Skip to main content

Federal Government

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240402-73352-94

Submitted by Bryan Lee Dail on
This webinar will cover the various dark nets: TOR, I2P, ZeroNet, IPFS, LokiNet and explain the differences between them. Attendees will learn about various investigative methods to different elements of criminality that exist on these dark nets. A very cursory overview of cryptocurrencies will be covered and how the cryptocurrencies are the cornerstone of dark web commerce as well as the best investigative leads. Presented by: Keven Hendricks, Detective, City of New Brunswick Police Department

20240402-73402-14

Submitted by Bryan Lee Dail on
This course introduces the history of UAVs and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones. Topics include gathering evidence both internal and external to the drone, as well as methods for manually processing flight logs and displaying data in Google Earth.

20240402-73407-93

Submitted by Bryan Lee Dail on
In todays cyber threat environment, attackers and defenders are constantly trying to outmaneuver each other and the stakes are higher than ever, particularly for mission-critical systems and communications. Understanding the methods and motivations of threat actors is crucial to developing a proactive program to defend against and prevent future attacks. In part one of our four part webinar series, we will introduce our insights and analysis of the most significant and impactful cyber threats facing public safety organizations.

20240402-73411-85

Submitted by Bryan Lee Dail on
The first module of this course covers fundamentals such as recognizing computer components and their functions, accessing computer firmware, and the startup and shutdown processes. The second module covers how a hard disk drive works, how data is converted into digital information, how to calculate the storage capacity of a device, partitioning and how that is used for storage, and how a solid state hard drive functions.

20240402-73416-84

Submitted by Bryan Lee Dail on
Have you ever wondered how the forensic tools you use, know what they do? Have you ever wondered what an artifact means and why the 0 indicates a call was missed? Join NW3C High-Tech Crime Specialist Chris Atha as he introduces how to find these answers. Chris will break down the basics of setting up a mobile test device and performing basic differential testing using an iOS device. These steps will be performed using various free and open source tools, which students can use to follow along.

20240402-73425-23

Submitted by Bryan Lee Dail on
The Internet Corporation for Assigned Names and Numbers (ICANN) and the American Registry for Internet Numbers (ARIN) have joined together to develop a presentation specifically designed for law enforcement focused on cyber security and the roles our organizations play in helping to combat this ever-evolving problem. ICANN helps coordinates the names and numbers that are used as unique identifiers in the global Internet. It is tasked with helping make sure that the Domain Name System (DNS) remains stable, secure, and resilient.

20240402-73429-92

Submitted by Bryan Lee Dail on
Often viewed as a nuisance as opposed to a crime, swatting calls have become extremely common over the past decade. Intertwined with the online gaming culture, swatting has become so popular that there are Discord, YouTube, and Telegram channels dedicated to it. Many police departments feel that these cases will often lead them outside of their jurisdictions, or even their country, and thus they are fruitless and pointless investigations. Nothing could be further from the truth!

20240402-73434-51

Submitted by Bryan Lee Dail on
This course focuses on the modern challenges with introducing digital evidence in court. In this course, we cover both Brady and admissibility requirements and explain what steps need to be taken to ensure digital evidence can be introduced and effectively used at trial. Takeaways from the course include best practices for visual presentations and a mock exam template.
Subscribe to Federal Government