Skip to main content

Technology Implementation - eCrime

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240403-80310-86

Submitted by Bryan Lee Dail on
This webinar will examine the investigative and legal considerations related to tracking technology, and the impact of ultra-wideband location networks such as Apple AirTags and other similar emerging technologies. We will use case analysis to illustrate key questions and considerations for both investigators and prosecutors given the increasing criminal use of this technology and proactive use during investigations. Presented by: Justin Fitzsimmons, Associate Vice President, NW3C Jim Emerson, Vice President, NW3C

20240403-80315-41

Submitted by Bryan Lee Dail on
Tradecraft is the analyst/investigators competency. Join Robert Bacon for a discussion of the integrated application of criminal analysis tools, and to learn why analysis is such a vital part of any investigation. He will discuss why it is essential to develop a fact-based argument to support the theory of the criminal case within the parameters set by U.S criminal procedure and the standards of proof needed to progress an investigation and the protection of rights.

20240403-80319-49

Submitted by Bryan Lee Dail on
Identifying and Seizing Digital Evidence provides a comprehensive overview of the issues surrounding digital media in relation to criminal investigations. Topics covered in this training included preparing to respond to the digital crime scene, identifying potential sources of digital evidence, and properly collecting items of evidentiary value to be used in court proceedings. The roles of the first responder, investigator, digital forensic examiner, prosecutor, and defense counsel are differentiated and explored. Legal concerns in conducting a search for digital evidence are also addressed.

20240403-80324-08

Submitted by Bryan Lee Dail on
This training will help investigators with the essential skills they need to obtain electronic evidence internationally. It will cover some foundational concepts about gathering information online, examine the different types of data service providers may have, and review the methods available to law enforcement for preserving and obtaining electronic evidence.

20240403-80328-18

Submitted by Bryan Lee Dail on
This webinar introduces participants to cryptocurrency and its relevance to criminal justice agents and investigations. The webinar will cover topics such as the different categories of cryptocurrency, common cryptocurrencies, the mining process, blockchain, and common cases where cryptocurrency is used or is the target of criminal activity. Participants gain basic knowledge of investigative options that are available to gather intelligence.

20240403-80333-68

Submitted by Bryan Lee Dail on
Trust is an essential component for reducing friction between people, organizations, government, and other entities. When trust is high, people are more willing to cooperate, require less assurances for doing so, and are less skeptical of the outcomes. Unfortunately, todays climate of manipulated media, deep fakes, conflicting sources of information, and sensationalized news has raised many people's level of skepticism. This makes building and maintaining trust particularly difficult but also incredibly important.

20240403-80342-61

Submitted by Bryan Lee Dail on
Some of the most dangerous counterfeits involve explosive elements of automotive airbags, which can literally explode in the victim's face during a low impact car accident. Join the Automotive Anti-Counterfeiting Council (A2C2) and learn how the members of the association can assist law enforcement with intellectual property investigations. Law enforcement has identified a trend of counterfeited automotive parts growing at an alarming rate.

20240403-80346-43

Submitted by Bryan Lee Dail on
As ransomware gangs move from encryption tactics to data exfiltration and extortion, cybersecurity professionals require a new approach and new way of thinking when it comes to tackling the issue of ransomware. Join this webinar to learn more about: Why preventing data exfiltration is critical in the fight against ransomware Why traditional detection and response solutions are failing to prevent these attacks How organizations can leverage anti data exfiltration technology to secure their data and prevent attacks

20240403-80351-99

Submitted by Bryan Lee Dail on
This course presents awareness-level information on mortgage fraud. The course covers basic definitions and terminology, common types of mortgage fraud schemes, components of fraud, roles in the mortgage process, and legal explanations. Students also learn to recognize fraud indicators associated with a variety of schemes and opportunities to commit fraud throughout the mortgage process. A sample mortgage loan application and other forms used in the process are available to download within this course.

20240403-80427-63

Submitted by Bryan Lee Dail on
In this 90-minute training session, "Navigating Human Trafficking: Awareness and Effective Responses," participants will gain a foundational understanding of human trafficking while focusing on practical techniques and approaches to ensure successful interactions and positive outcomes for victims and survivors. The session includes an overview of human trafficking, defining its various forms and shedding light on its prevalence. This concise yet comprehensive introduction includes definitions, myths and stereotypes, federal law, considerations, and case examples.
Subscribe to Technology Implementation - eCrime