Skip to main content

Training

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140358-07

Submitted by Bryan Lee Dail on
Join a team of experts from NW3C as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. Submit questions regarding intelligence analysis skills, information collection, or general comments of analytic tradecraft and a panel of NW3C experts will provide answers during this live session.

20250205-140338-87

Submitted by Bryan Lee Dail on
This webinar will examine the evolving complexity of investigation of fraud, money laundering, and terrorist financing by a team of UK detectives fighting financial crime both within the UK and globally for over 30 years. The webinar will use notable cases to study investigative approaches, placement, integration with other enforcement, investigative techniques, and critical "toolkit". These UK pioneers of advance fee fraud (aka 419 scams) investigations who worked with U.S.

20250205-140341-03

Submitted by Bryan Lee Dail on
Criminal, terror, and other types of illicit networks all need revenue streams to survive. This involves control of financial flows from the point of revenue generation through goal accomplishment. To some extent, many of these networks will engage in the international money movement processes maintained by financial institutions around the world in order to move the money in an efficient and secure manner. This presentation will describe the legitimate processes used by illicit networks to move money through financial systems.

20250205-140344-54

Submitted by Bryan Lee Dail on
Hundreds of incidents shootings, workplace violence, other attacks are taking place across schools and communities every year. In response, schools and communities continue to invest their money, time, and efforts into more deterrents, like locks, metal detectors, cameras, etc., but what happens when attackers are undeterred like we are seeing today?

20250205-140346-69

Submitted by Bryan Lee Dail on
This webinar provides fundamental knowledge about human trafficking including defining the crime, addressing why it occurs and why it is unique, reviewing the relevant human trafficking criminal laws, and providing information on how to identify human trafficking, start an investigation, and prosecute the case.

20250205-140352-27

Submitted by Bryan Lee Dail on
This webinar will demonstrate the use of iCatch, the iOS Cache Analysis for Tracking Coordinates History tool, which is used to analyze and map location data from iOS Cache.sqlite database. The presenter will discuss the forensic artifacts that can be found in the Cache.sqlite database, how to use the iCatch tool to analyze artifacts from the database, and how to effectively view and present the mapped data in Google Earth.

20250205-140355-68

Submitted by Bryan Lee Dail on
Join experts from the National Network of Fusion Centers as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. In this session, our panel has a wealth of experience with managing intelligence analysts and intelligence projects.

20250205-140401-76

Submitted by Bryan Lee Dail on
Join experts from NW3C and the National Network of Fusion Centers as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. In this session, our panel has a wealth of experience with managing intelligence analysts and intelligence projects. This panel will provide perspectives from large and smaller intelligence units at the local and state law enforcement levels.

20250205-140404-63

Submitted by Bryan Lee Dail on
The Internet Corporation for Assigned Names and Numbers (ICANN) and the American Registry for Internet Numbers (ARIN) have joined together to develop a presentation specifically designed for law enforcement focused on cyber security and the roles our organizations play in helping to combat this ever-evolving problem. ICANN helps coordinates the names and numbers that are used as unique identifiers in the global Internet. It is tasked with helping make sure that the Domain Name System (DNS) remains stable, secure, and resilient.
Subscribe to Training