Training Delivery - Online Training

Tor, Onion Routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators (Dec 2017)

Many criminal investigators and analysts have heard of virtual private networks, proxies, and Tor. But, most would not feel comfortable conducting an investigation in which one of these tools was deployed. Similarly, both the Deepnet and Darknet are widely discussed but often not understood. At the same time, criminal investigators and analysts increasingly are required to conduct investigations and collect criminal intelligence information in these spaces or when these tools are being used.

The Opioid and Fentanyl Crisis: Drug Investigations and the Link to the Dark Web

This webinar is intended for LAW ENFORCEMENT OFFICERS who are either engaged, or looking to be engaged, in cyber drug investigations. Please register using your agency-issued email.

This webinar will discuss the current opioid/fentanyl crisis from a cyber perspective, providing information to enhance the effectiveness of federal, state, and local law enforcement investigations. In this webinar, students will learn:

Cyber Investigation 152 - Search Warrants & Digital Evidence Web-based (Nov 2017)

This course provides information on obtaining and executing search warrants in cases involving digital evidence, with a focus on the similarities and differences between these and other search warrants. The course covers:

Cyber Investigation 152 - Search Warrants & Digital Evidence Web-based (Oct 2017)

This course provides information on obtaining and executing search warrants in cases involving digital evidence, with a focus on the similarities and differences between these and other search warrants. The course covers:

Cyber Investigation 156 - Post Seizure Evidentiary Concerns - LC6 WB

In contrast to the other LCDE modules, which deal primarily with the acquisition of digital evidence, LC6-WB addresses legal issues that appear relatively late in the investigative and judicial process. Topics include the Fifth Amendment as it applies to passwords and login credentials, determining the ownership of files on digital devices, and the admissibility of online evidence.

LC6-WB is the sixth of seven modules in the training series Legal Concerns for Digital Evidence Responders. It can be completed as a stand-alone course or in combination with the other six modules.

Cyber Investigation 157 - Mobile Digital Devices & GPS Web-based (Oct 2017)

"Cyber Investigation 157 - Mobile Digital Devices & GPS" (LC7-WB) addresses the legal issues surrounding mobile digital devices, including cell phones and GPS devices. Topics include seizing and searching mobile devices, the process of obtaining both historical and current location information from cellular service providers, and the legal process needed to install a GPS unit on a suspect’s vehicle. LC7-WB is the seventh of seven modules in the training series Legal Concerns for Digital Evidence Responders.

Drone Forensics 101: Extracting & Examining Data from Drones

The National White Collar Crime Center (NW3C) understands how important it is for law enforcement professionals to be up to speed on emerging technologies. In recent months, drones have been a subject of controversy and are being used more frequently by criminals. These devices store data and need to be handled appropriately. Active cases are currently being prosecuted in border, battlefield, and correctional facility scenarios. Having the capability to quickly recover and analyze data from drones has become critically important.

Counter Terrorism: Contingency Planning for Law Enforcement Agencies

Despite the best efforts of the Joint Terrorism Task Forces and Fusion Centers, organized or lone wolf terrorist attacks can still occur in the United States. When that occurs, it is the local law enforcement that has to respond. As in all police operations, it is better to have a contingency plan before a terrorist event. 

How to Hunt Criminals and Terrorists: The Actionable Intelligence Workshop

This webinar is designed to instruct law enforcement commanders, their police officers assigned to both patrol and investigative functions, and their analysts on how to aggressively collect and use actionable intelligence. The same intelligence techniques can also be used against both criminal and terrorist targets. The intelligence training taught in the webinar is designed to supplement the existing operational professionalism, skills, and experience within the audience.

Pages