Skip to main content

PSP

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250114-124120-96

Submitted by Bryan Lee Dail on
This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

IA103 Introduction to Strategic Intelligence Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

20250114-124107-29

Submitted by Bryan Lee Dail on
This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence.

IA101 Foundations of Intelligence Analysis Training

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included NW3C, Law Enforcement Intelligence Units (LEIU), the International Association of Law Enforcement Intelligence Analysis (IALEIA), and the Regional Information Sharing System (RISS).

*Analysis basics. History and purpose of intelligence analysis. Legal issues and ethics. Sources of information. The intelligence cycle.
*Types of analysis. Crime patterns. Associations. Flow. Communications. Financial analysis.
*Creative and critical thinking. Brainstorming. Mind mapping. Steps to critical thinking.
*Deterring crime. Strategic analysis as a tool for law enforcement personnel.
*Hands-on experience. Work as part of a team to analyze information pertaining to several hypothetical cases.

20250113-75003-57

Submitted by Bryan Lee Dail on
Technology has changed the modern crime scene; keeping up with tech advancements and collecting pertinent evidence will continue to grow exponentially. This webinar will discuss the digital evidence that is available and what may be available in the near future. We will discuss cellular, GPS, Wi-Fi, Bluetooth, and other forms of evidence. We will provide a plan to manage the collection in an innovative, timely, and practical manner, from what can be done now with some tech to the ideal way of collecting digital evidence.

20250113-75000-26

Submitted by Bryan Lee Dail on
O.J. Simpson was charged and acquitted with murdering two persons in a widely televised, 9-month jury trial, following a violent attack in June 1994. He was then found liable for their wrongful death in a later civil trail. This presentation will first provide an overview of the trial evidence and identify investigative challenges with this case. Then the presenter, an experienced former federal prosecutor who was not involved in the trials, will describe the present and emerging high technology and digital evidence that might be available if the same crime happened in 2023.

20250113-74956-82

Submitted by Bryan Lee Dail on
This webinar will explain how language can be used as a forensic science tool, underlying research rigor, and acceptable application. It will familiarize participants with historical and emerging use in investigations and prosecutions, the potential relevance to online and digital evidence, and the basic legal considerations for appropriate use in litigation.

20250113-74953-15

Submitted by Bryan Lee Dail on
The Internet Corporation for Assigned Names and Numbers (ICANN) and the American Registry for Internet Numbers (ARIN) have joined together to develop a presentation specifically designed for law enforcement focused on cyber security and the roles our organizations play in helping to combat this ever-evolving problem. ICANN helps coordinates the names and numbers that are used as unique identifiers in the global Internet. It is tasked with helping make sure that the Domain Name System (DNS) remains stable, secure, and resilient.

20250113-74950-83

Submitted by Bryan Lee Dail on
Hundreds of incidents shootings, workplace violence, other attacks are taking place across schools and communities every year. In response, schools and communities continue to invest their money, time, and efforts into more deterrents, like locks, metal detectors, cameras, etc., but what happens when attackers are undeterred like we are seeing today?

20250113-74947-52

Submitted by Bryan Lee Dail on
As ransomware gangs move from encryption tactics to data exfiltration and extortion, cybersecurity professionals require a new approach and new way of thinking when it comes to tackling the issue of ransomware. Join this webinar to learn more about: Why preventing data exfiltration is critical in the fight against ransomware Why traditional detection and response solutions are failing to prevent these attacks How organizations can leverage anti data exfiltration technology to secure their data and prevent attacks
Subscribe to PSP