|
"Hard-Core Computer-Aided Investigation, Open Source Intelligence (OSINT) and Digital Officer Safety”
Presented by: Steven Rambam CFE, CPP, PSP, PCI, CSAR, CFCS, BCIP (Cand.)
Sunday, May 15th 9:00AM - 5:00PM$95: FALI Members & FALI Conference Attendees $145: Non FALI members
This Class is being limited to 25 - 30 participants to allow for hands on training. Attendees are invited to bring active case files for processing.
Pre-Payment Required by May 6, 2016
Seminar - Learning Objectives and Executive Summary:This
is an introductory course. No prior training or experience is
necessary to attend this event. Upon completion of this course,
attendees can expect to have achieved an understanding of how to use
proprietary and Open Source data to support an investigative, auditing,
compliance or security function and how to protect themselves, their
organization and their activities and maintain OPSEC (Operations
Security).
Attendees will :
- Be
introduced to critical sources and methods for gathering and using PII
(Personally Identifiable Information), SPI (Sensitive Personal
Information) and subjects’ biographical data
- Learn how to obtain and use Open Source Intelligence (OSINT)
- Receive hands-on instruction in cyber-investigative methodsReceive instruction in digital counter-surveillance, including "Social Networking Best Practices” and "Digital Officer Safety”.
CEUs will be awarded to those successfully completing all seminar requirements: 8.0
CE hours. (Coding for CPEs: 5 CPEs will be earned in "Specialized
Knowledge and Applications”, 1 CPE in "Regulatory Ethics”, and 2 CPEs in
"Administrative Practice”).
A Certificate of Completion will be
provided. This will be a live ("Group-Live”), hands-on seminar.
Attendees are encouraged to bring active files and subject/target
information for processing.
SCHEDULE:0900-1200 - Module I 1200-1300 - LUNCH 1300-1400 - Module II 1400-1700 - Module III and Q&A
Seminar Overview - General:Government and private entities have put into practice operations that shred privacy and facilitate the gathering and warehousing of personal, relationship and communications data. Once unimaginable surveillance technologies are being perfected and implemented. The most intimate details of personal lives are routinely and unthinkingly self-contributed and surrendered to data-gatherers.
Self-contributed personal information gathered by private entities - Google, Facebook, Instagram, Twitter, Acxiom, et al - far exceeds information in governmental databases in both size and scope. Finances, sexual orientation, religion, politics, habits, hobbies, friends and family are gathered, indexed and analyzed.
Physical locations and activities are known, and past locations and activities are logged. If a subject attended a house of worship, or a demonstration, or visited an abortion clinic or a known criminal activity location or met with a targeted person, it was likely digitally documented.
Verified logins, cell phones and apps, Skyhook and known WiFi nodes, VOIP, Google Voice and Skype, facial recognition, camera analytics, license plate readers and advances in biometrics allow anyone to be deanonymized and remotely observed 24-7-365.
Forensic linguistics, browser and machine fingerprinting and back doors further eliminate the possibility of anonymous Internet activity.
Thanks to "The Internet of Things", your thermostat and electric meter report when you arrive home and your garbage can reports when you throw out evidence to be collected. Your baby’s diaper tweets and your sexual activity is blogged.
Data and "PII" collection now begins at birth. No data gathered will
ever be thrown away, and none of the data gathered belongs to you or is
under your control. "Predictive profiling" knows what you will do and
where you will go in the future, even if you don't.
Combining
OSINT with selected public records and proprietary databases allows a
capable investigative or security professional to quickly,
comprehensively and covertly compile a comprehensive dossier on any
subject, witness or target.
Additional Seminar Components This
seminar will discuss and demonstrate methods of merging proprietary
online databases with public records, OSINT and free sources, to support
"skip trace", background, character, due diligence, criminal, civil and
asset-location investigations, and will include a review of proper case
intake, to facilitate effective OSINT activity. Attendees are
encouraged to bring active files for processing.
This seminar
will also include an "ethical investigating" component (1.0 hour/CE),
including discussion of laws governing data access (ex. FCRA, DPPA, GLB)
and use of OSINT methods (e.g. adherence to bar association no-contact
rules, restraining orders, etc.). This seminar, time permitting, will
also include introductory instruction in tracing e-mail addresses,
domain names (URLs) and IP addresses to owners / users and physical
locations.
"Digital Officer Safety”: This
seminar will include "Digital Officer Safety" and "Social Networking
Best Practices" components. The purpose of these counter-intelligence
(CI) segments is to provide awareness and digital self defense training
to investigative and other professionals who might be targeted online by
criminals.
"Digital Officer Safety" is a critical concern, as
radicals and criminals routinely use the Internet, OSINT, and public
records to target law enforcement and other investigative professionals.
"Doxing”, "Dorking”, "crowd-sourced investigation”, facial recognition,
public "people finder” databases, "Google-Fu” and other open source
tools and methods are used by persons with criminal intent to obtain
investigative and law enforcement professionals’ home addresses,
spouses’ and children’s names, photos, license plates and countless
other types of sensitive information. Today, any interested person with
bad intent can build a dossier on a target in a matter of minutes.
Information gathered online by criminals and radicals can be later used
to impede and terrorize, and even to facilitate direct or indirect
physical attacks (ex. "SWAT-ing”) on Investigators and law enforcement
at their work, in the field and in their homes.
Eric Garner’s
wife tweeted the home addresses of NYPD officers involved in her
husband’s arrest. Occupy Wall Street used facial recognition technology
and crowdsourcing to identify arresting officers and their family
members. Daesh and other terrorist groups routinely post personal
information of deployed members of the military with a suggestion that
they be attacked.
The "Digital Officer Safety" and "Social
Networking Best Practices" components of this seminar will provide
attendees with basic awareness and tools necessary to mitigate digital
threats.
About the Speaker: Steven Rambam is the founder and CEO of Pallorium, Inc., a licensed Investigative agency and security services provider. Since 1981, Pallorium's investigators have successfully closed more than 10,000 cases worldwide, ranging from homicide and death claim investigations to missing person cases to the investigation of various types of sophisticated financial and insurance frauds.
Steven is also the host of a reality network television show and a weekly radio show.
Steven Rambam has lectured on topics ranging from "the location of missing persons", to "the criminal use of false identification", to "foreign investigations", to "war crimes and the pursuit of war criminals". Steven's keynote lectures, "Privacy Is Dead - Get Over It" and "International Investigations", have received worldwide recognition including a "Speaker of the Year" award.
Steven is a recognized SME on the topics of “Computer-Aided Investigation”, “Open Source Intelligence (OSINT)” and “Digital Officer Safety” and he provides regular instruction on these topics to private and governmental agencies.
Steven holds the "CFE" board certification from the Association of Certified Fraud Examiner, the "CPP", "PSP" and "PCI" board certifications from ASIS International, the "CSAR" certification from the International Association of Asset Recovery Specialists and the "CFCS" certification from the Association of Certified Financial Crime Specialists. It is believed that Steven is the only person to hold all six board certifications.
Steven is a member of FOI (Founding Member), WAD (Life Member), NAIS (Life Member), ION, AIIP, NCISS, BOMP (Founding Member), COIN, IJI, IOA, TALI, FALI, ACFE, ASIS, ACFCS, IWWA, ALDONYS, SPI (former VP and Board Member) and other investigative and security associations.
For more information and contact details: www.pallorium.com and www.stevenrambam.com.
|