Skip to main content

State Government

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140301-42

Submitted by Bryan Lee Dail on
This interactive course provides fundamental knowledge on human trafficking. It helps law enforcement, support staff, analysts, and regulatory agencies to recognize the situational and behavioral indicators associated with human trafficking victims, facilitators, and traffickers. The examples and scenarios throughout the course will educate and raise awareness to help understand how technology and social media and networking platforms impact human trafficking.

20250205-140304-45

Submitted by Bryan Lee Dail on
This course presents awareness-level information on the Bank Secrecy Act (BSA) and how it is used to aid law enforcement investigations into terrorism and criminal activity. Students will be introduced to the BSA, the USA PATRIOT Act, and definitions of commonly-used terms. This course will also explain the various documents and forms filed by financial institutions under the BSA. The Financial Crimes Enforcement Network (FinCEN) will be discussed with an emphasis on services and resources provided to law enforcement.

20250205-140310-57

Submitted by Bryan Lee Dail on
It is positioned in the center of your body because it is the center of your health. Maintain or create a healthy gut, and do the most powerful thing you can do to support your health. Walk away from this webinar with a better understanding of how your gut health impacts your overall health and how you feel, what things harm or strengthen your gut health, and a handful of simple things you can do every day to create a happy, healthy gut. Presented by, Danielle Cook Kawash, Founder, First in Wellness

20250205-140244-26

Submitted by Bryan Lee Dail on
As ransomware gangs move from encryption tactics to data exfiltration and extortion, cybersecurity professionals require a new approach and new way of thinking when it comes to tackling the issue of ransomware. Join this webinar to learn more about: Why preventing data exfiltration is critical in the fight against ransomware Why traditional detection and response solutions are failing to prevent these attacks How organizations can leverage anti data exfiltration technology to secure their data and prevent attacks

20250205-140117-68

Submitted by Bryan Lee Dail on
This webinar introduces participants to cryptocurrency and its relevance to criminal justice agents and investigations. The webinar will cover topics such as the different categories of cryptocurrency, common cryptocurrencies, the mining process, blockchain, and common cases where cryptocurrency is used or is the target of criminal activity. Participants gain basic knowledge of investigative options that are available to gather intelligence.

20250205-140126-36

Submitted by Bryan Lee Dail on
This course will introduce law enforcement executives to the fundamental concepts necessary for establishing healthy cybersecurity practices in their organizations. With the increase in Internet-connected devices and as threats become more prevalent and dangerous, cybersecurity becomes an extremely vital function for organizational stability. As the leadership of a law enforcement organization, executives are charged with protecting organizational assets and creating a culture of cybersecurity-minded behavior.

20250205-140114-07

Submitted by Bryan Lee Dail on
Miami-Dade County Police Department and Middlesex County NJ Prosecutors Office team up to look at cases involving artificial intelligence supported criminal trade craft, challenges for investigations, and digital forensic considerations. This presentation will review illustrative cases studies, technical considerations and investigative approaches applied. The webinar will also examine other potential criminal tactics techniques and procedures where support from artificial intelligence is likely to present in the future.

20250205-140111-33

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums, and VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams.? This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20250205-140108-13

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums,VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams. This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20250205-140056-15

Submitted by Bryan Lee Dail on
This course provides a legal overview of what investigators are and are not permitted to do while conducting online undercover investigations. Topics include terms of service, entrapment and outrageous government misconduct, and wiretapping law as it relates to the recording and documenting of online activities. This course also covers defense strategies commonly used to counter online undercover investigations. This is the fifth of seven modules in the training series Legal Concerns for Digital Evidence Responders.
Subscribe to State Government