Skip to main content

Technology Implementation - eCrime

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140105-43

Submitted by Bryan Lee Dail on
This course introduces the history of UAVs and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones. Topics include gathering evidence both internal and external to the drone, as well as methods for manually processing flight logs and displaying data in Google Earth.

20250205-140108-13

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums,VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams. This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20250205-140111-33

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums, and VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams.? This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20250205-140114-07

Submitted by Bryan Lee Dail on
Miami-Dade County Police Department and Middlesex County NJ Prosecutors Office team up to look at cases involving artificial intelligence supported criminal trade craft, challenges for investigations, and digital forensic considerations. This presentation will review illustrative cases studies, technical considerations and investigative approaches applied. The webinar will also examine other potential criminal tactics techniques and procedures where support from artificial intelligence is likely to present in the future.

20250205-140117-68

Submitted by Bryan Lee Dail on
This webinar introduces participants to cryptocurrency and its relevance to criminal justice agents and investigations. The webinar will cover topics such as the different categories of cryptocurrency, common cryptocurrencies, the mining process, blockchain, and common cases where cryptocurrency is used or is the target of criminal activity. Participants gain basic knowledge of investigative options that are available to gather intelligence.

20250205-140123-54

Submitted by Bryan Lee Dail on
Trust is an essential component for reducing friction between people, organizations, government, and other entities. When trust is high, people are more willing to cooperate, require less assurances for doing so, and are less skeptical of the outcomes. Unfortunately, todays climate of manipulated media, deep fakes, conflicting sources of information, and sensationalized news has raised many people's level of skepticism. This makes building and maintaining trust particularly difficult but also incredibly important.

20250205-140146-79

Submitted by Bryan Lee Dail on
Is information from mobile extractions, Cloud Source and Google Timeline a solid piece of evidence? In this webinar, we will see how to make your digital evidence become a strong basis for courtroom testimony when validated with phone records, cell coverage, and other sources.

20250205-140143-56

Submitted by Bryan Lee Dail on
This introductory course familiarizes participants with illegal darknet markets and associated forums, particularly the illicit goods and services offered, as well as successful law enforcement operations targeting these sites. Participants will gain practical knowledge on how to create anonymous accounts to access and monitor these sites and intelligence collection tactics for use in law enforcement investigations.

20250205-140120-51

Submitted by Bryan Lee Dail on
This course introduces fundamental concepts and terminology related to computer networks. Topics include the importance of computer networks, types of computer networks, common network components, network topologies and media, the OSI and TCP/IP models of communication, and IP addressing. The course also addresses the role of law enforcement iin cybersecurity within the current landscape of digital crime.

20250205-140137-96

Submitted by Bryan Lee Dail on
Cybercrimes can and have been committed by organized criminal groups. This webinar introduces participants to the notion of cyber organized crime, the cyber-dependent and cyber-enabled crimes committed by organized criminal groups, the structure and organization of cyber organized criminal groups and roles of members within these groups, and the tools used by these groups. The clearnet and darknet spaces where these groups operate will also be explored.
Subscribe to Technology Implementation - eCrime