Skip to main content

Technology Implementation - eCrime

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140418-71

Submitted by Bryan Lee Dail on
Threat actors are increasing their use of the Internet, social media and apps to conceal and advance their trafficking operations. Open-source information can provide investigators with intelligence and investigative leads related to narcotics and human trafficking operations. This webinar will provide attendees with introductory methods related to open-source information collection as it applies to identifying online profiles and activity related to narcotics and human trafficking.

20250205-140412-04

Submitted by Bryan Lee Dail on
This webinar will explain how language can be used as a forensic science tool, underlying research rigor, and acceptable application. It will familiarize participants with historical and emerging use in investigations and prosecutions, the potential relevance to online and digital evidence, and the basic legal considerations for appropriate use in litigation.

20250205-140407-43

Submitted by Bryan Lee Dail on
Departments nationwide are being inundated with reports of cryptocurrency facilitated crimes, specifically investment fraud. This webinar will cover the fundamentals of investigating fake cryptocurrency exchanges and "pig butchering". Attendees will understand the various ways these fraudulent services, such as DeFi "wallet drains," from taking the initial report to furthering the investigation.

20250205-140241-31

Submitted by Bryan Lee Dail on
Join the GeoComply team for an insightful presentation that delves into the complex realm of Internet Protocol (IP) addresses. In todays digital landscape, understanding the scale and significance of IP address manipulation is paramount for investigators and criminal justice professionals.

20250205-140238-12

Submitted by Bryan Lee Dail on
Cybercriminals in clearnet and darknet spaces often use tools like encrypted communication platforms in the commission of cybercrimes. This webinar introduces participants to various encrypted communication platforms and their use by online threat actors. Participants will gain technical knowledge of encrypted communication platforms and gain practical knowledge on how to conduct investigations that involve these platforms.

20250205-140235-24

Submitted by Bryan Lee Dail on
The scientific evidence continues to grow in support of how nutrition affects symptoms of anxiety, depression, and your moods. Think of your fork as a powerful tool you can use to help you feel better, more energized, focused, motivated, relaxed, and rested. Walk away from this webinar with a clear understanding of how what you eat affects your moods and simple strategies you can start using today to feel your best. Presented by, Danielle Cook Kawash, Founder, First in Wellness

20250205-140232-63

Submitted by Bryan Lee Dail on
Some of the most dangerous counterfeits involve explosive elements of automotive airbags, which can literally explode in the victims face during a low impact car accident. Join the Automotive Anti-Counterfeiting Council (A2C2) and learn how the members of the association can assist law enforcement with intellectual property investigations. Law enforcement has identified a trend of counterfeited automotive parts growing at an alarming rate.

20250205-140229-69

Submitted by Bryan Lee Dail on
What has not changed on the motor vehicle in over 125 years? If you answered, "The stamped metal license plate" you are correct! The digital license plate (DLP) of today can do so much more, and you can learn all about it on as we break down this new technology. Digital license plates are here with an array of features, including GPS, Bluetooth, RFID (radio frequency identification) and a cellular modem.

20250205-140221-67

Submitted by Bryan Lee Dail on
This course provides an introduction to data encryption, covering the purpose of encryption as well as the process of encrypting data, and clarifying the distinctions between encryption and other operations like password protection and encoding. It explores the confusion, diffusion, and secret key encryption methods. Topics include detecting encryption (including recognition of some of the most popular types of encryption software), as well as proper procedures for law enforcement professionals who detect that encryption may be present on a device.
Subscribe to Technology Implementation - eCrime