Skip to main content

$0 - $2,500

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140430-18

Submitted by Bryan Lee Dail on
Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital "footprints" that can help you during your investigations, no matter your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative ways of seeing a crime scene through different technologies.

20250205-140434-23

Submitted by Bryan Lee Dail on
Over the next year, a team of local and state experts will be providing you with all the basics to get you and your team started with building a cryptocurrency program. We will discuss why you need to know about crypto and how current scams use it. We will give you the basics including how it works, how to seize it, how to store it, and how to return it to victims. We will talk about how to engage with exchanges and how to read their returns. We will provide you with best practice information and sample warrants.

20250205-140407-43

Submitted by Bryan Lee Dail on
Departments nationwide are being inundated with reports of cryptocurrency facilitated crimes, specifically investment fraud. This webinar will cover the fundamentals of investigating fake cryptocurrency exchanges and "pig butchering". Attendees will understand the various ways these fraudulent services, such as DeFi "wallet drains," from taking the initial report to furthering the investigation.

20250205-140241-31

Submitted by Bryan Lee Dail on
Join the GeoComply team for an insightful presentation that delves into the complex realm of Internet Protocol (IP) addresses. In todays digital landscape, understanding the scale and significance of IP address manipulation is paramount for investigators and criminal justice professionals.

20250205-140253-97

Submitted by Bryan Lee Dail on
This course provides fundamental knowledge on financial investigation and data analysis. The investigation portion of the course will cover common consumer scams, how to identify suspects and their financial accounts and best processes for obtaining suspects records. The analysis portion of the course will cover the process of acquiring data, discuss methods for entering data, and provide strategies for finding patterns in data sets.

20250205-140238-12

Submitted by Bryan Lee Dail on
Cybercriminals in clearnet and darknet spaces often use tools like encrypted communication platforms in the commission of cybercrimes. This webinar introduces participants to various encrypted communication platforms and their use by online threat actors. Participants will gain technical knowledge of encrypted communication platforms and gain practical knowledge on how to conduct investigations that involve these platforms.

20250205-140235-24

Submitted by Bryan Lee Dail on
The scientific evidence continues to grow in support of how nutrition affects symptoms of anxiety, depression, and your moods. Think of your fork as a powerful tool you can use to help you feel better, more energized, focused, motivated, relaxed, and rested. Walk away from this webinar with a clear understanding of how what you eat affects your moods and simple strategies you can start using today to feel your best. Presented by, Danielle Cook Kawash, Founder, First in Wellness

20250205-140232-63

Submitted by Bryan Lee Dail on
Some of the most dangerous counterfeits involve explosive elements of automotive airbags, which can literally explode in the victims face during a low impact car accident. Join the Automotive Anti-Counterfeiting Council (A2C2) and learn how the members of the association can assist law enforcement with intellectual property investigations. Law enforcement has identified a trend of counterfeited automotive parts growing at an alarming rate.

20250205-140221-67

Submitted by Bryan Lee Dail on
This course provides an introduction to data encryption, covering the purpose of encryption as well as the process of encrypting data, and clarifying the distinctions between encryption and other operations like password protection and encoding. It explores the confusion, diffusion, and secret key encryption methods. Topics include detecting encryption (including recognition of some of the most popular types of encryption software), as well as proper procedures for law enforcement professionals who detect that encryption may be present on a device.

20250205-140215-05

Submitted by Bryan Lee Dail on
By the year 2025, it is expected that there will be over 45 billion connected devices around the world that is 9.27 connected devices per person. The Internet of Things (IoT) utilizes a variety of communication standards and a unique set of networking protocols to connect these devices. This webinar will explore these unique IoT networking protocols along with their varied IoT topography and explain IoT network interrogation techniques to be used in an investigation.
Subscribe to $0 - $2,500