Using GrayKey To Expedite Your Investigations

Mobile devices provide a wealth of digital evidence. They can indicate where devices have been, what they’ve done, who they’ve communicated with, when and why. Keeping up with technology is currently a challenge and will remain a challenge for years to come. iOS and Android platforms are constantly being updated on a regular basis, which … Continue reading Using GrayKey To Expedite Your Investigations

Free

Advancements in Handwriting Recognition for Financial Investigators

Collecting actionable insights from handwritten documents takes time, resources, and a skilled eye. In many cases, check images, deposit slips, and other handwritten forms come by the thousands.   The ScanWriter team will demonstrate the latest hyperautomation technology that captures and converts handwriting from any document into Excel or Business Intelligence analytics with accuracy. Join this … Continue reading Advancements in Handwriting Recognition for Financial Investigators

Free

Using GrayKey Passcode History File

GrayKey collections contain more than just the file system of an iOS device and this additional data is often overlooked. A notable example of this is the GrayKey passcode history file. Learn from Grayshift subject matter experts as they provide an overview of GrayKey passcode history file and how it can be used to maximize … Continue reading Using GrayKey Passcode History File

Free

Intelligence Analysis: Asked and Answered

Join a team of experts from NW3C as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. Click here to submit questions regarding intelligence analysis skills, information collection, or general comments of analytic tradecraft and a panel of NW3C experts will provide answers during this live session. Presented by: Randy Stickley, Intelligence Specialist, … Continue reading Intelligence Analysis: Asked and Answered

Free

Uber Resources for Law Enforcement

This webinar will demonstrate what Uber is and the various lines of business, the information each trip or delivery generates, how investigators can obtain that data, how that data can be useful in a criminal investigation, and trends Uber has observed. The objective is that law enforcement officers, analysts, and prosecutors in attendance are able … Continue reading Uber Resources for Law Enforcement

Free

Understanding the Dark Web

The dark web has the star quality and luster of a Hollywood movie, but in reality, it’s a den of inequity operated by the technically sophisticated. The more “Googleized” we’ve become as investigators and researchers, the less we understand what’s going on behind the scenes and how to operate in this nefarious world. This webinar … Continue reading Understanding the Dark Web

Free

What Investigators Need to Know about Hiding on the Internet: Proxies and VPNs

Criminal investigators and analysts need to understand how it is possible for people to conceal and obfuscate their identity and location on the Internet.  Two primary methods are through the use of proxies and virtual private networks (VPNs). This ability to hide one’s identity and location on the Internet can be both a challenge and … Continue reading What Investigators Need to Know about Hiding on the Internet: Proxies and VPNs

Free

Overview of IoT for Investigators and Examiners

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email. Join us to explore IoT through the optics of the investigator and the examiner. Let's examine the most popular IoT technology, essential planning in any case, how to identify and search for relevant technologies at search or crime scenes, what … Continue reading Overview of IoT for Investigators and Examiners

Free

Conducting Secure Online Investigations in 2022

This training is intended for U.S. Criminal Justice Practitioners. Please register using your agency-issued email. Remaining anonymous and protected online is key to any web intelligence investigation. With social media platforms becoming more efficient at finding and closing fictitious accounts, creating and operating avatars for online investigations is becoming more difficult. This presentation will give … Continue reading Conducting Secure Online Investigations in 2022

Free