Attention
This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.
Identifying and Seizing Digital Evidence provides a comprehensive overview of the issues surrounding digital media in relation to criminal investigations. Topics covered in this training included preparing to respond to the digital crime scene, identifying potential sources of digital evidence, and properly collecting items of evidentiary value to be used in court proceedings. The roles of the first responder, investigator, digital forensic examiner, prosecutor, and defense counsel are differentiated and explored. Legal concerns in conducting a search for digital evidence are also addressed.
20250205-135942-34
This course will provide an overview of how the Internet of Things (IoT) and associated devices can help law enforcement with their investigations. It will familiarize learners with what IoT is, how it works, common devices, and how it can be leveraged for gathering evidence.
20250205-135939-93
This interactive online module provides an overview of the basic concepts behind secure previewing of digital devices. Students become familiar with both onsite and offsite secure previewing, and learn to identify the two states in which a preview can be conducted (live-box and dead-box previewing). At the completion of the course, students will be able to recognize the recommended collection order of volatile data (the order of volatility).
20250205-135936-29
Digital forensics veterans Alan McConnell and Jeff Bell will discuss the importance of triage in investigations and its role in quickly finding and prioritizing evidence in this webinar. We will get into the idea of true triage, which centers on quickly locating evidence and moving the investigation forward FAST. We will discuss some of the issues with current thoughts regarding triage and how thorough block level hashing can help solve them.
20250205-135933-14
Tradecraft is the analyst/investigators competency. Join Robert Bacon for a discussion of the integrated application of criminal analysis tools, and to learn why analysis is such a vital part of any investigation. He will discuss why it is essential to develop a fact-based argument to support the theory of the criminal case within the parameters set by U.S criminal procedure and the standards of proof needed to progress an investigation and the protection of rights.
20250205-135930-53
This webinar will examine the investigative and legal considerations related to tracking technology, and the impact of ultra-wideband location networks such as Apple AirTags and other similar emerging technologies. We will use case analysis to illustrate key questions and considerations for both investigators and prosecutors given the increasing criminal use of this technology and proactive use during investigations.
Presented by:
Justin Fitzsimmons, Associate Vice President, NW3C
Jim Emerson, Vice President, NW3C
20250205-135927-68
This webinar will cover the various dark nets: TOR, I2P, ZeroNet, IPFS, LokiNet and explain the differences between them. Attendees will learn about various investigative methods to different elements of criminality that exist on these dark nets. A very cursory overview of cryptocurrencies will be covered and how the cryptocurrencies are the cornerstone of dark web commerce as well as the best investigative leads.
Presented by:
Keven Hendricks, Detective, City of New Brunswick Police Department
20250203-154826-24
Corrections Officer and Staff Safety and Wellness