I will be presenting "Breaking Anonymity". The presentation targets finding covert and anonymous communications when suspects are using methods such as Tor and electronic dead drops. I will give some high level Tor discussion as an intro to Tor as a comparison to other means of covert communications with methods to lawfully intercept them. Much of the information presented is based off the books "Placing the Suspect Behind the Keyboard" and "Hiding Behind the Keyboard."
If you have not been to a CTIN conference, consider attending. And if you have never been to a police academy, this is your choice to spend 3 days at the police academy without being a police recruit.