COURSE SCHEDULE

Registrants are encouraged to attend all four blocks, as we will be following evidence of a hypothetical case throughout the conference, but the blocks are divided into four discreet topics to assist those who must prioritize specific training needs. 

BLOCK ONE: 

Crimes on the Internet

We learn the organization of the internet, and efficient methods for navigation through it. We discover tools for obtaining open-source intelligence, and we explore criminal activity online. We discuss methods for collecting evidence from websites, third party providers, online transactions, and other online data.

BLOCK TWO:

Cryptocurrency

We discuss the blockchain as a protocol, the use of the cryptocurrency on the internet for criminal activity and learn multiple user attribution methods. Experts explain digital assets, blockchain tracing, pig butchering, and asset seizure issues.



BLOCK THREE:

Current Search Warrant Practice

We review the law on basic cybercrime search warrant writing, and delve into specific issues such as CalECPA compliance, the status of geolocation data, best practices for obtaining third party provider records, and what to expect in response to those warrants.


BLOCK FOUR:

Analyzing the Seized Data

We look at different tools and methods to analyze seized data from devices, including an in-depth exploration of forensic cell phone technology. We examine returned social media and other cloud content, and we see examples of courtroom-ready presentations of that evidence.