Skip to main content

Active

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140131-41

Submitted by Bryan Lee Dail on
Clearnet and darknet spaces are used to advertise, procure, sell, and transfer firearms and firearms-related knowledge and technology. This webinar will introduce participants to cyber-enabled firearms trafficking, particularly the types of firearms trafficked online, the clearnet and darknet spaces where this form of trafficking occurs, and the firearm knowledge and technology transferred within these spaces.

20250205-140129-31

Submitted by Bryan Lee Dail on
In recent years, the digital landscape has provided perpetrators with new tools and avenues to exploit vulnerable individuals for sexual exploitation and human trafficking. Cyber sexual abuse crimes encompass a wide range of activities, including online grooming, non-consensual sharing of intimate images revenge porn, and sextortion. These crimes often serve as a precursor to sex trafficking, creating a dangerous overlap that demands urgent attention.

20250205-140126-36

Submitted by Bryan Lee Dail on
This course will introduce law enforcement executives to the fundamental concepts necessary for establishing healthy cybersecurity practices in their organizations. With the increase in Internet-connected devices and as threats become more prevalent and dangerous, cybersecurity becomes an extremely vital function for organizational stability. As the leadership of a law enforcement organization, executives are charged with protecting organizational assets and creating a culture of cybersecurity-minded behavior.

20250205-140123-54

Submitted by Bryan Lee Dail on
Trust is an essential component for reducing friction between people, organizations, government, and other entities. When trust is high, people are more willing to cooperate, require less assurances for doing so, and are less skeptical of the outcomes. Unfortunately, todays climate of manipulated media, deep fakes, conflicting sources of information, and sensationalized news has raised many people's level of skepticism. This makes building and maintaining trust particularly difficult but also incredibly important.

20250205-140120-51

Submitted by Bryan Lee Dail on
This course introduces fundamental concepts and terminology related to computer networks. Topics include the importance of computer networks, types of computer networks, common network components, network topologies and media, the OSI and TCP/IP models of communication, and IP addressing. The course also addresses the role of law enforcement iin cybersecurity within the current landscape of digital crime.

20250205-140117-68

Submitted by Bryan Lee Dail on
This webinar introduces participants to cryptocurrency and its relevance to criminal justice agents and investigations. The webinar will cover topics such as the different categories of cryptocurrency, common cryptocurrencies, the mining process, blockchain, and common cases where cryptocurrency is used or is the target of criminal activity. Participants gain basic knowledge of investigative options that are available to gather intelligence.

20250205-140114-07

Submitted by Bryan Lee Dail on
Miami-Dade County Police Department and Middlesex County NJ Prosecutors Office team up to look at cases involving artificial intelligence supported criminal trade craft, challenges for investigations, and digital forensic considerations. This presentation will review illustrative cases studies, technical considerations and investigative approaches applied. The webinar will also examine other potential criminal tactics techniques and procedures where support from artificial intelligence is likely to present in the future.

20250205-140111-33

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums, and VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams.? This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20250205-140108-13

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums,VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams. This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20250205-140105-43

Submitted by Bryan Lee Dail on
This course introduces the history of UAVs and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones. Topics include gathering evidence both internal and external to the drone, as well as methods for manually processing flight logs and displaying data in Google Earth.
Subscribe to Active