Skip to main content

Federal Government

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240401-85012-19

Submitted by Bryan Lee Dail on
This course provides a legal overview of what investigators are and are not permitted to do while conducting online undercover investigations. Topics include terms of service, entrapment and outrageous government misconduct, and wiretapping law as it relates to the recording and documenting of online activities. This course also covers defense strategies commonly used to counter online undercover investigations. This is the fifth of seven modules in the training series Legal Concerns for Digital Evidence Responders.

20240401-85016-29

Submitted by Bryan Lee Dail on
This course provides an introduction to data encryption, covering the purpose of encryption as well as the process of encrypting data, and clarifying the distinctions between encryption and other operations like password protection and encoding. It explores the confusion, diffusion, and secret key encryption methods. Topics include detecting encryption (including recognition of some of the most popular types of encryption software), as well as proper procedures for law enforcement professionals who detect that encryption may be present on a device.

20240401-85021-46

Submitted by Bryan Lee Dail on
This interactive course provides fundamental knowledge on human trafficking. It helps law enforcement, support staff, analysts, and regulatory agencies to recognize the situational and behavioral indicators associated with human trafficking victims, facilitators, and traffickers. The examples and scenarios throughout the course will educate and raise awareness to help understand how technology and social media and networking platforms impact human trafficking.

20240401-85025-65

Submitted by Bryan Lee Dail on
Just a mile away from the Pottawattamie County Sheriffs Office in Council Bluffs, Iowa, a woman is shot during a nighttime stroll in a public park. It is the latest in a bizarre series of events, three years into a five-year missing persons investigation. Closing the case will take years of work, dozens of search warrants, and two weeks of testimony. This presentation will provide a case study of the investigation and prosecution of a no-body homicide.

20240401-73337-19

Submitted by Bryan Lee Dail on

In this webinar, the audience will get deeper knowledge and understanding about how to enhance their investigations by utilizing Radio Frequency Technology.

Topics covered during the session will be:

• Identifying and capturing cell towers at crime scenes
• Validating CDR records
• Event planning for potential mass casualty incidents
• Identifying towers during physical surveillance
• Basics on what is RF surveying

Presented by:
Lt. Eugene Kim, Beverly Hills Police Department
Magnus Hedlund, Vespereye

20240401-72340-09

Submitted by Bryan Lee Dail on
By the year 2025, it is expected that there will be over 45 billion connected devices around the world that is 9.27 connected devices per person. The Internet of Things (IoT) utilizes a variety of communication standards and a unique set of networking protocols to connect these devices. This webinar will explore these unique IoT networking protocols along with their varied IoT topography and explain IoT network interrogation techniques to be used in an investigation.

20240401-72345-92

Submitted by Bryan Lee Dail on
Some of the most dangerous counterfeits involve explosive elements of automotive airbags, which can literally explode in the victim's face during a low impact car accident. Join the Automotive Anti-Counterfeiting Council (A2C2) and learn how the members of the association can assist law enforcement with intellectual property investigations. Law enforcement has identified a trend of counterfeited automotive parts growing at an alarming rate.

20240401-72350-99

Submitted by Bryan Lee Dail on
Expand your DFIR skills by diving into the world of malware analysis. In this webinar, you will learn essential techniques and strategies for incorporating malware analysis into your skillset, enabling you to effectively identify, analyze, and mitigate malicious software threats. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks.

20240401-72354-54

Submitted by Bryan Lee Dail on
As ransomware gangs move from encryption tactics to data exfiltration and extortion, cybersecurity professionals require a new approach and new way of thinking when it comes to tackling the issue of ransomware. Join this webinar to learn more about: Why preventing data exfiltration is critical in the fight against ransomware Why traditional detection and response solutions are failing to prevent these attacks How organizations can leverage anti data exfiltration technology to secure their data and prevent attacks

20240328-90448-66

Submitted by Mrs. Cherrie L… on

The community supervision field has advanced over the last several decades with core evidence-based practices widely implemented by supervision agencies. However, agencies could benefit from more support to continue to improve outcomes for the people served and their communities. Through centralizing critical resources, offering training, and providing technical assistance, the Community Supervision Resource Center (CSRC) will strengthen pretrial, probation, and parole supervision agencies and build a network of practitioners committed to pursuing innovative and best practices.

Subscribe to Federal Government