When a person visits a website, blog, or social media platform, information about the person is visible to the site administrator, blogger, or social media company. This information can be used by a criminal investigator or analyst to identify and locate a suspect. It can also be used by a criminal to identify, compromise, and potentially locate an investigator. It is vitally important that investigators and analysts collecting information from the Internet, or communicating in a covert capacity on the Internet, understand these potential investigative leads and possible vulnerabilities. A certificate of training for one hour will be issued to the individual registering and paying for the event. Group rates are available. Contact Robin Elkins at relkins@nw3c.org for details.
Amount | Description |
---|---|
$39.00 | Group rates are available |