Skip to main content

N/A

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250210-154936-27

Submitted by Bryan Lee Dail on
This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues. *Emerging issues. Current trends in various types of financial crimes.

20250210-121714-55

Submitted by Ms. Marissa Bo… on

Webinar focused on working with original crime victims and their surviving family members to protect their rights in a post-conviction context. This is part of a monthly program for lawyers engaged in post-conviction innocence work, both prosecutors and defense lawyers. The TTA is a live webinar which will be recorded and posted publicly at convictionreview.net and https://www.youtube.com/watch?v=0kfJui9u9hA&list=PLR5Q3wC5nyVmmW6LwcfJt… \.

20250210-115745-28

Submitted by Ms. Marissa Bo… on

A webinar with a defense lawyer and a prosecutor discussing how lawyers can identify questionable convictions involving shaken baby syndrome or abuse head trauma.

20250210-100806-93

Submitted by Bryan Lee Dail on
Human beings are recruited, advertised, traded, bought, sold, and even rented on websites, chat rooms, social media platforms, online classified advertisement sites, and communication platforms.

20250210-100817-67

Submitted by Bryan Lee Dail on
The webinar covers one type of "crime as a service" (CaaS) offered on clearnet and darknet spaces, namely malware as a service (MaaS). Specifically, this webinar introduces participants to MaaS, the Clearnet, and Darknet sites where malware and MaaS are marketed, advertised, and sold, and information about them is distributed. Particularly, attention will be paid to the M.O., tactics, targets, and tools used by perpetrators of this cybercrime.

20250210-100813-89

Submitted by Bryan Lee Dail on
Join experts from NW3C and the National Network of Fusion Centers as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. In this session, our panel has a wealth of experience with managing intelligence analysts and intelligence projects.

20250210-100810-91

Submitted by Bryan Lee Dail on
Expand your DFIR skills by diving into the world of malware analysis. In this webinar, you will learn essential techniques and strategies for incorporating malware analysis into your skillset, enabling you to effectively identify, analyze, and mitigate malicious software threats. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks.

20250210-100840-43

Submitted by Bryan Lee Dail on
The sixth course in the STORM series explores the unique dynamics of law enforcement as a family-centered occupation, emphasizing the ripple effects of officers experiences on their families. It addresses the challenges law enforcement families face, such as long hours, public scrutiny, and emotional detachment, and highlights the importance of resilience, adaptability, and clear communication to overcome these obstacles. Strategies for building resilience are provided, including fostering positive family interactions, addressing emotional needs, and creating supportive networks.
Subscribe to N/A