Skip to main content

Justice Information Sharing

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240729-123259-86

Submitted by Linsey N Thibault on

Task 1. Provide policy research expertise and management support to Global and CICC leadership, the DFO, and the DDFO regarding Global policy issues and future direction.

For priorities recommended by Global, the GESC, and the CICC, facilitate the completion of a Priority Recommendation Form and manage submission of recommendations to BJA for approval.

20240729-122735-38

Submitted by Linsey N Thibault on

Task 3. Attend national partner events, conferences, and meetings to stay abreast of national initiatives, trending priorities, and emerging issues relevant to the work of Global.

20240729-122346-17

Submitted by Linsey N Thibault on

Task 1. As part of IIR collaboration efforts, staff members attended, participated in, and supported the following events for the purpose of discussing current priorities and learning about needs of the field.
• Virtual GESC meeting held on February 26, 2024
The virtual GESC meeting held on February 26, 2024, included the following updates and presentations:

20240729-121431-89

Submitted by Linsey N Thibault on

As a result of the DHS–IACP Intelligence Summit held in Alexandria, Virginia, in September 2022, the after-action report published in later 2022, and in consultation with Global DFO, GAC and CICC leadership, CICC members voted on and approved the DHS proposal to initiate a project to address the findings and to advance the recommendations as identified during the Summit. Work on the task teams continued during the current reporting period.

20240729-93503-06

Submitted by Bryan Lee Dail on
As ransomware gangs move from encryption tactics to data exfiltration and extortion, cybersecurity professionals require a new approach and new way of thinking when it comes to tackling the issue of ransomware. Join this webinar to learn more about: Why preventing data exfiltration is critical in the fight against ransomware Why traditional detection and response solutions are failing to prevent these attacks How organizations can leverage anti data exfiltration technology to secure their data and prevent attacks

20240726-125741-24

Submitted by Michelle Nickens on

The TTA team, along with an SME, attended the Conference Against Women to present on the National Ashanti Alert Network. The TTA developed a PowerPoint for this presentation, which provided an overview of Ashanti Billie's story, the Ashanti Alert Act, and the National Ashanti Alert Network and pilot project. It was also used to provide awareness about National Missing Person Alert systems. The conference was attended by almost 3000 people.

20240725-145248-78

Submitted by Michelle Nickens on

Multiple states and two tribes make up representation for the Ashanti Alert Stakeholder Working Group. The group holds a virtual meeting generally each quarter. The Ashanti TA team helps support the virtual meetings.

20240725-141650-09

Submitted by Michelle Nickens on

The Ashanti TA Team holds weekly meeting meetings with the BJA Senior Policy to discuss project progress, receive direction and guidance, and identify next steps.

Subscribe to Justice Information Sharing