Skip to main content

Active

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250214-75905-62

Submitted by Bryan Lee Dail on
This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

20250214-75900-85

Submitted by Bryan Lee Dail on
This course is designed specifically for law enforcement officers and investigators, providing the tools and knowledge needed to combat the growing threat of technology facilitated scams targeting older adults. Participants will learn to identify and investigate various digital fraud tactics, from tech support scams to government imposter fraud, and artificial intelligence schemes. The course covers the latest technology and platforms used by criminals, as well as effective techniques for tracing, reporting, and prosecuting these crimes while approaching victims with care.

20250213-160935-34

Submitted by Ms. Neve C Bre… on

The grantee asked if the time periods for short, intermediate, and long-term goals could be extended to allow more time for data collection, and we confirmed that the adjustments could be made. They also inquired about combining survey questions, and we explained that it depends on the specific questions, emphasizing the importance of clarity and avoiding double-barreled questions. We provided feedback on their surveys, suggesting revisions for clearer wording, more precise question definitions, and adding options like "Other" for open-ended responses.

Subscribe to Active