Getting the most out of your evidence is an issue all digital examiners face.
As forensic practices and tools evolve, it is crucial to continuously update how you process and examine a multitude of evidence items from MacOS, iOS, Android, and Windows to identify the suspect.Join BlackBag as Director of Training, Matt McFadden, and Stephen Villere, Forensic Engineer, walk examiners through the best methods on how to not just process the data and use the artifacts, but actually examine the data to make connections. These forensic experts, who both together have over 30 years of experience in law enforcement, will show investigators a deep dive into the file system, operating system, user and application evidence to help reveal the truth as to who is responsible for the cases being investigated.
In addition, attendees will learn about common areas in iOS examinations (communications, location data, etc.) that may be used to help connect the suspect to the evidence. Investigators will learn how to look for the data in those common areas to be analyzed, including:
– Photos taken by the device user and what metadata gets captured in those multimedia files (i.e. Were they captured with this device? Were they airdropped?)
– Spotlight information
– Airdrop data
– And more!
About BlackBag Technologies:
BlackBag® Technologies offers innovative forensic acquisition and analysis tools for both Windows and macOS based computers, as well as iOS and Android mobile devices. Its forensic software is used by hundreds of federal, state, and local law enforcement agencies around the world, as well as by leading corporations and consultants, to investigate all types of digital evidence associated with both criminal, civil and internal investigations. BlackBag also develops and delivers expert forensics training and certification programs, designed for both novice and experienced forensics professionals. To learn more, visit www.blackbagtech.com.