When: January 14 – 16, 2025
Where: Las Vegas, NV
In an era where the Internet of Things (IoT) and connected devices are ever-present, their role in gathering intelligence has become critical, especially in law enforcement. These devices are always watching, listening, sensing, creating logs and data that can be pivotal in criminal investigations. They help place suspects at crime scenes, establish timelines, and corroborate or refute statements made by individuals involved.
» Read more
Get more info
When: October 19 – 22, 2024
Where: Boston, MA
The International Association of Chiefs of Police (IACP) Annual Conference and Exposition is the largest and most impactful law enforcement event of the year – more than 16,000 public safety professionals come to learn new techniques, advance their knowledge and careers, and equip their department for ongoing success.
The three tenets of the conference are training, networking, and exhibit hall education.
» Read more
Register Here
This course provides information on obtaining and executing search warrants in cases involving digital evidence, with a focus on the similarities and differences between these and other search warrants. The course covers establishing probable cause, particularity, scope, and nexus; the use of outside experts; and out-of-state warrants for remote evidence.
» Read more
Click here for more information
This course focuses on gathering information from social media sites. Students will learn about popular social media platforms, tools that can help them discover information on them, and ways to capture and save online media. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.
» Read more
Click here for more information
This course covers a variety of tools and techniques to conduct deep web searches that go beyond common search engines like Google. The course highlights tools for discovering information about people and companies both domestically and internationally. It also includes tools for discovering and manipulating device information such as IP addresses. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.
» Read more
Click here for more information
This course focuses on practical online search techniques. Students will learn about using the advanced features of popular search engines, accessing cached versions of websites, searching with images, and common signs of fake and manipulated images. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.
» Read more
Click here for more information
This course provides an introduction to the digital space commonly referred to as social media and networking. Terminology used to describe how social media and networking services are accessed, statistical data on users and mobile devices, and a variety of popular services are covered in the first part of the course. This course also identifies and explains law enforcement uses of social media and networking services, the value of open source intelligence (OSINT), and important considerations such as social media policies,
» Read more
Click here for more information
This online course introduces the dark web and some of the most popular tools to access the darknet, including Tor, Freenet, and Invisible Internet Project (I2P). Basic topics include what Tor is, how it works, and who uses it; as well as dark markets in Tor Onion Service Servers (also known as .onion servers) and other hidden services. The course concludes with brief case studies covering some of the largest dark-market seizures in history.
» Read more
Click here for more information
This online course covers basic information and concepts that serve as an introduction to virtual currencies and their relationship to other types of currency. The course describes different types of virtual currencies and covers the main differences between decentralized and centralized currencies. Focusing on Bitcoin®, students will learn what Bitcoin is, how it is stored, and what are some investigative tips for law enforcement.
» Read more
Click here for more information
On Demand
Duration: 70 Minutes
This webinar provides fundamental knowledge about human trafficking including defining the crime, addressing why it occurs and why it is unique, reviewing the relevant human trafficking criminal laws, and providing information on how to identify human trafficking, start an investigation, and prosecute the case.
» Read more
Click here for more information