Techno-Crimes and the Evolution of Investigations
Technology is growing at an exponential rate, making it harder for investigators to deal with techno-crime investigations. Many investigators have never received any training about how to deal with these types of cases, or they don’t know where to find the resources they need to help with the technical aspects. Investigators who don’t educate themselves about new technology trends and how they are being used to commit crimes may be limiting their capability to conduct investigations in the future. They may also have fewer clients and career options if they aren’t able to provide the expertise needed for investigations involving the latest technologies.
This presentation will briefly describe how technology has created new challenges for investigators and investigations practices. We’ll also provide possible solutions that will help to reposition for success in this new environment.
Technologies That Will Create Crimes That You Haven’t Imagined
A self-driving car is being packed with explosives and programmed to be a remote-controlled bomb — no suicide bomber needed. Someone is using a drone with video cameras, microphones, and GPS to stalk your daughter. Could a robot be taken over remotely and instructed to commit a crime? Your biometric data is being collected, whether you want it to be or not. If it’s not secured and is later stolen, what could the consequences be? 3D printing will make it possible to counterfeit almost everything, from drugs and guns to designer clothing and jewelry.
All of these situations are already possible with today’s technology. What about the technology of tomorrow? Although the explosion of different technologies will produce tremendous benefits, it will also create entirely new types of crime. Do you know about bio-hacking, brainwave hacking, or crime in virtual reality? This presentation will take you on a journey to consider what crime will look like in the future, and why we need to start planning for these investigations today.
Darknets: What You Need to Know
Most people think that darknets are secret networks used by criminals and terrorists for all types of illegal activity. Even though there are crimes being committed on darknets, there’s a lot of misunderstanding about why these networks exist, why people use them, and how they work. We’ll show you how to safely and securely access several darknets, along with examples of criminal darknet markets where drugs and weapons are sold, as well as many other types of personal information and other merchandise. We’ll also discuss how darknet investigations must be conducted differently. We’ll also provide you with resources that will give you even more information in case you want to dive deeper into the subject.
Deepfakes and Data Poisoning: The New Threat That Nobody is Talking About
Technologies such as deepfake videos, audio, and email impersonation will make you wonder if you can still believe anything you see and hear. These have already been used to commit fraud, as well as to develop “fake news,” and even virtual digital “people.” Photos, videos, and audio can be manipulated in ways that you can’t believe, especially when combined with artificial intelligence.
What if your data was not just stolen, but also altered? What would you do if you could no longer guarantee that your investigative data is still valid? How could it damage a client if their data became poisoned so that they didn’t know what data had been changed?
Think about a new business model where someone creates false information about your suspect, generating multiple false leads that could waste your time and resources. Unless you know about how these technologies can be used to falsify data, how will you know what’s real from what’s fake?
This presentation will explain these technologies and will show you current examples of how easily data can be altered. You’ll also learn about new tools that are being developed to help detect deepfakes, as well as new technology that can be used to validate data.
Untraceable Links: Tools and Techniques the Crooks Are Using to Hide from You
Can there be an invisible crook who leaves no evidence or clues? Technology now provides new tools and techniques to help criminals hide their activities. Services and apps providing private and secure communication are now more widely used and growing in popularity. Some of these apps send messages that self-destruct and are never stored on a server. Virtual Private Networks (VPNs) give users the ability to look as if they’re located almost anywhere. Many of these new apps and services have built-in encryption and other tricks to conceal activity. To increase your chances of finding people and evidence, you’ll need to learn how crooks are using technology to try to be untraceable.
You may not want to know enough about technology to become a digital forensics expert. But the demand for techno-crime investigations is exploding, and we’ll need more people who know enough about digital forensics to contribute in some way.
As technology continues to evolve, our digital forensics experts will need to become more specialized, which will take much more of their time and focus. We won’t be able to expect them to be involved in every step of a techno-crime investigation, which means we’ll need the help of other trained people.
New opportunities will be created for people who understand digital forensics’ best practices so that we can develop new successful models for investigations involving technology.
This presentation will give you that basic foundation, along with new career and business options that you may not have now. After you take this course, you’ll have unique knowledge and a skill set that might give you exciting possibilities for the future.
For more information about inviting Walt to speak to your organization, please visit our Keynote Presentations & Training page
To see testimonials about Walt’s presentations, visit our Testimonials page
For Press interview inquiries or for a more detailed speaking proposal, please