Skip to main content

Juvenile Justice Agencies

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240819-82534-39

Submitted by Bryan Lee Dail on
Cybercriminals?in clearnet and darknet spaces often use tools like online communication platforms in the commission of cybercrimes. This course introduces participants to various communication platforms and their use by online threat actors. Participants will gain technical?knowledge of communication platforms and gain practical knowledge on how to conduct investigations that involve these platforms.

20240819-82539-38

Submitted by Bryan Lee Dail on
This introductory course familiarizes participants with illegal darknet markets and associated forums, particularly the illicit goods and services offered, as well as successful law enforcement operations targeting these sites. Participants will gain practical knowledge on how to create anonymous accounts to access and monitor these sites and intelligence collection tactics for use in law enforcement investigations.

20240819-82543-14

Submitted by Bryan Lee Dail on
This introductory course familiarizes participants with illegal darknet markets and associated forums, particularly the illicit goods and services offered, as well as successful law enforcement operations targeting these sites. Participants will gain practical knowledge on how to create anonymous accounts to access and monitor these sites and intelligence collection tactics for use in law enforcement investigations.

20240819-82548-43

Submitted by Bryan Lee Dail on
Is information from mobile extractions, Cloud Source and Google Timeline a solid piece of evidence? In this webinar, we will see how to make your digital evidence become a strong basis for courtroom testimony when validated with phone records, cell coverage, and other sources.

20240819-82552-86

Submitted by Bryan Lee Dail on
The Public Safety Threat Alliance Intelligence team will present our observations and assessments on the trends and developments of cyber activity targeting public safety. We will breakdown the specific tradecraft mapped to the MITRE ATT&CK matrix, and detail how threat actors have been adapting to continue to be successful in 2023. Presented by: Tyler Brodbeck, Threat Intelligence Manager, Motorola Solutions Travis Randall, Senior Threat Intelligence Analyst, Motorola Solutions

20240819-82557-59

Submitted by Bryan Lee Dail on
Some of the most dangerous counterfeits involve explosive elements of automotive airbags, which can literally explode in the victims face during a low impact car accident. Join the Automotive Anti-Counterfeiting Council (A2C2) and learn how the members of the association can assist law enforcement with intellectual property investigations. Law enforcement has identified a trend of counterfeited automotive parts growing at an alarming rate.

20240819-82636-84

Submitted by Bryan Lee Dail on
The Public Safety Threat Alliance Intelligence team will walk through the most frequent and impactful attack paths observed by threat actors targeting public safety organizations around the world. Using the MITRE ATT&CK matrix, we will breakdown the tradecraft observed targeting emergency services, and detail the importance of understanding the critical steps of the kill chain. Additionally, we will unveil insights from the criminal underground to highlight what they believe are the most valuable aspects of public safety.

20240819-82627-51

Submitted by Bryan Lee Dail on
In this 90-minute training session, "Navigating Human Trafficking: Awareness and Effective Responses," participants will gain a foundational understanding of human trafficking while focusing on practical techniques and approaches to ensure successful interactions and positive outcomes for victims and survivors. The session includes an overview of human trafficking, defining its various forms and shedding light on its prevalence. This concise yet comprehensive introduction includes definitions, myths and stereotypes, federal law, considerations, and case examples.

20240819-82632-72

Submitted by Bryan Lee Dail on
Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital "footprints" that can help you during your investigations, no matter your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative ways of seeing a crime scene through different technologies.

20240819-82610-69

Submitted by Bryan Lee Dail on
Face it, pain management with medication and surgery is not always effective and definitely not a long-term solution. This is where nutrition shines! Eating foods that dampen inflammation is one of the most useful and powerful tools you have to reduce and manage pain. In this webinar, you will learn what foods fuel inflammation and what foods extinguish it. Walk away from this webinar with practical nutrition strategies you can implement today to get you out of pain and feeling your best.
Subscribe to Juvenile Justice Agencies