January 19th, 2022 @ 11:00 AM (ET) View the Webinar
In the U.S, there are 287 million vehicles registered on the road, equating to roughly 872 vehicles per 1000 people. Similarly, in Great Britain, there are 39 million licensed vehicles, equating to roughly 600 vehicles per 1000 people. Vehicles are intrinsically linked to our way of life and are rarely found far from their owners, with infrastructure designed around their heavy use. Therefore, identifying the vehicle that the subject of an investigation owns, has access to, or is in possession of, can provide valuable insight into their current location.
February 16th, 2022 @ 11:00 AM (ET) View the Webinar
Multimedia instant messaging apps enable people to share pictures and videos with their social networks around the globe. Some multimedia instant messaging apps incorporate a feature that enables users to share content that self-destructs after a short period of time, making it inaccessible to recipients after this period.
Self-destructing messages have afforded criminals an opportunity to advertise illicit goods for sale, like drugs and weapons, in a way that limits detection by law enforcement agencies. Billions of multimedia messages are sent via these services each day, with many available for public consumption.
March 16th, 2022 @ 11:00 AM (ET) View the Webinar
Geospatial platforms enable investigators to research and map locations that are linked with criminality. Geospatial platforms can be used to view buildings, track the movement of criminals, calculate the distance between offenses, and identify crime hotspots.
April 13th, 2022 @ 11:00 AM (ET) View the Webinar
The internet provides a multitude of sources of publicly available information about businesses. Utilizing public directories, social media, historic data, and news articles, an investigator can establish a detailed background of a business and its employees.
Business focussed investigations have proven vital to the prevention of crime, enabling research into businesses committing serious fraud and those being used as a front for organized crime.
May 25th, 2022 @ 1:00 PM (ET) View the Webinar
Browser-based instant messaging apps provide users with end-to-end encrypted video calling, messaging, and file-sharing features. Browser-based instant messaging apps have been utilized by the criminal underworld to facilitate crimes, including terrorism, hacking, and the trade of stolen and illicit goods and services.
Utilizing these platforms, investigators can research criminal groups, examine their messages, and evidentially capture their message history.
June 15th, 2022 @ 1:00 PM (ET) View the Webinar
Social news aggregation and discussion websites enable users to share and discuss content relating to any topic. Whilst the majority of content is legitimate and there are rules and moderators in place to control the content, these platforms have been used by criminals to share criminal techniques and discuss previous criminality.
Investigations on social news aggregation sites enable investigators to detect emerging risks and to research subjects and their criminal methods.
July 13th, 2022 @ 11:00 AM (ET) View the Webinar
Every year, criminals utilize cryptocurrencies and NFTs to facilitate billions of dollars of illicit activity. Criminals rely on cryptocurrencies to launder money flows, collect payments from frauds and cybercrimes, and as means of payment for illegal goods and services. We’ll demonstrate free tools to locate cryptocurrency and NFT content, identify anonymous wallet holders, and put a live value to a criminal's funds hidden in the blockchain.
August 17th, 2022 @ 11:00 AM (ET)
Image hosting sites enable users to easily upload and host images on the internet publicly, meaning owners and the general public can access them online. We’ll show tools and techniques that investigators can rely on to locate content on popular platforms like Flickr, Imgur, and Pinterest, showing you how to get the most value from each three of these platforms for your OSINT investigations.
September 14th, 2022 @ 11:00 AM (ET)
It is vital that investigators collecting information from the internet do so in a manner in accordance with the law, legislation, and organizational policies. Investigators must utilize an approach that achieves best practice, protecting sensitive investigative tactics, the integrity of any evidence gained, and honoring the rights of members of the public to privacy and family life. In this session, we’ll outline how investigators can perfect their hardware setup, useful browser extensions for OSINT, and best practice for creating covert (sock-puppet) accounts.
October 12th, 2022 @ 11:00 AM (ET)
Wedding Registry sites are platforms that enable engaged couples to create dedicated websites about their wedding and relationship, as well as lists of gifts that they want to share with their guests prior to the wedding. In this webinar, we’ll show how investigators can leverage Wedding Registry sites to learn more about their subject’s relationships, showing how to locate and extract content from these platforms.