Search for episodes from Full Access by Grayshift with a specific topic:

Latest episodes from Full Access by Grayshift

Full Access to EcoATM

Play Episode Listen Later Jun 30, 2023 38:44


An estimated 500 million devices are sitting unused in United States houses. ecoATM offers a way to sell and recycle unwanted devices by utilizing one of the company's 6000 kiosk locations. What happens when the device sold had been stolen?   ecoATM checks each device in various electronic reporting systems for signs of being stolen and reports every transaction to the local jurisdiction. Because of this integration and cooperation, law enforcement agencies have been able to make positive IDs.

Full Access to Bertram Lyons

Play Episode Listen Later Jun 16, 2023 60:37


How can you know if video evidence is valid or has been altered? By analyzing a file's metadata without accessing personal information or video footage, Medex can identify if it has been tampered with and flag it for further investigation.  As videos can be easily manipulated, authenticating them is becoming legally necessary. The digital forensic community should apply more pressure to ensure that files can be evaluated earlier in their lifecycle.

Full Access to Nathan Anderson

Play Episode Listen Later May 26, 2023 39:42


Digital evidence is critical to all ICAC investigations. As storage devices become increasingly smaller in physical size but store more data, locating that evidence becomes difficult. North Carolina State Bureau of Investigation has responded to this need by adding K-9 Rita to the team.   This episode's conversation with Nathan Anderson discusses electronic detection K-9s and their role in criminal investigations.

Full Access to Scott Montgomery

Play Episode Listen Later May 19, 2023 40:22


In a perfect world, on-premise storage infrastructure is refreshed every five years. That timeframe isn't realistic for law enforcement agencies. The benefit of using cloud resources is that it removes the need to buy all new hardware. As a cloud services provider, AWS handles the refresh so that organizations always have the latest storage and pay for only what they need. Often backup systems in agencies take the form of a NAS device underneath someone's desk. In the event of a natural disaster, everything would be lost. Even if the backup wasn't destroyed, there may not be access to it, and the operation would be down. With cloud storage, mission-critical systems can continue to operate simply because the system is in a separate location.

Full Access to Brian Fitch

Play Episode Listen Later Apr 28, 2023 39:56


Grayshift wants to allow customers to remove limitations such as inadequate computers and the need to use expensive external units. VeraKey has delivered the ability for investigators to share evidence regardless of geographic boundaries.  VeraKey is Grayshift's solution for commercial customers who want a GrayKey device, the collection tool used by law enforcement. Unlike GrayKey, VeraKey is a consent-based mobile forensic solution. It performs the same function in performing full file system collection from a device and providing that for forensic analysis. [01:50] Profile of this episode's Guest: Brian Fitch, Senior Product Manager - Grayshift Brian was instrumental in the development and release of VeraKey. He has been the Product Manager for a variety of companies. Twenty-five years ago, he started his cybersecurity career in customer support and transitioned into sales or systems engineering. [08:11] Endpoint Detection and Response(EDR) and Manage Detection and Response(MDR) EDR is what antivirus and anti-malware have morphed into today. It protects endpoints against the latest threats and gives customers information about what is happening at those endpoints. Sometimes something new can get into the system that isn't detected by anti-malware or antivirus. EDR reports against that. MDR ingests the alerts of EDR and sends them through software engineering and artificial intelligence to take out actionable security alerts for customers. [13:31] Brian's journey to Grayshift Brian had heard of the company and the positive outcomes it helped deliver, so he had been interested in joining Grayshift for a while. More and more people he knew and had good working relationships with had joined Grayshift. When a product management position opened, he pursued it and started with Grayshift last summer. [17:38] What is VeraKey? VeraKey is a consent-based mobile forensics solution offering plug-and-play functionality to perform a full-file system collection while offering simultaneous data analysis when coupled with Grayshift's new ArtifactIQ. A significant benefit is the ease with which collections can be shared, even with geographical separations in an investigation. The best feature is the ease of use. Following the workflow, the full file system is extracted. The user can opt to upload to ArtifactIQ and reach their first fact faster while performing analysis. The main difference between VeraKey and GrayKey is that VeraKey is a consent-based device only. It cannot unlock or brute force a phone like GrayKey. The companies using VeraKey have the consent of the device custodian and are usually performing a corporate investigation. [20:24] ArtifactIQ and how it works with VeraKey ArtifactIQ is a cloud based analytics tool. When VeraKey starts collecting data, it gives you the option to send that collected data to ArtifactIQ simultaneously.  Once in the cloud, ArtifactIQ pulls the most important data forward and puts it in an easy-to-read format inside the same user interface. Investigators can then review data easily and quickly. [24:59] Research from the private sector Grayshift spoke with many digital forensic examiners in the private sector while conducting research for the creation of VeraKey. Companies were adamant about protecting their employees from outside threats such as litigation of a perceived malpractice event. Commercial customers benefit from having consent for the collection, usually due to the device being a corporate-owned device or having a Bring Your Own Device agreement. [33:40] Prioritizing the roadmap for innovations Prioritization is one of the most fun and frustrating parts of being a product manager. Many organizations follow a framework such as Weighted Shortest Job First (WSJF) or Reach Impact Confidence Effort (RICE) to prioritize what problems to solve first. There's no right or wrong method for prioritization. Organizations need to determine what approach would work best for them. Brian primarily focuses on ensuring the company addresses the right problems first. CONNECT WITH DEBBIE, KARIN, AND GRAYSHIFT Debbie on Twitter Debbie on LinkedIn Karin on Linkedin Check out Grayshift online - https://Grayshift.com  Grayshift on Facebook Grayshift on Instagram Grayshift on Twitter Grayshift on LinkedIn Connect with us about the podcast at podcast@grayshift.com 

Full Access to Billy Rodgers and Olin Rankin

Play Episode Listen Later Apr 14, 2023 63:14


Many challenges accompany investigations on the dark web. Jurisdiction isn't the only hurdle. The investigator must also find a prosecutor who understands the investigation and is on board to tackle the challenge. With crypto, is enough money involved to get someone's attention with everything else they're doing? With a dark website, appropriately dedicated equipment is necessary. Not every agency can do that.  Learning to navigate the dark web requires time. Interacting with it is the best way to learn. Because it's so easy to download, Billy and Olin focus on teaching people how to get connected with it. Then investigations consist of taking the information found on the dark web to traditional places and hoping the criminal messed up somewhere. [00:55] Profile of this episode's guests: Billy Rodgers and Olin Rankin Both Billy and Olin are instructors for NW3C. Billy began his career as an adult probation officer in Pennsylvania, was a DEA agent for over 23 years, and now works as a high-tech crime specialist for NW3C. Olin teaches throughout the U.S., focusing on basic and intermediate instruction in classes such as Dark Web virtual currency and basic digital forensic analysis. [07:14] Billy's experience with the first-ever tapping of a website There was an individual who was selling chemicals on separate websites. When these chemicals were combined, they would create a drug. In the early 2000s, there wasn't a playbook for tapping websites. Billy was the person who forwarded everything to the agents who were working on the case. Billy had the opportunity to be part of the arrest team in Quebec for this case. This experience started Billy's interest in the nerdy part of investigating. [10:47] Olin's law enforcement career and move to cryptocurrency Olin started his law enforcement career as a desk clerk. Olin would enter all the data that had come in for service calls from the Russell Police Department's dispatch center. At the time, the calls for service were hand-written. Because he was still under 21, Olin moved into corrections for 12 years. When the county sheriff's office had an opening in the cybercrime division, he transferred there as a forensic examiner. [13:37] How can smaller agencies develop their own cybercrime divisions? The smaller an agency is, the harder it is for them to have the capital to start a cybercrimes division. Olin learned about a fund in the narcotics division where anyone convicted of a drug offense pays into a budget for the narcotics division to use for equipment. So Olin worked with Senator Bart Hester to create a similar cyber fund in Arkansas. [18:26] Funding undercover operations via a Bitcoin mining program Olin wanted his sheriff to be able to have every option on the table if they were hit with a ransomware attack.  He proposed starting a mining operation where they could utilize seized mining equipment instead of auctioning it off. The funds were used for undercover operations, prostitution stings, and dark web investigations. [21:31] Understanding cryptocurrency Cryptocurrency is a decentralized exchange medium allowing peer-to-peer and borderless payments. The software that manages different cryptocurrencies is called a wallet. The blockchain is a public ledger where all the transactional data resides. Any transaction that's ever occurred can be seen in the transactional data. Many people think crypto, like Bitcoin, is untraceable, but it isn't. There are ways in which the transactions can be followed to identify who is responsible. [29:11] What is an NFT? NFTs are also stored on the blockchain. They are designed to be specific, unique tokens representing various things. There have been money laundering cases where people sold NFTs to themselves and transferred money from one address to another. This process is also used to build the price up to scam people out of more money. NFTs could potentially become a better form of identification for people in the future to prevent identity theft and fraud. [34:03] The dark web, crime, and investigations The dark web is another form of communication. It's essentially a different browser that is more complicated to connect to, and it's slower. While the dark web isn't inherently bad, it can have marketplaces where people sell awful things. The dark web makes transactions anonymous. People don't even have to meet face-to-face. There are many types of crime on the dark web, such as drugs, child exploitation, selling stolen goods, and anything you could find in traditional crime. [56:37] What types of training are available with NW3C? NW3C.org has a complete catalog of courses available. Webinars, online training, and in-person training There are intelligence courses, financial investigation courses, courses on high-tech crimes, and something for everybody in law enforcement. NW3C also offers technical assistance Training is open to investigators, digital forensic examiners, prosecutors, and anyone in a law enforcement agency. CONNECT WITH DEBBIE, WILTON, AND GRAYSHIFT Debbie on Twitter Debbie on LinkedIn Matt on Linkedin Check out Grayshift online - https://Grayshift.com  Grayshift on Facebook Grayshift on Instagram Grayshift on Twitter Grayshift on LinkedIn Connect with us about the podcast at podcast@grayshift.com 

Full Access to Teagan Kavanagh

Play Episode Listen Later Mar 23, 2023 38:35


Digital Forensics is about finding the truth. Something that isn't discussed often is how sometimes the evidence doesn't add up, and people are exonerated. Data either exists or doesn't exist. Or, data existed at one point and doesn't exist now. Very rarely can something happen outside of those facts. What digital forensics can prove or disprove is crucial to the truth. E-discovery is a collaborative effort with multiple parties involved. Various stakeholders have a role to play in the whole process. People working in digital forensics need to be able to explain some of the technical terminologies in layperson's terms so that everyone can understand why an artifact is presenting itself a certain way or why something exists or doesn't exist on a device. [00:46] Profile of this episode's Guest: Teagan Kavanagh - Digital Forensic Examiner for TransPerfect Legal Solutions Teagan decided to pursue a career in criminal justice/law enforcement in college. During his senior year at Colorado State University, he interned with the Longmont Police Department, which jumpstarted his law enforcement career. Teagan had always been interested in tech, building his own PCs since he was a teenager. He didn't realize how much that experience could apply to his law enforcement career until it was needed. He utilized some of the many free resources available for law enforcement, such as a network investigations class where he learned to do router interrogations, break down IP addresses, and find hidden networks. [06:26] Teagan's role at TransPerfect Legal Solutions As Digital Forensic Examiner, Teagan works in the forensic technology and consulting branch of the legal solutions side of the company. The forensics division is a small part of the overarching e-discovery branch. In e-discovery, Teagan's job is primarily data preservation and collection from various digital data sources. [07:42] Digital forensics in the private sector vs. law enforcement Teagan's first job outside law enforcement was with a smaller, forensics vendor, Defense Forensic, where he worked with other former law enforcement. He then had an opportunity to work with TransPerfect Legal Solutions(TLS), and that seemed like the next logical move for his career.  TLS has a good mix of both law enforcement and not. Some of the team is former law enforcement, while some went to school for digital forensics and went directly into a corporate job after school. Digital forensics in the private sector works almost exclusively based on consent rather than seizing a phone and writing search warrants. When dealing with hardware, both sectors use the same tools and analyze artifacts in the same way. [13:48] Overcoming instances where someone isn't willing to provide information Trying to get a device away from somebody for longer than an hour is challenging, especially without knowing how long the process will take.  Large-scale preservation or collection matters involve over 100 devices. Coordinating time windows for each person to come in to image their devices requires a lot of logistics. Having forensics involved from the beginning of the process helps obtain the correct information to set accurate expectations later. The project is set up for failure if expectations aren't managed upfront. Managing expectations is vital to getting the job done efficiently. [20:17] The biggest challenges facing technology-related investigations With multiple parties involved, explaining some technical terminology in layperson's terms is critical to understanding. Many people have multiple phones nowadays. Sometimes those are old phones, and sometimes they are work or personal phones, and any of those could fall under the scope of the investigation. When someone buys a new device, they often transfer data from their old phone to the new one. Repeatedly doing that means more and more data must be processed. [33:20] Advice for those starting in digital forensics and those transitioning to the private sector Many high schools and colleges now offer classes and degrees in digital forensics. Free resources include podcasts, webinars, free training, and online information. Many people in law enforcement don't give themselves enough credit regarding transferable skills. Talk to people who have transitioned from law enforcement to the private sector for advice to get a better, well-rounded idea of the process. CONNECT WITH DEBBIE, MATT, AND GRAYSHIFT Debbie on Twitter Debbie on LinkedIn Matt on Linkedin Check out Grayshift online - https://Grayshift.com  Grayshift on Facebook Grayshift on Instagram Grayshift on Twitter Grayshift on LinkedIn Connect with us about the podcast at podcast@grayshift.com 

Full Access to Alia El-Sawi

Play Episode Listen Later Mar 10, 2023 40:53


One of the biggest challenges in helping victims of human trafficking is reiterating the importance of a victim-centered approach. When law enforcement agents are new to human trafficking, they must remember that someone is not in a sex-trafficking position because they want to be. A lot of manipulation is behind the situation, along with prior trauma that may have led that individual to their awful situation.  These cases differ from other investigations, such as drugs, guns, and gangs. They affect human lives, and these individuals will be the key to making the case. When working with these human trafficking cases, there needs to be an element of compassion while also being careful about removing biases. [01:09] Profile of this episode's guest: Alia El-Sawi - Victim Assistance Specialist at Homeland Security Investigations Alia has been a Victim Assistance Specialist with Homeland Security Investigations since 2010. Before her work with HSI, she served as the Anti-Human Trafficking Program Coordinator for a nonprofit organization called Tapestri. She has received many awards and recognitions, including Georgia Trend's “Top 40 Under 40” Georgians, Islamic Speakers Bureau of Atlanta's “Top 40 under 40”, and the Immigration and Customs Enforcement Directors Award.  [02:29] What is human trafficking? While human trafficking and human smuggling can be related, they are different. Both may involve movement of some sort. However, smuggling generally is done with the goal of the person having a better quality of life. Human trafficking consists of an ulterior motive by the trafficker to exploit the individual. With human trafficking, the individual may not understand or fully know they're being brought somewhere for an exploitative purpose. They may have been promised a job, but that job ends up looking very different. Labor trafficking is a form of human trafficking that uses force, fraud, or coercion to recruit individuals for some particular employment where the individuals end up in servitude. Sex trafficking involves commercial sex, where an individual is forced into what some refer to as forced prostitution. [11:25] Alia's role at Tapestri and journey to Homeland Security Investigations Alia started working in the anti-human trafficking field with Tapestri, a nonprofit, nongovernmental organization based in Atlanta, Georgia. At Tapestri, Alia provided direct services for survivors of both labor trafficking and sex trafficking of juveniles and adults, specifically within the various immigrant and refugee communities. Because of her work with Tapestri, Alia spent a lot of time building connections with local, state, and federal law enforcement. She referred case after case that agents could successfully present to the U.S. Attorney's Office, which successfully prosecuted. When the role of Victim Assistance Specialist opened in Atlanta, the supervisor and Assistant Special Agent in Charge approached Alia about the position. [19:00] Services available to those who have been victims of human trafficking Most of the time, Alia relies on the networks and resources she's built over the years that continue with the nonprofit world, direct service providers, child advocacy centers, and expands into the medical realm. Alia works with many medical professionals, such as behavioral health and substance abuse facilities.  Many faith-based communities are willing and eager to help the efforts by providing volunteers. Sometimes services look like anything from food banks to language access through English as a second language classes for an individual. [26:35] Staying motivated in difficult cases People ask Alia how she keeps from being depressed about such a heavy topic. She hangs on to the success stories because she knows people can escape their darkest days and walk into the light. There was one case that followed Alia as she moved from Tapestri to HSI. She saw the young lady go through the process and get the resources she needed to grow into a young lady doing exceptionally well. [30:03] The role of mobile forensics in human trafficking cases With the internet, there is, unfortunately, easier access to a variety of people. Many are recruited online through various means of social media. Social media with messaging, video, or photo capabilities are a breeding ground for trafficking and create an easier way for traffickers to infiltrate and start casual conversations with both adults and juveniles. Cell phones are a vital component of human trafficking investigations. Having the information on cell phones is the easiest way to unveil more of what's happening. [37:23] The future of fighting human trafficking Continue to raise awareness. As a country, the U.S. has come a long way in building awareness. Even globally, many strides have been taken to advance the fight. All sorts of legislation are being passed that help provide additional resources for the victims.  Dispelling human trafficking myths will help accurately detect what human trafficking is so more people can know what some of the red flags are and refer cases to help provide victims with the help they need. CONNECT WITH DEBBIE, MATT, AND GRAYSHIFT Debbie on Twitter Debbie on LinkedIn Matt on Linkedin Check out Grayshift online - https://Grayshift.com  Grayshift on Facebook Grayshift on Instagram Grayshift on Twitter Grayshift on LinkedIn Connect with us about the podcast at podcast@grayshift.com 

Full Access to Bernie Lampe

Play Episode Listen Later Feb 24, 2023 90:32


Our listeners want to know more about Grayshift, our mission, and the knowledgeable people who work here creating powerful digital forensics tools. Our guest today is Bernie Lampe, Vice President of Research at Grayshift, and we're talking about all things Android.  GrayKey has developed as a standout, game-changing leader in iOS access and extraction, but many people don't realize that Grayshift also supports Android devices. So this episode is dedicated to talking about the Android capabilities related to GrayKey. [01:53] Profile of this episode's guest: Bernie Lampe, Vice President of Research - Grayshift Has experience in both government and the private sector Joined the Air Force in 1999 He has presented at conferences and universities, and his research has been published. For the last several years, he has been working with government organizations on various projects, including remote sensing and vulnerability research [10:54] When did Grayshift first release support for Android devices? Bernie was hired in May 2020, and in January 2021, Grayshift released the S20 Android is meant to be more flexible than iOS. While iOS has a lineage version number, Android spider webs Since the S20, Grayshift has focused on Samsung because the company is the biggest provider of vendor Android phones Grayshift has also made its way into the Moto space [17:16] How to find good vulnerability researchers A good vulnerability researcher has to have reverse engineering skills. Code auditing experience is essential. Many people have the right things on their resumes, but they don't necessarily have a practitioner's level of working knowledge. The best people at this job are creative thinkers. [24:29] Attack surfaces have become more complicated over time A researcher has to invest a lot of time and effort into understanding a particular narrow problem set that is complicated. While there is some crossover between Android and iOS, understanding each well requires individual focus. Encryption schemes are constantly changing, and the work people did years ago is less relevant now. Someone must be deeply invested in understanding what's going on with one particular attack surface to devise techniques that no one else would know. [35:23] Some of the biggest vulnerabilities in Android Vendors have added various security and ad hoc security mechanisms that have been poorly implemented and have become sources of vulnerabilities themselves. Android has a lag time between finding a bug and perfectly patching it because of infighting between different companies or the company itself. One of the biggest problems with computer science in general in the software industry is that there are no standards. [41:07] Strategies for learning new devices The first step is finding the firmware and understanding the different pieces. The next step is researching by trying to find any open-source documentation, looking at the data, and looking at other online information about how people have approached this technology. One of the biggest challenges is knowing where to spend time in research. If a lot of information is available online, that route might not be a fertile attack surface because it has been vetted. If you can ask a question that no one has asked before, then typically, asking the right question leads to an answer quickly. [50:21] How long does it take to research and develop a solution for Grayshift to add a phone to its support matrix? The timeframe can vary from months to years. While bugs are constantly found, the bugs aren't necessarily usable. Grayshift's exploit engineering team has done an amazing job of building automated systems to port-forward bugs. If some phones are similar, they might have bugs that are portable. Support for those phones might be almost immediate. Because of fragmentation, each phone is configured differently, so they won't have the same bugs and won't be supported as quickly. The time between finding a vulnerability and actually finding an exploit can be long, but Grayshift is trying to speed that up by encapsulating fragmentation. [01:11:15] Advice for someone wanting to start a career in software vulnerability research Not everyone has the temperament for research. People need to be prepared to fail and learn from failing. Someone is always on the other side trying to pull the bricks out of the bridge you're trying to build, and then you have to start all over again. Learning how to learn is critical. The Art of Doing Science and Engineering: Learning to Learn: Richard W. Hamming, Bret Victor Richard Hamming: "Learning to Learn" - YouTube  CONNECT WITH DEBBIE, WILTON, AND GRAYSHIFT Debbie on Twitter Debbie on LinkedIn Wilton on Twitter Wilton on Linkedin Check out Grayshift online - https://Grayshift.com  Grayshift on Facebook Grayshift on Instagram Grayshift on Twitter Grayshift on LinkedIn Connect with us about the podcast at podcast@grayshift.com 

Full Access to Francey Hakes

Play Episode Listen Later Feb 10, 2023 83:03


The relationship between prosecutors and law enforcement is crucial to success. Nothing goes perfectly in a criminal trial; something crazy always happens. Trust is important so that whatever happens can be corrected in the run-up or during the trial itself. While law enforcement and prosecutors sometimes disagree, they are on the same team. When a relationship is developed between prosecutors and local and federal agents, they feel like they can call on each other for advice. If an agent is on a scene or going to be involved in an arrest and something unusual happens, the agent can call a prosecutor and ask how that would impact the prosecution later. That collaboration is critical on so many levels.

trust full access francey hakes
Full Access to Shannon Krieger

Play Episode Listen Later Jan 27, 2023 59:09


After his tenure as a U.S. Army Ranger and Special Operator, Shannon Krieger was introduced to the field of Digital Forensics through the USSOCOM Warrior Care Program (Care Coalition).  In this conversation with Shannon, we talk about the creation of the Human Exploitation Rescue Operation (HERO) Child-Rescue Corps Program, how Shannon became involved in combating child exploitation, and his experience during the last nine years as a Computer Forensic Analyst.

Full Access to Jessa Jones

Play Episode Listen Later Jan 13, 2023 90:42


What do you do when a phone is damaged and you can't access important information that will aid in solving a case? More often than not, you'll be told that the data isn't recoverable. But Jessa Jones believes that 99% of the time, that isn't the case.  In this episode, Jessa shares why phone manufacturers shy away from data recovery and how her business—iPad Rehab—steps in to fill the gap. Jessa has recovered data from phones chewed up by lawnmowers, blown up in airplane crashes, and water-logged while deep-sea fishing.  Jessa also offers law enforcement the necessary training to troubleshoot and repair mobile devices to extract the data they need.

Full Access to Stevie Coates

Play Episode Listen Later Dec 16, 2022 75:20


This episode is part of a series to help listeners and customers learn more about Grayshift, the company mission, and the people who carry out that mission. This episode's guest is Stevie Coates, Digital Forensics Specialist at Grayshift. He comes from a long career in law enforcement as an officer, digital forensics examiner, and trainer in Northern Ireland. The way people interact and use devices has dramatically changed over the years. Phones can now store impressive amounts of data that need to be processed. Likewise, computers nowadays typically have at least two or four terabyte drives. The challenge is the time required to move data into a format that can be analyzed. When investigating officers are up against the clock, and a serious incident just occurred, they need that data as quickly as possible to act on it.

Full Access to Corrina Chester

Play Episode Listen Later Dec 2, 2022 58:19


Grayshift would like listeners and customers to have the opportunity to learn more about the company, its mission, and the people who work to carry out that mission. The next series of podcasts will feature Grayshifters to share their experiences and expertise. This episode features Corrina Chester, the Strategic Account Manager for the United Kingdom in Ireland. Corrina has a rich history of serving the IT and digital forensics community. She shares her background, career, how she came to Grayshift, and what she sees as a path forward for technology and law enforcement.

united kingdom ireland chester full access grayshift
Full Access to Elizabeth Strong, Program Manager at NW3C, Wellness & Mental Health Initiative

Play Episode Listen Later Nov 16, 2022 43:58


We depend on law enforcement personnel to be on top of their game 24 hours a day, no questions asked. They're always making split second decisions which are always under scrutiny. The expectations of them are unrealistic, especially without considering mental health and wellness. Mental health and wellness are part of the constant maintenance everyone needs to be their best, especially law enforcement. If someone is expected to be on their game 100% of the time, making decisions that alter people's lives, they need to have the capacity and room to make those decisions. This episode's conversation with Elizabeth Strong outlines the need for mental health and wellness among law enforcement, dispatchers, public safety, fire, EMS, and so many more.

Full Access to Austin Berrier

Play Episode Listen Later Sep 30, 2022 64:18


Live streamed and victim-generated abuse imagery was already on the rise before the pandemic and has exploded in the last couple of years. Unless someone made the overt choice to memorialize it, the content is gone once the stream is turned off. Scores of apps have a live streaming component, even those that aren't marketed as live streaming. Children can video chat with people worldwide and be groomed and coerced to produce CSAM. Often the offender isn't in the room with the victim. This episode's guest, Austin Berrier, is a Special Agent at Homeland Security Investigations in the Cyber Crimes Division. The conversation covers his expertise in investigating human trafficking and the live streaming of sexual abuse of children. Austin also shares insight into the legal aspects of live streaming abuse investigations and some of the technical aspects of investigating this crime.

live children scores special agents full access homeland security investigations
Full Access to Jennifer Salvadori - Project Manager of Techno Security Conferences

Play Episode Listen Later Sep 24, 2022 33:09


IT security affects everyone, from law enforcement and municipalities to large corporations. The Techno Security & Digital Forensics Conference brings together anyone involved in cybersecurity, digital forensics, audit and risk management, and investigations.  The guest of this episode, Jennifer Salvadori - Event Director for Techno Security, explains that one of the greatest benefits of this conference is the encouragement people give each other through connections and networking. Attendees learn about new technology, processes, products, and services to increase work productivity. 

Full Access to Grayshift Digital Forensics Specialists: Josh Carder and Matt Fullerton

Play Episode Listen Later Sep 8, 2022 68:54


Listen now for Full Access to Josh Carder, Digital Forensics Specialist and Matt Fullerton, Digital Forensic Specialist at Grayshift.  Learn how Josh and Matt have taken their previous experiences in law enforcement and have applied them to help generate awareness and interest in mobile digital forensics while at Grayshift.   

EP14: Full Access to International Association of Computer Investigative Specialists: Mark Baker and Mario Merendon

Play Episode Listen Later Sep 2, 2022 58:01


Mark Baker is the Training Manager for the International Association of Computer Investigative Specialists (IACIS) and Mario Merendon is the Chairman of the Mobile Device Forensics class. Together they bring a combined 40+ years of experience in law enforcement to this episode of Full Access. 

EP: 13 Full Access to Ray Ham, The Georgia Department of Juvenile Justice, and the Georgia Gang Investigators Association

Play Episode Listen Later Aug 26, 2022 51:46


On this episode of Full Access, listen in as hosts Debbie Garner and Wilton Cleveland speak with Ray Ham, Manager of the Special Investigations Unit of the Georgia Department of Juvenile Justice. Ham also brings his experience with the Georgia Gang Investigators Association to the discussion. Much of this episode is focused on gangs and violent crime. 

EP 12: Full Access to Reveal by Grayshift

Play Episode Listen Later Aug 2, 2022 38:55


Episode Summary On this episode of Full Access, Grayshift Co-founder and Chief Product Officer, Braden Thomas, and Reveal Product Owner Scott Hettinger introduce listeners to Grayshift's new data analysis tool, Reveal.   You can listen to Full Access Episode #2 to learn more about Braden and the origins and creation of GrayKey, Grayshift's flagship data extraction tool for law enforcement. 

EP 11: Full Access to Special Agent Alan Davis

Play Episode Listen Later Jul 26, 2022 54:09


On this episode of Full Access meet current Assistant to the Special Agent in Charge (ATSAIC), responsible for Curriculum Development at the National Forensic Computer Institute (NCFI) in Hoover, Alabama, Alan Davis. This is your chance to hear about all the amazing training opportunities for state, local, tribal, and territorial law enforcement via the NCFI and how you can apply. 

EP 10: Full Access to the Grayshift Customer Success Team

Play Episode Listen Later Jul 1, 2022 43:19


On this episode of Full Access meet Vice President of Customer Success, Rick Hensley and Lead Customer Success Trainer Crystal Edmonds, and get a sneak peek into some of the exciting things the team is planning for Grayshift customers soon. 

vice president customer success full access customer success team grayshift
EP: 09 Full Access to NCMEC Director, Shelley Allwang

Play Episode Listen Later Jun 3, 2022 59:21


Today on Full Access we're discussing topics related to child sexual abuse material, also known as CSAM and child pornography. We're addressing these topics as they pertain to law enforcement and other organizations combatting this horrific crime. We are informing you now that there is discussion of graphic content during this episode of Full Access. We hope you choose to listen and learn with us but understand if you choose not to do so. Let's begin… It takes a network to take down a network. Shelley Allwang has been employed by the National Center for Missing and Exploited Children (NCMEC) since 2005 and worked her way up from the call center to the Director of the Exploited Children Division.   

Ep. 08: Full Access to Grayshift Digital Forensics Director, David Smalley

Play Episode Listen Later May 19, 2022 51:09


Listen now for Full Access to David Smalley, Director of Digital Forensics at Grayshift. Smalley came to Grayshift with a background in both law enforcement and the private sector and takes listeners on the journey of his career from loss prevention officer to DF Director.

EP 07: Full Access to Grayshift Grant Writer, Josh King

Play Episode Listen Later May 19, 2022 44:24


Listen now for Full Access to Grayshift Grant Writer, Josh King. King came to Grayshift from the Searcy Police Department in Arkansas where he was a Police Officer for just over 11 years. King spent half of his career assigned to the Central Arkansas Drug Task Force and is now currently in Law School.

Ep. 06 Full Access to the Technology Coalition

Play Episode Listen Later Mar 30, 2022 49:53


Listen now for Full Access to Sean Linton, Executive Director of the Technology Coalition, and to learn more about how tech companies across the world are working together to fight against the online sexual abuse and exploitation of children. 

Ep. 05 Full Access to the Child Rescue Coalition

Play Episode Listen Later Mar 30, 2022 51:52


Listen in as Glen Pounder grants you full access to what the Child Rescue Coalition, its mission, and what you can do to help keep children safe.  

Ep. 04 Full Access to Retired ICAC Commanders: John Pizzuro & Alan Flora

Play Episode Listen Later Mar 30, 2022 67:20


Listen in as former Internet Crimes Against Children (ICAC) commanders John Pizzuro (New Jersey) and Alan Flora (North Carolina) grant you full access to what the ICAC program is, its mission, and how it works.  

Ep. 03 Full Access to Hexordia Founder, Jessica Hyde

Play Episode Listen Later Jan 25, 2022 53:59


Join us as we speak with Jessica Hyde. Jessica is the founder at Hexordia, a consultant at Magnet Forensics and an adjunct professor at George Mason University. She is heavily involved in the DFIR community and has quite the fan base on Twitter, you can find her @B1N2H3X. We know you will enjoy getting to know her and hearing her perspective on all topics digital forensics'

Ep. 02 Full Access to the Minds Behind GrayKey

Play Episode Listen Later Jan 25, 2022 52:27


Join us as we speak with Grayshift co-founders, CEO, David Miles, and Chief Product Officer, Braden Thomas. We are thrilled to learn more about their careers, the origins of Grayshift, and a few little-known facts about themselves and the company.

Ep. 01 Full Access to Your Hosts: Debbie Garner & Wilton Cleveland

Play Episode Listen Later Jan 21, 2022 41:22


Join us as we introduce you to our Full Access hosts, Debbie Garner and Wilton Cleveland. Learn more about their backgrounds in Law Enforcement, what lead them to Grayshift, and much more!

Claim Full Access by Grayshift

In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

Claim Cancel