Getting Past the Android Passcode

  Getting Past the iOS Passcode

Original Air Date
July 28, 2016
Scott Lucas
$199
Details | Register

Original Air Date:
May 27, 2016
Scott Lucas
$199
Details | Register

  Smartphone DB/SQL Forensics

​​

This webinar will explore various ways to bypass the passcode on a locked iOS device. Apple’s mobile devices are some of the most popular on the planet, and run versions of Apple’s mobile operating system, iOS. These devices often contain valuable evidence for our investigations, but this data is frequently protected by user passcodes. With the myriad of possible combinations of hardware and software versions, it can be challenging to determine if it is possible to get into a locked device, and, if so, which hardware, software or process will do the trick. This is a constantly evolving topic, due to the frequent release of updated versions of iOS and Apple devices, the changing of Apple’s policies, and the unveiling of new tools.  MORE


Original Air Date:
June 23, 2016
Scott Lucas
$199
Details | Register

  D.A.R.T. Cell Mapping

​​​

For years, many agencies have relied upon Microsoft Streets and Trips® for their cell phone mapping software. Microsoft Streets and Trips® was a reliable and inexpensive tool, but unfortunately it has reached “End of Life”, and there hasn’t been an updated version since 2013. Many agencies have contacted PATCtech asking us for a recommendation for a replacement, and we set out to find a solution. After testing several different tools, we have selected DART® as our replacement for the classroom and for our cases as well. DART® is a utility that allows for mapping of individual towers, or importing the entire Call Detail Record at once. Additionally, it can add ranges, azimuths and beam widths without the need of having a protractor or any other software. It also allows the user to choose between several different map options. DART® has many more capabilities, including SQLite Viewer, PList Viewer, and much more.  MORE


​​

This webinar will explore various methods of gaining access to or recovering data from locked devices running the Android smartphone operating system. Millions of devices run this popular operating system, and our ability or inability to access the data that is contained on them can often make or break our investigations. This is a constantly evolving topic, due to the frequent release of updated versions the Android OS and Android devices, the changing of Google’s policies, and the unveiling of new tools. MORE


 On-Scene Router Interrogation

 On-Scene Triage of Electronic Evidence

Original Air Date:
August 12, 2016
Scott Lucas
$199
Details | Register

PAST WEBINARS   


Your registration will give you 15 days of unlimited access to the recordings of the live sessions of these webinars.  

Original Air Date:
March 31, 2016
Glenn Bard
$199
Details | Register

Original Air Date:
June 9, 2016
Scott Lucas
$199
Details | Register


This webinar is intended to make investigators and responding officers aware of the types of electronic evidence that they may encounter, appropriate methods for seizing this evidence, special situations officers may encounter, and effective and appropriate tools and techniques for on-scene triage of electronic evidence. MORE



This webinar is intended to make investigators and responding officers aware of the types of electronic evidence that they may encounter, appropriate methods for seizing this evidence, special situations officers may encounter, and effective and appropriate tools and techniques for on-scene triage of electronic evidence. MORE



Does your agency include information from the internet and social media when making employment decisions? Incorporating online information into your existing background investigation process for new hires and promotions can help you avoid future liability, but agencies must exercise caution when developing and implementing cybervetting policies. MORE


DIGITAL FORENSICS

PATCtech

​​​

This webinar will cover the aspects of extracting data from databases on Smartphones. The technology of Smartphones has changed the way forensics is done, and the mount of data stored on the devices continues to grow. A large amount of the data is being stored in files such as DB, SQL and SQLITE. Everything from website bookmarks, to voicemails dates and times, to pictures being stored in BLOB data is able to be recovered from a thorough examination. This webinar will introduce the attendee to the process of extracting data from these files, and also reveal some of the best places to look for hidden evidence.  MORE


With the widespread availability of open wifi networks, it is increasingly likely that our bad guys may be committing their on-line crimes from locations other than their own homes. In these situations, the IP address of their activities will resolve to the location of the wifi network, and may even cast suspicion on an innocent party. Additionally, when we are executing a search warrant at a scene, we need to make sure that we have accounted for every computer, mobile devices, network attached storage devices, and anything else that may be attached to the network. This makes it vitally important that we are able to explore the inner workings of wifi routers, and understand what information may be available, where it may be located, and understand its volatility. MORE