Northwest HIDTA
|
Training Registration
TECHNOLOGY THREATS & TRENDS AGAINST LAW ENFORCEMENT
October 1st 8am
Duration:
8 hours
Location:
Northwest HIDTA
Please check if you are entering a registration for another student
Contact Information
First Name
Middle Initial
Last Name
Office Phone
Ext
Mobile
Email
Confirm Email
Arrest Power
Supervisor Information
Supervisor Name
Supervisor Title
Supervisor Email
Supervisor Phone
HIDTA Task Force & Agency Information
HIDTA
--- Select a HIDTA ---
Alaska
Appalachia
Arizona
Atlanta-Carolinas
Central Florida
Central Valley - California
Chicago
Gulf Coast
Hawaii
Houston
Indiana
Liberty Mid-Atlantic
LInX
Los Angeles
Michigan
Midwest
National HIDTA Assistance Center
Nevada
New England
New Mexico
New York - New Jersey
Non-HIDTA
North Central
North Florida
Northern California
Northwest
Ohio
ONDCP HIDTA Program
Oregon - Idaho
Puerto Rico - Virgin Islands
Rocky Mountain
San Diego-Imperial Valley
South Florida
South Texas
Texoma
Washington - Baltimore
West Texas
HIDTA Task Force
Agency
Agency Type
Local
State
Federal
Military
Tribal
Other
Complete Registration
Course Details
Category
Enforcement
Provider
Professional Law Enforcement Training (PLET)
Description
Technology saturates our everyday lives. Yet, so many technologies are being developed with the specific purpose of targeting police officers or hiding criminal activity. This is a unique and eye-opening class for prosecutors, law enforcement personnel, and anyone working in the judicial system who wants to learn more about how technologies are being used (or misused) to commit crimes, avoid or detect investigations, and to conduct counter-surveillance. However, not only will this class examine and demonstrate how individuals are misusing these technologies, but it will also reveal simple, inexpensive ways to mitigate their success as well as provide some investigative tips. Although dealing with technology issues, this course is instructed in a manner that both the novice and the expert will understand and appreciate. The course utilizes a combination of lecture, multimedia examples, case studies, and live demonstrations involving the attendees.?? TOPICS COVERED: Video Counter-Surveillance The Vulnerabilities of Caller ID Including Spoofing & Unblocking Software Virtual Numbers What the Metadata in Photographs Reveals Devious & Dangerous Smartphone Apps GPS & Geo-Location Threats Understanding IP Addresses & How to Identify a Target Proxy Servers &VPNs Pertinent Intelligence to Gain from Vehicle Data Officers Personal Information on the Internet & How to Remove Case Studies & Examples of Some Technologies Used Against Officers
© 2022 - National HIDTA Assistance Center
www.nhac.org
|
HIDTA Training