Attention
This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.
This interactive online module provides an overview of how ransomware can affect devices and networks, how to recognize and respond to a ransomware attack, and how to prevent ransomware attacks.
20250205-140002-06
This course introduces learners to the colloquially used term, deepfakes, and the technology that makes synthetic media possible.
20250205-140005-26
This course provides information on what constitutes cyberstalking in a legal context and information on handling cyberstalking complaints. Common elements of cyberstalking cases, potential tools and platforms used by cyberstalkers, and behavioral indicators are also covered in this course. Developed with a victim-centered approach, this course provides information on establishing a relationship with victims to maximize their safety and further investigative efforts.
20250205-140008-38
This online course introduces the dark web and some of the most popular tools to access the darknet, including Tor, Freenet, and Invisible Internet Project (I2P). Basic topics include what Tor is, how it works, and who uses it; as well as dark markets in Tor Onion Service Servers (also known as .onion servers) and other hidden services. The course concludes with brief case studies covering some of the largest dark-market seizures in history.
20250205-140011-03
This training will help investigators with the essential skills they need to obtain electronic evidence internationally. It will cover some foundational concepts about gathering information online, examine the different types of data service providers may have, and review the methods available to law enforcement for preserving and obtaining electronic evidence.
20250205-140014-17
This course provides an introduction to the digital space commonly referred to as social media and networking. Terminology used to describe how social media and networking services are accessed, statistical data on users and mobile devices, and a variety of popular services are covered in the first part of the course.
20250205-140017-28
This course focuses on practical online search techniques. Students will learn about using the advanced features of popular search engines, accessing cached versions of websites, searching with images, and common signs of fake and manipulated images. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.
20250205-140020-73
This course covers a variety of tools and techniques to conduct deep web searches that go beyond common search engines like Google. The course highlights tools for discovering information about people and companies both domestically and internationally. It also includes tools for discovering and manipulating device information such as IP addresses. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.
20250205-140023-97
This course focuses on gathering information from social media sites. Students will learn about popular social media platforms, tools that can help them discover information on them, and ways to capture and save online media. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.
20250204-80550-06
Onsite Technical Assistance staff/court observations, and Training with treatment court staff members as part of Adult TA initiative.