Skip to main content

Active

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140418-71

Submitted by Bryan Lee Dail on
Threat actors are increasing their use of the Internet, social media and apps to conceal and advance their trafficking operations. Open-source information can provide investigators with intelligence and investigative leads related to narcotics and human trafficking operations. This webinar will provide attendees with introductory methods related to open-source information collection as it applies to identifying online profiles and activity related to narcotics and human trafficking.

20250205-140412-04

Submitted by Bryan Lee Dail on
This webinar will explain how language can be used as a forensic science tool, underlying research rigor, and acceptable application. It will familiarize participants with historical and emerging use in investigations and prosecutions, the potential relevance to online and digital evidence, and the basic legal considerations for appropriate use in litigation.

20250205-140410-02

Submitted by Bryan Lee Dail on
Often viewed as a nuisance as opposed to a crime, swatting calls have become extremely common over the past decade. Intertwined with the online gaming culture, swatting has become so popular that there are Discord, YouTube, and Telegram channels dedicated to it. Many police departments feel that these cases will often lead them outside of their jurisdictions, or even their country, and thus they are fruitless and pointless investigations. Nothing could be further from the truth!

20250205-140407-43

Submitted by Bryan Lee Dail on
Departments nationwide are being inundated with reports of cryptocurrency facilitated crimes, specifically investment fraud. This webinar will cover the fundamentals of investigating fake cryptocurrency exchanges and "pig butchering". Attendees will understand the various ways these fraudulent services, such as DeFi "wallet drains," from taking the initial report to furthering the investigation.

20250205-140404-63

Submitted by Bryan Lee Dail on
The Internet Corporation for Assigned Names and Numbers (ICANN) and the American Registry for Internet Numbers (ARIN) have joined together to develop a presentation specifically designed for law enforcement focused on cyber security and the roles our organizations play in helping to combat this ever-evolving problem. ICANN helps coordinates the names and numbers that are used as unique identifiers in the global Internet. It is tasked with helping make sure that the Domain Name System (DNS) remains stable, secure, and resilient.

20250205-140401-76

Submitted by Bryan Lee Dail on
Join experts from NW3C and the National Network of Fusion Centers as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. In this session, our panel has a wealth of experience with managing intelligence analysts and intelligence projects. This panel will provide perspectives from large and smaller intelligence units at the local and state law enforcement levels.

20250205-140358-07

Submitted by Bryan Lee Dail on
Join a team of experts from NW3C as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. Submit questions regarding intelligence analysis skills, information collection, or general comments of analytic tradecraft and a panel of NW3C experts will provide answers during this live session.

20250205-140355-68

Submitted by Bryan Lee Dail on
Join experts from the National Network of Fusion Centers as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. In this session, our panel has a wealth of experience with managing intelligence analysts and intelligence projects.

20250205-140352-27

Submitted by Bryan Lee Dail on
This webinar will demonstrate the use of iCatch, the iOS Cache Analysis for Tracking Coordinates History tool, which is used to analyze and map location data from iOS Cache.sqlite database. The presenter will discuss the forensic artifacts that can be found in the Cache.sqlite database, how to use the iCatch tool to analyze artifacts from the database, and how to effectively view and present the mapped data in Google Earth.
Subscribe to Active