For technical issues, visit our User Support page.

Cyber Investigation

Understanding Digital Footprints
  Understanding Digital Footprints

The Dark Web: An Introduction
The Dark Web: An Introduction

Investigating Incidents Involving UAVs
Investigating Incidents Involving UAVs

virtual-currencies
  Virtual Currency

mobile-digital-devices
  Mobile Digital Devices and GPS

intro-computer-networks
  Introduction to Computer Networks

Cyberstalking
  Cyberstalking

Search Warrants and DE
  Search Warrants & Digital Evidence

Previewing
  Introduction to Previewing

online-undercover
  Online Undercover

post-seizure-evidence
  Post-Seizure Evidentiary Concerns

First Responders
  First Responders & Digital Evidence

Searching without Warrant
  Searching Without a Warrant

Digital Forensics

How Computers Work and Store Data
  How Computers Work and Store Data

encryption
  Encryption

Economic and Other Crime

Financial Investigations Basics
Financial Investigations Basics

Human Trafficking Awareness
Human Trafficking Awareness

Elder Abuse Guide for Law Enforcement
Elder Abuse Guide for Law Enforcement

MORF Web Image
  Introduction to Mortgage Fraud

Intellectual Property Theft
  Intellectual Property Theft: Time to Make a Difference

Victim-Centered Solutions to Elder Exploitation
Victim-Centered Solutions to Elder Exploitation

overview-white-collar-crime
  Overview of White Collar Crime

fc-151
  The Bank Secrecy Act

Intelligence

IINT-WB
Introduction to Intelligence

Basic Analyst Skills and Requirements
Basic Analyst Skills and Requirements

Policies and Guidance for Intelligence Analysts Exercise
Policies and Guidance for Intelligence Analysts Exercise

Prosecutor Training

Introducing Digital Evidence in Court
  Introducing Digital Evidence in Court

Prosecuting the Dark Web
  Prosecuting the Dark Web

pt-160
  Legal Challenges to Criminal Investigations

pt-152
  Search Warrants & Digital Evidence

pt-153
  Searching Without a Warrant

Resources

Cyberbullying
Cyberbullying: Our Children, Our Problem