Skip to main content

Justice Information Sharing

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140244-26

Submitted by Bryan Lee Dail on
As ransomware gangs move from encryption tactics to data exfiltration and extortion, cybersecurity professionals require a new approach and new way of thinking when it comes to tackling the issue of ransomware. Join this webinar to learn more about: Why preventing data exfiltration is critical in the fight against ransomware Why traditional detection and response solutions are failing to prevent these attacks How organizations can leverage anti data exfiltration technology to secure their data and prevent attacks

20250205-140250-62

Submitted by Bryan Lee Dail on
This course presents awareness-level information on a variety of topics related to white collar crime. The course covers basic definitions and terminology, common types of white collar crime, and the effects of white collar crime on society. Students learn to recognize and respond to common internet scams, provide assistance to victims of white collar crime, and recognize warning signs and red flags of criminal behavior. This course emphasizes the role of law enforcement in preventing and responding to white collar crime, and includes additional resources for combating this widespread problem.

20250205-140256-37

Submitted by Bryan Lee Dail on
This course presents awareness-level information on mortgage fraud. The course covers basic definitions and terminology, common types of mortgage fraud schemes, components of fraud, roles in the mortgage process, and legal explanations. Students also learn to recognize fraud indicators associated with a variety of schemes and opportunities to commit fraud throughout the mortgage process. A sample mortgage loan application and other forms used in the process are available to download within this course.

20250205-140117-68

Submitted by Bryan Lee Dail on
This webinar introduces participants to cryptocurrency and its relevance to criminal justice agents and investigations. The webinar will cover topics such as the different categories of cryptocurrency, common cryptocurrencies, the mining process, blockchain, and common cases where cryptocurrency is used or is the target of criminal activity. Participants gain basic knowledge of investigative options that are available to gather intelligence.

20250205-140114-07

Submitted by Bryan Lee Dail on
Miami-Dade County Police Department and Middlesex County NJ Prosecutors Office team up to look at cases involving artificial intelligence supported criminal trade craft, challenges for investigations, and digital forensic considerations. This presentation will review illustrative cases studies, technical considerations and investigative approaches applied. The webinar will also examine other potential criminal tactics techniques and procedures where support from artificial intelligence is likely to present in the future.

20250205-140111-33

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums, and VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams.? This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20250205-140108-13

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums,VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams. This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20250205-140105-43

Submitted by Bryan Lee Dail on
This course introduces the history of UAVs and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones. Topics include gathering evidence both internal and external to the drone, as well as methods for manually processing flight logs and displaying data in Google Earth.

20250205-140053-68

Submitted by Bryan Lee Dail on
This course provides information on obtaining and executing search warrants in cases involving digital evidence, with a focus on the similarities and differences between these and other search warrants. The course covers establishing probable cause, particularity, scope, and nexus; the use of outside experts; and out-of-state warrants for remote evidence. This is the second of seven modules in the training series Legal Concerns for Digital Evidence Responders. It can be completed as a stand-alone course or in combination with the other six modules.

20250205-140120-51

Submitted by Bryan Lee Dail on
This course introduces fundamental concepts and terminology related to computer networks. Topics include the importance of computer networks, types of computer networks, common network components, network topologies and media, the OSI and TCP/IP models of communication, and IP addressing. The course also addresses the role of law enforcement iin cybersecurity within the current landscape of digital crime.
Subscribe to Justice Information Sharing