Skip to main content

Technology Implementation - eCrime

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20220804-141444-27

Submitted by Bryan Lee Dail on
This course presents awareness-level information on mortgage fraud. The course covers basic definitions and terminology, common types of mortgage fraud schemes, components of fraud, roles in the mortgage process, and legal explanations. Students also learn to recognize fraud indicators associated with a variety of schemes and opportunities to commit fraud throughout the mortgage process. A sample mortgage loan application and other forms used in the process are available to download within this course.

20220804-141437-82

Submitted by Bryan Lee Dail on
Tradecraft is the analyst/investigators competency. Join Robert Bacon for a discussion of the integrated application of criminal analysis tools, and to learn why analysis is such a vital part of any investigation. He will discuss why it is essential to develop a fact-based argument to support the theory of the criminal case within the parameters set by U.S criminal procedure and the standards of proof needed to progress an investigation and the protection of rights.

20220804-141433-07

Submitted by Bryan Lee Dail on
This webinar presented by subject matter experts will cover the skills necessary to perform advanced cyber investigations using legal, open source, and closed source data. Attendees will learn the concepts and possibilities on how to identify those committing the most heinous crimes. We will look at a range of techniques for finding the who done it, from obtaining more evidence to looking through the eye of the criminal and discovering how they chose and researched their victim. We will look at what can be done for crimes committed in public and private spaces.

20220804-141428-38

Submitted by Bryan Lee Dail on
Money laundering is an integral part of many, if not most, of crime and terror finance. From local crime and tax avoidance, to transnational networks, the source of money will be masked to conceal the source and at the same time serve to make the money usable in the legitimate worlds of business and finance.

20220803-74837-99

Submitted by Bryan Lee Dail on
The National Motor Vehicle Title Information System (NMVTIS) is intended to protect consumers from fraud and deters the selling of unsafe and stolen vehicles. Vehicle information from state motor vehicle titling agencies, vehicle recyclers, junk and salvage yards, insurance carriers, and individuals is compiled into NMVTIS. The Law Enforcement Access Tool (LEAT) is the method to which law enforcement can access NMVTIS information along with other vehicle records and history.

20220803-74827-46

Submitted by Bryan Lee Dail on
This course presents awareness-level information on the Bank Secrecy Act (BSA) and how it is used to aid law enforcement investigations into terrorism and criminal activity. Students will be introduced to the BSA, the USA PATRIOT Act, and definitions of commonly-used terms. This course will also explain the various documents and forms filed by financial institutions under the BSA. The Financial Crimes Enforcement Network (FinCEN) will be discussed with an emphasis on services and resources provided to law enforcement.

20220803-74823-17

Submitted by Bryan Lee Dail on
This interactive course provides fundamental knowledge on human trafficking. It helps law enforcement, support staff, analysts, and regulatory agencies to recognize the situational and behavioral indicators associated with human trafficking victims, facilitators, and traffickers. The examples and scenarios throughout the course will educate and raise awareness to help understand how technology and social media and networking platforms impact human trafficking.

20220803-74818-84

Submitted by Bryan Lee Dail on
This course provides information on what constitutes cyberstalking in a legal context and information on handling cyberstalking complaints. Common elements of cyberstalking cases, potential tools and platforms used by cyberstalkers, and behavioral indicators are also covered in this course. Developed with a victim-centered approach, this course provides information on establishing a relationship with victims to maximize their safety and further investigative efforts.

20220803-74812-33

Submitted by Bryan Lee Dail on
What is there to know about bank fraud? Everything! Join us for an interactive presentation discussing the main types of bank fraud (1st Party,3rd Party/ATO, Identity Theft). There will be content involving the various channels of fraud (Check, ACH, Wire, Debit, Bill Pay, Person to Person). We will discuss trends in the industry, and how Capital One can assist in your investigations.
Subscribe to Technology Implementation - eCrime