Skip to main content

Federal Government

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140639-73

Submitted by Bryan Lee Dail on
NW3C conducted listening sessions for BJA hosted by the Massachusetts Attorney General at the National Cyber Crime Conference in April 2024. Join us to review the comments of your colleagues from across the US as we posed a range of important questions regarding digital evidence, legal complexities, and emerging technologies such as artificial intelligence. Presented by: Jim Emerson, Vice President, NW3C NW3C does not share attendees personally identifiable information with any third party without opt-in consent given during registration.

20250205-140642-95

Submitted by Bryan Lee Dail on
This course redefines fitness for law enforcement officers, focusing on long-term health instead of peak physical ability. In this course you will learn how to maintain a healthy lifestyle throughout your career and how to address challenges like injuries and shift work. By creating a personalized plan and sustainable habits, you will gain the tools to achieve your wellness goals and live an active life from the academy through retirement.? This is the first course in the STORM (Strategic Training for Organizational Resilience and Mindset) series.

20250205-140404-63

Submitted by Bryan Lee Dail on
The Internet Corporation for Assigned Names and Numbers (ICANN) and the American Registry for Internet Numbers (ARIN) have joined together to develop a presentation specifically designed for law enforcement focused on cyber security and the roles our organizations play in helping to combat this ever-evolving problem. ICANN helps coordinates the names and numbers that are used as unique identifiers in the global Internet. It is tasked with helping make sure that the Domain Name System (DNS) remains stable, secure, and resilient.

20250205-140401-76

Submitted by Bryan Lee Dail on
Join experts from NW3C and the National Network of Fusion Centers as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. In this session, our panel has a wealth of experience with managing intelligence analysts and intelligence projects. This panel will provide perspectives from large and smaller intelligence units at the local and state law enforcement levels.

20250205-140358-07

Submitted by Bryan Lee Dail on
Join a team of experts from NW3C as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. Submit questions regarding intelligence analysis skills, information collection, or general comments of analytic tradecraft and a panel of NW3C experts will provide answers during this live session.

20250205-140355-68

Submitted by Bryan Lee Dail on
Join experts from the National Network of Fusion Centers as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. In this session, our panel has a wealth of experience with managing intelligence analysts and intelligence projects.

20250205-140352-27

Submitted by Bryan Lee Dail on
This webinar will demonstrate the use of iCatch, the iOS Cache Analysis for Tracking Coordinates History tool, which is used to analyze and map location data from iOS Cache.sqlite database. The presenter will discuss the forensic artifacts that can be found in the Cache.sqlite database, how to use the iCatch tool to analyze artifacts from the database, and how to effectively view and present the mapped data in Google Earth.

20250205-140341-03

Submitted by Bryan Lee Dail on
Criminal, terror, and other types of illicit networks all need revenue streams to survive. This involves control of financial flows from the point of revenue generation through goal accomplishment. To some extent, many of these networks will engage in the international money movement processes maintained by financial institutions around the world in order to move the money in an efficient and secure manner. This presentation will describe the legitimate processes used by illicit networks to move money through financial systems.

20250205-140430-18

Submitted by Bryan Lee Dail on
Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital "footprints" that can help you during your investigations, no matter your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative ways of seeing a crime scene through different technologies.

20250205-140338-87

Submitted by Bryan Lee Dail on
This webinar will examine the evolving complexity of investigation of fraud, money laundering, and terrorist financing by a team of UK detectives fighting financial crime both within the UK and globally for over 30 years. The webinar will use notable cases to study investigative approaches, placement, integration with other enforcement, investigative techniques, and critical "toolkit". These UK pioneers of advance fee fraud (aka 419 scams) investigations who worked with U.S.
Subscribe to Federal Government