I gave two presentations today at the NW ICAC conference
hosted by Microsoft in Redmond, Washington on the same topic in two parts. I met some great folks in the field doing so really awesome work to protect children. Plus, I got to see some people that I have not seen in a long time. All the sponsors set up a great conference with Microsoft providing the venue. I was only there for the first day and I'm sure the next two days will be just as beneficial to attendees.
The first presentation (Part 1) was a broad overview of my first book, Placing the Suspect Behind the Keyboard
. My primary goal was to give a ton of investigative tips in hopes that at least one will be able to save investigators hours (or weeks or months) of labor in their cases. I flew through the material like a firefighter putting out a house fire to make sure enough tips were given to fit as many investigators needed in their specific cases. Definitely covered a lot of ground in a short amount of time. Reading my book covers a lot more, but this was fun.
The second presentation (Part 2) was a brief intro to one chapter in my upcoming third book, Hiding Behind the Keyboard
. Probably the best tips came from how to identify Tor users along with how to explain Tor to the layperson, which is sometimes one of the hardest things to do in a courtroom setting. Both Part 1 and Part 2 presentations are independent of each other but the information is complimentary just like both books are.
If you are in law enforcement and would like a copy of both presentations, you can download them here for the next month or so before I update the presentations:
Placing the Suspect Behind the Keyboard-ICAC.
Send me a message after you download the file and I'll e-mail you the password (the slidedeck will be available for short time).