20201016-132037-98
This webinar will discuss various approaches to prosecuting intellectual property crimes while emphasizing the importance of communication between the prosecutor and the investigator.
This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.
This webinar will discuss various approaches to prosecuting intellectual property crimes while emphasizing the importance of communication between the prosecutor and the investigator.
This webinar will discuss various approaches to prosecuting intellectual property crimes while emphasizing the importance of communication between the prosecutor and the investigator.
This webinar will discuss cryptocurrency general information for detailed discussion regarding legitimate use versus illegitimate use, common financial crimes, and avoidance of compliance requirements. Further, the webinar will delve into exchanges, transactions, opportunities for data collection and analysis, the value to criminal or compliance investigations and a review of current case studies.
This webinar will discuss cryptocurrency general information for detailed discussion regarding legitimate use versus illegitimate use, common financial crimes, and avoidance of compliance requirements. Further, the webinar will delve into exchanges, transactions, opportunities for data collection and analysis, the value to criminal or compliance investigations, and a review of current case studies.
On average, seventy percent of convicted sex offenders are placed on probation. This webinar will identify and explain information forensic examiners can provide to the sentencing court and probation officers which will enhance offender supervision in the community. While this information is usually not relevant to prove legal thresholds of a crime, it is critical to safely supervising convicted offenders. Join two law enforcement professionals to learn how you can augment your reports to help protect the community.
Intellectual Property (IP) Crimes come in many different forms, including counterfeiting, copyright infringement, and trade secrets, just to name a few. This webinar will provide a global perspective on IP crimes, basic investigative techniques, and the importance of public/private sector partnerships when conducting these investigations.
As technology touches every aspect of our lives and work, cybersecurity has become as critical as physical security. From malware to scams to targeted attacks, this presentation by the Multi-State Information Sharing and Analysis Center (MS-ISAC) will provide a detailed, discussion of the current and emerging cyber threats to U.S. state, local, tribal, and territorial (SLTT) governments, with a focus on how these threats are impacting law enforcement officials, and resources to mitigate them. The MS-ISAC is the U.S.
The year 2020 has brought an onslaught of new challenges in the criminal justice world! While officer wellness has always been an important topic, it is especially critical now. During this webinar we will share the experience of two law enforcement professionals who know the importance and necessity of wellness and mental health programs for criminal justice professionals. Audience interaction will also determine the topics for our next wellness webinars.
The sale of counterfeit goods may be thought of as a relatively harmless crime, when in reality production, sale, and distribution of counterfeit goods represents money laundering, corruption, fraud, human trafficking, sanctions evasion, and terrorist finance. Much like the sale of illegal narcotics, the production, distribution, and sale of counterfeit goods can yield hundreds of billions of dollars every year. As a result, transnational and localized organized crime groups are involved at every step of the operation.
If anything about mobile forensics could be considered buzzworthy in the past year, it would be the release of the Checkm8 Boot ROM exploit created by axi0mX in October. Allowing critical access to 11 generations of iPhones and iDevices, checkm8 is a new opportunity to access data previously locked behind a secure wall. But beyond the hype, what data can you actually access using this newfound exploit, and what do you do once you?'ve extracted data using Checkm8?