Skip to main content

Federal Government

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250214-81217-13

Submitted by Bryan Lee Dail on
This introductory course familiarizes participants with illegal darknet markets and associated forums, particularly the illicit goods and services offered, as well as successful law enforcement operations targeting these sites. Participants will gain practical knowledge on how to create anonymous accounts to access and monitor these sites and intelligence collection tactics for use in law enforcement investigations.

20250214-81226-05

Submitted by Bryan Lee Dail on
In this 90-minute training session, "Navigating Human Trafficking: Awareness and Effective Responses," participants will gain a foundational understanding of human trafficking while focusing on practical techniques and approaches to ensure successful interactions and positive outcomes for victims and survivors. The session includes an overview of human trafficking, defining its various forms and shedding light on its prevalence. This concise yet comprehensive introduction includes definitions, myths and stereotypes, federal law, considerations, and case examples.

20250214-81243-55

Submitted by Bryan Lee Dail on
The fourth course in the STORM series focuses on mental and emotional wellness. You will explore the concepts of accumulated stress and trauma- to understand the impact they have on your job and personal life. In this course, you will learn about symptoms, risk factors and how your brain processes and responds to traumatic events or stressors. The course will wrap up by discussing ways to heal after exposure to trauma, how to care with for your mental health, and how to build mental health resilience.

20250214-81213-02

Submitted by Bryan Lee Dail on
Cybercriminals?in clearnet and darknet spaces often use tools like online communication platforms in the commission of cybercrimes. This course introduces participants to various communication platforms and their use by online threat actors. Participants will gain technical?knowledge of communication platforms and gain practical knowledge on how to conduct investigations that involve these platforms.

20250214-81231-64

Submitted by Bryan Lee Dail on
This course focuses on the modern challenges with introducing digital evidence in court. In this course, we cover both Brady and admissibility requirements and explain what steps need to be taken to ensure digital evidence can be introduced and effectively used at trial. Takeaways from the course include best practices for visual presentations and a mock exam template.

20250214-75905-62

Submitted by Bryan Lee Dail on
This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

20250214-75920-77

Submitted by Bryan Lee Dail on
This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft.

20250214-75900-85

Submitted by Bryan Lee Dail on
This course is designed specifically for law enforcement officers and investigators, providing the tools and knowledge needed to combat the growing threat of technology facilitated scams targeting older adults. Participants will learn to identify and investigate various digital fraud tactics, from tech support scams to government imposter fraud, and artificial intelligence schemes. The course covers the latest technology and platforms used by criminals, as well as effective techniques for tracing, reporting, and prosecuting these crimes while approaching victims with care.

20250214-75916-88

Submitted by Bryan Lee Dail on
This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence. *Prepare. Prepare to respond to an incident or crime scene where digital evidence may be present. *Identify. Learn tow to identify relevant sources of digital evidence in an ever-evolving landscape. *Collect.

20250214-75910-78

Submitted by Bryan Lee Dail on
This three-day course covers the fundamentals of financial investigations and incorporates some of the more advanced processes that elevate an investigation. During this course, students will learn about investigative processes, practical tools, and sources of information necessary to plan and conduct financial investigations. The course begins with a description of the basic composition of elements within illicit financial networks and how they work to compromise legitimate business and financial sectors.
Subscribe to Federal Government