Skip to main content

$0 - $2,500

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140129-31

Submitted by Bryan Lee Dail on
In recent years, the digital landscape has provided perpetrators with new tools and avenues to exploit vulnerable individuals for sexual exploitation and human trafficking. Cyber sexual abuse crimes encompass a wide range of activities, including online grooming, non-consensual sharing of intimate images revenge porn, and sextortion. These crimes often serve as a precursor to sex trafficking, creating a dangerous overlap that demands urgent attention.

20250205-140126-36

Submitted by Bryan Lee Dail on
This course will introduce law enforcement executives to the fundamental concepts necessary for establishing healthy cybersecurity practices in their organizations. With the increase in Internet-connected devices and as threats become more prevalent and dangerous, cybersecurity becomes an extremely vital function for organizational stability. As the leadership of a law enforcement organization, executives are charged with protecting organizational assets and creating a culture of cybersecurity-minded behavior.

20250205-140134-67

Submitted by Bryan Lee Dail on
Human beings are recruited, advertised, traded, bought, sold, and even rented on websites, chat rooms, social media platforms, online classified advertisement sites, and communication platforms.

20250205-135953-63

Submitted by Bryan Lee Dail on
This course covers basic information and concepts that serve as an introduction to virtual currencies and their relationship to other types of currency. It covers various types of virtual currency, including the difference between decentralized and centralized currencies, with a strong focus on Bitcoin: what it is, how it is stored, and Bitcoin-specific investigative tips and techniques.

20250205-135950-52

Submitted by Bryan Lee Dail on
This course provides an overview of the two phases of a cell phone investigation: the preservation, extraction, and analysis of data within the phone; and the acquisition and analysis of data external to the phone (call detail records and other information). Students become familiar with several forensic tools currently in use in the field, as well as NW3Cs PerpHound, a specialized tool that assists in plotting historical cell site locations. Other topics include cell phone components, cellular network components, and mobile device identification.

20250205-135948-14

Submitted by Bryan Lee Dail on
This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individuals digital footprint, protecting privacy on social media, opting out of data aggregator sites, and the consequences of oversharing personal information; as well as steps to take after becoming a target of doxing.

20250205-135945-16

Submitted by Bryan Lee Dail on
Identifying and Seizing Digital Evidence provides a comprehensive overview of the issues surrounding digital media in relation to criminal investigations. Topics covered in this training included preparing to respond to the digital crime scene, identifying potential sources of digital evidence, and properly collecting items of evidentiary value to be used in court proceedings. The roles of the first responder, investigator, digital forensic examiner, prosecutor, and defense counsel are differentiated and explored. Legal concerns in conducting a search for digital evidence are also addressed.

20250205-135942-34

Submitted by Bryan Lee Dail on
This course will provide an overview of how the Internet of Things (IoT) and associated devices can help law enforcement with their investigations. It will familiarize learners with what IoT is, how it works, common devices, and how it can be leveraged for gathering evidence.

20250205-135930-53

Submitted by Bryan Lee Dail on
This webinar will examine the investigative and legal considerations related to tracking technology, and the impact of ultra-wideband location networks such as Apple AirTags and other similar emerging technologies. We will use case analysis to illustrate key questions and considerations for both investigators and prosecutors given the increasing criminal use of this technology and proactive use during investigations. Presented by: Justin Fitzsimmons, Associate Vice President, NW3C Jim Emerson, Vice President, NW3C

20250205-135933-14

Submitted by Bryan Lee Dail on
Tradecraft is the analyst/investigators competency. Join Robert Bacon for a discussion of the integrated application of criminal analysis tools, and to learn why analysis is such a vital part of any investigation. He will discuss why it is essential to develop a fact-based argument to support the theory of the criminal case within the parameters set by U.S criminal procedure and the standards of proof needed to progress an investigation and the protection of rights.
Subscribe to $0 - $2,500