Skip to main content

Technology Implementation - eCrime

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140301-42

Submitted by Bryan Lee Dail on
This interactive course provides fundamental knowledge on human trafficking. It helps law enforcement, support staff, analysts, and regulatory agencies to recognize the situational and behavioral indicators associated with human trafficking victims, facilitators, and traffickers. The examples and scenarios throughout the course will educate and raise awareness to help understand how technology and social media and networking platforms impact human trafficking.

20250205-140307-71

Submitted by Bryan Lee Dail on
Join a team of experts from NW3C as they provide thoughtful and detailed answers to financial investigation questions you submit. Click here to submit questions regarding financial crimes, financial analysis and What else? a panel of NW3C experts will provide answers during this live session.

20250205-140310-57

Submitted by Bryan Lee Dail on
It is positioned in the center of your body because it is the center of your health. Maintain or create a healthy gut, and do the most powerful thing you can do to support your health. Walk away from this webinar with a better understanding of how your gut health impacts your overall health and how you feel, what things harm or strengthen your gut health, and a handful of simple things you can do every day to create a happy, healthy gut. Presented by, Danielle Cook Kawash, Founder, First in Wellness

20250205-140244-26

Submitted by Bryan Lee Dail on
As ransomware gangs move from encryption tactics to data exfiltration and extortion, cybersecurity professionals require a new approach and new way of thinking when it comes to tackling the issue of ransomware. Join this webinar to learn more about: Why preventing data exfiltration is critical in the fight against ransomware Why traditional detection and response solutions are failing to prevent these attacks How organizations can leverage anti data exfiltration technology to secure their data and prevent attacks

20250205-140117-68

Submitted by Bryan Lee Dail on
This webinar introduces participants to cryptocurrency and its relevance to criminal justice agents and investigations. The webinar will cover topics such as the different categories of cryptocurrency, common cryptocurrencies, the mining process, blockchain, and common cases where cryptocurrency is used or is the target of criminal activity. Participants gain basic knowledge of investigative options that are available to gather intelligence.

20250205-140114-07

Submitted by Bryan Lee Dail on
Miami-Dade County Police Department and Middlesex County NJ Prosecutors Office team up to look at cases involving artificial intelligence supported criminal trade craft, challenges for investigations, and digital forensic considerations. This presentation will review illustrative cases studies, technical considerations and investigative approaches applied. The webinar will also examine other potential criminal tactics techniques and procedures where support from artificial intelligence is likely to present in the future.

20250205-140111-33

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums, and VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams.? This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20250205-140108-13

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums,VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams. This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20250205-140105-43

Submitted by Bryan Lee Dail on
This course introduces the history of UAVs and the ways they are commonly used, both legitimately and in relation to a crime, and focuses on the ways law enforcement can gather and analyze evidence involving drones. Topics include gathering evidence both internal and external to the drone, as well as methods for manually processing flight logs and displaying data in Google Earth.

20250205-140053-68

Submitted by Bryan Lee Dail on
This course provides information on obtaining and executing search warrants in cases involving digital evidence, with a focus on the similarities and differences between these and other search warrants. The course covers establishing probable cause, particularity, scope, and nexus; the use of outside experts; and out-of-state warrants for remote evidence. This is the second of seven modules in the training series Legal Concerns for Digital Evidence Responders. It can be completed as a stand-alone course or in combination with the other six modules.
Subscribe to Technology Implementation - eCrime