize travel expenses of project personnel by purpose (e.g., staff to training). Show the basis of computation (e.g., two
people to 3 -day training at $x airfare, $x Lodging, $x subsistence). In training projects, travel and meals for trainees should be listed
separately. Show the number of trainees and the unit costs involved. Identify the location of travel, if known. Indicate source of Travel
Policies applied, Applicant or Federal Travel Regulations.
Purpose of Travel
Location
Item
Computation
Cost
Attending TEEL
Technologies Chip -off 2.0
Forensics training, offered
several times in 2017
through out the USA.
Rancho Cordova, CA (used for
funding calculations) or Largo,
FL or Cincinnati, OH
Airfare .
Airfare ($350) and
Baggage Fees ($25 x 2 =
$50) = $400/flight x 1 trip
_ $400
$ 400.00
Lodging
Lodging = 5 nights x
$91/night = $595 x 1 trip =
$595
$ 595.00
Per Diem
Per Diem = $64/ full day.
4 full days x $64 = $256 +
2 travel days at $48
=96.00; $352 per trip x 1
trip = $352
$ 352.00
Ground Transportation
Includes such as taxi,
shuttles, airport/hotel
parking fees, etc $180 per
trip xl trip = $180
$ 180.00
Sub -Total
$ 1,527.00
Attending IACIS Cyber
Incident Forensic Response
(CIFR) Training Program,
in 2017 (or early 2018 if not
offered in 2017).
Lake Mary FL
Airfare
Airfare ($575) and
Baggage Fees ($25 x 2 =
$50) = $675/flight x 1 trip
= $675
$ 675.00
Lodging
Lodging = 13 nights x
$91/night = $1183 x 1 trip
= $1183
$ 1,183.00
Per Diem
Per Diem = $51/ full day.
12 full days x $51 = $612
+ 2 travel days at $38.25
=74.50; $686.50 per trip x
1 trip = $686.50
$ 686.50
Ground Transportation
Includes such as taxi,
shuttles, airport/hotel
parking fees, etc $280 per
trip xl trip = $180
$ 280.00
Sub -Total
$ 2,824.50
Travel Sub -Total $ 4,351.50;
2016/17 ICAC Grant Application
Colorado ICAC Task Force
1 of 3
B. Equipment: List non -expendable items that are to be purchased. Non -expendable equipment is tangible property having a useful life of
more than two years and an acquisition cost of $5,000 or more per unit. Expendable items should be included in the "supplies" category.
Explain how the equipment is necessary for the success of the project.
Item
Computation
Cost
$ -
Equipment Sub -Total $
C. Supplies: List items by type costing less than $5,000, such as books, hand held tape recorders) and show the basis for computation.
(Note: Organization's own capitalization policy may be used for items costing less than $5,000). Generally, supplies include any material
that are expendable or consumed during the course of the project.
Item
Computation
Cost
Supplies Sub -Total
$
D. Other Costs: List items (e.g., registrations)
Description
Computation
Cost
Attending TEEL Technologies Chip -off 2.0 Forensics training,
offered several times in 2017 through out the USA.
1 class X $3950 =
$3950
3950
Attending IACIS Cyber Incident Forensic Response (CIFR)
Training Program, in 2017 (or early 2018 if not offered in
2017).
1 class X $2795 =
2795
$ 2,795.00
Other Costs Sub -Total
$ 6,745.00
Total Request
,096.50'
2016/17 ICAC Grant Application
Colorado ICAC Task Force
2 of 3
Budget Summary: When you have completed the budget worksheet, transfer the totals for each category to the spaces below.
Budget Category:
A. Travel
B. Equipment
C. Supplies
D. Other
Amount:
$4,351.50
$0.00
$0.00
$6,745.00
TOTAL PROJECT COSTS $11,096.50
2016/17 ICAC Grant Application
Colorado ICAC Task Force 3 of 3
Risk Assessment Checklist for CSPD Grant Sub -Recipients
GRANT TITLE:
Internet Crimes Against Children (ICAC) Task Force
GRANT NUMBER:
9109281
AWARD PERIOD:
Anticipated dates 7/1/2017 —09/30/2018
AMOUNT OF AWARD:
$ 11,096.50
SUB -RECIPIENT'S FISCAL
MANAGER:
Barbara Connolly, Controller
SUB -RECIPIENT'S PROGRAM
MANAGER:
Ronald Arndt
CERTIFICATION OF RESPONSES
I hereby certify that the information provided and contained within my responses are true and correct
to the best of my knowledge. I further understand that untruthful statements provided or falsified
documentation submitted may result in the immediate termination of the above -mentioned
grant/contract (Statement of Grant Award) and is punishable by law.
Signature of individual ttre responses
Barbara Connolly, Controller, Weld County
Printed Name and Title of individual certifying the responses
Date
6./8/17
Return to:
Colorado Springs Police Department
ATTN: Tricia Lykes, ICAC Program Coordinator
705 South Nevada Avenue
Colorado Springs, CO 80903
lykespa@ci.colospgs.co.us
1
Risk Assessment Checklist for CSPD Grant Sub -Recipients
Your agency's responses will be used to determine the level of sub -recipient monitoring CSPD will
perform related to your grant award.
1. Does your agency have an EEOP (Equal Employment Opportunity) plan on file?
X
YES
NO
2. Does your agency notify program beneficiaries how to file complaints alleging discrimination with
the (federal) Office for Civil Rights? (Notification can be a link on your website, posters, brochures,
etc.) Definition of Beneficiaries: All grant funded projects have beneficiaries. For example, if your
project was funded for the purchase of equipment, then you need to think about how the equipment
benefits your agency personnel and/or the citizens of your local community.
X
YES
NO
3. In the prior two years, has your agency had any findings of discrimination against the grant funded
agency issued by a federal or state court, or federal or state administrative agency on the grounds of
race, color, religion, national origin, sex, gender identity, or sexual orientation?
YES
X
NO
4. Does your agency have policies that prohibit discrimination against prospective or current
employees on the basis of race, color, religion, national origin, sex, gender identity, or sexual
orientation?
X
YES
NO
5. Does your agency have a policy that addresses meaningful access to your programs and activities
to persons who have limited English proficiency (LEP)?
NOTE: For more information go to http://www.ojp.usdoj.gov/about/ocr/lep.htm and www.LEP.gov
X
YES
NO
2
Risk Assessment Checklist for CSPD Grant Sub -Recipients
6. Is your agency presently debarred, suspended, proposed for debarment, declared ineligible,
sentenced to a denial of Federal benefits by a State or Federal court, or voluntarily excluded from
covered transactions by any Federal department or agency?
YES
X
NO
7. Does your agency use any grant money for lobbying activities?
YES
X
NO
8. Does your agency have written personnel policies and procedures?
X
YES
NO
9. Does your agency abide by the Drug -Free Workplace Act of 1988?
X
YES
NO
10. Does your agency have a written policy that addresses the retention of grant -related records that
meets the requirements of funding agencies?
X
YES
NO
11. Will or has your grant funded project use(d) federal funds to reduce state or local funds that are
available or have been allocated for the same activity or purpose within your grant funded agency
(i.e. will you supplant local funds with these funds)?
YES
X
NO
3
Risk Assessment Checklist for CSPD Grant Sub -Recipients
12. Do you have written Financial Policies and Procedures in place that cover:
•Grant accounting to include procedures for Financial Management
X
YES
NO
•Cash Management
X
YES
NO
• Procurement
X
YES
NO
•Travel
X
YES
NO
• Inventory Controls
X
YES
NO
• Personnel Time and Attendance
X
YES
NO
•Separation of Duties
X
YES
NO
• Financial Statement Review
X
YES
NO
13. Does your agency have its financial statements audited by an independent audit firm annually?
X
YES
NO
If yes, what is the date of the your most recent
•A-133 Audit (if required): 12/31/2015
• Financial Audit or Review (please specify): Audit
14. Does your agency have a password -protected financial software system that provides records
that can identify the source and application of funds for award -supported activities?
X
YES
NO
15. Does your system allow expenditures to be classified by the broad budget categories listed in the
approved budget in your grant? (i.e. Personnel, Supplies and Operating, Travel, Equipment and
Professional Services)
X
YES
NO
4
Risk Assessment Checklist for CSPD Grant Sub -Recipients
16. Does your agency reconcile grant information maintained outside your financial system to the
agency's financial system at least monthly?
X
YES
NO
17. Does your agency maintain written or digital time sheets, signed or acknowledged by the
employee and approved by the supervisor/program director for each employee paid by these grant
funds? If written time sheets are not required, please provide description of the time and labor
tracking system in place.
X
YES
NO
18. Does your organization track and conduct a biennia physical inventory of grant funded
equipment that identifies acquisition date, cost, vendor, property description, source of funding, who
holds title, serial It, location, ultimate disposition data, percentage of Federal participation, and use
and condition of the property?
X
YES
NO
5
Hello