Skip to main content

PSP

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250102-110738-92

Submitted by Bryan Lee Dail on
This interactive online module provides an overview of the basic concepts behind secure previewing of digital devices. Students become familiar with both onsite and offsite secure previewing, and learn to identify the two states in which a preview can be conducted (live-box and dead-box previewing). At the completion of the course, students will be able to recognize the recommended collection order of volatile data (the order of volatility).

20250102-110735-14

Submitted by Bryan Lee Dail on
This webinar will cover the various dark nets: TOR, I2P, ZeroNet, IPFS, LokiNet and explain the differences between them. Attendees will learn about various investigative methods to different elements of criminality that exist on these dark nets. A very cursory overview of cryptocurrencies will be covered and how the cryptocurrencies are the cornerstone of dark web commerce as well as the best investigative leads. Presented by: Keven Hendricks, Detective, City of New Brunswick Police Department

20250102-105933-38

Submitted by Bryan Lee Dail on
This course redefines fitness for law enforcement officers, focusing on long-term health instead of peak physical ability. In this course you will learn how to maintain a healthy lifestyle throughout your career and how to address challenges like injuries and shift work. By creating a personalized plan and sustainable habits, you will gain the tools to achieve your wellness goals and live an active life from the academy through retirement.? This is the first course in the STORM (Strategic Training for Organizational Resilience and Mindset) series.

20250102-105930-49

Submitted by Bryan Lee Dail on
In 2024, one of the first cybercrime cases to make the news involved the virtual kidnapping of a Chinese student in the United States. Using this incident as a case study, this webinar critically examines the case and identifies how this new case compares to past virtual kidnapping incidents in the United States. Special attention is paid to the tactics, tools, targets, and modus operandi of virtual kidnappers who target U.S. victims.

20250102-105927-23

Submitted by Bryan Lee Dail on
The Internet Corporation for Assigned Names and Numbers (ICANN) and the American Registry for Internet Numbers (ARIN) have joined together to develop a presentation specifically designed for law enforcement focused on cyber security and the roles our organizations play in helping to combat this ever-evolving problem. ICANN helps coordinates the names and numbers that are used as unique identifiers in the global Internet. It is tasked with helping make sure that the Domain Name System (DNS) remains stable, secure, and resilient.

20250102-105923-99

Submitted by Bryan Lee Dail on
Join experts from NW3C and the National Network of Fusion Centers as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. In this session, our panel has a wealth of experience with managing intelligence analysts and intelligence projects. This panel will provide perspectives from large and smaller intelligence units at the local and state law enforcement levels.

20250102-105920-98

Submitted by Bryan Lee Dail on
This webinar will demonstrate the use of iCatch, the iOS Cache Analysis for Tracking Coordinates History tool, which is used to analyze and map location data from iOS Cache.sqlite database. The presenter will discuss the forensic artifacts that can be found in the Cache.sqlite database, how to use the iCatch tool to analyze artifacts from the database, and how to effectively view and present the mapped data in Google Earth.

20250102-105917-49

Submitted by Bryan Lee Dail on
By the year 2025, it is expected that there will be over 45 billion connected devices around the world that is 9.27 connected devices per person. The Internet of Things (IoT) utilizes a variety of communication standards and a unique set of networking protocols to connect these devices. This webinar will explore these unique IoT networking protocols along with their varied IoT topography and explain IoT network interrogation techniques to be used in an investigation.

20250102-105914-98

Submitted by Bryan Lee Dail on
Human beings are recruited, advertised, traded, bought, sold, and even rented on websites, chat rooms, social media platforms, online classified advertisement sites, and communication platforms.

20250102-105910-13

Submitted by Bryan Lee Dail on
Clearnet and darknet spaces are used to advertise, procure, sell, and transfer firearms and firearms-related knowledge and technology. This webinar will introduce participants to cyber-enabled firearms trafficking, particularly the types of firearms trafficked online, the clearnet and darknet spaces where this form of trafficking occurs, and the firearm knowledge and technology transferred within these spaces.
Subscribe to PSP