Getting the most out of your evidence is an issue all digital examiners face.
As forensic practices and tools evolve, it is crucial to continuously update how you process and examine a multitude of evidence items from MacOS, iOS, Android, and Windows to identify the suspect.
Join us as BlackBag’s Director of Training, Matt McFadden, and Stephen Villere, Forensic Engineer, walk examiners through the best methods on how to not just process the data and use the artifacts, but actually examine the data to make connections. Our forensic experts, who together have over 30 years of experience in law enforcement, will show investigators a deep dive into the file system, operating system, user and application evidence to help reveal the truth as to who is responsible for the cases being investigated.
In addition, attendees will learn about common areas in iOS examinations (communications, location data, etc.) that may be used to help connect the suspect to the evidence. Our experts will show investigators how to look for the data in those common areas to be analyzed, including:
- Photos taken by the device user and what metadata gets captured in those multimedia files (i.e. Were they captured with this device? Were they airdropped?)
- Spotlight information
- Airdrop data
- And more!
Register below and watch now.