Google is everyone's go-to search engine, but most people aren't utilizing it to the full capability. Google has built-in tools to search particular websites, exact phrases, and within URLs. This webinar will teach students how to effectively use Google to filter search results to relevant and usable information to search Facebook and Tiktok and for specific case law and book passages.
A WiFi access point can be a data source to tell an investigator who showed up and when. During this webinar, the attendees will be shown how to interpret router logs to identify specific devices that have been connected a WiFi access point. Additionally, a person's phone innately keeps track of all of the previous connected WiFi networks. Wouldn't it be nice to match these networks to physical locations? Also demonstrated will be to take the WiFi access points seen databases from Android and iPhones and plot those using open source SSID and BSSID tracking tools.
Social Media Sites are a treasure-trove of evidence, but saving the data can be challenging. This webiunar will demonstrate free, open-source tools that can used to save data from profiles, videos, and pages.
Ransomware containing embedded Child Sexual Abuse Material (CSAM) is an increasingly common problem for online child sexual exploitation investigators and examiners. The identification of malware on a device which contains embedded CSAM opens the door for a defense of “the malware did it”. This webinar will present a case study of a limited-scope examination of CSAM ransomware identified on an android device.
Social media is a common part of everyday life, so there is little surprise that it has become commonplace to investigations. However, there are capabilities within social media websites that are little-known within the Crimes Against Children community. This webinar will detail how 3 specific social media searches can be used to enhance the investigation and prosecution of cases. Topics discussed will be using the geocode: search in Twitter to find tweets from a specific latitude and longitude, using site: in Google to search specific social media websites, and using a URL manipulation in Facebook to find mutual friends on a target profile even when the friends list is set to private.