Skip to main content

Juvenile Justice Agencies

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250106-223634-49

Submitted by Lynn Chernich on

Joint COSSAP tribal grantee and CTAS PA3 (alcohol and substance use) grantee cohort call. Calls include peer-to-peer exchange, information and resource sharing, discussion around key barriers and challenges to project implementation, sharing of promising practices, and micro-learning opportunities. The April 2024 call included a micro-learning opportunity, facilitated discussion, and peer exchange around substance misuse policy and procedure development.

20250106-221205-53

Submitted by Lynn Chernich on

Joint COSSAP tribal grantee and CTAS PA3 (alcohol and substance use) grantee cohort call. Calls include peer-to-peer exchange, information and resource sharing, discussion around key barriers and challenges to project implementation, sharing of promising practices, and micro-learning opportunities. The June 2022 call included general discussion and peer exchange around an overview of grantee projects, progress, barriers and challenges.

20250106-95335-02

Submitted by Bryan Lee Dail on

Over the next year, a team of local and state experts will be providing you with all the basics to get you and your team started with building a cryptocurrency program. We will discuss why you need to know about crypto and how current scams use it. We'll give you the basics including how it works, how to seize it, how to store it, and how to return it to victims. We will talk about how to engage with exchanges and how to read their returns. We'll provide you with best practice information and sample warrants.

Shamrock Crypto Series: Pig Butchering and Other Scams

Over the next year, a team of local and state experts will be providing you with all the basics to get you and your team started with building a cryptocurrency program. We will discuss why you need to know about crypto and how current scams use it. We'll give you the basics including how it works, how to seize it, how to store it, and how to return it to victims. We will talk about how to engage with exchanges and how to read their returns. We'll provide you with best practice information and sample warrants. At the end of this year, you'll have the education, the samples, and the community to move forward with your cryptocurrency practice.

Presented by:
Erin West, Founder, Operation Shamrock

20250106-92551-14

Submitted by Bryan Lee Dail on
In 2011, FBI agents were concluding a routine liaison visit with officials at DuPont Pioneers offices near Des Moines, Iowa when one of the agents asked if company officials had any unusual activity recently. Specifically, they were looking for anything that may involve targeting the companys intellectual property (IP). The company official subsequently detailed a recent incident where an Asian male had been found digging in one of their grower fields. Grower fields operate like laboratories where companies can test their products.

20250106-92547-91

Submitted by Bryan Lee Dail on
Just a mile away from the Pottawattamie County Sheriffs Office in Council Bluffs, Iowa, a woman is shot during a nighttime stroll in a public park. It is the latest in a bizarre series of events, three years into a five-year missing persons investigation. Closing the case will take years of work, dozens of search warrants, and two weeks of testimony. This presentation will provide a case study of the investigation and prosecution of a no-body homicide.

20250106-92544-46

Submitted by Bryan Lee Dail on
This course focuses on the modern challenges with introducing digital evidence in court. In this course, we cover both Brady and admissibility requirements and explain what steps need to be taken to ensure digital evidence can be introduced and effectively used at trial. Takeaways from the course include best practices for visual presentations and a mock exam template.

20250106-92541-22

Submitted by Bryan Lee Dail on
Join us to explore IoT through the optics of the investigator and the examiner. Let us examine the most popular IoT technology, essential planning in any case, how to identify and search for relevant technologies at search or crime scenes, what digital evidence is available locally versus remotely, what tools are available to assist in collection and analysis, what should you know about IoT related legal process, and where to obtain additional resources, focused training, and technical assistance.

20250106-92538-81

Submitted by Bryan Lee Dail on
Threat actors are increasing their use of the Internet, social media and apps to conceal and advance their trafficking operations. Open-source information can provide investigators with intelligence and investigative leads related to narcotics and human trafficking operations. This webinar will provide attendees with introductory methods related to open-source information collection as it applies to identifying online profiles and activity related to narcotics and human trafficking.

20250106-92535-42

Submitted by Bryan Lee Dail on
In this 90-minute training session, "Navigating Human Trafficking: Awareness and Effective Responses," participants will gain a foundational understanding of human trafficking while focusing on practical techniques and approaches to ensure successful interactions and positive outcomes for victims and survivors. The session includes an overview of human trafficking, defining its various forms and shedding light on its prevalence. This concise yet comprehensive introduction includes definitions, myths and stereotypes, federal law, considerations, and case examples.
Subscribe to Juvenile Justice Agencies