Skip to main content

Training Delivery - Webinar

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20201106-113718-92

Submitted by Bryan Lee Dail on

This webinar will discuss cryptocurrency general information for detailed discussion regarding legitimate use versus illegitimate use, common financial crimes, and avoidance of compliance requirements. Further, the webinar will delve into exchanges, transactions, opportunities for data collection and analysis, the value to criminal or compliance investigations and a review of current case studies.

Webinar – Building a Successful Homicide Committee: Police-Prosecutor Collaboration in Jackson County, MO

Join the Association of Prosecuting Attorneys and the Bureau of Justice Assistance (BJA) for “Building a Successful Homicide Committee: Police-Prosecutor Collaboration in Jackson County, MO,” an hour-long webinar that is part of the Capital Case Litigation Initiative webinar series. The Jackson County Prosecutor’s Office and the Kansas City Police Department have instituted a successful, collaborative homicide review process.

20201104-134157-56

Submitted by Bryan Lee Dail on

In many sexual abuse cases, DNA or other traditional forensic evidence does not exist, and the outcome often depends on the ability of the multidisciplinary team to maximize the strength of survivors throughout the investigation and at trial. A former prosecutor and an abuse survivor who recorded the perpetrator?'s confession share investigative tips, best practices for interacting with survivors, and trial strategies to dismantle the power dynamics of perpetrator and victim.

20201103-153735-57

Submitted by Bryan Lee Dail on

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email.

20201103-153728-45

Submitted by Bryan Lee Dail on

From targeting child predators to identifying deepfake videos, this presentation will introduce a new approach to uncovering previously unavailable information from digital video files. Learn how the source of a video file can be identified, even from social media platforms. Take a deeper dive into the authenticity of those files to show the truth in video.

20201103-145209-27

Submitted by Bryan Lee Dail on

Python is a powerful programming language designed with the beginner in mind. With its endless tutorials and extensive libraries, Python is a perfect addition to any officer or analyst?'s repertoire. Attendees will start from the beginning and learn what Python is and how it can be used to simplify their day to day taskings. Attendees will also be provided with coding examples as well as resources available to help aid them in learning Python. This series is designed for the novice programmer, but any law enforcement can attend.

20201103-145200-97

Submitted by Bryan Lee Dail on

Part 1 of a 2 Part Series

Autopsy is a free and open source digital forensics platform with many features comparable to those found in the leading commercial tools. It can be installed on Windows, macOS, and Linux operating systems. This is part 1 in our 2-part webinar series focused on using Autopsy to perform digital forensic examinations.

20201103-143739-76

Submitted by Bryan Lee Dail on

?"Through the looking glass?" is a metaphorical expression meaning: on the strange side, in the twilight zone, or in a strange, parallel world. While the internet can be considered a strange, parallel world, it can also be an informative, interesting, yet scary place when conducting different types of investigations. There are various technologies and methods that you can use to protect your identity and information while conducting internet-based investigations. This session will illustrate these technologies and methods to keep you safe when investigating online.

20201103-143715-25

Submitted by Bryan Lee Dail on

The sale of counterfeit goods may be thought of as a relatively harmless crime, when in reality production, sale, and distribution of counterfeit goods represents money laundering, corruption, fraud, human trafficking, sanctions evasion, and terrorist finance. Much like the sale of illegal narcotics, the production, distribution, and sale of counterfeit goods can yield hundreds of billions of dollars every year. As a result, transnational and localized organized crime groups are involved at every step of the operation.

20201103-143707-48

Submitted by Bryan Lee Dail on

If anything about mobile forensics could be considered buzzworthy in the past year, it would be the release of the Checkm8 Boot ROM exploit created by axi0mX in October. Allowing critical access to 11 generations of iPhones and iDevices, checkm8 is a new opportunity to access data previously locked behind a secure wall. But beyond the hype, what data can you actually access using this newfound exploit, and what do you do once you?'ve extracted data using Checkm8?

Subscribe to Training Delivery - Webinar