Skip to main content

Technology Implementation - eCrime

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240401-85012-19

Submitted by Bryan Lee Dail on
This course provides a legal overview of what investigators are and are not permitted to do while conducting online undercover investigations. Topics include terms of service, entrapment and outrageous government misconduct, and wiretapping law as it relates to the recording and documenting of online activities. This course also covers defense strategies commonly used to counter online undercover investigations. This is the fifth of seven modules in the training series Legal Concerns for Digital Evidence Responders.

20240401-85021-46

Submitted by Bryan Lee Dail on
This interactive course provides fundamental knowledge on human trafficking. It helps law enforcement, support staff, analysts, and regulatory agencies to recognize the situational and behavioral indicators associated with human trafficking victims, facilitators, and traffickers. The examples and scenarios throughout the course will educate and raise awareness to help understand how technology and social media and networking platforms impact human trafficking.

20240401-85025-65

Submitted by Bryan Lee Dail on
Just a mile away from the Pottawattamie County Sheriffs Office in Council Bluffs, Iowa, a woman is shot during a nighttime stroll in a public park. It is the latest in a bizarre series of events, three years into a five-year missing persons investigation. Closing the case will take years of work, dozens of search warrants, and two weeks of testimony. This presentation will provide a case study of the investigation and prosecution of a no-body homicide.

20240401-73337-19

Submitted by Bryan Lee Dail on

In this webinar, the audience will get deeper knowledge and understanding about how to enhance their investigations by utilizing Radio Frequency Technology.

Topics covered during the session will be:

• Identifying and capturing cell towers at crime scenes
• Validating CDR records
• Event planning for potential mass casualty incidents
• Identifying towers during physical surveillance
• Basics on what is RF surveying

Presented by:
Lt. Eugene Kim, Beverly Hills Police Department
Magnus Hedlund, Vespereye

20240401-72354-54

Submitted by Bryan Lee Dail on
As ransomware gangs move from encryption tactics to data exfiltration and extortion, cybersecurity professionals require a new approach and new way of thinking when it comes to tackling the issue of ransomware. Join this webinar to learn more about: Why preventing data exfiltration is critical in the fight against ransomware Why traditional detection and response solutions are failing to prevent these attacks How organizations can leverage anti data exfiltration technology to secure their data and prevent attacks

20240401-72350-99

Submitted by Bryan Lee Dail on
Expand your DFIR skills by diving into the world of malware analysis. In this webinar, you will learn essential techniques and strategies for incorporating malware analysis into your skillset, enabling you to effectively identify, analyze, and mitigate malicious software threats. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks.

20240401-72345-92

Submitted by Bryan Lee Dail on
Some of the most dangerous counterfeits involve explosive elements of automotive airbags, which can literally explode in the victim's face during a low impact car accident. Join the Automotive Anti-Counterfeiting Council (A2C2) and learn how the members of the association can assist law enforcement with intellectual property investigations. Law enforcement has identified a trend of counterfeited automotive parts growing at an alarming rate.

20240401-72340-09

Submitted by Bryan Lee Dail on
By the year 2025, it is expected that there will be over 45 billion connected devices around the world that is 9.27 connected devices per person. The Internet of Things (IoT) utilizes a variety of communication standards and a unique set of networking protocols to connect these devices. This webinar will explore these unique IoT networking protocols along with their varied IoT topography and explain IoT network interrogation techniques to be used in an investigation.

20240326-142305-91

Submitted by Bryan Lee Dail on

This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues.

20240325-114622-41

Submitted by Bryan Lee Dail on

This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific folder that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

Subscribe to Technology Implementation - eCrime