Juvenile Justice Agencies

Cybercrime: From Crime to Courtroom (July 2017)

The objective of this 2-day course is to focus on how Internet/cyber/computer technology-based criminal cases - as well as criminal cases reliant upon digital evidence - unfold in a courtroom and why it is vital for investigators, prosecutors, and computer forensic technicians to comprehend these elements throughout the entirety of their investigations and prosecutions. The format is interactive.
Key Learning Points:
* Comprehend the ever-changing online environments where crimes occur and the locations of evidential repositories.

Successful Use of Online Social Networking for Investigations and Intelligence (Aug 2017)

This 2-day course provides students with an up-to-date understanding of how social networking sites work and how members act and interact. Student will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.

The course is designed for criminal intelligence analysts, special agents, and other investigators. Students with any level of familiarity with the Internet and computers, from beginning to advanced, will find this course beneficial.

Successful Use of Online Social Networking for Investigations and Intelligence (July 2017)

This 2-day course provides students with an up-to-date understanding of how social networking sites work and how members act and interact. Student will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.

The course is designed for criminal intelligence analysts, special agents, and other investigators. Students with any level of familiarity with the Internet and computers, from beginning to advanced, will find this course beneficial.

Successful Use of Online Social Networking for Investigations and Intelligence (June 2017)

This 2-day course provides students with an up-to-date understanding of how social networking sites work and how members act and interact. Student will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.

The course is designed for criminal intelligence analysts, special agents, and other investigators. Students with any level of familiarity with the Internet and computers, from beginning to advanced, will find this course beneficial.

Successful Use of Online Social Networking for Investigations and Intelligence (OSNII)

This 2-day course provides students with an up-to-date understanding of how social networking sites work and how members act and interact. Student will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.

The course is designed for criminal intelligence analysts, special agents, and other investigators. Students with any level of familiarity with the Internet and computers, from beginning to advanced, will find this course beneficial.

OJJDP Webinar - ReEntry Mentoring: Conversations from the Field on Working with System-Involved Youth

Thousands of youth are arrested each year, beginning a gateway for many into the juvenile justice system. Throughout the country, mentoring programs are providing system-involved youth with the opportunity to be connected to a mentor in their own community to stop the cycle. Join this webinar as representatives from the following organizations share how they engage system-involved youth through mentoring and how they are expanding: 

Tor, Onion Routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators (May 2017)

Many criminal investigators and analysts have heard of VPNs, proxies, and Tor. Most would not feel comfortable conducting an investigation in which one of these tools was deployed. Similarly, both the Deepnet and Darknet are widely discussed, but often not understood. At the same time, criminal investigators and analysts increasingly are required to conduct investigations and collect criminal intelligence information in these spaces or when these tools are being used.

Pages