Federal Justice

Cybercrime: From Crime to Courtroom (Aug 2017)

The objective of this 2-day course is to focus on how Internet/cyber/computer technology-based criminal cases - as well as criminal cases reliant upon digital evidence - unfold in a courtroom and why it is vital for investigators, prosecutors, and computer forensic technicians to comprehend these elements throughout the entirety of their investigations and prosecutions. The format is interactive.
Key Learning Points:
* Comprehend the ever-changing online environments where crimes occur and the locations of evidential repositories.

Cybercrime: From Crime to Courtroom (July 2017)

The objective of this 2-day course is to focus on how Internet/cyber/computer technology-based criminal cases - as well as criminal cases reliant upon digital evidence - unfold in a courtroom and why it is vital for investigators, prosecutors, and computer forensic technicians to comprehend these elements throughout the entirety of their investigations and prosecutions. The format is interactive.
Key Learning Points:
* Comprehend the ever-changing online environments where crimes occur and the locations of evidential repositories.

Successful Use of Online Social Networking for Investigations and Intelligence (Aug 2017)

This 2-day course provides students with an up-to-date understanding of how social networking sites work and how members act and interact. Student will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.

The course is designed for criminal intelligence analysts, special agents, and other investigators. Students with any level of familiarity with the Internet and computers, from beginning to advanced, will find this course beneficial.

Successful Use of Online Social Networking for Investigations and Intelligence (July 2017)

This 2-day course provides students with an up-to-date understanding of how social networking sites work and how members act and interact. Student will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.

The course is designed for criminal intelligence analysts, special agents, and other investigators. Students with any level of familiarity with the Internet and computers, from beginning to advanced, will find this course beneficial.

Successful Use of Online Social Networking for Investigations and Intelligence (June 2017)

This 2-day course provides students with an up-to-date understanding of how social networking sites work and how members act and interact. Student will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.

The course is designed for criminal intelligence analysts, special agents, and other investigators. Students with any level of familiarity with the Internet and computers, from beginning to advanced, will find this course beneficial.

Successful Use of Online Social Networking for Investigations and Intelligence (OSNII)

This 2-day course provides students with an up-to-date understanding of how social networking sites work and how members act and interact. Student will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.

The course is designed for criminal intelligence analysts, special agents, and other investigators. Students with any level of familiarity with the Internet and computers, from beginning to advanced, will find this course beneficial.

Tor, Onion Routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators (May 2017)

Many criminal investigators and analysts have heard of VPNs, proxies, and Tor. Most would not feel comfortable conducting an investigation in which one of these tools was deployed. Similarly, both the Deepnet and Darknet are widely discussed, but often not understood. At the same time, criminal investigators and analysts increasingly are required to conduct investigations and collect criminal intelligence information in these spaces or when these tools are being used.

Pages