Loading Events

In this hands-on class, participants will review a case study detailing how a fraudulent and nefarious actor obtains personally identifiable information and how it can be used against you. Participants will learn “Opt Out” procedures for public service and security personnel and explore the tools and methodologies used to operate discreetly on the internet. Upon completion of the class, field investigators will be able to identify how private lives and public information are available through websites, social networks, and “Invisible Web” sources; and will have the ability to protect their privacy by implementing basic security practices online, at home, and on social media.