This workshop will discuss the interconnections between legal returns, open-source, and closed-source information by examining each and then walking through case studies where the methods were applied. We will discuss techniques for unmasking people who are using technology to hide. Some of the topics will include facial recognition, geolocating images, advertising IDs, breach data, legal strategies, and dark web data lakes with a focus on data exploitation and data fusion. The workshop will provide a roadmap on how to complete these tasks efficiently and cost-effectively while protecting the civil rights of those we are committed to safeguarding. The workshops are for everyone from senior cyber and homicide investigators to new investigators, prosecutors, analysts, supervisors, and everyone in between. Note: You do NOT have to take Part 1 to attend Part 2.
Understand the basic concepts of image geolocation.
Understand the basic concepts of all source investigations.
Apply all source intelligence knowledge to practical exercises.