In the modern cyber-world, almost all criminal investigations have an online aspect that can be used to further investigations and more quickly solve otherwise difficult cases. Join us to examine open source online intelligence/information and learn how to leverage free platforms, databases, and web applications to strengthen criminal cases. Uncover little known facts and techniques to optimize results using online search engines and online internet resources, which will support your investigations and prosecutions. Learn how to complete and serve search warrants for a variety of electronic information and databases to further all types of investigations. Develop new skill sets to establish contacts and open-source intelligence networks to provide ongoing criminal and threat intelligence in your jurisdiction.
From the initial 911 call to the courtroom, real-time crime analysis and rapidly evolving technology are transforming how law enforcement solves crimes and delivers justice faster than ever before. Join us for an engaging webinar that explores the digital tools, forensic innovations, and data-driven strategies that are reshaping modern criminal investigations — both today and into the future. With the belief that we are all digital detectives; this session will take a closer look at the latest advancements powering today’s investigative efforts. As we work to increase solve rates and better serve victims in our communities, the integration of technology into every phase of an investigation is proving essential. Attendees will gain insight through real-world case studies and practical examples that highlight how these tools are being used in the field to solve crimes more efficiently, accurately, and with fewer resources.
The Internet of Things (IoT) involves a web of data which requires planning to access and manage. During this training, we will explore devices and their connected systems, to understand how they create valuable evidence and could have significance at crime scenes. Examination through live demonstrations on how to retrieve and review the data, identify applicable Fourth Amendment concepts, and apply them to build a legally defensible and ethical case will be discussed.
Technology plays a tremendous role in our children's lives. Learn about the ways children are interacting online to create better understanding and open up meaningful communication. Increase awareness of opportunities to protect and connect with children while also gathering valuable information to mitigate threats posed by individuals who seek to exploit them.
Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation.
Explore investigative strategies that address the relationship between child sexual abuse and child sexual abuse materials (child pornography) to supplement an investigation and corroborate victim statements. Gather new tools and resources for the most comprehensive case outcomes.
In an era where connected devices (cars, phones, wearables, smart devices) and Artificial Intelligence (AI) are ever-present, their role in gathering evidence and intelligence has become critical for law enforcement and prosecution. These devices are always watching, listening, sensing, creating logs and data that can be pivotal in criminal investigations. They help place suspects at crime scenes, establish timelines, and corroborate or refute statements made by individuals involved. We will discuss how finding and preserving this evidence can protect the innocent and improve trust.
Learn current cell phone related strategies and techniques for any type of investigation. Explore and apply current practices for working with different cellular network providers, completing technology-focused search warrants, analyzing cellular provider call data, associating reported data to the investigation and effective case reporting strategies.
Learn how to identify the types of data that is available from connected cars and the difference between network connected cars and vehicle forensics options. Gain knowledge on how to query certain vehicles to determine their connection status to various service providers will also be covered. Explore and be instructed on how to draft legal process for the extraction of vehicle specific data and learn about resources and tools that can assist them in their investigations that involve vehicle data.
Do you set technology device boundaries in your home? Do you provide professional guidance to others about safe technology uses for children and families? Technology devices have a large presence in our daily lives, surrounding us in our homes, schools, and workplaces. They assist us in many ways but can be equally disruptive or dangerous if not marshalled correctly. Dana Miller shares three critical things to consider when teaching or setting your own technology device limits for children and adolescents.