SEARCH

The National Consortium for Justice Information and Statistics

The National Consortium for Justice Information and Statistics

Search
Generic filters

SEARCH News

News Categories
News Archives

SEARCH Offers Interactive Learning in Digital Evidence, Computer Forensics at the Annual Conference on Crimes Against Women

New title

Through hands-on computer labs, lectures and case studies, SEARCH is providing an interactive learning experience to investigators, prosecutors and victim advocates attending the 19th Annual Conference on Crimes Against Women (CCAW) this week in Dallas, Texas.

The SEARCH Cybercrime and Digital Forensics Program team is offering expert instruction so these professionals can gain practical skills that will help them identify, investigate, and prosecute crimes against women.

The CCAW is a partnership between the Dallas Police Department, FBI and Genesis Women’s Shelter & Support. It is the only conference that addresses all crimes against women with a multidisciplinary focus to encourage a coordinated community response.

In addition, CCAW is the only conference focused on domestic violence investigations that offers technology-based computer labs. SEARCH is the sole provider of these labs and has partnered with CCAW for years to bring this content to attendees.

“At SEARCH, we are committed to leveraging technology to combat domestic violence and support survivors. As we engage with investigators and advocates at this year’s conference, we are reminded of the critical role technology plays in both the problem and the solution,” noted Mrs. Lauren Wagner, SEARCH Program Manager of Cybercrime and Digital Forensics.

SEARCH's Cybercrime and Digital Forensics Program team poses May 20 at the 19th Annual Conference on Crimes Against Women in Dallas, TX. Clockwise from lower right: Mrs. Lauren Wagner, Program Manager; Mr. Eric Jollymore, Digital Evidence Forensic Analyst; Mr. Timothy Lott, Director of Cybercrime Training; Mr. John Trenary, Director of Digital Forensics Services; and Det. Christopher Dale, Cybercrimes Training Specialist.

It's a full house for a SEARCH lecture on "Combatting Technology-Based Stalking" presented at the 2024 Conference on Crimes Against Women this week in Dallas, TX. Presenting were (from right) SEARCH Director of Digital Forensics Services John Trenary and Cybercrime and Digital Forensics Program Manager Lauren Wagner.

Mrs. Lauren Wagner, SEARCH Program Manager of Cybercrime and Digital Forensics, leads investigators, prosecutors and victim advocates through a computer lab at this week's 2024 Conference on Crimes Against Women in Dallas, TX. CCAW is the only conference focused on domestic violence investigations that offers technology-based computer labs, and SEARCH is the sole partner providing these labs.

SEARCH's Director of Cybercrime Training, Timothy Lott, leads investigators, prosecutors and victim advocates through a computer lab at this week's 2024 Conference on Crimes Against Women in Dallas, TX. CCAW is the only conference focused on domestic violence investigations that offers technology-based computer labs, and SEARCH is the sole partner providing these labs.

SEARCH Digital Evidence Forensic Analyst Eric Jollymore lectures on understanding artificial intelligence-generated imagery before a well-attended group of attendees at the 2024 Conference on Crimes Against Women, in Dallas, TX. The lecture helped build attendees' knowledge and experience of how popular AI technologies work and prepare for upcoming AI-assisted exploitation investigations.

The 20 computer labs, lectures and other presentations SEARCH is making this week are:

May 20

Computer Lab – Data in Data: Finding File Metadata and Using it in Investigations

An anonymous threatening word document is sent to your victim. What data is there to help you identify the sender? Metadata, or data about data, is contained in many common files including Office files and images. This hands-on computer lab shows how to use office applications and other third-party tools to find this data and see the author, time for editing, and potentially even latitude and longitude where a photo was taken.
Trainers: Christopher Dale, Eric Jollymore, John Trenary

Computer Lab – #howdoisearchthat: Leveraging Native Social Media Search Capabilities

Social media sites have some advanced searching capabilities that are unadvertised and underutilized. This hands-on computer lab shows how to leverage the built-in capabilities offered by social media sites to find information on Facebook, Instagram, Snapchat, and more.
Trainers: Timothy Lott, Lauren Wagner

Computer Lab – The 4th Dimension of Crime: Technology Artifact Awareness

The forensic sciences have experienced a quantum shift, with law enforcement now having to make sense of the clues left behind in the invisible fourth-dimension of information technology. This computer lab introduces any truth-seeker to many of the most common sources of technology evidence; attendees gain an understanding of what technology artifacts might exist related to the crime they are confronting.
Trainers: Christopher Dale, John Trenary

Lecture – AirTag, You’re It: Combatting Technology-Based Stalking

In today’s digital age it is essential how technology can be used to stalk and harass individuals. This workshop, designed specifically for victim advocates and investigators, explores the use of apple AirTags and other tracking technologies, teach strategies to identify if an unwanted set of eyes is watching your victims’ online behaviors, and develop best-practices for personal security to teach to stalking victims.
Trainers:  John Trenary, Lauren Wagner

Computer Lab – Now What? Digesting Electronic Search Warrant Returns

You wrote the warrant, you got the return data, now what…? In this hands-on computer lab, attendees learn the necessary skills to effectively review and analyze the massive volumes of digital evidence search warrant return data, as well as developing an understanding of how to extract relevant information. The instructors share methods on how to document findings, interpret data, and present findings in a clear and concise manner.
Trainers:  Eric Jollymore, Timothy Lott

May 21

Computer Lab – Become a Google Jedi: Building a Better Boolean String

By mastering the art of Google Boolean and advanced operators, attendees learn how to filter search results and uncover relevant information, saving valuable time and effort. In this hands-on computer lab, the instructors share techniques on how attendees can leverage Google’s built-in search tools to extract precise information from social media sites and other sources. Through hands-on exercises, attendees also learn to develop practical skills and knowledge that will enhance productivity in today’s digital world.
Trainers:  Eric Jollymore, Lauren Wagner

Computer Lab – Practical Tools for Data Insights and Analysis

This hands-on lab explores practical features from free tools to easily use optical character recognition and advanced mouse functions for seamless insights extraction. Attendees learn practical skills to navigate the evolving cybercrime landscape by working smarter, not harder. The lab features live demos with precise zooming and annotations that teach attendees how to effortlessly toggle between scientific and hexadecimal modes for data decoding, and enhance information navigation using a potent indexing and search tool across multiple volumes.
Trainers:  Christopher Dale, John Trenary

Lecture – The Future is Now: Understanding AI-Generated Imagery

AI? GAN? Diffusion? GPT? What do all these terms mean? In this lecture, the presenter lays out the foundations and essentials for understanding how popular AI technologies work. AI-aided exploitation investigations are coming! The time is now to build that knowledge and experience. 
Trainer:  Eric Jollymore

Computer Lab – Capturing and Preserving Online Videos

This hands-on computer lab explores the treasure trove of evidence on social media sites. Attendees are taught how to save valuable data, specifically videos, with free and open-source tools and discover browser tricks and add-ons to save videos from TikTok and Snapchat, YouTube-dl for other web videos, and VLC for playing and enhancing videos. Instructors share strategies on how to enhance investigative capabilities with practical exercises, develop skills in data preservation, and gain a deeper understanding of how to use these tools.
Trainers:  Christopher Dale, John Trenary, Lauren Wagner

Computer Lab – Shining Light on the Darknet: Darknet Awareness

As the debate over digital privacy rages in the media and the Courts, many who utilize technology have found ways to obscure their online activity. These also include people who wish to commit criminal offenses. While the TOR network has some noble ideals, it is often used as a bastion where offenders can operate in the open with little fear of law enforcement interdiction. This hands-on computer lab introduces attendees to the terminology employed in anonymized browsing, how to access the TOR network, and gain a firmer understanding of the challenges of investigating crimes on the Darknet.
Trainers:  Eric Jollymore, Timothy Lott

Computer Lab – Writing Legal Process for Digital Investigations

With every website and app comes new challenges to writing legal process. This hands-on computer lab shows attendees how to identify who and how to send your legal process, web resources for knowing what each company keeps and how to write legal process to recover it, and resources for finding information when the go-to data sources come up short.
Trainers:  Christopher Dale, John Trenary, Lauren Wagner

Computer Lab – Digital Detective: Unleashing the Power of OSINT

In this lab, attendees discover third-party open-source intelligence (OSINT) resources for searching data on people, places, and things, which helps enhance their investigative skills. They explore people search resources, cell phone and email lookup tools, and third-party resources for social media information, gain practical experience with these tools and expand their knowledge in OSINT research.
Trainers:  Christopher Dale, Timothy Lott, Lauren Wagner

Computer Lab – Virtual Treasure Troves: User Account Downloads

Victims of crimes against women use technology, social media, and other communication platforms to stay connected to their support networks. However, perpetrators can also use the victim’s technology against them to stalk, monitor, and further isolate the victim. When time is of the essence, user account downloads can be critical for accessing immediate information to protect victims. This hands-on computer lab explores how to access this data with the victim’s assistance, identify signs of unauthorized monitoring, and collect actionable information when signs of unauthorized monitoring are detected.
Trainers:  Eric Jollymore, John Trenary

May 22

Computer Lab – Making Sense of Mobile Forensics, Part 1 and Part 2

In this two-part lab, attendees are introduced to mobile devices and instructors discuss the many impacts that mobile devices have on investigations. Attendees learn how to identify mobile evidence, discover strategies for recovering mobile evidence information, and review mobile evidence forensic reports, using commonly encountered forensic report tools such as Cellebrite Reader.
Trainers:  Christopher Dale

Lecture – VPN Investigations

Virtual Private Networks or VPNs are a tool that can be used for user privacy and to work towards masking malicious activity. When digital anonymity and privacy are increasingly sought after, Virtual Private Networks have become a common tool for individuals seeking to mask their online activities. This presents unique challenges and complexities for law enforcement investigators and advocates working to uphold the law and protect communities. This workshop is designed to demystify the technology behind VPNs, explore their operation, identify the challenges they pose to investigations, and provide ways to unmask the hidden information in unique ways when possible.
Trainers:  Timothy Lott

Lecture – Scrolling with Purpose: Mastering the Art of Social Media Searching

Many people understand the importance of leveraging social media searches in investigations, but, oftentimes it can be intimidating to know where to start. This workshop helps attendees gain confidence in leveraging social media searches and discover methods to search popular social media platforms, such as Facebook, Instagram, TikTok, and Snapchat. With practical examples and tips, attendees are taught how to effectively navigate these platforms and uncover valuable information.
Trainers:  Timothy Lott, Lauren Wagner

Computer Lab – Using Google Earn to Plot Geolocation Points, Create Maps and Visuals, Part 1 and Part 2

This two-part hands-on lab demonstrates how to leverage Google Earth to support investigations and create compelling visual aids. Geolocation data, obtained from sources such as cell tower records, EXIF information from photos, and location data from social media, is becoming increasingly important in modern investigations. Attendees are exposed to practical experience in plotting information on Google Earth and use the functionality it offers.
Trainers:  Timothy Lott, John Trenary

Computer Lab – You Down With OPP (Other People’s Python)?

This hands-on computer lab demystifies Python scripts and makes them accessible to everyone. Attendees learn how to find and use pre-written Python code to address various investigative needs, and discover the basics of Python terminology, how to search for existing scripts, and how to run them for their own investigations. Through practical exercises, attendees gain confidence in using Python to further develop skills in digital investigations.
Trainers:  Christopher Dale, Eric Jollymore, Lauren Wagner

SEARCH Cybercrime and Digital Forensics Trainers

These SEARCH team members are presenting at the Conference on Crimes Against Women June 20-22, 2024, in Dallas, TX:

Timothy Lott

Director of Operations
Director of Cybercrime and Digital Forensics

Timothy Lott

Director of Operations
Director of Cybercrime and Digital Forensics

Lauren Wagner

Program Manager, Cybercrime and Digital Forensics

Lauren Wagner

Program Manager, Cybercrime and Digital Forensics

John Trenary

Director of Digital Forensics Services

John Trenary

Director of Digital Forensics Services

Eric Jollymore

Digital Evidence Forensic Analyst

Eric Jollymore

Digital Evidence Forensic Analyst

Det. Christopher Dale

Cybercrimes Training Specialist

Det. Christopher Dale

Cybercrimes Training Specialist

Learn More: SEARCH Cybercrime & Digital Forensics Program

 

  • Questions? Need training? Contact Lauren Wagner, Program Manager, Cybercrime and Digital Forensics
Scroll to Top