Skip to main content

PSP

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250102-110926-91

Submitted by Bryan Lee Dail on
Is information from mobile extractions, Cloud Source and Google Timeline a solid piece of evidence? In this webinar, we will see how to make your digital evidence become a strong basis for courtroom testimony when validated with phone records, cell coverage, and other sources.

20250102-110923-09

Submitted by Bryan Lee Dail on
Clearnet and darknet spaces are used to advertise, procure, sell, and transfer firearms and firearms-related knowledge and technology. This webinar will introduce participants to cyber-enabled firearms trafficking, particularly the types of firearms trafficked online, the clearnet and darknet spaces where this form of trafficking occurs, and the firearm knowledge and technology transferred within these spaces.

20250102-110837-82

Submitted by Bryan Lee Dail on
In recent years, the digital landscape has provided perpetrators with new tools and avenues to exploit vulnerable individuals for sexual exploitation and human trafficking. Cyber sexual abuse crimes encompass a wide range of activities, including online grooming, non-consensual sharing of intimate images revenge porn, and sextortion. These crimes often serve as a precursor to sex trafficking, creating a dangerous overlap that demands urgent attention.

20250102-110834-25

Submitted by Bryan Lee Dail on
This webinar introduces participants to cryptocurrency and its relevance to criminal justice agents and investigations. The webinar will cover topics such as the different categories of cryptocurrency, common cryptocurrencies, the mining process, blockchain, and common cases where cryptocurrency is used or is the target of criminal activity. Participants gain basic knowledge of investigative options that are available to gather intelligence.

20250102-110831-26

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums,VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams. This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20250102-110827-33

Submitted by Bryan Lee Dail on
This course introduces the history of UAVs and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones. Topics include gathering evidence both internal and external to the drone, as well as methods for manually processing flight logs and displaying data in Google Earth.

20250102-110824-76

Submitted by Bryan Lee Dail on
In contrast to the other courses in this series, which deal primarily with the acquisition of digital evidence, this course addresses legal issues that appear relatively late in the investigative and judicial process. Topics include the Fifth Amendment as it applies to passwords and login credentials, determining the ownership of files on digital devices, and the admissibility of online evidence. This is the sixth of seven modules in the training series Legal Concerns for Digital Evidence Responders. It can be completed as a stand-alone course or in combination with the other six modules.

20250102-110821-27

Submitted by Bryan Lee Dail on
This course provides information on obtaining and executing search warrants in cases involving digital evidence, with a focus on the similarities and differences between these and other search warrants. The course covers establishing probable cause, particularity, scope, and nexus; the use of outside experts; and out-of-state warrants for remote evidence. This is the second of seven modules in the training series Legal Concerns for Digital Evidence Responders. It can be completed as a stand-alone course or in combination with the other six modules.

20250102-110817-81

Submitted by Bryan Lee Dail on
This course provides basic information for first responders who may encounter digital evidence in the course of their duties. Topics include the definition of digital evidence, where it can be found, the importance of getting digital devices to a forensics expert, and the ways in which digital evidence can be compromised. This course also addresses the issue of when a warrant is required to seize and/or search digital devices. This is the first of seven modules in the training series Legal Concerns for Digital Evidence Responders.

20250102-110814-46

Submitted by Bryan Lee Dail on
This course focuses on gathering information from social media sites. Students will learn about popular social media platforms, tools that can help them discover information on them, and ways to capture and save online media. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.
Subscribe to PSP