Skip to main content

PSP

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250106-92237-69

Submitted by Bryan Lee Dail on
Cybercrimes can and have been committed by organized criminal groups. This webinar introduces participants to the notion of cyber organized crime, the cyber-dependent and cyber-enabled crimes committed by organized criminal groups, the structure and organization of cyber organized criminal groups and roles of members within these groups, and the tools used by these groups. The clearnet and darknet spaces where these groups operate will also be explored.

20250106-92234-34

Submitted by Bryan Lee Dail on
Human beings are recruited, advertised, traded, bought, sold, and even rented on websites, chat rooms, social media platforms, online classified advertisement sites, and communication platforms.

20250106-92228-07

Submitted by Bryan Lee Dail on
In todays cyber threat environment, attackers and defenders are constantly trying to outmaneuver each other and the stakes are higher than ever, particularly for mission-critical systems and communications. Understanding the methods and motivations of threat actors is crucial to developing a proactive program to defend against and prevent future attacks. In part one of our four part webinar series, we will introduce our insights and analysis of the most significant and impactful cyber threats facing public safety organizations.

20250106-92225-09

Submitted by Bryan Lee Dail on
This course will introduce law enforcement executives to the fundamental concepts necessary for establishing healthy cybersecurity practices in their organizations. With the increase in Internet-connected devices and as threats become more prevalent and dangerous, cybersecurity becomes an extremely vital function for organizational stability. As the leadership of a law enforcement organization, executives are charged with protecting organizational assets and creating a culture of cybersecurity-minded behavior.

20250106-92222-17

Submitted by Bryan Lee Dail on
This course introduces fundamental concepts and terminology related to computer networks. Topics include the importance of computer networks, types of computer networks, common network components, network topologies and media, the OSI and TCP/IP models of communication, and IP addressing. The course also addresses the role of law enforcement iin cybersecurity within the current landscape of digital crime.

20250106-92218-57

Submitted by Bryan Lee Dail on
Today with the advent of Internet press and social media, press outlets can get information, factual or not, out in a matter of seconds. Your investigation or incident can become viral, making it challenging to navigate. This webinar will go over some techniques on crisis communication and navigating the press. We will discuss how to make sound bites to the press advantageous to you and how to avoid getting trapped and used by the press.

20250106-92215-05

Submitted by Bryan Lee Dail on
Cybercriminals?in clearnet and darknet spaces often use tools like online communication platforms in the commission of cybercrimes. This course introduces participants to various communication platforms and their use by online threat actors. Participants will gain technical?knowledge of communication platforms and gain practical knowledge on how to conduct investigations that involve these platforms.

20250106-92211-52

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums, and VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams.? This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20250106-92207-38

Submitted by Bryan Lee Dail on
This course addresses the legal issues surrounding mobile digital devices including cell phones and GPS devices. Topics include seizing and searching mobile devices, the process of obtaining both historical and current location information from cellular service providers, and legal process needed to install a GPS unit on a vehicle. This is the final course in the training series Legal Concerns for Digital Evidence Responders. It can be completed as a stand-alone course or in combination with the other six modules.

20250106-92204-78

Submitted by Bryan Lee Dail on
This course provides a legal overview of what investigators are and are not permitted to do while conducting online undercover investigations. Topics include terms of service, entrapment and outrageous government misconduct, and wiretapping law as it relates to the recording and documenting of online activities. This course also covers defense strategies commonly used to counter online undercover investigations. This is the fifth of seven modules in the training series Legal Concerns for Digital Evidence Responders.
Subscribe to PSP