Skip to main content

Technology Implementation - eCrime

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240402-73438-99

Submitted by Bryan Lee Dail on
O.J. Simpson was charged and acquitted with murdering two persons in a widely televised, 9-month jury trial, following a violent attack in June 1994. He was then found liable for their wrongful death in a later civil trail. This presentation will first provide an overview of the trial evidence and identify investigative challenges with this case. Then the presenter, an experienced former federal prosecutor who was not involved in the trials, will describe the present and emerging high technology and digital evidence that might be available if the same crime happened in 2023.

20240402-73443-59

Submitted by Bryan Lee Dail on
Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital "footprints" that can help you during your investigations, no matter your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative ways of seeing a crime scene through different technologies.

20240402-73447-93

Submitted by Bryan Lee Dail on
Join Erin Craw as she explains the benefits of social support in mitigating the adverse effects of stress on officers health and wellbeing. Dr. Craw will also discuss ways to support officers on and off the job. This webinar will also include recommendations and guidance for having difficult conversations with family members.

20240402-73425-23

Submitted by Bryan Lee Dail on
The Internet Corporation for Assigned Names and Numbers (ICANN) and the American Registry for Internet Numbers (ARIN) have joined together to develop a presentation specifically designed for law enforcement focused on cyber security and the roles our organizations play in helping to combat this ever-evolving problem. ICANN helps coordinates the names and numbers that are used as unique identifiers in the global Internet. It is tasked with helping make sure that the Domain Name System (DNS) remains stable, secure, and resilient.

20240402-73455-99

Submitted by Bryan Lee Dail on
Are you curious about when to initiate investigations into domestic partner stalking cases? Join us for an insightful webinar where we delve into the challenges victims face in reporting crimes and how we can bridge the gaps in knowledge and understanding to support them better. In this webinar, we'll explore the current threat landscape associated with domestic partner stalking and discuss phone apps and their potential for abuse.

20240402-71848-07

Submitted by Bryan Lee Dail on
This course focuses on gathering information from social media sites. Students will learn about popular social media platforms, tools that can help them discover information on them, and ways to capture and save online media. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.

20240402-71843-83

Submitted by Bryan Lee Dail on
This course covers a variety of tools and techniques to conduct deep web searches that go beyond common search engines like Google. The course highlights tools for discovering information about people and companies both domestically and internationally. It also includes tools for discovering and manipulating device information such as IP addresses. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.

20240402-71839-56

Submitted by Bryan Lee Dail on
This course provides an introduction to the digital space commonly referred to as social media and networking. Terminology used to describe how social media and networking services are accessed, statistical data on users and mobile devices, and a variety of popular services are covered in the first part of the course.

20240402-71834-69

Submitted by Bryan Lee Dail on
This online course introduces the dark web and some of the most popular tools to access the darknet, including Tor, Freenet, and Invisible Internet Project (I2P). Basic topics include what Tor is, how it works, and who uses it; as well as dark markets in Tor Onion Service Servers (also known as .onion servers) and other hidden services. The course concludes with brief case studies covering some of the largest dark-market seizures in history.

20240402-71830-45

Submitted by Bryan Lee Dail on
This course provides information on what constitutes cyberstalking in a legal context and information on handling cyberstalking complaints. Common elements of cyberstalking cases, potential tools and platforms used by cyberstalkers, and behavioral indicators are also covered in this course. Developed with a victim-centered approach, this course provides information on establishing a relationship with victims to maximize their safety and further investigative efforts.
Subscribe to Technology Implementation - eCrime