Program Details-Morning Sessions
Session #1
Intelligence-Driven Asset Searches: How to Steer Public Information Research and Human Insight Efforts into Results will provide insights to navigate today’s complex legal and financial landscapes to conduct asset searches, which require more than database queries and surface-level research. Intelligence-driven asset searches combine structured public records research, digital footprint analysis and often human-source insights to uncover hidden assets, beneficial ownership structures and risk exposures.
This session will detail a strategic, results-oriented framework for conducting asset investigations that goes beyond passive information gathering. Participants will learn how to design intelligence plans, prioritize high-value data sources, integrate open-source intelligence (OSINT) with human insight efforts and transform fragmented information into actionable findings.
By focusing on methodology, analytical rigor and ethical considerations, this session equips investigative professionals with practical tools to drive efficient, defensible, and outcome-focused asset search investigations – whether for litigation support, due diligence, fraud recovery, regulatory compliance or strategic risk assessment.
Learning Objectives
By the end of this session, participants will be able to:
1. Design a structured asset search strategy
Develop a clear investigative roadmap that aligns research efforts with case objectives and measurable outcomes. Differentiate and understand efficient and effective research techniques that work in the United States versus overseas.
2. Leverage public information sources effectively
Identify and prioritize high-impact public records, corporate filings, real property databases, court records and digital footprints to uncover asset indicators.
3. Integrate human insight with open-source intelligence
Understand how and when to combine interviews, network mapping and contextual human intelligence with OSINT findings to expand leads.
4. Transform data into actionable intelligence
Synthetize disparate information into defensible reports that support litigation objectives (piercing the corporate veil), recovery strategies (going after prized assets to force an outcome) or strategic decision making (whether to settle or continue until final verdict).
Session #2
Piercing the Privacy Veil: Investigating Romance + Investment Scams and Other Fraud Online explores the methodology behind identifying perpetrators of online fraud by leveraging open-source intelligence (OSINT), breached data and ethically sourced deep/dark web intelligence.
This session will walk through practical investigative workflows used in romance scams, investment fraud and other online deception schemes. Participants will learn how to pivot from common, often pseudonymous identifiers—such as email addresses, usernames, phone numbers and profile photos—to uncover digital footprints and potential real-world identities.
The talk will emphasize method over tools, breaking down how paid commercial tools source their data so investigators can understand (and replicate) similar queries using free open source tools and manual techniques. Real-world examples will include using GHunt to extract a Gaia ID from a Google account, correlating that data with Maps reviews and pivoting across platforms like Yelp and Goodreads to connect accounts tied to the same identifiers.
Attendees will leave with a practical framework for conducting structured, defensible online investigations while understanding the technical, ethical and legal considerations involved.
Learning Objectives
By the end of this session, participants will be able to:
1. Pivot Effectively from Core Identifiers
Use email addresses, usernames, phone numbers and other digital artifacts to uncover linked accounts and build investigative leads across multiple platforms.
2. Leverage Breach and Scraped Data Responsibly
Understand how data breaches and deep/dark web–sourced datasets can assist investigations, and apply them ethically and legally to enrich attribution efforts.
3. Deconstruct Commercial OSINT Tools
Analyze how commercial tools source and correlate data, and replicate similar investigative queries using open-source techniques and APIs.
4. Recognize Operational Security (OPSEC) Risks in Investigations
Identify how investigators can inadvertently alert fraud actors, contaminate data or expose themselves online—and implement safeguards to protect investigative integrity.
Program Details-Afternoon Sessions
Attendees will leave with a practical framework for conducting structured, defensible online investigations while understanding the technical, ethical and legal considerations involved.
Learning Objectives
By the end of this session, participants will be able to:
1. Pivot Effectively from Core Identifiers
Use email addresses, usernames, phone numbers and other digital artifacts to uncover linked accounts and build investigative leads across multiple platforms.
2. Leverage Breach and Scraped Data Responsibly
Understand how data breaches and deep/dark web–sourced datasets can assist investigations, and apply them ethically and legally to enrich attribution efforts.
3. Deconstruct Commercial OSINT Tools
Analyze how commercial tools source and correlate data, and replicate similar investigative queries using open-source techniques and APIs.
4. Recognize Operational Security (OPSEC) Risks in Investigations
Identify how investigators can inadvertently alert fraud actors, contaminate data or expose themselves online—and implement safeguards to protect investigative integrity.