Seminar Title

Online-Investigating Social Media Threats: Facebook, Instagram, Twitter, and more

Dates of Events

02/25/2022 through 02/25/2022

Last Updated: 01/17/2022
Instructor(s): Glenn Bard
Course Registration Fee: $150
Instructor Bio
Glenn Bard
INSTRUCTOR


Glenn Bard is a retired Pennsylvania State Trooper First Class and a U.S. Veteran of Operation Desert Storm. In 1999 Glenn began Computer Crime Investigations for the state police and has since investigated crimes across the United States ranging from Child Pornography to Criminal Homicide. Glenn has also conducted forensic examinations for city, state and federal Law Enforcement Agencies including the FBI, US Postal Inspectors, and I.C.E. as well as foreign governments.
Glenn has been certified as an expert in numerous states, the U.S. Virgin Islands and the United States Federal Court System in the areas of Digital Forensics, Cellular Technology and Computer Technology.
Glenn has been a speaker for organizations of all sizes and types, both public and private, to include the American Academy of Forensic Sciences, World Security Congress, and hundreds of law enforcement agencies, law firms and universities.
Several of the cases Glenn has worked have received National coverage, to include Fox News, Dateline, the Associated Press, Yahoo!, the New York Times, and many more.
Glenn has received numerous awards during his military and police career, including Honorable Discharges from both the United States Army and the Pennsylvania State Police.
Glenn developed, created and implemented certifications for two forensic software companies used by agencies around the world.
Glenn is the Chief Technical officer for PATCtech, overseeing all Digital Forensic and Data Services. Glenn has acted as technical consultant and/or personally developed Computer Forensic Programs at multiple Colleges, to include Westmoreland County Community College where he was a faculty instructor prior to retiring.
Course Objectives
Course Overview:
Group Viewing Encouraged: Pay 1 Registration Fee
·Multiple attendees can group view the training from one device only and each attendee will receive a certificate.
·ONLY the registered attendee will receive a link to join the training (Link will be sent 1-2 Days Prior to the Event)
Quiz & Certificates: Within 24 hours after the live broadcast the registered attendee will receive an email with:
·Quiz link that will need to be forwarded to each person in your group so they may print a certificate after completing the quiz. ·30 Days Access of the Recording (this link may be shared with with others in your department)
*** No Refunds After Class Link Has Been Sent***
Date: February 25, 2022
Time: 12:00pm – 3:00pm (Eastern Time)

On a regular basis a threat posted to Social Media causes schools to close, businesses to lose customers and can even cause transportation delays. In many cases, it is seemingly impossible to tell if the threat is credible, a hoax or even urban legend.
In this webinar the attendee will be introduced to the correct steps and procedures to preserve the social media threat, determine the source, identify the actor, and take the correct steps to seize the involved device used to create the posting. Specifically this webinar will cover the following:
Searching Social Media and locating the threat.
TikTok, Facebook, Instagram, Twitter, and more
Preserving the threat.
Capturing the post
Creating a copy of any videos
Identifying the user who made the posting
Locating the username
Preparing the request for the proper information
Exigent Circumstances vs warrant
Reviewing the results
Tracking any IP addresses
Creating a second request for other information
ISP’s, Cellular Providers, email accounts
Identifying the device that created the post
Identifying the source network vs the actual person
Preparing the warrant for the source location
What items to ask for in the warrant
How to be prepared to seize the proper equipment
What other information can help us identify the actor
IP logs
Cellular records

Print Friendly, PDF & Email