Registrants are encouraged to attend all four blocks, as we will be following evidence of a hypothetical case throughout the conference, but the blocks are divided into four discreet topics to assist those who must prioritize specific training needs.
We learn the organization of the internet, and efficient methods for navigation through it. We discover tools for obtaining open-source intelligence, and we explore criminal activity online. We discuss methods for collecting evidence from websites, third party providers, online transactions, and other online data.
We review the law on basic cybercrime search warrant writing, and delve into specific issues such as CalECPA compliance, the status of geolocation data, best practices for obtaining third party provider records, and what to expect in response to those warrants.
We look at different tools and methods to analyze seized data from devices, including an in-depth exploration of forensic cell phone technology. We examine returned social media and other cloud content, and we see examples of courtroom-ready presentations of that evidence.