Skip to main content

Technology Implementation - eCrime

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20220824-81023-63

Submitted by Bryan Lee Dail on

NW3C asked to present two, three hour sessions on Criminal INTEL. This session was called Criminal INTEL Governance. The session examined the NSISS and the NCISP as related to GLOBAL and the CICC to determine if the 2022 Information Sharing Environment was still adequate as organized under a FACA given changing stakeholder needs demanding as much if not more bottom-up Sharing of Sensitive but Unclassified data among public safety organizations, the ODNI, DHS, and DOJ.

20220824-81019-23

Submitted by Bryan Lee Dail on

NW3C asked to send Justin Fitzsimmons to present, "The Digital Crime Scene: Understanding the Nuances of Search and Seizure, Discovery & Authentication." The presentations is described as, "This presentation and demonstration explore the various types of technology and digital evidence that may be used to support an investigation and prosecution of technology-facilitated child sexual exploitation cases. The presentation covers both technical and non-technical evidence that might be recovered from crime scenes or through the interviewing of potential witnesses.

20220824-81014-42

Submitted by Bryan Lee Dail on

The Gloucester City Prosecutors Office has requested HTCS Rodgers to provide a two hour block of instruction on Cryptocurrency and Cyber Crime as one part of a week long High Tech Crimes Conference at the Gloucester Cty Police Academy on July 1, 2022 in Sewell, NJ on the Rowan College of South Jersey Campus.

20220816-83624-53

Submitted by Bryan Lee Dail on

This course builds on the concepts introduced in FC101 (FIPS) and FC105 (FREA), introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises. Students conduct a mock investigation that includes interviews, data analysis, and the examination of various documents.

20220816-81937-98

Submitted by Bryan Lee Dail on

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes, but is not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

20220816-81931-83

Submitted by Bryan Lee Dail on

This course promotes a multi-agency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and resources for investigation and community awareness. Detailed examination of a case study from initial complaint to prosecution reinforces and illustrates the course content.

20220816-81925-63

Submitted by Bryan Lee Dail on

This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues.

20220816-81916-03

Submitted by Bryan Lee Dail on

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

20220816-81911-08

Submitted by Bryan Lee Dail on

This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.

20220816-81905-49

Submitted by Bryan Lee Dail on

This intermediate spreadsheeting course uses Microsoft Excel to assess and organize data in an electronic format. The class is designed for learners who have experience using Excel and who want to increase their spreadsheeting knowledge and skills. Topics include text functions, absolute referencing, date and time functions, flash fill, handling formula errors, VLOOKUP, dynamic arrays, and data validation. The course combines live demonstrations, instructor-led exercises, and independent student exercises.

Subscribe to Technology Implementation - eCrime