Skip to main content

Juvenile Justice Agencies

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240903-83147-15

Submitted by Bryan Lee Dail on
This course provides an introduction to the digital space commonly referred to as social media and networking. Terminology used to describe how social media and networking services are accessed, statistical data on users and mobile devices, and a variety of popular services are covered in the first part of the course.

20240903-83119-36

Submitted by Bryan Lee Dail on
This course covers basic information and concepts that serve as an introduction to virtual currencies and their relationship to other types of currency. It covers various types of virtual currency, including the difference between decentralized and centralized currencies, with a strong focus on Bitcoin: what it is, how it is stored, and Bitcoin-specific investigative tips and techniques.

20240903-83329-67

Submitted by Bryan Lee Dail on
O.J. Simpson was charged and acquitted with murdering two persons in a widely televised, 9-month jury trial, following a violent attack in June 1994. He was then found liable for their wrongful death in a later civil trail. This presentation will first provide an overview of the trial evidence and identify investigative challenges with this case. Then the presenter, an experienced former federal prosecutor who was not involved in the trials, will describe the present and emerging high technology and digital evidence that might be available if the same crime happened in 2023.

20240903-83100-87

Submitted by Bryan Lee Dail on
This course will provide an overview of how the Internet of Things (IoT) and associated devices can help law enforcement with their investigations. It will familiarize learners with what IoT is, how it works, common devices, and how it can be leveraged for gathering evidence.

20240903-83104-17

Submitted by Bryan Lee Dail on
Identifying and Seizing Digital Evidence provides a comprehensive overview of the issues surrounding digital media in relation to criminal investigations. Topics covered in this training included preparing to respond to the digital crime scene, identifying potential sources of digital evidence, and properly collecting items of evidentiary value to be used in court proceedings. The roles of the first responder, investigator, digital forensic examiner, prosecutor, and defense counsel are differentiated and explored. Legal concerns in conducting a search for digital evidence are also addressed.

20240903-83109-22

Submitted by Bryan Lee Dail on
This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individuals digital footprint, protecting privacy on social media, opting out of data aggregator sites, and the consequences of oversharing personal information; as well as steps to take after becoming a target of doxing.

20240903-83114-97

Submitted by Bryan Lee Dail on
This course provides an overview of the two phases of a cell phone investigation: the preservation, extraction, and analysis of data within the phone; and the acquisition and analysis of data external to the phone (call detail records and other information). Students become familiar with several forensic tools currently in use in the field, as well as NW3Cs PerpHound, a specialized tool that assists in plotting historical cell site locations. Other topics include cell phone components, cellular network components, and mobile device identification.

20240903-83132-98

Submitted by Bryan Lee Dail on
This course provides information on what constitutes cyberstalking in a legal context and information on handling cyberstalking complaints. Common elements of cyberstalking cases, potential tools and platforms used by cyberstalkers, and behavioral indicators are also covered in this course. Developed with a victim-centered approach, this course provides information on establishing a relationship with victims to maximize their safety and further investigative efforts.

20240903-83137-13

Submitted by Bryan Lee Dail on
This online course introduces the dark web and some of the most popular tools to access the darknet, including Tor, Freenet, and Invisible Internet Project (I2P). Basic topics include what Tor is, how it works, and who uses it; as well as dark markets in Tor Onion Service Servers (also known as .onion servers) and other hidden services. The course concludes with brief case studies covering some of the largest dark-market seizures in history.

20240903-83055-67

Submitted by Bryan Lee Dail on
This webinar will cover the various dark nets: TOR, I2P, ZeroNet, IPFS, LokiNet and explain the differences between them. Attendees will learn about various investigative methods to different elements of criminality that exist on these dark nets. A very cursory overview of cryptocurrencies will be covered and how the cryptocurrencies are the cornerstone of dark web commerce as well as the best investigative leads. Presented by: Keven Hendricks, Detective, City of New Brunswick Police Department
Subscribe to Juvenile Justice Agencies