Attention
This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.
- This course introduces the problem of intellectual property theft and provides tools, techniques, an…Event Date-
- This one-day course provides foundational spreadsheeting knowledge and skills to enhance workplace p…Event Date-
- This webinar will explore the ever-expanding importance of Internet of Things (IoT) crime scenes and…Event Date-
- In recent years, the digital landscape has provided perpetrators with new tools and avenues to explo…Event Date-
- Often viewed as a nuisance as opposed to a crime, swatting calls have become extremely common over t…Event Date-
- This course introduces analysts to the broader concepts of connecting the dots through link analysis…Event Date-
- This course covers basic intelligence writing and briefing principles as well as methods for effecti…Event Date-
- This course builds on the concepts introduced in FC101 (FIPS) and FC105 (FREA), introducing investig…Event Date-
- This course is for officers, investigators, and analysts who encounter cell phone evidence that incl…Event Date-
- The Role of Online OSINT in Preparing For and Responding To Critical Incidents Topics covered: 1. Co…Event Date-
- This course introduces learners to the concept of digital footprints and best practices in protectin…Event Date-
- This course covers the identification and extraction of artifacts associated with the Microsoft Wind…Event Date-
- This course introduces learners to the concept of digital footprints and best practices in protectin…Event Date-
- Recognizing the importance of pre-arrest and pre-court diversions in reducing youth involvement in t…Event Date-
- Through the Bureau of Justice Assistance’s Student, Teachers, and Officers Preventing (STOP) School…Event Date-
- This 2-day course provides the practical legal and technical information prosecutors need to success…Event Date-
- The Public Safety Threat Alliance Intelligence team will present our observations and assessments on…Event Date-
- Participants will learn about the strategic implications of emerging technologies and the rapid pace…Event Date-
- Some of the most dangerous counterfeits involve explosive elements of automotive airbags, which can…Event Date-
- This course introduces analysts to the broader concepts of connecting the dots through link analysis…Event Date-
- Mobile devices dominate the intake list, and the desks of most digital forensics analyst globally. D…Event Date-
- This intermediate spreadsheeting course uses Microsoft Excel to assess and organize data in an elect…Event Date-
- Mobile devices dominate the intake list, and the desks of most digital forensics analyst globally. D…Event Date-
- This course introduces analysts to the broader concepts of connecting the dots through link analysis…Event Date-