Attention
This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.
This course presents awareness-level information on a variety of topics related to white collar crime. The course covers basic definitions and terminology, common types of white collar crime, and the effects of white collar crime on society. Students learn to recognize and respond to common internet scams, provide assistance to victims of white collar crime, and recognize warning signs and red flags of criminal behavior. This course emphasizes the role of law enforcement in preventing and responding to white collar crime, and includes additional resources for combating this widespread problem.
20240402-71919-07
This course provides fundamental knowledge on financial investigation and data analysis. The investigation portion of the course will cover common consumer scams, how to identify suspects and their financial accounts and best processes for obtaining suspects records. The analysis portion of the course will cover the process of acquiring data, discuss methods for entering data, and provide strategies for finding patterns in data sets.
20240402-71924-56
Join a team of experts from NW3C as they provide thoughtful and detailed answers to financial investigation questions you submit. Click here to submit questions regarding financial crimes, financial analysis and What else? a panel of NW3C experts will provide answers during this live session.
20240402-71928-73
Criminal, terror, and other types of illicit networks all need revenue streams to survive. This involves control of financial flows from the point of revenue generation through goal accomplishment. To some extent, many of these networks will engage in the international money movement processes maintained by financial institutions around the world in order to move the money in an efficient and secure manner.
This presentation will describe the legitimate processes used by illicit networks to move money through financial systems.
20240402-71932-92
Hundreds of incidents shootings, workplace violence, other attacks are taking place across schools and communities every year. In response, schools and communities continue to invest their money, time, and efforts into more deterrents, like locks, metal detectors, cameras, etc., but what happens when attackers are undeterred like we are seeing today?
20240401-94624-76
Presented the VALOR presentation Stressors Faced by Women in Law Enforcement to the Empowering Women in Law Enforcement Conference
20240401-84952-67
This course covers basic information and concepts that serve as an introduction to virtual currencies and their relationship to other types of currency. It covers various types of virtual currency, including the difference between decentralized and centralized currencies, with a strong focus on Bitcoin: what it is, how it is stored, and Bitcoin-specific investigative tips and techniques.
20240401-84958-56
This course focuses on practical online search techniques. Students will learn about using the advanced features of popular search engines, accessing cached versions of websites, searching with images, and common signs of fake and manipulated images. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.
20240401-85003-84
This course provides basic information for first responders who may encounter digital evidence in the course of their duties. Topics include the definition of digital evidence, where it can be found, the importance of getting digital devices to a forensics expert, and the ways in which digital evidence can be compromised. This course also addresses the issue of when a warrant is required to seize and/or search digital devices.
This is the first of seven modules in the training series Legal Concerns for Digital Evidence Responders.
20240401-85007-91
This course provides information on obtaining and executing search warrants in cases involving digital evidence, with a focus on the similarities and differences between these and other search warrants. The course covers establishing probable cause, particularity, scope, and nexus; the use of outside experts; and out-of-state warrants for remote evidence.
This is the second of seven modules in the training series Legal Concerns for Digital Evidence Responders. It can be completed as a stand-alone course or in combination with the other six modules.