Attention
This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.
This course provides an introduction to data encryption, covering the purpose of encryption as well as the process of encrypting data, and clarifying the distinctions between encryption and other operations like password protection and encoding. It explores the confusion, diffusion, and secret key encryption methods. Topics include detecting encryption (including recognition of some of the most popular types of encryption software), as well as proper procedures for law enforcement professionals who detect that encryption may be present on a device.
20240903-83320-57
This webinar will explain how language can be used as a forensic science tool, underlying research rigor, and acceptable application. It will familiarize participants with historical and emerging use in investigations and prosecutions, the potential relevance to online and digital evidence, and the basic legal considerations for appropriate use in litigation.
20240903-80634-85
This course in the STORM series is designed to provide police officers with the necessary tools and strategies to enhance occupational wellness and overall well-being. In this course, you will explore various aspects of identity within your career, focus on the realities of balancing work and personal life, learn about the impact your career has on you and your family and look at how to maintain healthy coping skills when off the clock. You will gain knowledge to assist you in recognizing and dealing with the changes your career will have on your life.
20240903-80629-18
This webinar is presented in coordination with the U.S. Attorney's Office for the Western District of Pennsylvania. With the rapid changes in artificial intelligence (AI) it is imperative that law enforcement and public safety agencies be aware of how AI may impact their job and possibly affect them in their investigations. The instructor for this webinar will take the attendees deep into the criminal use of AI in recent crimes and cases.
20240903-80639-51
The fourth course in the STORM series focuses on mental and emotional wellness. You will explore the concepts of accumulated stress and trauma- to understand the impact they have on your job and personal life. In this course, you will learn about symptoms, risk factors and how your brain processes and responds to traumatic events or stressors. The course will wrap up by discussing ways to heal after exposure to trauma, how to care with for your mental health, and how to build mental health resilience.
20240821-124156-82
Call to assess grantee needs and assist with workplan development.
20240819-82557-59
Some of the most dangerous counterfeits involve explosive elements of automotive airbags, which can literally explode in the victims face during a low impact car accident. Join the Automotive Anti-Counterfeiting Council (A2C2) and learn how the members of the association can assist law enforcement with intellectual property investigations. Law enforcement has identified a trend of counterfeited automotive parts growing at an alarming rate.
20240819-82548-43
Is information from mobile extractions, Cloud Source and Google Timeline a solid piece of evidence? In this webinar, we will see how to make your digital evidence become a strong basis for courtroom testimony when validated with phone records, cell coverage, and other sources.
20240819-82552-86
The Public Safety Threat Alliance Intelligence team will present our observations and assessments on the trends and developments of cyber activity targeting public safety. We will breakdown the specific tradecraft mapped to the MITRE ATT&CK matrix, and detail how threat actors have been adapting to continue to be successful in 2023.
Presented by:
Tyler Brodbeck, Threat Intelligence Manager, Motorola Solutions
Travis Randall, Senior Threat Intelligence Analyst, Motorola Solutions
20240819-82539-38
This introductory course familiarizes participants with illegal darknet markets and associated forums, particularly the illicit goods and services offered, as well as successful law enforcement operations targeting these sites. Participants will gain practical knowledge on how to create anonymous accounts to access and monitor these sites and intelligence collection tactics for use in law enforcement investigations.