Skip to main content

Technology Implementation - eCrime

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250214-75910-78

Submitted by Bryan Lee Dail on
This three-day course covers the fundamentals of financial investigations and incorporates some of the more advanced processes that elevate an investigation. During this course, students will learn about investigative processes, practical tools, and sources of information necessary to plan and conduct financial investigations. The course begins with a description of the basic composition of elements within illicit financial networks and how they work to compromise legitimate business and financial sectors.

20250214-75920-77

Submitted by Bryan Lee Dail on
This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft.

20250214-75900-85

Submitted by Bryan Lee Dail on
This course is designed specifically for law enforcement officers and investigators, providing the tools and knowledge needed to combat the growing threat of technology facilitated scams targeting older adults. Participants will learn to identify and investigate various digital fraud tactics, from tech support scams to government imposter fraud, and artificial intelligence schemes. The course covers the latest technology and platforms used by criminals, as well as effective techniques for tracing, reporting, and prosecuting these crimes while approaching victims with care.

20250214-75916-88

Submitted by Bryan Lee Dail on
This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence. *Prepare. Prepare to respond to an incident or crime scene where digital evidence may be present. *Identify. Learn tow to identify relevant sources of digital evidence in an ever-evolving landscape. *Collect.

20250214-75905-62

Submitted by Bryan Lee Dail on
This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

20250212-74154-65

Submitted by Bryan Lee Dail on
This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

20250212-74157-96

Submitted by Bryan Lee Dail on
This one-day course provides foundational spreadsheeting knowledge and skills to enhance workplace productivity. The course covers basic navigation of Microsoft Excel by combining live demonstrations and hands-on exercises. Work with multiple worksheets within a workbook Hide, unhide, and protect worksheets Adjust rows and columns Use copy and paste options Find, select, and sort data

20250212-73730-06

Submitted by Bryan Lee Dail on
This webinar will introduce students to fundamental concepts of Open-Source Intelligence (OSINT) collection, organization, and analysis working within cryptocurrency investigations. The session will cover ethical and legal considerations, best practices for gathering and storing data, and techniques for evaluating source credibility and detecting bias. Students will learn how to properly cite sources, maintain data integrity, and use OSINT tools effectively.

20250211-152304-56

Submitted by Bryan Lee Dail on

NW3C is sending staff Jeff Lybarger to run the NW3C/BJA exhibit at the 2024 National Public Safety Partnership (PSP) 10th Anniversary Summit: Building Safer Communities Together to communicate the resources offered by BJA/NW3C.

Subscribe to Technology Implementation - eCrime