Skip to main content

Juvenile Justice Agencies

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140120-51

Submitted by Bryan Lee Dail on
This course introduces fundamental concepts and terminology related to computer networks. Topics include the importance of computer networks, types of computer networks, common network components, network topologies and media, the OSI and TCP/IP models of communication, and IP addressing. The course also addresses the role of law enforcement iin cybersecurity within the current landscape of digital crime.

20250205-140143-56

Submitted by Bryan Lee Dail on
This introductory course familiarizes participants with illegal darknet markets and associated forums, particularly the illicit goods and services offered, as well as successful law enforcement operations targeting these sites. Participants will gain practical knowledge on how to create anonymous accounts to access and monitor these sites and intelligence collection tactics for use in law enforcement investigations.

20250205-140140-05

Submitted by Bryan Lee Dail on
This webinar introduces participants to illegal darknet markets and associated forums, particularly the illicit goods and services offered, as well as successful law enforcement operations targeting these sites. Participants will gain practical knowledge on how to create anonymous accounts to access and monitor these sites and intelligence collection tactics for use in law enforcement investigations.

20250205-140137-96

Submitted by Bryan Lee Dail on
Cybercrimes can and have been committed by organized criminal groups. This webinar introduces participants to the notion of cyber organized crime, the cyber-dependent and cyber-enabled crimes committed by organized criminal groups, the structure and organization of cyber organized criminal groups and roles of members within these groups, and the tools used by these groups. The clearnet and darknet spaces where these groups operate will also be explored.

20250205-140131-41

Submitted by Bryan Lee Dail on
Clearnet and darknet spaces are used to advertise, procure, sell, and transfer firearms and firearms-related knowledge and technology. This webinar will introduce participants to cyber-enabled firearms trafficking, particularly the types of firearms trafficked online, the clearnet and darknet spaces where this form of trafficking occurs, and the firearm knowledge and technology transferred within these spaces.

20250205-140134-67

Submitted by Bryan Lee Dail on
Human beings are recruited, advertised, traded, bought, sold, and even rented on websites, chat rooms, social media platforms, online classified advertisement sites, and communication platforms.

20250205-140126-36

Submitted by Bryan Lee Dail on
This course will introduce law enforcement executives to the fundamental concepts necessary for establishing healthy cybersecurity practices in their organizations. With the increase in Internet-connected devices and as threats become more prevalent and dangerous, cybersecurity becomes an extremely vital function for organizational stability. As the leadership of a law enforcement organization, executives are charged with protecting organizational assets and creating a culture of cybersecurity-minded behavior.

20250205-140129-31

Submitted by Bryan Lee Dail on
In recent years, the digital landscape has provided perpetrators with new tools and avenues to exploit vulnerable individuals for sexual exploitation and human trafficking. Cyber sexual abuse crimes encompass a wide range of activities, including online grooming, non-consensual sharing of intimate images revenge porn, and sextortion. These crimes often serve as a precursor to sex trafficking, creating a dangerous overlap that demands urgent attention.

20250205-135942-34

Submitted by Bryan Lee Dail on
This course will provide an overview of how the Internet of Things (IoT) and associated devices can help law enforcement with their investigations. It will familiarize learners with what IoT is, how it works, common devices, and how it can be leveraged for gathering evidence.

20250205-135945-16

Submitted by Bryan Lee Dail on
Identifying and Seizing Digital Evidence provides a comprehensive overview of the issues surrounding digital media in relation to criminal investigations. Topics covered in this training included preparing to respond to the digital crime scene, identifying potential sources of digital evidence, and properly collecting items of evidentiary value to be used in court proceedings. The roles of the first responder, investigator, digital forensic examiner, prosecutor, and defense counsel are differentiated and explored. Legal concerns in conducting a search for digital evidence are also addressed.
Subscribe to Juvenile Justice Agencies