Online Training Registration
Law Enforcement Training Courses and Schedule
PATC Links
Law Enforcement Training Institute
PATC Internal Affairs Institute
PATC Internal Association of Hostage Negotiators
PATC Class Materials
Contact Us      Aboout PATC      PATC Publishing/Bookstore      Training Partners      Newsletter, Training Brochures, RSS, Facebook, Twitter, LinkedIN


Register for this Seminar | Return to Schedule |

Seminar Title:  
Social Media and Cell Phone Investigative Techniques

DATES:  11/1/2023 through 11/2/2023

INSTRUCTOR(S):  Melissa Maranville

LOCATION:  Columbus, Ohio Division of Police Training Academy - 1000 North Hague Ave., Columbus, OH  43204-2121

HOTEL:  Drury Inn & Suites Columbus Convention Center - Columbus, OH  
Contact Hotel for State Govt. Rate

COURSE REGISTRATION FEE:  $350.00 Includes all training materials, and a Certificate of Completion.

Instructor Bio

Melissa comes with almost 30 years of experience in the criminal justice field, either working, researching, developing, or delivering education and training. Her employment history includes a paralegal in criminal law, a booking, and intake officer cross-trained in forensic crime scene investigation, and a former criminal justice and criminology professor for almost 15 years. In 2000, Melissa assisted in training and educating the FBI's Evidence Response Team in crime scene collection of human remains and time since death at the University of Tennessee's Forensic Anthropological Research Facility, the Body Farm. Her experience also includes developing and delivering mass fatalities and counter-terrorism education content at the Department of Homeland Security training division and the College of Forensic Psychology on expert witness courtroom testimony regarding Domestic Minor Sex Trafficking.

Melissa researched, developed, and taught many criminal justice and behavior courses as a college professor and developed a SACS accredited "military accepted" college degree program for an online associate degree in Homeland Security and Criminal Justice. With a continued passion for understanding the criminal mind ,Melissa developed and presented training content for the International IP Crime Investigator's College (IIPCIC), a UL and INTERPOL initiative on the topics "The  Future of the Criminal Mind: Cryptocurrency and the Dark Web," and "Illicit  Activity in the Free Trade Zones." Melissa participated in expert panel discussions on cybercrime and criminal behavior.

In continuing her work, she DeVille and Associates, a forensic consulting and interagency training firm. She has been consulting and training focusing on illicit topics such as cryptocurrency and dark web, cyber forensic psychology, cognitive and dark psychology, cybersex predators, sexual deviance, and human trafficking. She has also been developing content and training online social media moderators on combating violence and predator behavior on social media and gaming platforms, as well as gathering cyber data on sex trafficking cases.

Melissa is a Ph.D. candidate in Cognitive Psychology at Grand Canyon University. Her dissertation topic is "A Case Study of Ineffective Legislation: Moral Panic and the Sex Offender Registry." Melissa also holds a master's degree in Safety Management with an additional emphasis in Criminology and a bachelorette degree in Criminology with a minor in abnormal psychology from the University of Tennessee, Knoxville.

Lastly, Melissa holds many recognitions, Psi Chi National Honorary Society (Ph.D. level),Alpha Chi National Honor Society (Ph.D. level), recognition of research on "Violence Against Women in the South," nomination for a distinguished faculty member for five consecutive years, and a letter of commendation for dedicated work that resulted in the capture and expedition of a repeat sex offender.  



Pre-Payment is not required to register or attend IN-PERSON seminars. Pre-payment is required for WEBINARS and ONLINE COURSES.


Course Objectives

The criminal mind never sleeps and is constantly advancing with technology. This introductory course will review the use of cyber technology looking at social networking* sites such as Facebook, Instagram, Tumblr, Twitter, Google+, Telegram, Omegle, and others in understanding criminal behavior and social networking sites, and cell phone technology*. Within cell phone technology investigative techniques, investigations techniques will range from cell phone apps to cell phone tower tracking protocols. Social networking sites and cell phones have expanded cyber crimes and created new channels for sharing information that could also be utilized by law enforcement to investigate crimes and identify suspects. This course does include child abuse and other illicit activities as case studies and examples. This course does include P2P investigations, proactive chat investigations, search and seizure protocols with courtroom testimony, gaming platforms, and much more.

(*Course will not be taught in necessarily the same order as listed below and in outline) (2-day event)

Upon Completion:

Participants will be able to:

1. Common crimes committed on social networking sites.

     a. The use of "bots."

     b. Artificial intelligence in gathering data.

2. Understand the basic steps for preserving a profile.

    a. Identifying its creator.

    c. Gather profile information.

3. Review social networking artifacts.

    a. Obtain evidence from servers.

4. Capture live digital evidence from computers and networks using opensource internet tools.

5. Perform live router interrogations.

    a. Use router interrogations to find evidence on computers.

    b. Copy RAM contents, Analyze routers at the scene.

6. Search and seizure protocols on digital evidence and courtroom testimony.

7. Understand and define the basic terms related to investigating cyber crimes.

8. Understand and explain IP addresses.

     a. Including dark web and virtual private networks (VPNs)

     b. Capture IP addresses and URL’s

9. Describe the links between social networking sites and the acceleration of crimes.

     a. Telegram, Omegle, Chat investigations, gaming platforms.

10. Understand the role of sextortion and online gaming platforms using social networking sites and cell phones.

11. Employ specific techniques and evolving tactics for successful cyber investigations.

12. Learn how to intercept digital evidence.

     a. Learn the importance of securing metadata when intercepting evidence.

13. Search and seizure protocols.

     a. Seizing both electronic and digital evidence and courtroom testimony.

     b. Current case laws

14. Learn how to intercept digital evidence.

     a. Metadata, cell phone records, tower records, cell phone data.

15. How to conduct peer-to-peer (P2P) investigations.

a. Proactive chat investigations.

Register for this Seminar | Return to Schedule |




View Legal Article Archive



Click Here to See Our FAQ!



Legal Updates
Internal Affairs

Click below to sign up for
emails and brochures!

PATC Mailing List

Public Agency Training Council - 2230 Stafford Road STE 115 PMB 379 - Plainfield, IN 46168 - 800.365.0119

About PATC | PATC Publishing/Bookstore | Training Partners | E-Newsletter | Contact Us | Home | Site Terms of Use Policy