This presentation will explore the interconnections between legal returns, open-source, and closed-source information by examining each of them and then walking through case studies where the methods were applied. The presenter will discuss techniques for identifying people who are using technology to hide. Some topics will include facial recognition, geolocating images, advertising IDs, breach data, legal strategies, and dark web data lakes focusing on data exploitation and fusion.
Learning Objectives:
Understand non-typical but high-value requests for legal process in cases involving technology
Understand how to connect and pivot from the physical world to technology
Understand how technology and more traditional pieces of an investigation, such as DNA, or witness statements, fit together and enhance the investigation and the prosecution