This course covers a variety of tools and techniques to conduct deep web searches that go beyond common search engines like Google. The course highlights tools for discovering information about people and companies both domestically and internationally. It also includes tools for discovering and manipulating device information such as IP addresses. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.
» Read more
Click here for more information
This course focuses on practical online search techniques. Students will learn about using the advanced features of popular search engines, accessing cached versions of websites, searching with images, and common signs of fake and manipulated images. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.
» Read more
Click here for more information
This online course introduces the dark web and some of the most popular tools to access the darknet, including Tor, Freenet, and Invisible Internet Project (I2P). Basic topics include what Tor is, how it works, and who uses it; as well as dark markets in Tor Onion Service Servers (also known as .onion servers) and other hidden services. The course concludes with brief case studies covering some of the largest dark-market seizures in history.
» Read more
Click here for more information
This course provides information on what constitutes cyberstalking in a legal context and information on handling cyberstalking complaints. Common elements of cyberstalking cases, potential tools and platforms used by cyberstalkers, and behavioral indicators are also covered in this course. Developed with a victim-centered approach, this course provides information on establishing a relationship with victims to maximize their safety and further investigative efforts. The course concludes with guidance on developing an investigative checklist and additional resources available to law enforcement.
» Read more
Click here for more information
This course introduces learners to the colloquially used term deepfakes and the technology that makes this type of synthetic media possible. Deepfakes and artificial intelligence (AI) are increasingly used by cybercriminals to avoid biometric security, steal identities, and facilitate financial crime. This course covers how artificial intelligence is used to create deepfakes, common uses of synthetic media, and how to recognize deepfakes.
» Read more
Click here for more information
According to the FBI’s Internet Crime Complaint Center (IC3), ransomware attacks lead to several billion dollars lost each year. Law enforcement officers should know how to respond to and protect their agencies and communities from these attacks. This interactive module teaches participants how to recognize and respond to a ransomware attack and discusses how ransomware can affect devices and networks and how to prevent ransomware attacks.
» Read more
Click here for more information
With the rise of electronic evidence and the likelihood that the crimes you’re investigating are conducted with or supported by the use of mobile devices, the Internet, or cloud-based applications, preservation letters provide a means to prevent the destruction of electronic records and buy an investigator time to retrieve and analyze potential evidence.
» Read more
Click here for more information
This online course covers basic information and concepts that serve as an introduction to virtual currencies and their relationship to other types of currency. The course describes different types of virtual currencies and covers the main differences between decentralized and centralized currencies. Focusing on Bitcoin®, students will learn what Bitcoin is, how it is stored, and what are some investigative tips for law enforcement.
» Read more
Click here for more information
This course provides an overview of the two phases of a cell phone investigation: the preservation, extraction, and analysis of data within the phone; and the acquisition and analysis of data external to the phone (call detail records and other information). Students become familiar with several forensic tools currently in use in the field, as well as NW3C’s PerpHound™, a specialized tool that assists in plotting historical cell site locations. Other topics include cell phone components,
» Read more
Click here for more information
This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, opting out of data aggregator sites, and the consequences of oversharing personal information; as well as steps to take after becoming a target of doxing.
» Read more
Click here for more information