Skip to main content

Technology Implementation - eCrime

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240402-71915-38

Submitted by Bryan Lee Dail on
This course presents awareness-level information on a variety of topics related to white collar crime. The course covers basic definitions and terminology, common types of white collar crime, and the effects of white collar crime on society. Students learn to recognize and respond to common internet scams, provide assistance to victims of white collar crime, and recognize warning signs and red flags of criminal behavior. This course emphasizes the role of law enforcement in preventing and responding to white collar crime, and includes additional resources for combating this widespread problem.

20240402-71919-07

Submitted by Bryan Lee Dail on
This course provides fundamental knowledge on financial investigation and data analysis. The investigation portion of the course will cover common consumer scams, how to identify suspects and their financial accounts and best processes for obtaining suspects records. The analysis portion of the course will cover the process of acquiring data, discuss methods for entering data, and provide strategies for finding patterns in data sets.

20240402-71924-56

Submitted by Bryan Lee Dail on
Join a team of experts from NW3C as they provide thoughtful and detailed answers to financial investigation questions you submit. Click here to submit questions regarding financial crimes, financial analysis and What else? a panel of NW3C experts will provide answers during this live session.

20240402-71928-73

Submitted by Bryan Lee Dail on
Criminal, terror, and other types of illicit networks all need revenue streams to survive. This involves control of financial flows from the point of revenue generation through goal accomplishment. To some extent, many of these networks will engage in the international money movement processes maintained by financial institutions around the world in order to move the money in an efficient and secure manner. This presentation will describe the legitimate processes used by illicit networks to move money through financial systems.

20240402-71932-92

Submitted by Bryan Lee Dail on
Hundreds of incidents shootings, workplace violence, other attacks are taking place across schools and communities every year. In response, schools and communities continue to invest their money, time, and efforts into more deterrents, like locks, metal detectors, cameras, etc., but what happens when attackers are undeterred like we are seeing today?

20240401-85016-29

Submitted by Bryan Lee Dail on
This course provides an introduction to data encryption, covering the purpose of encryption as well as the process of encrypting data, and clarifying the distinctions between encryption and other operations like password protection and encoding. It explores the confusion, diffusion, and secret key encryption methods. Topics include detecting encryption (including recognition of some of the most popular types of encryption software), as well as proper procedures for law enforcement professionals who detect that encryption may be present on a device.

20240401-84952-67

Submitted by Bryan Lee Dail on
This course covers basic information and concepts that serve as an introduction to virtual currencies and their relationship to other types of currency. It covers various types of virtual currency, including the difference between decentralized and centralized currencies, with a strong focus on Bitcoin: what it is, how it is stored, and Bitcoin-specific investigative tips and techniques.

20240401-84958-56

Submitted by Bryan Lee Dail on
This course focuses on practical online search techniques. Students will learn about using the advanced features of popular search engines, accessing cached versions of websites, searching with images, and common signs of fake and manipulated images. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.

20240401-85003-84

Submitted by Bryan Lee Dail on
This course provides basic information for first responders who may encounter digital evidence in the course of their duties. Topics include the definition of digital evidence, where it can be found, the importance of getting digital devices to a forensics expert, and the ways in which digital evidence can be compromised. This course also addresses the issue of when a warrant is required to seize and/or search digital devices. This is the first of seven modules in the training series Legal Concerns for Digital Evidence Responders.

20240401-85007-91

Submitted by Bryan Lee Dail on
This course provides information on obtaining and executing search warrants in cases involving digital evidence, with a focus on the similarities and differences between these and other search warrants. The course covers establishing probable cause, particularity, scope, and nexus; the use of outside experts; and out-of-state warrants for remote evidence. This is the second of seven modules in the training series Legal Concerns for Digital Evidence Responders. It can be completed as a stand-alone course or in combination with the other six modules.
Subscribe to Technology Implementation - eCrime