The Internet of Things (IoT) involves a web of data which requires planning to access and manage. During this training, we will explore devices and their connected systems, to understand how they create valuable evidence and could have significance at crime scenes. Examination through live demonstrations on how to retrieve and review the data, identify applicable Fourth Amendment concepts, and apply them to build a legally defensible and ethical case will be discussed.
As the Internet of Things (IoT) becomes ubiquitous in our everyday lives there are privacy and security concerns that citizens should be aware of. This training will provide an overview of IoT and will teach law enforcement officials methods to engage with their communities to provide information about IoT privacy and security. Steps that community members can take to be safer with these devices, and effective teaching strategies regarding prevention will be covered.
This training provides participants with essential guidance on identifying critical iPhone® data before a forensic examination. Participants will explore key usage data, search functions, Stolen Device Protection, Screen Time, synced passwords, and learn how Apple Watch® evidence can play a pivotal role in investigations.
This training prepares participants to identify critical data on Android® devices before a forensic examination. Participants will learn what to collect beyond photos, text messages, and apps, including usage data and system artifacts. The course also explores how Google® accounts and cloud-stored information integrate with Android devices to support investigative efforts.
Technology plays a tremendous role in our children's lives. Learn about the ways children are interacting online to create better understanding and open up meaningful communication. Increase awareness of opportunities to protect and connect with children while also gathering valuable information to mitigate threats posed by individuals who seek to exploit them.
Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation.
Explore investigative strategies that address the relationship between child sexual abuse and child sexual abuse materials (child pornography) to supplement an investigation and corroborate victim statements. Gather new tools and resources for the most comprehensive case outcomes.
Join this two-part webinar to master the art of building impactful courtroom visuals, including interactive chalks, dynamic exhibits, and multimedia presentations. Learn how to effectively incorporate digital evidence from diverse sources—such as IoT devices, cell phones, computers, and cloud platforms—into your trial strategy. Discover how to support expert testimony with compelling visuals that resonate with judges and juries, both online and in-person, to achieve maximum courtroom impact.
Join this two-part webinar to master the art of building impactful courtroom visuals, including interactive chalks, dynamic exhibits, and multimedia presentations. Learn how to effectively incorporate digital evidence from diverse sources—such as IoT devices, cell phones, computers, and cloud platforms—into your trial strategy. Discover how to support expert testimony with compelling visuals that resonate with judges and juries, both online and in-person, to achieve maximum courtroom impact.
Learn current cell phone related strategies and techniques for any type of investigation. Explore and apply current practices for working with different cellular network providers, completing technology-focused search warrants, analyzing cellular provider call data, associating reported data to the investigation and effective case reporting strategies.