Skip to main content

Local Government

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250210-115745-28

Submitted by Ms. Marissa Bo… on

A webinar with a defense lawyer and a prosecutor discussing how lawyers can identify questionable convictions involving shaken baby syndrome or abuse head trauma.

20250210-100821-26

Submitted by Bryan Lee Dail on
Join us to explore IoT through the optics of the investigator and the examiner. Let us examine the most popular IoT technology, essential planning in any case, how to identify and search for relevant technologies at search or crime scenes, what digital evidence is available locally versus remotely, what tools are available to assist in collection and analysis, what should you know about IoT related legal process, and where to obtain additional resources, focused training, and technical assistance.

20250210-100758-46

Submitted by Bryan Lee Dail on
Today with the advent of Internet press and social media, press outlets can get information, factual or not, out in a matter of seconds. Your investigation or incident can become viral, making it challenging to navigate. This webinar will go over some techniques on crisis communication and navigating the press. We will discuss how to make sound bites to the press advantageous to you and how to avoid getting trapped and used by the press.

20250210-100802-01

Submitted by Bryan Lee Dail on
In todays cyber threat environment, attackers and defenders are constantly trying to outmaneuver each other and the stakes are higher than ever, particularly for mission-critical systems and communications. Understanding the methods and motivations of threat actors is crucial to developing a proactive program to defend against and prevent future attacks. In part one of our four part webinar series, we will introduce our insights and analysis of the most significant and impactful cyber threats facing public safety organizations.

20250210-100806-93

Submitted by Bryan Lee Dail on
Human beings are recruited, advertised, traded, bought, sold, and even rented on websites, chat rooms, social media platforms, online classified advertisement sites, and communication platforms.

20250210-100810-91

Submitted by Bryan Lee Dail on
Expand your DFIR skills by diving into the world of malware analysis. In this webinar, you will learn essential techniques and strategies for incorporating malware analysis into your skillset, enabling you to effectively identify, analyze, and mitigate malicious software threats. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks.

20250210-100813-89

Submitted by Bryan Lee Dail on
Join experts from NW3C and the National Network of Fusion Centers as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. In this session, our panel has a wealth of experience with managing intelligence analysts and intelligence projects.

20250210-100817-67

Submitted by Bryan Lee Dail on
The webinar covers one type of "crime as a service" (CaaS) offered on clearnet and darknet spaces, namely malware as a service (MaaS). Specifically, this webinar introduces participants to MaaS, the Clearnet, and Darknet sites where malware and MaaS are marketed, advertised, and sold, and information about them is distributed. Particularly, attention will be paid to the M.O., tactics, targets, and tools used by perpetrators of this cybercrime.

20250210-100825-52

Submitted by Bryan Lee Dail on
Case synopsis of a Transnational Gift Card Scam laundering $26 million in fraudulently obtained gift cards through major retailers across the United States. Suspects were targeting victims with multiple different scams (Grandparent Scam, Arrest Warrant Scam, Apple Scam, Norton Anti-virus Scam, Publishers Clearing House Scams, and more). Victims were told to purchase Walmart and Target gift cards and provide the card information over the phone to the Scammers. Scammers would electronically transmit the cards to money mules across the U.S.
Subscribe to Local Government