Webinar Registration

Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
Date you Choose 8:00 AM Eastern
Duration: 90 minutes

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And, they increasingly choose to use platforms that make this communication openly available for others to view. This means that evidence associated with not just metadata, but also content of communications can often be collected through open sources long after the communication is completed.

While evidence of criminality and victimization can be recovered through open source investigative techniques, many of the commercial tools marketed to criminal investigators and analysts are expensive. This sometimes places them outside the reach of police departments. And, social media companies are increasingly blocking API connections for commercial tools that allow the tools to be used for, “surveillance”. For these reasons, it is increasingly important for criminal investigators and analysts to build an inexpensive cyber-OSINT toolbox.

This Webinar will discuss the rapidly evolving ecosystem of online social media and how people are changing how they choose to communicate. It will then detail and demonstrate free and inexpensive cyber-OSINT tools that criminal investigators and analysts can use to start build a cyber-OSINT toolbox.

Presented by: Chuck Cohen, Cohen Training & Consulting


NW3C Privacy Statement
Yes, I have read, understand, and agree with the NW3C privacy statement.

NW3C Webinars Terms and Conditions
Yes, I have read, understand, and agree with the terms and conditions for this product.

Check this if you agree that NW3C may share my Personally Identifiable Information.
I agree that NW3C may share my Personally Identifiable Information, including, but not limited to, my email address, with third-party vendors in connection with this NW3C product in accordance with NW3C’s privacy statement.