Skip to main content

Federal Government

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240403-81349-17

Submitted by Bryan Lee Dail on

In recent years, the digital landscape has provided perpetrators with new tools and avenues to exploit vulnerable individuals for sexual exploitation and human trafficking. Cyber sexual abuse crimes encompass a wide range of activities, including online grooming, non-consensual sharing of intimate images revenge porn, and sextortion.

20240403-80310-86

Submitted by Bryan Lee Dail on
This webinar will examine the investigative and legal considerations related to tracking technology, and the impact of ultra-wideband location networks such as Apple AirTags and other similar emerging technologies. We will use case analysis to illustrate key questions and considerations for both investigators and prosecutors given the increasing criminal use of this technology and proactive use during investigations. Presented by: Justin Fitzsimmons, Associate Vice President, NW3C Jim Emerson, Vice President, NW3C

20240403-80315-41

Submitted by Bryan Lee Dail on
Tradecraft is the analyst/investigators competency. Join Robert Bacon for a discussion of the integrated application of criminal analysis tools, and to learn why analysis is such a vital part of any investigation. He will discuss why it is essential to develop a fact-based argument to support the theory of the criminal case within the parameters set by U.S criminal procedure and the standards of proof needed to progress an investigation and the protection of rights.

20240403-80319-49

Submitted by Bryan Lee Dail on
Identifying and Seizing Digital Evidence provides a comprehensive overview of the issues surrounding digital media in relation to criminal investigations. Topics covered in this training included preparing to respond to the digital crime scene, identifying potential sources of digital evidence, and properly collecting items of evidentiary value to be used in court proceedings. The roles of the first responder, investigator, digital forensic examiner, prosecutor, and defense counsel are differentiated and explored. Legal concerns in conducting a search for digital evidence are also addressed.

20240403-80324-08

Submitted by Bryan Lee Dail on
This training will help investigators with the essential skills they need to obtain electronic evidence internationally. It will cover some foundational concepts about gathering information online, examine the different types of data service providers may have, and review the methods available to law enforcement for preserving and obtaining electronic evidence.

20240403-80328-18

Submitted by Bryan Lee Dail on
This webinar introduces participants to cryptocurrency and its relevance to criminal justice agents and investigations. The webinar will cover topics such as the different categories of cryptocurrency, common cryptocurrencies, the mining process, blockchain, and common cases where cryptocurrency is used or is the target of criminal activity. Participants gain basic knowledge of investigative options that are available to gather intelligence.

20240403-80333-68

Submitted by Bryan Lee Dail on
Trust is an essential component for reducing friction between people, organizations, government, and other entities. When trust is high, people are more willing to cooperate, require less assurances for doing so, and are less skeptical of the outcomes. Unfortunately, todays climate of manipulated media, deep fakes, conflicting sources of information, and sensationalized news has raised many people's level of skepticism. This makes building and maintaining trust particularly difficult but also incredibly important.

20240403-80337-79

Submitted by Bryan Lee Dail on
What has not changed on the motor vehicle in over 125 years? If you answered, "The stamped metal license plate" you are correct! The digital license plate (DLP) of today can do so much more, and you can learn all about it on as we break down this new technology. Digital license plates are here with an array of features, including GPS, Bluetooth, RFID (radio frequency identification) and a cellular modem.

20240403-80342-61

Submitted by Bryan Lee Dail on
Some of the most dangerous counterfeits involve explosive elements of automotive airbags, which can literally explode in the victim's face during a low impact car accident. Join the Automotive Anti-Counterfeiting Council (A2C2) and learn how the members of the association can assist law enforcement with intellectual property investigations. Law enforcement has identified a trend of counterfeited automotive parts growing at an alarming rate.

20240403-80346-43

Submitted by Bryan Lee Dail on
As ransomware gangs move from encryption tactics to data exfiltration and extortion, cybersecurity professionals require a new approach and new way of thinking when it comes to tackling the issue of ransomware. Join this webinar to learn more about: Why preventing data exfiltration is critical in the fight against ransomware Why traditional detection and response solutions are failing to prevent these attacks How organizations can leverage anti data exfiltration technology to secure their data and prevent attacks
Subscribe to Federal Government