Skip to main content

Technology Implementation - eCrime

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240409-103317-82

Submitted by Bryan Lee Dail on

This webinar will explore the ever-expanding importance of Internet of Things (IoT) crime scenes and the potential evidence generated by IoT and wearable devices. The session will include real-world examples showcasing IoT crime scene evidence and exhibits, illustrating how these interconnected devices can play a pivotal role in solving cases. The importance of lawful access to IoT devices, including appropriate legal processes and proper pre-planning considerations for IoT evidence searches, will also be discussed.

20240409-103222-85

Submitted by Bryan Lee Dail on
This interactive online module provides an overview of how ransomware can affect devices and networks, how to recognize and respond to a ransomware attack, and how to prevent ransomware attacks.

20240409-103230-07

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums, and VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams.? This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20240409-103235-22

Submitted by Bryan Lee Dail on
Cybercriminals?in clearnet and darknet spaces often use tools like online communication platforms in the commission of cybercrimes. This course introduces participants to various communication platforms and their use by online threat actors. Participants will gain technical?knowledge of communication platforms and gain practical knowledge on how to conduct investigations that involve these platforms.

20240409-103240-94

Submitted by Bryan Lee Dail on
This introductory course familiarizes participants with illegal darknet markets and associated forums, particularly the illicit goods and services offered, as well as successful law enforcement operations targeting these sites. Participants will gain practical knowledge on how to create anonymous accounts to access and monitor these sites and intelligence collection tactics for use in law enforcement investigations.

20240409-103246-32

Submitted by Bryan Lee Dail on
By the year 2025, it is expected that there will be over 45 billion connected devices around the world that is 9.27 connected devices per person. The Internet of Things (IoT) utilizes a variety of communication standards and a unique set of networking protocols to connect these devices. This webinar will explore these unique IoT networking protocols along with their varied IoT topography and explain IoT network interrogation techniques to be used in an investigation.

20240409-103251-98

Submitted by Bryan Lee Dail on
Join us for an essential conversation with two veteran law enforcement leaders as we explore the evolving challenges faced by law enforcement related to the ever-increasing amount, and complexity of digital evidence available in a typical investigation. Hear how agencies can adapt to keep pace with the constant digital expansion within law enforcement investigations. Do not miss the opportunity to participate in this important discussion. Presented by: Ashan M.

20240409-103256-15

Submitted by Bryan Lee Dail on
This interactive course provides fundamental knowledge on human trafficking. It helps law enforcement, support staff, analysts, and regulatory agencies to recognize the situational and behavioral indicators associated with human trafficking victims, facilitators, and traffickers. The examples and scenarios throughout the course will educate and raise awareness to help understand how technology and social media and networking platforms impact human trafficking.

20240409-103327-48

Submitted by Bryan Lee Dail on
The Public Safety Threat Alliance Intelligence team will walk through the most frequent and impactful attack paths observed by threat actors targeting public safety organizations around the world. Using the MITRE ATT&CK matrix, we will breakdown the tradecraft observed targeting emergency services, and detail the importance of understanding the critical steps of the kill chain. Additionally, we will unveil insights from the criminal underground to highlight what they believe are the most valuable aspects of public safety.

20240409-103322-54

Submitted by Bryan Lee Dail on
This webinar will show how parallel investigation techniques commence with a review of tactics and strategies that can be introduced in related fraud enquires. The importance protecting the tradecraft deployed and the use of open and closed source research will be discussed to include comparable techniques used in covert sensitive investigations. Money laundering utilizing virtual, or cryptocurrency will be featured to examine current tradecraft. Additionally, this presentation will include discussion of the impact on not-for-profits as well as a look at mortgage fraud.
Subscribe to Technology Implementation - eCrime