Skip to main content

PSP

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250102-111001-44

Submitted by Bryan Lee Dail on
Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital "footprints" that can help you during your investigations, no matter your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative ways of seeing a crime scene through different technologies.

20250102-110958-58

Submitted by Bryan Lee Dail on
Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital "footprints" that can help you during your investigations, no matter your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative ways of seeing a crime scene through different technologies.

20250102-110954-32

Submitted by Bryan Lee Dail on
In this webinar, the audience will get deeper knowledge and understanding about how to enhance their investigations by utilizing Radio Frequency Technology. Topics covered during the session will be: Identifying and capturing cell towers at crime scenes Validating CDR records Event planning for potential mass casualty incidents Identifying towers during physical surveillance Basics on what is RF surveying Presented by: Lt. Eugene Kim, Beverly Hills Police Department Magnus Hedlund, Vespereye

20250102-110951-28

Submitted by Bryan Lee Dail on
This interactive course provides fundamental knowledge on human trafficking. It helps law enforcement, support staff, analysts, and regulatory agencies to recognize the situational and behavioral indicators associated with human trafficking victims, facilitators, and traffickers. The examples and scenarios throughout the course will educate and raise awareness to help understand how technology and social media and networking platforms impact human trafficking.

20250102-110947-59

Submitted by Bryan Lee Dail on
This course provides fundamental knowledge on financial investigation and data analysis. The investigation portion of the course will cover common consumer scams, how to identify suspects and their financial accounts and best processes for obtaining suspects records. The analysis portion of the course will cover the process of acquiring data, discuss methods for entering data, and provide strategies for finding patterns in data sets.

20250102-110944-41

Submitted by Bryan Lee Dail on
This course presents awareness-level information on a variety of topics related to white collar crime. The course covers basic definitions and terminology, common types of white collar crime, and the effects of white collar crime on society. Students learn to recognize and respond to common internet scams, provide assistance to victims of white collar crime, and recognize warning signs and red flags of criminal behavior. This course emphasizes the role of law enforcement in preventing and responding to white collar crime, and includes additional resources for combating this widespread problem.

20250102-110940-51

Submitted by Bryan Lee Dail on
Cybercriminals in clearnet and darknet spaces often use tools like encrypted communication platforms in the commission of cybercrimes. This webinar introduces participants to various encrypted communication platforms and their use by online threat actors. Participants will gain technical knowledge of encrypted communication platforms and gain practical knowledge on how to conduct investigations that involve these platforms.

20250102-110937-78

Submitted by Bryan Lee Dail on
Have you ever wondered how the forensic tools you use, know what they do? Have you ever wondered what an artifact means and why the 0 indicates a call was missed? Join NW3C High-Tech Crime Specialist Chris Atha as he introduces how to find these answers. Chris will break down the basics of setting up a mobile test device and performing basic differential testing using an iOS device. These steps will be performed using various free and open source tools, which students can use to follow along.

20250102-110933-58

Submitted by Bryan Lee Dail on
The first module of this course covers fundamentals such as recognizing computer components and their functions, accessing computer firmware, and the startup and shutdown processes. The second module covers how a hard disk drive works, how data is converted into digital information, how to calculate the storage capacity of a device, partitioning and how that is used for storage, and how a solid state hard drive functions.

20250102-110930-93

Submitted by Bryan Lee Dail on
This course provides an introduction to data encryption, covering the purpose of encryption as well as the process of encrypting data, and clarifying the distinctions between encryption and other operations like password protection and encoding. It explores the confusion, diffusion, and secret key encryption methods. Topics include detecting encryption (including recognition of some of the most popular types of encryption software), as well as proper procedures for law enforcement professionals who detect that encryption may be present on a device.
Subscribe to PSP