Justice Information Sharing

Submit your nominations for the National Criminal Justice Association’s (NCJA) annual NCJA Outstanding Criminal Justice Programs (OCJP) Awards by 5:00 p.m. ET on Friday, April 21. The awards will be announced at the 2017 National Forum on Criminal Justice, which will honor five outstanding programs that provided effective services to address crime-related issues in their communities and showcase promising practices in criminal justice.

The Bureau of Justice Assistance (BJA) National Training and Technical Assistance Center (NTTAC) is excited to announce the release of the spring 2017 edition of the BJA Training and Technical Assistance (TTA) Provider Directory. This free, easy-to-use, downloadable guide enables BJA staff, BJA TTA providers, and the criminal justice field to access key information on BJA TTA providers with a wealth of criminal justice knowledge and experience.

Tor, Onion Routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators (May 2017)

Many criminal investigators and analysts have heard of VPNs, proxies, and Tor. Most would not feel comfortable conducting an investigation in which one of these tools was deployed. Similarly, both the Deepnet and Darknet are widely discussed, but often not understood. At the same time, criminal investigators and analysts increasingly are required to conduct investigations and collect criminal intelligence information in these spaces or when these tools are being used.

What Investigators Need to Know About Hiding on the Internet

When a person visits a website, blog, or social media platform, information about the person is visible to the site administrator, blogger, or social media company. This information can be used by a criminal investigator or analyst to identify and locate a suspect. It can also be used by a criminal to identify, compromise, and potentially locate an investigator. It is vitally important that investigators and analysts collecting information from the Internet, or communicating in a covert capacity on the Internet, understand these potential investigative leads and possible vulnerabilities.