Skip Ribbon Commands
Skip to main content
Navigate Up
ICAC P2P Investigations
Sign In
Page Banner
Skip Navigation LinksNCJTC Home > ICAC > On-site Training > FVTC ICAC T&TA > ICAC P2P Investigations
 

 ICAC Peer to Peer Investigations

 
 
In response to changing trends in P2P investigations, the ICAC Training & Technical Assistance Program now offers FOUR separate courses which address peer-to-peer investigations in different file sharing networks, as outlined below.
 

New!! World surrounded by multiple computer monitors ICAC Gigatribe - This 2 day training program is designed to introduce experienced investigators to the Gigatribe file sharing network.  Students will learn how to install, configure and use the Gigatribe software client and the associated tools used to investigate the distribution of child pornography on the Gigatribe network.  Evidence artifacts that are created during the use of the tools will be identified and explained.  Digital trace evidence located on the offender’s computer will be identified and discussed.  Prerequisites: Students must possess a strong working knowledge of IP addresses, ports, hash values, and have both experience conducting on-line child exploitation investigations (including P2P) and an ICACCOPS account. 

Length of program for the ICAC-Gigatribe course is 2 days.

 

Rows of laptop computersNew!! ICAC-BitTorrent Investigations This 2 day training program is designed to introduce experienced investigators to the BitTorrent file sharing network. Students will learn how to install, configure and use the Roundup-BitTorrent tool to investigate child pornography distribution. Prerequisites: Students must possess a strong working knowledge of IP addresses, ports, hash values, and have both experience conducting on-line child exploitation investigations (including P2P) and an ICACCOPS account.


Length of program for the ICAC-BitTorrent course is 2 days.
 
 

  

 

Computer mouseICAC-P2P ARES Investigations This 1 day training program is designed to introduce experienced investigators to the ARES file sharing network. Students will learn how to install, configure and use the Roundup-ARES tool to investigate the distribution of child pornography on the ARES network. The ARES investigative tool was developed by the Ontario Provincial Police and works with the ICACCOPS website. Prerequisites: Students must possess a strong working knowledge of IP addresses, ports, hash values, have experience conducting on-line child exploitation investigations and an ICACCOPS account.

Length of program for the ICAC-ARES course is 2 days.  

 

Green image of fingerprint
ICAC-P2P eMule Investigations
This 2 day training program is designed to introduce experienced investigators to the eMule file sharing network. Students will learn how to install, configure and use the Roundup-eMule tool to investigate the distribution of child pornography on the eMule network. The RoundUp eMule tool was developed by the University of Massachusetts and works with the ICACCOPS website. Prerequisites: Students must possess a strong working knowledge of IP addresses, ports, hash values, have experience conducting on-line child exploitation investigations and an ICACCOPS account.

Length of program for the ICAC eMule course is 2 days.

 

World globe covered with laptops
ICAC-P2P Gnutella
- This 2 1/2 day training program is to provide ICAC investigators with the training, materials and tools necessary to investigate the use of the Gnutella peer-to-peer file sharing network using RoundUp tool, a Gnutella investigation program developed collaboratively by U-MASS Amherst. This is yet another tool which can be added to the ICAC Task Force Program’s arsenal of peer-to-peer file sharing investigative tools

Length of program for the ICAC-P2P Gnutella course is 2-½ days.  

 

Class sizes: 36

Target Audience: This training is open to state, local and federal law enforcement investigators. State and local agency registrants must be a member of a Regional ICAC Task Force or Affiliate Agency.

How to Register for these courses: The dates and locations that are available for this course are shown below in the box titled "Training Schedule". Click on the links in the Class field for registration. In order to register for this course, the course must be listed as open or waitlist in the training schedule displayed below.

Class statuses marked with an asterisk (*), in the training schedule below, are pending approval from the Department of Justice. Do not make any travel reservations or incur any other costs until confirmation to attend is received via email.
 

 Training Schedule - Click the Link Under "Class" to Register

 
ClassLocationStart DateEnd DateReg DeadlineStatus
ICAC-BitTorrent InvestigationsAlexandria, VA05-15-201405-16-201403-20-2014Waitlist
ICAC-Investigative TechniquesAlexandria, VA05-19-201405-23-201403-24-2014Waitlist
ICAC-BitTorrent InvestigationsNaperville, IL06-09-201406-10-201405-12-2014Invite Only
ICAC-GigatribeNaperville, IL06-11-201406-12-201405-14-2014Invite Only
ICAC-BitTorrent InvestigationsIrvine, CA06-26-201406-27-201405-01-2014Open