Why Your Investigations Strategy Might Not Be Working Anymore
Technology is growing at an exponential rate, making it harder for investigators to deal with techno-crime investigations. Many investigators have never received any training about how to deal with these types of cases, or they don’t know where to find the resources they need to help with the technical aspects. Investigators who don’t educate themselves about new technology trends and how they are being used to commit crimes may be limiting their capability to conduct investigations in the future. They may also have fewer clients and career options if they aren’t able to provide the expertise needed for investigations involving the latest technologies.
This presentation will briefly describe how technology has created new challenges for investigators and investigations practices. We’ll also provide possible solutions that will help to reposition for success in this new environment.
Technologies That Will Create Crimes That You Haven’t Imagined
A self-driving car is being packed with explosives and programmed to be a remote-controlled bomb — no suicide bomber needed. Someone is using a drone with video cameras, microphones, and GPS to stalk your daughter. Could a robot be taken over remotely and instructed to commit a crime? Your biometric data is being collected, whether you want it to be or not. If it’s not secured and is later stolen, what could the consequences be? 3D printing will make it possible to counterfeit almost everything, from drugs and guns to designer clothing and jewelry.
All of these situations are already possible with today’s technology. What about the technology of tomorrow? Although the explosion of different technologies will produce tremendous benefits, it will also create entirely new types of crime. Do you know about bio-hacking, brainwave hacking, or crime in virtual reality? This presentation will take you on a journey to consider what crime will look like in the future, and why we need to start planning for these investigations today.
Darknets: What You Need to Know
Most people think that darknets are secret networks used by criminals and terrorists for all types of illegal activity. Even though there are crimes being committed on darknets, there’s a lot of misunderstanding about why these networks exist, why people use them, and how they work. We’ll show you how to safely and securely access several darknets, along with examples of criminal darknet markets where drugs and weapons are sold, as well as many other types of personal information and other merchandise. We’ll also discuss how darknet investigations must be conducted differently. We’ll also provide you with resources that will give you even more information in case you want to dive deeper into the subject.
How Hard Will It Be to Find Your Evidence with Cosmos Computing?
Most investigators have heard about cloud computing, but may not know much about the technology. With cloud providers hosting more and more applications and data, investigators need to understand how cloud technologies may create new challenges in an investigation.
Consider an example where you are assigned to investigate multiple cloud computing providers along with several possible suspects. All of the involved individuals use more than one personal cloud service. Your investigation will be more difficult because the electronic evidence you need could now be fragmented and stored by multiple service providers. Each provider may have a different computing platform and might be physically located in other countries with different legal systems and privacy laws.
There are also new distributed networks being developed that will break any stored data into small pieces, each of which is encrypted, with different pieces scattered across the various devices connected to the network for storage. The days of finding a complete data file stored on a single device may be coming to an end and will demand investigators with specialized skills and new tools that don’t exist today.
There are also companies developing satellite platforms to provide Wi-Fi communication capability to the entire planet from space. If data can be stored on these satellites, how will you collect and preserve the data?
This presentation will provide you with an overview of how these technologies work and how they can impact your investigations.
Deepfakes and Data Poisoning: The New Threat That Nobody is Talking About
Technologies such as deepfake videos, audio, and email impersonation will make you wonder if you can still believe anything you see and hear. These have already been used to commit fraud, as well as to develop “fake news,” and even virtual digital “people.” Photos, videos, and audio can be manipulated in ways that you can’t believe, especially when combined with artificial intelligence.
What if your data was not just stolen, but also altered? What would you do if you could no longer guarantee that your investigative data is still valid? How could it damage a client if their data became poisoned so that they didn’t know what data had been changed?
Think about a new business model where someone creates false information about your suspect, generating multiple false leads that could waste your time and resources. Unless you know about how these technologies can be used to falsify data, how will you know what’s real from what’s fake?
This presentation will explain these technologies and will show you current examples of how easily data can be altered. You’ll also learn about new tools that are being developed to help detect deepfakes, as well as new technology that can be used to validate data.
Untraceable Links: Tools and Techniques the Crooks Are Using to Hide from You
Can there be an invisible crook who leaves no evidence or clues? Technology now provides new tools and techniques to help criminals hide their activities. Services and apps providing private and secure communication are now more widely used and growing in popularity. Some of these apps send messages that self-destruct and are never stored on a server. Virtual Private Networks (VPNs) give users the ability to look as if they’re located almost anywhere. Many of these new apps and services have built-in encryption and other tricks to conceal activity. To increase your chances of finding people and evidence, you’ll need to learn how crooks are using technology to try to be untraceable.
How Risky Are Those Mobile Devices?
Mobile devices may be one of the most significant security risks today. Did you know that some mobile apps give the developer permission to upload your contacts, read your text and email messages, and track your location? Malware can provide criminals with access to mobile banking apps, with the capability of draining all funds from the targeted bank account, while changing the data on the device screen to show only the expected transactions and balances. Most people don’t know that connecting a device to unsecured public Wi-Fi can give an attacker access to confidential business and personal data. Mobile device apps and malware are creating new victims every day. Let us show you how these threats work, and what you can do to minimize your risk, while also helping your clients to improve their security.
Technology That Will Revolutionize Your Investigations: The Internet of Things
Your father’s pacemaker has just been hacked, and his heartbeat is dangerously high. Control of the car being driven by your wife is intercepted by a hacker miles away, who decides to slam on the brakes while your wife is driving on a high-speed freeway. You are using your new smart home controller to make online purchases and conduct banking transactions, but someone else has access to all of the data being transmitted. Millions of new “smart” Internet of Things devices will always be watching and listening to everything you say and do. Industrial sensors, connected vehicles, medical devices, fitness trackers, security systems and cameras have already been hacked. How will this technology affect your privacy and personal security? Learn how this new technology will change crime and investigations forever.
What if there were an easier way to launder money or hide it? Cryptocurrencies like Bitcoin are increasingly being used in both the real world and in virtual worlds to transfer funds and to purchase almost anything imaginable — both legal and illegal. Many of these currencies can be converted back into real-world currency in any country. They have been used to transfer and launder funds across international borders and to fund terrorism. Yet, there are almost no laws or enforcement in this area. Few law enforcement agencies and investigators know much about cryptocurrencies, and there is no consistency in how international law treats this new technology. “Following the money” in an investigation will now be much harder – and in some cases may not even be possible. If you have cases involving financial transactions or the transfer of funds, you’ll need this presentation to understand cryptocurrencies.
What Do You Need to Know About Digital Forensics?
As technology permeates and controls more of our daily lives, the data related to your investigations will become more critical. We have thousands of digital forensics experts in the world today, but we don’t have enough to satisfy the current demand for their services.
You may not want to know enough about technology to become a digital forensics expert. But the demand for techno-crime investigations is exploding, and we’ll need more people who know enough about digital forensics to contribute in some way.
As technology continues to evolve, our digital forensics experts will need to become more specialized, which will take much more of their time and focus. We won’t be able to expect them to be involved in every step of a techno-crime investigation, which means we’ll need the help of other trained people.
New opportunities will be created for people who understand digital forensics’ best practices so that we can develop new successful models for investigations involving technology.
This presentation will give you that basic foundation, along with new career and business options that you may not have now. After you take this course, you’ll have unique knowledge and a skill set that might give you exciting possibilities for the future.
For more information about inviting Walt to speak to your organization, please visit our Keynote Presentations & Training page
To see testimonials about Walt’s presentations, visit our Testimonials page
For Press interview inquiries or for a more detailed speaking proposal, please