Post Conference Add-On “Hard-Core Computer-Aided Investigation, OSINT and Digital Officer Safety
Tell a Friend About This EventTell a Friend
 

This is an introductory course. No prior training or experience is necessary to attend this event. Upon completion of this course, attendees can expect to have achieved an understanding of how to use proprietary and Open Source data to learn how to obtain and use Open Source Intelligence (OSINT); will receive hands-on instruction in cyber-investigative methods; and will receive instruction in digital counter-surveillance, including “Social Networking Best Practices” and “Digital Officer Safety”.

5/15/2016
When: Sunday, May 15, 2016
9:00 AM
Where: Hilton Tampa Airport Westshore - Tampa Bay Room
2225 N. Lois Avenue
Tampa, Florida  33607
United States
Presenter: Steven Rambam, CFE, CPP, PSP, PCI, CSAR, CFCS, BCIP (Cand.)
Contact: Amy O'Rourke
admin@fali.org
888-845-3254


Online registration is closed.
« Go to Upcoming Event List  

"Hard-Core Computer-Aided Investigation,
Open Source Intelligence (OSINT) and Digital Officer Safety”


Presented by:
Steven Rambam
CFE, CPP, PSP, PCI, CSAR, CFCS, BCIP (Cand.)




Sunday, May 15th
9:00AM - 5:00PM

$95: FALI Members & FALI Conference Attendees
$145: Non FALI members


This Class is being limited to 25 - 30 participants
to allow for hands on training.
Attendees are invited to bring active case files for processing.

Pre-Payment Required by May 6, 2016

Seminar - Learning Objectives and Executive Summary:
This is an introductory course. No prior training or experience is necessary to attend this event. Upon completion of this course, attendees can expect to have achieved an understanding of how to use proprietary and Open Source data to support an investigative, auditing, compliance or security function and how to protect themselves, their organization and their activities and maintain OPSEC (Operations Security).

Attendees will :
  • Be introduced to critical sources and methods for gathering and using PII (Personally Identifiable Information), SPI (Sensitive Personal Information) and subjects’ biographical data
  • Learn how to obtain and use Open Source Intelligence (OSINT)
  • Receive hands-on instruction in cyber-investigative methodsReceive instruction in digital counter-surveillance, including "Social Networking Best Practices” and "Digital Officer Safety”.

CEUs will be awarded to those successfully completing all seminar requirements:
8.0 CE hours. (Coding for CPEs: 5 CPEs will be earned in "Specialized Knowledge and Applications”, 1 CPE in "Regulatory Ethics”, and 2 CPEs in "Administrative Practice”).

A Certificate of Completion will be provided. This will be a live ("Group-Live”), hands-on seminar. Attendees are encouraged to bring active files and subject/target information for processing. 


SCHEDULE:
0900-1200 - Module I
1200-1300 - LUNCH
1300-1400 - Module II
1400-1700 - Module III and Q&A


Seminar Overview - General:
Government and private entities have put into practice operations that shred privacy and facilitate the gathering and warehousing of personal, relationship and communications data. Once unimaginable surveillance technologies are being perfected and implemented. The most intimate details of personal lives are routinely and unthinkingly self-contributed and surrendered to data-gatherers.

Self-contributed personal information gathered by private entities - Google, Facebook, Instagram,
Twitter, Acxiom, et al - far exceeds information in governmental databases in both size and scope. Finances, sexual orientation, religion, politics, habits, hobbies, friends and family are gathered, indexed and analyzed.

Physical locations and activities are known, and past locations and activities are logged. If a subject attended a house of worship, or a demonstration, or visited an abortion clinic or a known criminal activity location or met with a targeted person, it was likely digitally documented.

Verified logins, cell phones and apps, Skyhook and known WiFi nodes, VOIP, Google Voice and
Skype, facial recognition, camera analytics, license plate readers and advances in biometrics allow anyone to be deanonymized and remotely observed 24-7-365.

Forensic linguistics, browser and machine fingerprinting and back doors further eliminate the possibility of anonymous Internet activity.

Thanks to "The Internet of Things", your thermostat and electric meter report when you arrive home and your garbage can reports when you throw out evidence to be collected. Your baby’s diaper tweets and your sexual activity is blogged.

Data and "PII" collection now begins at birth. No data gathered will ever be thrown away, and none of the data gathered belongs to you or is under your control. "Predictive profiling" knows what you will do and where you will go in the future, even if you don't.

Combining OSINT with selected public records and proprietary databases allows a capable investigative or security professional to quickly, comprehensively and covertly compile a comprehensive dossier on any subject, witness or target.

Additional Seminar Components
This seminar will discuss and demonstrate methods of merging proprietary online databases with public records, OSINT and free sources, to support "skip trace", background, character, due diligence, criminal, civil and asset-location investigations, and will include a review of proper case intake, to facilitate effective OSINT activity. Attendees are encouraged to bring active files for processing.

This seminar will also include an "ethical investigating" component (1.0 hour/CE), including discussion of laws governing data access (ex. FCRA, DPPA, GLB) and use of OSINT methods (e.g. adherence to bar association no-contact rules, restraining orders, etc.). This seminar, time permitting, will also include introductory instruction in tracing e-mail addresses, domain names (URLs) and IP addresses to owners / users and physical locations.

"Digital Officer Safety”:
This seminar will include "Digital Officer Safety" and "Social Networking Best Practices" components. The purpose of these counter-intelligence (CI) segments is to provide awareness and digital self defense training to investigative and other professionals who might be targeted online by criminals.

"Digital Officer Safety" is a critical concern, as radicals and criminals routinely use the Internet, OSINT, and public records to target law enforcement and other investigative professionals. "Doxing”, "Dorking”, "crowd-sourced investigation”, facial recognition, public "people finder” databases, "Google-Fu” and other open source tools and methods are used by persons with criminal intent to obtain investigative and law enforcement professionals’ home addresses, spouses’ and children’s names, photos, license plates and countless other types of sensitive information. Today, any interested person with bad intent can build a dossier on a target in a matter of minutes. Information gathered online by criminals and radicals can be later used to impede and terrorize, and even to facilitate direct or indirect physical attacks (ex. "SWAT-ing”) on Investigators and law enforcement at their work, in the field and in their homes.

Eric Garner’s wife tweeted the home addresses of NYPD officers involved in her husband’s arrest. Occupy Wall Street used facial recognition technology and crowdsourcing to identify arresting officers and their family members. Daesh and other terrorist groups routinely post personal information of deployed members of the military with a suggestion that they be attacked.

The "Digital Officer Safety" and "Social Networking Best Practices" components of this seminar will provide attendees with basic awareness and tools necessary to mitigate digital threats.


About the Speaker:
Steven Rambam is the founder and CEO of Pallorium, Inc., a licensed Investigative agency and security
services provider. Since 1981, Pallorium's investigators have successfully closed more than 10,000 cases worldwide, ranging from homicide and death claim investigations to missing person cases to the investigation of various types of sophisticated financial and insurance frauds.

Steven is also the host of a reality network television show and a weekly radio show.

Steven Rambam has lectured on topics ranging from "the location of missing persons", to "the criminal use of false identification", to "foreign investigations", to "war crimes and the pursuit of war criminals". Steven's keynote lectures, "Privacy Is Dead - Get Over It" and "International Investigations", have received worldwide recognition including a "Speaker of the Year" award.

Steven is a recognized SME on the topics of “Computer-Aided Investigation”, “Open Source Intelligence (OSINT)” and “Digital Officer Safety” and he provides regular instruction on these topics to private and governmental agencies.

Steven holds the "CFE" board certification from the Association of Certified Fraud Examiner, the "CPP", "PSP" and "PCI" board certifications from ASIS International, the "CSAR" certification from the International Association of Asset Recovery Specialists and the "CFCS" certification from the Association of Certified Financial Crime Specialists. It is believed that Steven is the only person to hold all six board certifications.

Steven is a member of FOI (Founding Member), WAD (Life Member), NAIS (Life Member), ION, AIIP,
NCISS, BOMP (Founding Member), COIN, IJI, IOA, TALI, FALI, ACFE, ASIS, ACFCS, IWWA,
ALDONYS, SPI (former VP and Board Member) and other investigative and security associations.

For more information and contact details: www.pallorium.com and www.stevenrambam.com.