Skip to main content

Justice Information Sharing

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240715-101232-08

Submitted by Bryan Lee Dail on
This introductory course familiarizes participants with illegal darknet markets and associated forums, particularly the illicit goods and services offered, as well as successful law enforcement operations targeting these sites. Participants will gain practical knowledge on how to create anonymous accounts to access and monitor these sites and intelligence collection tactics for use in law enforcement investigations.

20240715-101228-31

Submitted by Bryan Lee Dail on
Cybercriminals?in clearnet and darknet spaces often use tools like online communication platforms in the commission of cybercrimes. This course introduces participants to various communication platforms and their use by online threat actors. Participants will gain technical?knowledge of communication platforms and gain practical knowledge on how to conduct investigations that involve these platforms.

20240715-101223-19

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums, and VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams.? This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

FC122 Intellectual Property Theft Training

This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific folder that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

This course is presented in collaboration with the National Association of Attorneys General (NAAG).
Awareness. Types of IP crimes. The criminals who commit these crimes. Impacts and dangers.
Investigation. Online and traditional techniques. Working with brand experts and the private sector. Large amounts of evidence. Resources.
Statutes. Prosecutorial theories. State-specific discussion.
Hands-on experience. Work with real counterfeit products. Identify fakes with expert guidance.

CI130 Basic Cyber Investigations: Cellular Records Analysis

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers; and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of NW3Cs PerpHound tool, which assists in the plotting of call detail record locations.

*Cellular technology. Land-line and cellular networks. Types and generations of cell phones. Cell site design and its implications for law enforcement.
*Analysis of call detail records. Request information from service providers. Convert records into a useful format. *Merge two related spreadsheets. Read and analyze using filters, sorting, and pivot tables. Plot location information.
*Hands-on experience. Hands-on experience with NW3Cs free software tool PerpHound and Microsoft Excel to analyze various types of records that are available from cellular providers.

20240712-150705-99

Submitted by Bryan Lee Dail on

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers; and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended.

20240712-150709-34

Submitted by Bryan Lee Dail on

This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific folder that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

Subscribe to Justice Information Sharing