Course Overview:

Over the past several years, online predators have continued to adapt and find different ways to find their victims and avoid authorities. In some ways they are still using chat rooms and text messages. But they are also using apps like Signal, TikTok and Snapchat. Additionally, as the Internet of Things (IoT) expands, it means that evidence of these crimes may be located in different places and require a vast set of skills to properly identify, seize and examine the data. Most investigators are going to be able to identify the obvious items, such as computers and cell phones, but may miss items such as Routers, Cameras, smartwatches, and even items such as cloud backups, cell records, Google history, and TikTok messages or Snapchat memories. In this event, our presenter will cover how to respond to Cyber Predator investigations in 2023.

Specifically, this course will cover the following:

Types of evidence

Devices – Proper seizing and what can be obtained from a good examination.
• Phones
• Computers
• IoT devices and others
Records – Proper warrant wording and analysis
• Cellular Records
• Social Media Records
• Google Records
Clouds– Proper warrant wording and review of contents
• Phone backups
• Social media server data
The Dark Web, anonymizers, and burner phones
• Different ways Predators are using these items and how to properly investigate

Print Friendly, PDF & Email