Attend this workshop with Internet communications expert, Scott Tuma, as he shares how to maximize social media returns with best practices used by today’s top ICAC investigators. Discover how to decrypt Apple iCloud data with the click of a button and request access to device storage, including encrypted apps, in your iCloud warrants. Understand how to use precision location techniques from Google, Snapchat, and Facebook to place suspect and victim together. Lastly, discover how easy it is to consolidate case data from over 600+ social media, phone carriers, and internet companies. You will also learn why ICAC investigators are conducting more social media and email live intercepts than ever before and learn how to run a live intercept from start to finish on a target and never look back again.
Fully understand the value in the data of Social Media and Email Live Intercepts and see just how easy they are to implement.
Utilize Precision Location warrant returns from Google, Snapchat, and Facebook to pinpoint targets' movements and locations.
Save time and frustration by seeing better ways to work CSAM cases involving large volumes of social media and email data.
Discover how to decrypt and view Apple iCloud data with the click of a button.
Filter out the 'noise' on social media returns to make life easier.